πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Name That Toon: Time to Spare? πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-3316 β€Ό

A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34373 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Dylan James Zephyr Project Manager plugin <=Γ‚ 3.3.93 versions.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-35772 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alain Gonzalez Google Map Shortcode plugin <=Γ‚ 3.1.2 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Consumer Data: The Risk and Reward for Manufacturing Companies πŸ•΄

To adequately address privacy, manufacturers need to think differently about data.

πŸ“– Read

via "Dark Reading".
⚠ Megaupload duo will go to prison at last, but Kim Dotcom fights on… ⚠

One, sadly, has died, and two are heading to prison, but for Kim Dotcom, the saga goes on...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2022-48489 β€Ό

Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34156 β€Ό

Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34162 β€Ό

Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34167 β€Ό

Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3022 β€Ό

A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-32659 β€Ό

SUBNET PowerSYSTEM Center versions 2020 U10 and prior contain a cross-site scripting vulnerability that may allow an attacker to inject malicious code into report header graphic files that could propagate out of the system and reach users who are subscribed to email notifications.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3320 β€Ό

The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation in the ~/admin/views/admin.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-26427 β€Ό

Default permissions for a properties file were too permissive. Local system users could read potentially sensitive information. We updated the default permissions for noreply.properties set during package installation. No publicly available exploits are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3325 β€Ό

The CMS Commander plugin for WordPress is vulnerable to authorization bypass due to the use of an insufficiently unique cryptographic signature on the 'cmsc_add_site' function in versions up to, and including, 2.287. This makes it possible for unauthenticated attackers to the plugin to change the '_cmsc_public_key' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation. This can only be exploited if the plugin has not been configured yet, however, if combined with another arbitrary plugin installation and activation vulnerability, the impact can be severe.

πŸ“– Read

via "National Vulnerability Database".
⚠ Megaupload duo will go to prison at last, but Kim Dotcom fights on… ⚠

One, sadly, has died, and two are heading to prison, but for Kim Dotcom, the saga goes on...

πŸ“– Read

via "Naked Security".
πŸ“’ Researchers uncover novel RDStealer malware targeting remote desktop protocol πŸ“’

Bitdefender's experts said the level of disguise observed in this campaign β€œsurpasses anything witnessed thus far”

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-35097 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Internet Marketing Dojo WP Affiliate Links plugin <=Γ‚ 0.1.1 versions.

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ•΄ Rorschach Ransomware: What You Need to Know πŸ•΄

Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-35854 β€Ό

Zoho ManageEngine ADSelfService Plus through 6113 has an authentication bypass that can be exploited to steal the domain controller session token for identity spoofing, thereby achieving the privileges of the domain controller administrator.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33495 β€Ό

Craft CMS through 4.4.9 is vulnerable to HTML Injection.

πŸ“– Read

via "National Vulnerability Database".