βΌ CVE-2023-31655 βΌ
π Read
via "National Vulnerability Database".
redis-7.0.10 was discovered to contain a segmentation violation.π Read
via "National Vulnerability Database".
π΄ Enterprises Rely on Multicloud Security to Protect Cloud Workloads π΄
π Read
via "Dark Reading".
As enterprises adopt multicloud, the security picture has gotten foggy. Cloud workload protection platforms and distributed firewalls are creating clarity.π Read
via "Dark Reading".
Dark Reading
Enterprises Rely on Multicloud Security to Protect Cloud Workloads
As enterprises adopt multicloud, the security picture has become foggy. Cloud workload protection platforms and distributed firewalls are creating clarity.
βΌ CVE-2022-35798 βΌ
π Read
via "National Vulnerability Database".
Azure Arc Jumpstart Information Disclosure Vulnerabilityπ Read
via "National Vulnerability Database".
βΌ CVE-2023-30470 βΌ
π Read
via "National Vulnerability Database".
A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24832 βΌ
π Read
via "National Vulnerability Database".
A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23556 βΌ
π Read
via "National Vulnerability Database".
An error in BigInt conversion to Number in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by a malicious attacker to execute arbitrary code due to an out-of-bound write. Note that this bug is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32680 βΌ
π Read
via "National Vulnerability Database".
Metabase is an open source business analytics engine. To edit SQL Snippets, Metabase should have required people to be in at least one group with native query editing permissions to a databaseΓ’β¬βbut affected versions of Metabase didn't enforce that requirement. This lack of enforcement meant that: AnyoneΓ’β¬βincluding people in sandboxed groupsΓ’β¬βcould edit SQL snippets. They could edit snippets via the API or, in the application UI, when editing the metadata for a model based on a SQL question, and people in sandboxed groups could edit a SQL snippet used in a query that creates their sandbox. If the snippet contained logic that restricted which data that person could see, they could potentially edit that snippet and change their level of data access. The permissions model for SQL snippets has been fixed in Metabase versions 0.46.3, 0.45.4, 0.44.7, 1.46.3, 1.45.4, and 1.44.7. Users are advised to upgrade. Users unable to upgrade should ensure that SQL queries used to create sandboxes exclude SQL snippets.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28081 βΌ
π Read
via "National Vulnerability Database".
A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28753 βΌ
π Read
via "National Vulnerability Database".
netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23557 βΌ
π Read
via "National Vulnerability Database".
An error in Hermes' algorithm for copying objects properties prior to commit a00d237346894c6067a594983be6634f4168c9ad could be used by a malicious attacker to execute arbitrary code via type confusion. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24833 βΌ
π Read
via "National Vulnerability Database".
A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VMΓ’β¬β’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1195 βΌ
π Read
via "National Vulnerability Database".
A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23759 βΌ
π Read
via "National Vulnerability Database".
There is a vulnerability in the fizz library prior to v2023.01.30.00 where a CHECK failure can be triggered remotely. This behavior requires the client supported cipher advertisement changing between the original ClientHello and the second ClientHello, crashing the process (impact is limited to denial of service).π Read
via "National Vulnerability Database".
βΌ CVE-2023-25933 βΌ
π Read
via "National Vulnerability Database".
A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.π Read
via "National Vulnerability Database".
β S3 Ep135: Sysadmin by day, extortionist by night β
π Read
via "Naked Security".
Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)...π Read
via "Naked Security".
Naked Security
S3 Ep135: Sysadmin by day, extortionist by night
Laugh (sufficiently), learn (efficiently), and then let us know what you think in our comments (anonymously, if you wish)β¦
β Appleβs secret is out: 3 zero-days fixed, so be sure to patch now! β
π Read
via "Naked Security".
All Apple users have zero-days that need patching, though some have more zero-days than others.π Read
via "Naked Security".
Naked Security
Appleβs secret is out: 3 zero-days fixed, so be sure to patch now!
All Apple users have zero-days that need patching, though some have more zero-days than others.
π₯1
βΌ CVE-2023-2704 βΌ
π Read
via "National Vulnerability Database".
The BP Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.5. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28045 βΌ
π Read
via "National Vulnerability Database".
Dell CloudIQ Collector version 1.10.2 contains a missing encryption of sensitive data vulnerability. An attacker with low privileges could potentially exploit this vulnerability, leading to gain access to unauthorized data.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33240 βΌ
π Read
via "National Vulnerability Database".
Foxit PDF Reader (12.1.1.15289 and earlier) and Foxit PDF Editor (12.1.1.15289 and all previous 12.x versions, 11.2.5.53785 and all previous 11.x versions, and 10.1.11.37866 and earlier) on Windows allows Local Privilege Escalation when installed to a non-default directory because unprivileged users have access to an executable file of a system service. This is fixed in 12.1.2.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2023-2806 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in Weaver e-cology up to 9.0. Affected by this vulnerability is the function RequestInfoByXml of the component API. The manipulation leads to xml external entity reference. The associated identifier of this vulnerability is VDB-229411. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1618 βΌ
π Read
via "National Vulnerability Database".
Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all versions allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.π Read
via "National Vulnerability Database".