πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Firefox 114 is out: No 0-days, but one fascinating β€œteachable moment” bug ⚠

With the right (or wrong, if you're on the right side of the fence) timing...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-1825 β€Ό

An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘Ž1
β€Ό CVE-2023-3146 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\categories\manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231015.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Fined $20M For Xbox Child Data Collection πŸ•΄

The FTC has demanded additional data privacy protections for kids using Xbox gaming systems, extending COPPA protections.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34234 β€Ό

OpenZeppelin Contracts is a library for smart contract development. By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. This problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. Users are advised to upgrade. Users unable to upgrade may submit the proposal creation transaction to an endpoint with frontrunning protection as a workaround.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34108 β€Ό

mailcow is a mail server suite based on Dovecot, Postfix and other open source software, that provides a modern web UI for user/server administration. A vulnerability has been discovered in mailcow which allows an attacker to manipulate internal Dovecot variables by using specially crafted passwords during the authentication process. The issue arises from the behavior of the `passwd-verify.lua` script, which is responsible for verifying user passwords during login attempts. Upon a successful login, the script returns a response in the format of "password=<valid-password>", indicating the successful authentication. By crafting a password with additional key-value pairs appended to it, an attacker can manipulate the returned string and influence the internal behavior of Dovecot. For example, using the password "123 mail_crypt_save_version=0" would cause the `passwd-verify.lua` script to return the string "password=123 mail_crypt_save_version=0". Consequently, Dovecot will interpret this string and set the internal variables accordingly, leading to unintended consequences. This vulnerability can be exploited by an authenticated attacker who has the ability to set their own password. Successful exploitation of this vulnerability could result in unauthorized access to user accounts, bypassing security controls, or other malicious activities. This issue has been patched in version `2023-05a`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Defenders Buckle Up for a Future of Detecting Deepfakes πŸ•΄

Today, technology companies have high success rates against generative AI-created voices and videos, but future detection will be much more difficult.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Minecraft Malware Spreading Through Mods, Plug-ins πŸ•΄

A worm virus called "fracturizer" has been embedded in modpacks from various sites, including CurseForge and CraftBukkit.

πŸ“– Read

via "Dark Reading".
πŸ•΄ BeyondID Launches Initiative to Accelerate Zero Trust With Okta Identity Engine πŸ•΄

OIE upgrade roadmap helps organizations become more secure; saves time, resources.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Radiflow's CIARA 4.0 Delivers Actionable Insights to Simplify the Management of OT Cyber-Risk at Industrial Facilities πŸ•΄

CIARA V4.0 boosts compliance with security regulations and best practices while providing effective mitigation guidance. "CISOs are doing more with less, making it challenging to understand their current standing across the OT Cybersecurity landscape," said Ilan Barda, Radiflow CEO and co-founder.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-33496 β€Ό

xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31116 β€Ό

An issue was discovered in the Shannon RCS component in Samsung Exynos Modem 5123 and 5300. An incorrect default permission can cause unintended querying of RCS capability via a crafted application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29168 β€Ό

The local Vuforia web application does not support HTTPS, and federated credentials are passed via basic authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29502 β€Ό

Before importing a project into Vuforia, a user could modify the Ò€œresourceDirectoryҀ� attribute in the appConfig.json file to be a different path.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2904 β€Ό

The External Visitor Manager portal of HIDÒ€ℒs SAFE versions 5.8.0 through 5.11.3 are vulnerable to manipulation within web fields in the application programmable interface (API). An attacker could log in using account credentials available through a request generated by an internal user and then manipulate the visitor-id within the web API to access the personal data of other users. There is no limit on the number of requests that can be made to the HID SAFE Web Server, so an attacker could also exploit this vulnerability to create a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29152 β€Ό

By changing the filename parameter in the request, an attacker could delete any file with the permissions of the Vuforia server account.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-31200 β€Ό

PTC Vuforia Studio does not require a token; this could allow an attacker with local access to perform a cross-site request forgery attack or a replay attack.

πŸ“– Read

via "National Vulnerability Database".
❀2
β€Ό CVE-2023-33846 β€Ό

IBM TXSeries for Multiplatforms 8.1, 8.2, 9.1, CICS TX Standard, 11.1, CICS TX Advanced 10.1, and 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 257100.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23481 β€Ό

IBM Sterling Partner Engagement Manager 6.1, 6.2, and 6.2.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 245889.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Barracuda Networks says hacked devices β€œmust be immediately replaced” despite patches πŸ“’

Seven-month exploitation of a critical vulnerability enabled persistent backdoor access in its email security gateway devices

πŸ“– Read

via "ITPro".
πŸ“’ The top malware and ransomware threats for June 2023 πŸ“’

Organizations face a fresh round of cyber threats as criminals continue to evolve their tactics

πŸ“– Read

via "ITPro".
❀1