πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-31208 β€Ό

Improper neutralization of livestatus command delimiters in the RestAPI in Checkmk < 2.0.0p36, < 2.1.0p28, and < 2.2.0b8 (beta) allows arbitrary livestatus command execution for authorized users.

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ“’ US identifies and places $10 million bounty on LockBit, Hive ransomware kingpin πŸ“’

Mikhail Pavlovich Matveev was linked to specific ransomware attacks, including a 2021 raid on the DC police department

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-2756 β€Ό

SQL Injection in GitHub repository pimcore/customer-data-framework prior to 3.3.10.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Digital Defense Report: Nation-State Threats and Cyber Mercenaries πŸ•΄

In part three of this three-part series, Microsoft dissects these twinned threats and what organizations can do to reduce or eliminate their risk.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ I Was an RSAC Innovation Sandbox Judge β€” Here's What I Learned πŸ•΄

Three pieces of advice to startups serious about winning funding and support for their nascent companies: Articulate your key message clearly, have the founder speak, and don't use a canned demo.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-31699 β€Ό

ChurchCRM v4.5.4 is vulnerable to Reflected Cross-Site Scripting (XSS) via image file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31702 β€Ό

SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-31698 β€Ό

Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31902 β€Ό

RPA Technology Mobile Mouse 3.6.0.4 is vulnerable to Remote Code Execution (RCE).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31703 β€Ό

Cross Site Scripting (XSS) in the edit user form in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the from parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30438 β€Ό

An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server. IBM X-Force ID: 252706.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31904 β€Ό

savysoda Wifi HD Wireless Disk Drive 11 is vulnerable to Local File Inclusion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2679 β€Ό

Data leakage in Adobe connector in Snow Software SPE 9.27.0 on Windows allows privileged user to observe other users data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31903 β€Ό

GuppY CMS 6.00.10 is vulnerable to Unrestricted File Upload which allows remote attackers to execute arbitrary code by uploading a php file.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Sunday Paper Debacle: Philadelphia Inquirer Scrambles to Respond to Cyberattack πŸ•΄

It's still unclear when systems for Pennsylvania's largest media outlet will be fully restored, as employees were told to stay at home through Tuesday, May 16.

πŸ“– Read

via "Dark Reading".
πŸ›  AIDE 0.18.3 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ How to Protect Your Organization From Vulnerabilities πŸ•΄

Cobalt's fifth edition of "The State of Penetration Testing Report" taps into data from 3,100 pen tests and more than 1,000 responses from security practitioners.

πŸ“– Read

via "Dark Reading".
⚠ Belkin Wemo Smart Plug V2 – the buffer overflow that won’t be patched ⚠

Yes, it's a buffer overflow bug. No, it's not going get fixed.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-31723 β€Ό

yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31700 β€Ό

TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceAdd.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31724 β€Ό

yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c.

πŸ“– Read

via "National Vulnerability Database".