πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-3429 β€Ό

When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28328 β€Ό

A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2166 β€Ό

A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2084 β€Ό

Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33971 β€Ό

Qihoo 360 (https://www.360.cn/) Qihoo 360 Safeguard (https://www.360.cn/) Qihoo 360 Total Security (http://www.360totalsecurity.com/) is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: This is a set of vulnerabilities affecting popular software, "360 Safeguard(12.1.0.1004,12.1.0.1005,13.1.0.1001)" , "360 Total Security(10.8.0.1060,10.8.0.1213)", "360 Safe Browser & 360 Chrome(13.0.2170.0)". The attack vector is: On the browser vulnerability, just open a link to complete the vulnerability exploitation remotely; on the client software, you need to locally execute the vulnerability exploitation program, which of course can be achieved with the full chain of browser vulnerability. ¢¢ This is a set of the most serious vulnerabilities that exist on Qihoo 360's PC client a variety of popular software, remote vulnerabilities can be completed by opening a link to arbitrary code execution on both security browsers, with the use of local vulnerabilities, not only help the vulnerability code constitutes an escalation of privileges, er can make the spyware persistent without being scanned permanently resides on the target PC computer (because local vulnerability against Qihoo 360 company's antivirus kernel flaws); this group of remote and local vulnerability of the perfect match, to achieve an information security fallacy, in Qihoo 360's antivirus vulnerability, not only can not be scanned out of the virus, but will help the virus persistently control the target computer, while Qihoo 360 claims to be a safe browser, which exists in the kernel vulnerability but helped the composition of the remote vulnerability. (Security expert "Memory Corruptor" have reported this set of vulnerabilities to the corresponding vendor, all vulnerabilities have been fixed and the vendor rewarded thousands of dollars to the security experts)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23451 β€Ό

The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW., SICK UE410-EN1 FLEXI ETHERNET GATEW., SICK UE410-EN3S04 FLEXI ETHERNET GATEW., SICK UE410-EN4 FLEXI ETHERNET GATEW., SICK FX0-GENT00000 FLEXISOFT EIP GATEW., SICK FX0-GMOD00000 FLEXISOFT MOD GATEW., SICK FX0-GPNT00000 FLEXISOFT PNET GATEW., SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 and SICK FX0-GMOD00010 FLEXISOFT MOD GW. have Telnet enabled by factory default. No password is set in the default configuration. Gateways with a serial number >2311xxxx have the Telnet interface disabled by factory default.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1382 β€Ό

A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28327 β€Ό

A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ“’ Capita finally admits breach affecting 4% of its servers πŸ“’

It also allegedly misled the public about when the breach took place

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-2193 β€Ό

Mattermost fails to invalidate existing authorization codes when deauthorizing an OAuth2 app, allowing an attacker possessing an authorization code to generate an access token.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28047 β€Ό

Dell Display Manager, versions 2.1.0 and prior, contains an arbitrary file or folder creation vulnerability during installation. A local low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code on the operating system with high privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0384 β€Ό

User-controlled operations could have allowed Denial of Service in M-Files Server before 23.4.12528.1 due to uncontrolled memory consumption for a scheduled job.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0383 β€Ό

User-controlled operations could have allowed Denial of Service in M-Files Server before 23.4.12528.1 due to uncontrolled memory consumption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2014-125099 β€Ό

A vulnerability has been found in I Recommend This Plugin up to 3.7.2 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality of the file dot-irecommendthis.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 3.7.3 is able to address this issue. The name of the patch is 058b3ef5c7577bf557557904a53ecc8599b13649. It is recommended to upgrade the affected component. The identifier VDB-226309 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4942 β€Ό

A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The name of the patch is 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2112 β€Ό

Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Walking the line: GitOps and Shift Left security πŸ“’

Scalable, developer-centric supply chain security solutions

πŸ“– Read

via "ITPro".
πŸ“’ Beat cyber criminals at their own game πŸ“’

A guide to winning the vulnerability race and protection your organization

πŸ“– Read

via "ITPro".
πŸ“’ Off-the-shelf ransomware is spurring a new era in the Ukraine war πŸ“’

Experts agreed Russian forces could be overwhelmed, forced to use less sophisticated tools to meet the regime's demands

πŸ“– Read

via "ITPro".
πŸ“’ Quantifying the public vulnerability market: 2022 edition πŸ“’

An analysis of vulnerability disclosures, impact severity, and product analysis

πŸ“– Read

via "ITPro".
πŸ“’ Three ways to evolve your security operations πŸ“’

Why current approaches aren’t working

πŸ“– Read

via "ITPro".