πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-34537 β€Ό

A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2637 β€Ό

Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.Γ‚  Hard-coded cryptographic key may lead to privilege escalation.Γ‚  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2639 β€Ό

The underlying feedback mechanism of Rockwell Automation'sΓ‚ FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.Γ‚  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs πŸ•΄

Mandiant's ongoing investigation of UNC3886 has uncovered new details of threat actors' TTPs.

πŸ“– Read

via "Dark Reading".
⚠ Gozi banking malware β€œIT chief” finally jailed after more than 10 years ⚠

Gozi threesome from way back in the late 2000s and early 2010s now all charged, convicted and sentenced. The DOJ got there in the end...

πŸ“– Read

via "Naked Security".
⚠ Patch Tuesday fixes 4 critical RCE bugs, and a bunch of Office holes ⚠

No zero-days this month, if you ignore the Edge RCE hole patched last week

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-31142 β€Ό

Discourse is an open source discussion platform. Prior to version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches, if a site has modified their general category permissions, they could be set back to the default. This issue is patched in version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches. A workaround, only if you are modifying the general category permissions, is to use a new category for the same purpose.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32301 β€Ό

Discourse is an open source discussion platform. Prior to version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches, multiple duplicate topics could be created if topic embedding is enabled. This issue is patched in version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches. As a workaround, disable topic embedding if it has been enabled.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  AIDE 0.18.4 πŸ› 

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

πŸ“– Read

via "Packet Storm Security".
πŸ‘1
β€Ό CVE-2023-29357 β€Ό

Microsoft SharePoint Server Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29364 β€Ό

Windows Authentication Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29366 β€Ό

Windows Geolocation Service Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24938 β€Ό

Windows CryptoAPI Denial of Service Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29353 β€Ό

Sysinternals Process Monitor for Windows Denial of Service Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32010 β€Ό

Windows Bus Filter Driver Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32011 β€Ό

Windows iSCSI Discovery Service Denial of Service Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29372 β€Ό

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32032 β€Ό

.NET and Visual Studio Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32017 β€Ό

Microsoft PostScript Printer Driver Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32015 β€Ό

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

πŸ“– Read

via "National Vulnerability Database".