πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-35844 β€Ό

packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34642 β€Ό

KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function showDirectoryPicker() which can then be used to open an unprivileged command prompt.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32201 β€Ό

Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32273.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34603 β€Ό

JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryFilterTableDictInfo at org.jeecg.modules.api.controller.SystemApiController.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32542 β€Ό

Out-of-bounds read vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted V8 file may lead to information disclosure and/or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Anonymous Sudan: Who are the hackers behind Microsoft’s cloud outages? πŸ“’

The highly aggressive β€˜hacktivist’ group is thought to have links to the pro-Russian Killnet hacker collective

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-2805 β€Ό

The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25733 β€Ό

The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25747 β€Ό

A potential use-after-free in libaudio was fixed by disabling the AAudio backend when running on Android API below version 30.*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 110.1.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2899 β€Ό

The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Decoding Identity and Access Management For Organizations and Consumers πŸ•΄

Workforce IAM and consumer IAM are not interchangeable β€” they serve different purposes and constituencies.

πŸ“– Read

via "Dark Reading".
πŸ•΄ US Investors Sniffing Around Blacklisted NSO Group Assets πŸ•΄

Pressure mounts on the NSO Group's business viability as Khashoggi widow joins group of plaintiffs suing the Israeli firm for Pegasus spyware abuse.

πŸ“– Read

via "Dark Reading".
❀1
πŸ•΄ Generative AI Has Its Risks, But the Sky Isn't Falling πŸ•΄

The threat organizations face with GenAI is not new, but it could speed how quickly private data reaches a wider audience.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Name That Toon: Time to Spare? πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-3316 β€Ό

A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34373 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Project Manager plugin <=Γ‚ 3.3.93 versions.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-35772 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alain Gonzalez Google Map Shortcode plugin <=Γ‚ 3.1.2 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Consumer Data: The Risk and Reward for Manufacturing Companies πŸ•΄

To adequately address privacy, manufacturers need to think differently about data.

πŸ“– Read

via "Dark Reading".
⚠ Megaupload duo will go to prison at last, but Kim Dotcom fights on… ⚠

One, sadly, has died, and two are heading to prison, but for Kim Dotcom, the saga goes on...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-48489 β€Ό

Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34156 β€Ό

Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied.

πŸ“– Read

via "National Vulnerability Database".