πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Researchers claim Windows β€œbackdoor” affects hundreds of Gigabyte motherboards ⚠

It's a backdoor, Jim, but not as we know it... here's a sober look at this issue.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-3056 β€Ό

A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33717 β€Ό

mp4v2 v2.1.3 was discovered to contain a memory leak when a method calling MP4File::ReadBytes() had allocated memory but did not catch exceptions thrown by ReadBytes()

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How CISOs Can Manage the Intersection of Security, Privacy, And Trust πŸ•΄

Integrating a subject rights request tool with security and compliance solutions can help identify potential data conflicts more efficiently and with greater accuracy.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Want Sustainable Security? Find Middle Ground Between Tech & Education πŸ•΄

The winning recipe for sustainable security combines strategic user education and tactical automation of well-constructed processes.

πŸ“– Read

via "Dark Reading".
πŸ›  Faraday 4.4.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-30149 β€Ό

SQL injection vulnerability in the City Autocomplete (cityautocomplete) module from ebewe.net for PrestaShop, prior to version 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7), allows remote attackers to execute arbitrary SQL commands via the type, input_name. or q parameter in the autocompletion.php front controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34362 β€Ό

In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3061 β€Ό

A vulnerability was found in code-projects Agro-School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file btn_functions.php of the component Attachment Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-230567.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33476 β€Ό

ReadyMedia (MiniDLNA) versions from 1.1.15 up to 1.3.2 is vulnerable to Buffer Overflow. The vulnerability is caused by incorrect validation logic when handling HTTP requests using chunked transport encoding. This results in other code later using attacker-controlled chunk values that exceed the length of the allocated buffer, resulting in out-of-bounds read/write.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3060 β€Ό

A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as problematic. This vulnerability affects the function doAddQuestion of the file btn_functions.php. The manipulation of the argument Question leads to cross site scripting. The attack can be initiated remotely. VDB-230566 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3062 β€Ό

A vulnerability was found in code-projects Agro-School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-230568.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Streamers Ditch Netflix for Dark Web After Password Sharing Ban πŸ•΄

Disgruntled users are pursuing offers for "full Netflix access" at steeply discounted rates.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 'Picture-in-Picture' Obfuscation Spoofs Delta, Kohl's for Credential Harvesting πŸ•΄

A recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from trusted brands.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-25749 β€Ό

Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so. <br>*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25751 β€Ό

Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32207 β€Ό

A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1945 β€Ό

Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.10 and Firefox ESR < 102.10.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25752 β€Ό

When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29539 β€Ό

When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25737 β€Ό

An invalid downcast from <code>nsTextNode</code> to <code>SVGElement</code> could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

πŸ“– Read

via "National Vulnerability Database".