πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-29736 β€Ό

Keyboard Themes 1.275.1.164 for Android contains a dictionary traversal vulnerability that allows unauthorized apps to overwrite arbitrary files in its internal storage and achieve arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-29725 β€Ό

The BT21 x BTS Wallpaper app 12 for Android allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-29746 β€Ό

An issue found in The Thaiger v.1.2 for Android allows unauthorized apps to cause a code execution attack by manipulating the SharedPreference files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2835 β€Ό

The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯2
β€Ό CVE-2023-2060 β€Ό

Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1
πŸ“’ Horabot campaign targeted businesses for more than two years before finally being discovered πŸ“’

The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular

πŸ“– Read

via "ITPro".
πŸ‘1
πŸ“’ Kaspersky traces spyware attack on staff iOS devices back to 2019 πŸ“’

It's currently unclear who is behind the spyware attack on the Russian-based cyber security firm

πŸ“– Read

via "ITPro".
πŸ‘1
β€Ό CVE-2023-28705 β€Ό

Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain malicious web pages injected with JavaScript. When users access the system and open the email, it triggers an XSS (Reflected Cross-site scripting) attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28702 β€Ό

ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands, disrupt system or terminate service.

πŸ“– Read

via "National Vulnerability Database".
⚠ Researchers claim Windows β€œbackdoor” affects hundreds of Gigabyte motherboards ⚠

It's a backdoor, Jim, but not as we know it... here's a sober look at this issue.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-3056 β€Ό

A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33717 β€Ό

mp4v2 v2.1.3 was discovered to contain a memory leak when a method calling MP4File::ReadBytes() had allocated memory but did not catch exceptions thrown by ReadBytes()

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How CISOs Can Manage the Intersection of Security, Privacy, And Trust πŸ•΄

Integrating a subject rights request tool with security and compliance solutions can help identify potential data conflicts more efficiently and with greater accuracy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Want Sustainable Security? Find Middle Ground Between Tech & Education πŸ•΄

The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.

πŸ“– Read

via "Dark Reading".
πŸ›  Faraday 4.4.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-30149 β€Ό

SQL injection vulnerability in the City Autocomplete (cityautocomplete) module from ebewe.net for PrestaShop, prior to version 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7), allows remote attackers to execute arbitrary SQL commands via the type, input_name. or q parameter in the autocompletion.php front controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34362 β€Ό

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3061 β€Ό

A vulnerability was found in code-projects Agro-School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file btn_functions.php of the component Attachment Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-230567.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33476 β€Ό

ReadyMedia (MiniDLNA) versions from 1.1.15 up to 1.3.2 is vulnerable to Buffer Overflow. The vulnerability is caused by incorrect validation logic when handling HTTP requests using chunked transport encoding. This results in other code later using attacker-controlled chunk values that exceed the length of the allocated buffer, resulting in out-of-bounds read/write.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3060 β€Ό

A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as problematic. This vulnerability affects the function doAddQuestion of the file btn_functions.php. The manipulation of the argument Question leads to cross site scripting. The attack can be initiated remotely. VDB-230566 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3062 β€Ό

A vulnerability was found in code-projects Agro-School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-230568.

πŸ“– Read

via "National Vulnerability Database".