πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-20724 β€Ό

In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843841.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-20733 β€Ό

In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645149.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-20747 β€Ό

In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33532 β€Ό

There is a command injection vulnerability in the Netgear R6250 router with Firmware Version 1.0.4.48. If an attacker gains web management privileges, they can inject commands into the post request parameters, thereby gaining shell privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30948 β€Ό

A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content.This defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time.

πŸ“– Read

via "National Vulnerability Database".
⚠ Chrome zero-day: β€œThis exploit is in the wild”, so check your version now ⚠

Chrome 0-day patched now, Edge patch coming soon.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-0921 β€Ό

A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32281 β€Ό

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in the FontManager. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33651 β€Ό

An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27126 β€Ό

The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Netskope Intelligent SSE Selected by Transdev to Secure and Connect its Hybrid Workforce πŸ•΄

Implementation is part of Transdev's Cloud-First approach to better manage technological obsolescence.

πŸ“– Read

via "Dark Reading".
πŸ•΄ ILTA and Conversant Group Release Cybersecurity Benchmarking Survey of the Legal Industry πŸ•΄

Joint research highlights disconnect between legal IT and recommended cybersecurity practices.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Verizon DBIR: Social Engineering Breaches Double, Leading to Spiraling Ransomware Costs πŸ•΄

Ransomware continues its runaway growth with median payments reaching $50,000 per incident.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-2603 β€Ό

A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29632 β€Ό

PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36723 β€Ό

The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Sensitive Data Exposure in versions before 2.6.1 via the ~/listingpro-plugin/functions.php file. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, full names, email addresses, phone numbers, physical addresses and user post counts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36730 β€Ό

The CMP for WordPress is vulnerable to authorization bypass due to a missing capability check on the cmp_get_post_detail(), niteo_export_csv(), and cmp_disable_comingsoon_ajax() functions in versions up to, and including, 3.8.1. This makes it possible for unauthenticated attackers to read posts, export subscriber lists, and/or deactivate the plugin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-25144 β€Ό

The WP HTML Mail plugin for WordPress is vulnerable to HTML injection in versions up to, and including, 2.2.10 due to insufficient input sanitization. This makes it possible for unauthenticated attackers to inject arbitrary HTML in pages that execute if they can successfully trick a administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0668 β€Ό

Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36696 β€Ό

The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_downloads() function in versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to download files from the vulnerable service.

πŸ“– Read

via "National Vulnerability Database".