‼ CVE-2023-23605 ‼
📖 Read
via "National Vulnerability Database".
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32205 ‼
📖 Read
via "National Vulnerability Database".
In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29540 ‼
📖 Read
via "National Vulnerability Database".
Using a redirect embedded into <code>sourceMappingUrls</code> could allow for navigation to external protocol links in sandboxed iframes without <code>allow-top-navigation-to-custom-protocols</code>. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29541 ‼
📖 Read
via "National Vulnerability Database".
Firefox did not properly handle downloads of files ending in <code>.desktop</code>, which can be interpreted to run attacker-controlled commands. <br>*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29547 ‼
📖 Read
via "National Vulnerability Database".
When a secure cookie existed in the Firefox cookie jar an insecure cookie for the same domain could have been created, when it should have silently failed. This could have led to a desynchronization in expected results when reading from the secure cookie. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2023-32206 ‼
📖 Read
via "National Vulnerability Database".
An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-25730 ‼
📖 Read
via "National Vulnerability Database".
A background script invoking <code>requestFullscreen</code> and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32215 ‼
📖 Read
via "National Vulnerability Database".
Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28161 ‼
📖 Read
via "National Vulnerability Database".
If temporary "one-time" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL. This is potentially dangerous if the local files came from different sources, such as in a download directory. This vulnerability affects Firefox < 111.📖 Read
via "National Vulnerability Database".
🕴 'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft 🕴
📖 Read
via "Dark Reading".
SMS campaigns targeting members of the public in the United Arab Emirates have been detected.📖 Read
via "Dark Reading".
Dark Reading
'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft
SMS campaigns targeting members of the public in the United Arab Emirates have been detected.
‼ CVE-2023-3075 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in GitHub repository tsolucio/corebos prior to 8.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3074 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3073 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8.📖 Read
via "National Vulnerability Database".
🕴 PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say 🕴
📖 Read
via "Dark Reading".
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.📖 Read
via "Dark Reading".
Dark Reading
PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
‼ CVE-2023-33761 ‼
📖 Read
via "National Vulnerability Database".
eMedia Consulting simpleRedak up to v2.47.23.05 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /view/cb/format_642.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33670 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the time parameter in the sub_4a79ec function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33673 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC8V4.0-V16.03.34.06 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1297 ‼
📖 Read
via "National Vulnerability Database".
Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3055 ‼
📖 Read
via "National Vulnerability Database".
The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the 'azh_save' function. This makes it possible for unauthenticated attackers to update the post content and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2781 ‼
📖 Read
via "National Vulnerability Database".
The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up to, and including, 3.5.0. This is due to a random token generation weakness in the resend_verification_email function. This allows unauthenticated attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Allow Automatic Login After Successful Verification setting to be enabled, which it is not by default.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2416 ‼
📖 Read
via "National Vulnerability Database".
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the vcita_logout_callback function in versions up to, and including, 4.2.10. This makes it possible for unauthenticated to logout a vctia connected account which would cause a denial of service on the appointment scheduler, via a forged request granted they can trick a site user into performing an action such as clicking on a link.📖 Read
via "National Vulnerability Database".