πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ New Generative AI Tools Aim to Improve Security πŸ•΄

The debate over whether ChatGPT and other generative AI tools will benefit defenders or further embolden attackers may be ongoing, but companies are going forward with new tools.

πŸ“– Read

via "Dark Reading".
⚠ World Password Day: 2 + 2 = 4 ⚠

We've kept it short and simple, with no sermons, no judgmentalism, no tubthumping... and no BUY NOW buttons. Have a nice day!

πŸ“– Read

via "Naked Security".
πŸ•΄ Famine to Feast and Back: Startups Adjust to Economic Realities πŸ•΄

Cybersecurity is a hotbed of startup activity, and with good reason. Startups typically look for an IPO or acquisition, but right now IPOs are off the table.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-26016 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tauhidul Alam Simple Portfolio Gallery plugin <=Γ‚ 0.1 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25962 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Biplob Adhikari Accordion Γ’β‚¬β€œ Multiple Accordion or FAQs Builder plugin <=Γ‚ 2.3.0 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2022-45818 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP OnlineSupport, Essential Plugin Hero Banner Ultimate plugin <=Γ‚ 1.3.4 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23470 β€Ό

IBM i 7.2, 7.3, 7.4, and 7.5 could allow an authenticated privileged administrator to gain elevated privileges in non-default configurations, as a result of improper SQL processing. By using a specially crafted SQL operation, the administrator could exploit the vulnerability to perform additional administrator operations. IBM X-Force ID: 244510.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24958 β€Ό

A vulnerability in the IBM TS7700 Management Interface 8.51.2.12, 8.52.200.111, 8.52.102.13, and 8.53.0.63 could allow an authenticated user to submit a specially crafted URL leading to privilege escalation and remote code execution. IBM X-Force ID: 246320.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26012 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Denzel Chia | Phire Design Custom Login Page plugin <=Γ‚ 2.0 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30619 β€Ό

Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26010 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPMobile.App plugin <=Γ‚ 11.18 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29827 β€Ό

ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Public-Private Information Sharing Can Level the Cybersecurity Playing Field πŸ•΄

Sharing information is critical to help organizations protect data and systems. To be even more effective, collaboration should be inclusive β€” vendors, researchers, and private companies large and small.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep133: Apple takes β€œtight-lipped” to a whole new level ⚠

Entertaining, educational, and all in plain English πŸŽ§πŸ“–

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-29995 β€Ό

In NanoMQ v0.15.0-0, a Heap overflow occurs in copyn_utf8_str function of mqtt_parser.c

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29996 β€Ό

In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2521 β€Ό

A vulnerability was found in NEXTU NEXT-7004N 3.0.1. It has been classified as problematic. Affected is an unknown function of the file /boafrm/formFilter of the component POST Request Handler. The manipulation of the argument url with the input <svg onload=alert(1337)> leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228012. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29994 β€Ό

In NanoMQ v0.15.0-0, Heap overflow occurs in read_byte function of mqtt_code.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30184 β€Ό

A stored cross-site scripting (XSS) vulnerability in Typecho v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter at /index.php/archives/1/comment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2519 β€Ό

A vulnerability has been found in Caton CTP Relay Server 1.2.9 and classified as critical. This vulnerability affects unknown code of the file /server/api/v1/login of the component API. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. VDB-228010 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2520 β€Ό

A vulnerability was found in Caton Prime 2.1.2.51.e8d7225049(202303031001) and classified as critical. This issue affects some unknown processing of the file cgi-bin/tools_ping.cgi?action=Command of the component Ping Handler. The manipulation of the argument Destination leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228011. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".