βΌ CVE-2023-31742 βΌ
π Read
via "National Vulnerability Database".
There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2588 βΌ
π Read
via "National Vulnerability Database".
TeltonikaΓ’β¬β’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devicesΓ’β¬β’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31062 βΌ
π Read
via "National Vulnerability Database".
Improper Privilege Management Vulnerabilities in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0.Γ WhenΓ the attacker has access to a valid (but unprivileged) account, the exploit can be executed using Burp Suite by sending a loginrequest and following it with a subsequent HTTP requestusing the returned cookie.Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31103 βΌ
π Read
via "National Vulnerability Database".
Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.Γ Attackers can change the immutable name and type of cluster of InLong.Γ Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7891 https://github.com/apache/inlong/pull/7891 to solve it.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31101 βΌ
π Read
via "National Vulnerability Database".
Insecure Default Initialization of Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.6.0. Users registered in InLong who joined later can see deleted users' data. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 to solve it.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32349 βΌ
π Read
via "National Vulnerability Database".
Versions 00.07.00 through 00.07.03.4 of TeltonikaΓ’β¬β’s RUT router firmware contain a packet dump utility that contains proper validation for filter parameters. However, variables for validation checks are stored in an external configuration file. An authenticated attacker could use an exposed UCI configuration utility to change these variables and enable malicious parameters in the dump utility, which could result in arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31065 βΌ
π Read
via "National Vulnerability Database".
Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.Γ An old session can be used by an attacker even after the user has been deleted or the password has been changed.Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27067 βΌ
π Read
via "National Vulnerability Database".
Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspxπ Read
via "National Vulnerability Database".
βΌ CVE-2023-31584 βΌ
π Read
via "National Vulnerability Database".
GitHub repository cu/silicon commit a9ef36 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the User Input field.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2840 βΌ
π Read
via "National Vulnerability Database".
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2839 βΌ
π Read
via "National Vulnerability Database".
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28467 βΌ
π Read
via "National Vulnerability Database".
In MyBB before 1.8.34, there is XSS in the User CP module via the user email field.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2837 βΌ
π Read
via "National Vulnerability Database".
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.π Read
via "National Vulnerability Database".
βΌ CVE-2023-2838 βΌ
π Read
via "National Vulnerability Database".
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.π Read
via "National Vulnerability Database".
π΄ Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations π΄
π Read
via "Dark Reading".
The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.π Read
via "Dark Reading".
Dark Reading
Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations
The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.
π΄ PyPI Shuts Down Over the Weekend, Says Incident Was Overblown π΄
π Read
via "Dark Reading".
The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.π Read
via "Dark Reading".
Dark Reading
PyPI Shuts Down Over the Weekend, Says Incident Was Overblown
The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.
π΄ Improving Cybersecurity Requires Building Better Public-Private Cooperation π΄
π Read
via "Dark Reading".
Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.π Read
via "Dark Reading".
Dark Reading
Improving Cybersecurity Requires Building Better Public-Private Cooperation
Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.
βΌ CVE-2023-28412 βΌ
π Read
via "National Vulnerability Database".
When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31816 βΌ
π Read
via "National Vulnerability Database".
IT Sourcecode Content Management System Project In PHP and MySQL With Source Code 1.0.0 is vulnerable to Cross Site Scripting (XSS) via /ecodesource/search_list.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31240 βΌ
π Read
via "National Vulnerability Database".
Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28386 βΌ
π Read
via "National Vulnerability Database".
Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware signature could allow attackers to upload arbitrary firmware updates, resulting in code execution.π Read
via "National Vulnerability Database".