πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ APT28 Employs Windows Update Lures to Trick Ukrainian Targets πŸ•΄

The phishing emails were sent using names of system administrators and a letter containing instructions to protect against hackers.

πŸ“– Read

via "Dark Reading".
⚠ Apple delivers first-ever Rapid Security Response β€œcyberattack” patch – leaves some users confused ⚠

Just when we'd got used to three-numbered versions, such as "13.3.1", here comes an update suffix, bringing you "13.3.1 (a)"...

πŸ“– Read

via "Naked Security".
πŸ•΄ Enterprise Strategy Group Research Reveals 75% of Organizations Change or Update APIs on a Daily or Weekly Basis πŸ•΄

According to the ESG Study, 92% of organizations have experienced at least one security incident related to insecure APIs in the past year.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-2197 β€Ό

HashiCorp Vault Enterprise 1.13.0 up to 1.13.1 is vulnerable to a padding oracle attack when using an HSM in conjunction with theΓ‚ CKM_AES_CBC_PAD orΓ‚ CKM_AES_CBC encryption mechanisms.Γ‚ An attacker with privileges to modify storage and restart Vault may be able to intercept or modify cipher text in order to derive VaultÒ€ℒs root key. Fixed in 1.13.2

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-35898 β€Ό

OpenText BizManager before 16.6.0.1 does not perform proper validation during the change-password operation. This allows any authenticated user to change the password of any other user, including the Administrator account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2014-125100 β€Ό

A vulnerability classified as problematic was found in BestWebSoft Job Board Plugin 1.0.0 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is dbb71deee071422ce3e663fbcdce3ad24886f940. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227764.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2013-10026 β€Ό

A vulnerability, which was classified as problematic, has been found in Mail Subscribe List Plugin up to 2.0.10 on WordPress. This issue affects some unknown processing of the file index.php. The manipulation of the argument sml_name/sml_email leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.1 is able to address this issue. The name of the patch is 484970ef8285cae51d2de3bd4e4684d33c956c28. It is recommended to upgrade the affected component. The identifier VDB-227765 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30869 β€Ό

Improper Authentication vulnerability in Easy Digital Downloads plugin allows unauth. Privilege Escalation.Γ‚ This issue affects Easy Digital Downloads: from 3.1 through 3.1.1.4.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Malware being pushed to businesses by search engines remains a pervasive threat πŸ“’

High-profile malvertising campaigns in recent months have surged

πŸ“– Read

via "ITPro".
πŸ•΄ 4 Principles for Creating a New Blueprint for Secure Software Development πŸ•΄

Improving the security of the software development process is key to thwarting bad actors.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-2474 β€Ό

A vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2475 β€Ό

A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29772 β€Ό

A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23723 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media WP Email Capture plugin <=Γ‚ 3.9.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2473 β€Ό

A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google Ads Abused to Lure Corporate Workers to LOBSHOT Backdoor πŸ•΄

The cyberattack campaign, similar to one to spread the Rhadamanthys Stealer, is part of a larger trend by attackers to use malvertising as initial access for ransomware and other threat activity.

πŸ“– Read

via "Dark Reading".
πŸ›  MIMEDefang Email Scanner 3.4.1 πŸ› 

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Clam AntiVirus Toolkit 1.1.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS source code release.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-2476 β€Ό

A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument ????/???? leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2477 β€Ό

A vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".