πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.3K subscribers
88.8K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-30839 β€Ό

PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23721 β€Ό

PingID integration for Windows login prior to 2.9 does not handle duplicate usernames, which can lead to a username collision when two people with the same username are provisioned onto the same machine at different times.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45291 β€Ό

PWS Personal Weather Station Dashboard (PWS_Dashboard) LTS December 2020 (2012_lts) allows remote code execution by injecting PHP code into settings.php. Attacks can use the PWS_printfile.php, PWS_frame_text.php, PWS_listfile.php, PWS_winter.php, and PWS_easyweathersetup.php endpoints. A contributing factor is a hardcoded login password of support, which is not documented. (This is not the same as the documented setup password, which is 12345.) The issue was fixed in late 2022.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26263 β€Ό

Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28088 β€Ό

An HPE OneView appliance dump may expose SAN switch administrative credentials

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44465 β€Ό

Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23837 β€Ό

No exception handling vulnerability which revealed sensitive or excessive information to users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30838 β€Ό

PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the `ValidateCore::isCleanHTML()` method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup `@keyframes` methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23166 β€Ό

A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read and write local files on the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45071 β€Ό

Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via crafted uploaded file names.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44476 β€Ό

A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ NetWitness Partners With Palo Alto Networks, Broadcom to Launch SASE Packet Integrations at RSA Conference 2023 πŸ•΄

Full packet capture and log monitoring directly on SASE nodes maintains enterprise-grade security, no matter where the data originates.

πŸ“– Read

via "Dark Reading".
πŸ•΄ ReliaQuest Adds AI Capabilities to GreyMatter Intelligent Analysis πŸ•΄

Integration of AI can lead to reduction of up to 90% in meantime to resolve security incidents.

πŸ“– Read

via "Dark Reading".
πŸ•΄ AI Experts: Account for AI/ML Resilience & Risk While There's Still Time πŸ•΄

CISOs and cybersecurity teams will play a key role in hardening artificial intelligence and machine learning systems.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-20871 β€Ό

VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29012 β€Ό

Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25815 β€Ό

In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28084 β€Ό

HPE OneView and HPE OneView Global Dashboard appliance dumps may expose authentication tokens

πŸ“– Read

via "National Vulnerability Database".