πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-22640 β€Ό

A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.11, FortiOS version 6.2.0 through 6.2.13, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.1, FortiProxy version 7.0.0 through 7.0.7, FortiProxy all versions 2.0, FortiProxy all versions 1.2, FortiProxy all versions 1.1, FortiProxy all versions 1.0 allows an authenticated attacker to execute unauthorized code or commands via specifically crafted requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27999 β€Ό

An improper neutralization of special elements used in an OS command vulnerability [CWE-78]Γ‚ in FortiADC 7.2.0, 7.1.0 through 7.1.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22637 β€Ό

An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in License Management would permit an authenticated attacker to trigger remote code execution via crafted licenses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0756 β€Ό

An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. The main branch of a repository with a specially crafted name allows an attacker to create repositories with malicious code, victims who clone or download these repositories will execute arbitrary code on their systems.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4376 β€Ό

An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions, an attacker may be able to map a private email of a GitLab user to their GitLab account on an instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45860 β€Ό

A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30331 β€Ό

An issue in the render function of beetl v3.15.0 allows attackers to execute server-side template injection (SSTI) via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30077 β€Ό

Judging Management System v1.0 by oretnom23 was discovered to vulnerable to SQL injection via /php-jms/review_result.php?mainevent_id=, mainevent_id.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27075 β€Ό

A cross-site scripting vulnerability (XSS) in the component microbin/src/pasta.rs of Microbin v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
β€Ό CVE-2023-27568 β€Ό

SQL injection vulnerability inSpryker Commerce OS 0.9 that allows for access to sensitive data via customer/order?orderSearchForm[searchText]=

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1πŸ”₯1
β€Ό CVE-2022-47757 β€Ό

In imo.im 2022.11.1051, a path traversal vulnerability delivered via an unsanitized deeplink can force the application to write a file into the application's data directory. This may allow an attacker to save a shared library under a special directory which the app uses to dynamically load modules. Loading the library can lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯2
β€Ό CVE-2023-26125 β€Ό

Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22651 β€Ό

Improper Privilege Management vulnerability in SUSE Rancher allows Privilege Escalation. A failure in the update logic of Rancher's admission Webhook may lead to the misconfiguration of the Webhook. This component enforces validation rules and security checks before resources are admitted into the Kubernetes cluster.The issue only affects users that upgrade from 2.6.x or 2.7.x to 2.7.2. Users that did a fresh install of 2.7.2 (and did not follow an upgrade path) are not affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25934 β€Ό

DELL ECS prior to 3.8.0.2 contains an improper verification of cryptographic signature vulnerability. A network attacker with an ability to intercept the request could potentially exploit this vulnerability to modify the body data of the request.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ As Google launches passwordless authentication for all, what are the business benefits of passkeys? πŸ“’

Google follows Apple in its latest shift to passwordless authentication, but what are the benefits?

πŸ“– Read

via "ITPro".
⚠ Tracked by hidden tags? Apple and Google unite to propose safety and security standards… ⚠

To bleat, or not to bleat, that is the question.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2017-20184 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Carlo Gavazzi Powersoft up to version 2.1.1.1 allows an unauthenticated, remote attacker to download any file from the affected device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4259 β€Ό

Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Patches Serious Azure Cloud Security Flaws πŸ•΄

Three vulnerabilities in the platform's API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New Generative AI Tools Aim to Improve Security πŸ•΄

The debate over whether ChatGPT and other generative AI tools will benefit defenders or further embolden attackers may be ongoing, but companies are going forward with new tools.

πŸ“– Read

via "Dark Reading".
⚠ World Password Day: 2 + 2 = 4 ⚠

We've kept it short and simple, with no sermons, no judgmentalism, no tubthumping... and no BUY NOW buttons. Have a nice day!

πŸ“– Read

via "Naked Security".