πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  MIMEDefang Email Scanner 3.4.1 πŸ› 

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Clam AntiVirus Toolkit 1.1.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software. This is the LTS source code release.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-2476 β€Ό

A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument ????/???? leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2477 β€Ό

A vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2479 β€Ό

OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29856 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L Hardware version A1, firmware version 1.12 is vulnerable to Buffer Overflow. The vulnerability is in scandir.sgi binary.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2445 β€Ό

Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Five things to consider before choosing an MFA solution πŸ“’

Because we all should move on from using β€œpassword” as a password

πŸ“– Read

via "ITPro".
πŸ•΄ North Korean APT Gets Around Macro-Blocking With LNK Switch-Up πŸ•΄

APT37 is among a growing list of threat actors that have switched to Windows shortcut files after Microsoft blocked macros last year.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-29868 β€Ό

Zammad 5.3.x (Fixed in 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker with agent and customer roles could perform unauthorized changes on articles where they only have customer permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29918 β€Ό

RosarioSIS 10.8.4 is vulnerable to CSV injection via the Periods Module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29867 β€Ό

Zammad 5.3.x (Fixed 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker could gain information about linked accounts of users involved in their tickets using the Zammad API.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30861 β€Ό

Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by the proxy to other clients. If the proxy also caches `Set-Cookie` headers, it may send one client's `session` cookie to other clients. The severity depends on the application's use of the session and the proxy's behavior regarding cookies. The risk depends on all these conditions being met.1. The application must be hosted behind a caching proxy that does not strip cookies or ignore responses with cookies.2. The application sets `session.permanent = True`3. The application does not access or modify the session at any point during a request.4. `SESSION_REFRESH_EACH_REQUEST` enabled (the default).5. The application does not set a `Cache-Control` header to indicate that a page is private or should not be cached.This happens because vulnerable versions of Flask only set the `Vary: Cookie` header when the session is accessed or modified, not when it is refreshed (re-sent to update the expiration) without being accessed or modified. This issue has been fixed in versions 2.3.2 and 2.2.5.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Apple Debuts Its Rapid Response Security Update Approach πŸ•΄

Smaller fixes deliver quick improvements for iPhones, iPads, and iMacs between software updates.

πŸ“– Read

via "Dark Reading".
πŸ•΄ PrivateGPT Tackles Sensitive Info in ChatGPT Prompts πŸ•΄

In an effort to curb employees from entering private data into the AI, ChatGPT is blocked from ingesting more than 50+ types of PII and other sensitive information.

πŸ“– Read

via "Dark Reading".
πŸ•΄ APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics πŸ•΄

The notorious Chinese APT is spreading cyber maliciousness around Southeast Asia, and its next targets are already in sight.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-47878 β€Ό

Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31434 β€Ό

The parameters nutzer_titel, nutzer_vn, and nutzer_nn in the user profile, and langID and ONLINEID in direct links, in evasys before 8.2 Build 2286 and 9.x before 9.0 Build 2401 do not validate input, which allows authenticated attackers to inject HTML Code and XSS payloads in multiple locations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47877 β€Ό

A Stored cross-site scripting vulnerability in Jedox 2020.2.5 allows remote, authenticated users to inject arbitrary web script or HTML in the Logs page via the log module 'log'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30943 β€Ό

The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47874 β€Ό

Improper Access Control in /tc/rpc in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to view details of database connections via class 'com.jedox.etl.mngr.Connections' and method 'getGlobalConnection'.

πŸ“– Read

via "National Vulnerability Database".