🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-29608 ‼

An issue was discovered in ONOS 2.5.1. An intent with a port that is an intermediate point of its path installs an invalid flow rule, causing a network loop.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38364 ‼

An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of flow rules installed by intents. A remote attacker can install or remove a new intent, and consequently modify or delete the existing flow rules related to other intents.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-29605 ‼

An issue was discovered in ONOS 2.5.1. IntentManager attempts to install the IPv6 flow rules of an intent into an OpenFlow 1.0 switch that does not support IPv6. Improper handling of the difference in capabilities of the intent and switch is misleading to a network operator.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-29606 ‼

An issue was discovered in ONOS 2.5.1. An intent with a large port number shows the CORRUPT state, which is misleading to a network operator. Improper handling of such port numbers causes inconsistency between intent and flow rules in the network.

📖 Read

via "National Vulnerability Database".
âš  Ex-CEO of breached pyschotherapy clinic gets prison sentence for bad data security âš 

Did the sentence fit the crime? Read the backstory, and then have your say in our comments! (You may post anonymously.)

📖 Read

via "Naked Security".
🕴 Global Spyware Attacks Spotted Against Both New & Old iPhones 🕴

Campaigns that wielded NSO Group's Pegasus against high-risk users over a six-month period demonstrate the growing sophistication and relentless nature of spyware actors.

📖 Read

via "Dark Reading".
‼ CVE-2023-22309 ‼

Reflective Cross-Site-Scripting in Webconf in Tribe29 Checkmk Appliance before 1.6.4.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-29926 ‼

PowerJob V4.3.2 has unauthorized interface that causes remote code execution.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-46302 ‼

Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-27652 ‼

An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges cause a denial of service via the update_info field of the _default_.xml file.

📖 Read

via "National Vulnerability Database".
🕴 Tech Insight: Dangers of Using Large Language Models Before They Are Baked 🕴

Today's LLMs pose too many trust and security risks.

📖 Read

via "Dark Reading".
🕴 Twitter's 2FA Policy Is a Call for Passkey Disruption 🕴

Overcoming the limitations of consumer MFA with a new flavor of passwordless.

📖 Read

via "Dark Reading".
âš  S3 Ep131: Can you really have fun with FORTRAN? âš 

Loop-the-loop in this week's episode. Entertaining, educational and all in plain English. Transcript inside.

📖 Read

via "Naked Security".
‼ CVE-2023-25601 ‼

On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-1255 ‼

Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-23938 ‼

Tuleap is a Free & Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-27350 ‼

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-36788 ‼

A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-27351 ‼

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226.

📖 Read

via "National Vulnerability Database".
🕴 Trigona Ransomware Trolling for 'Poorly Managed' MS-SQL Servers 🕴

Vulnerable MS-SQL database servers have external connections and weak account credentials, researchers warn.

📖 Read

via "Dark Reading".
‼ CVE-2023-23579 ‼

Datakit CrossCadWare_x64.dll contains an out-of-bounds write past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This could allow an attacker to execute code in the context of the current process.

📖 Read

via "National Vulnerability Database".