πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  AIDE 0.18.3 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ How to Protect Your Organization From Vulnerabilities πŸ•΄

Cobalt's fifth edition of "The State of Penetration Testing Report" taps into data from 3,100 pen tests and more than 1,000 responses from security practitioners.

πŸ“– Read

via "Dark Reading".
⚠ Belkin Wemo Smart Plug V2 – the buffer overflow that won’t be patched ⚠

Yes, it's a buffer overflow bug. No, it's not going get fixed.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-31723 β€Ό

yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31700 β€Ό

TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceAdd.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31724 β€Ό

yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31725 β€Ό

yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free via the function expand_mmac_params at yasm/modules/preprocs/nasm/nasm-pp.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31722 β€Ό

There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31701 β€Ό

TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.

πŸ“– Read

via "National Vulnerability Database".
⚠ US offers $10m bounty for Russian ransomware suspect outed in indictment ⚠

"Up to $10 million for information that leads to the arrest and/or conviction of this defendant."

πŸ“– Read

via "Naked Security".
πŸ‘1
πŸ•΄ Talking Security Strategy: Cybersecurity Has a Seat at the Boardroom Table πŸ•΄

Pending new SEC rules reinforce how integral cybersecurity is to modern business operations, and will help close the gap between security teams and those making policy decisions.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Microsoft Teams Features Amp Up Orgs' Cyberattack Exposure πŸ•΄

It's as they say: A Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings, and Messages functions, and they all can be exploited.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-2765 β€Ό

A vulnerability has been found in Weaver OA up to 9.5 and classified as problematic. This vulnerability affects unknown code of the file /E-mobile/App/System/File/downfile.php. The manipulation of the argument url leads to absolute path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2766 β€Ό

A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Apple Boots a Half-Million Developers From Official App Store πŸ•΄

The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-22348 β€Ό

Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2768 β€Ό

A vulnerability was found in Sucms 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin_ads.php?action=add. The manipulation of the argument intro leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229274 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2772 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Budget and Expense Tracker System 1.0. Affected is an unknown function of the file /admin/budget/manage_budget.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-229278 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2770 β€Ό

A vulnerability classified as critical was found in SourceCodester Online Exam System 1.0. This vulnerability affects unknown code of the file /kelasdosen/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229276.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31135 β€Ό

Dgraph is an open source distributed GraphQL database. Existing Dgraph audit logs are vulnerable to brute force attacks due to nonce collisions. The first 12 bytes come from a baseIv which is initialized when an audit log is created. The last 4 bytes come from the length of the log line being encrypted. This is problematic because two log lines will often have the same length, so due to these collisions we are reusing the same nonce many times. All audit logs generated by versions of Dgraph <v23.0.0 are affected. Attackers must have access to the system the logs are stored on. Dgraph users should upgrade to v23.0.0. Users unable to upgrade should store existing audit logs in a secure location and for extra security, encrypt using an external tool like `gpg`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2769 β€Ό

A vulnerability classified as critical has been found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229275.

πŸ“– Read

via "National Vulnerability Database".