🕴 Why Legacy System Users Prioritize Uptime Over Security 🕴
📖 Read
via "Dark Reading".
For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?📖 Read
via "Dark Reading".
Dark Reading
Why Legacy System Users Prioritize Uptime Over Security
For line-of-business execs, the fear of mission-critical systems grinding to a halt overrides their cybersecurity concerns. How can CISOs overcome this?
‼ CVE-2023-34466 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.0-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35151 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.📖 Read
via "National Vulnerability Database".
👍1
🕴 Suspicious Smartwatches Mailed to US Army Personnel 🕴
📖 Read
via "Dark Reading".
Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise. 📖 Read
via "Dark Reading".
Dark Reading
Suspicious Smartwatches Mailed to US Army Personnel
Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.
‼ CVE-2022-42807 ‼
📖 Read
via "National Vulnerability Database".
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13. A user may accidentally add a participant to a Shared Album by pressing the Delete key📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2023-35159 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 3.4-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-42834 ‼
📖 Read
via "National Vulnerability Database".
An access issue was addressed with improved access restrictions. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13, macOS Big Sur 11.7.3. An app may be able to access mail folder attachments through a temporary directory used during compression📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28202 ‼
📖 Read
via "National Vulnerability Database".
This issue was addressed with improved state management. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app firewall setting may not take effect after exiting the Settings app📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32404 ‼
📖 Read
via "National Vulnerability Database".
This issue was addressed with improved entitlements. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5. An app may be able to bypass Privacy preferences📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32417 ‼
📖 Read
via "National Vulnerability Database".
This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 9.5. An attacker with physical access to a locked Apple Watch may be able to view user photos or contacts via accessibility features📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32413 ‼
📖 Read
via "National Vulnerability Database".
A race condition was addressed with improved state handling. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to gain root privileges📖 Read
via "National Vulnerability Database".
🕴 NSA: BlackLotus BootKit Patching Won't Prevent Compromise 🕴
📖 Read
via "Dark Reading".
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.📖 Read
via "Dark Reading".
Dark Reading
NSA: BlackLotus BootKit Patching Won't Prevent Compromise
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.
🕴 Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023 🕴
📖 Read
via "Dark Reading".
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.📖 Read
via "Dark Reading".
Dark Reading
Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.
‼ CVE-2023-35165 ‼
📖 Read
via "National Vulnerability Database".
AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages `aws-cdk-lib` 2.0.0 until 2.80.0 and `@aws-cdk/aws-eks` 1.57.0 until 1.202.0, `eks.Cluster` and `eks.FargateCluster` constructs create two roles, `CreationRole` and `default MastersRole`, that have an overly permissive trust policy. The first, referred to as the `CreationRole`, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected. The second, referred to as the `default MastersRole`, is provisioned only if the `mastersRole` property isn't provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected.The issue has been fixed in `@aws-cdk/aws-eks` v1.202.0 and `aws-cdk-lib` v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the `default MastersRole`, use the `mastersRole` property to explicitly provide a role.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36345 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in POS Codekop v2.0 allows attackers to escalate privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35932 ‼
📖 Read
via "National Vulnerability Database".
jcvi is a Python library to facilitate genome assembly, annotation, and comparative genomics. A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. This vulnerability does not currently have a fix.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3197 ‼
📖 Read
via "National Vulnerability Database".
The MStore API plugin for WordPress is vulnerable to Unauthenticated Blind SQL Injection via the 'id' parameter in versions up to, and including, 4.0.1 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1721 ‼
📖 Read
via "National Vulnerability Database".
Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.📖 Read
via "National Vulnerability Database".
❤1👍1
‼ CVE-2023-36612 ‼
📖 Read
via "National Vulnerability Database".
Directory traversal can occur in the Basecamp com.basecamp.bc3 application before 4.2.1 for Android, which may allow an attacker to write arbitrary files in the application's private directory. Additionally, by using a malicious intent, the attacker may redirect the server's responses (containing sensitive information) to third-party applications by using a custom-crafted deeplink scheme.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36630 ‼
📖 Read
via "National Vulnerability Database".
In CloudPanel before 2.3.1, insecure file upload leads to privilege escalation and authentication bypass.📖 Read
via "National Vulnerability Database".
‼ CVE-2015-20109 ‼
📖 Read
via "National Vulnerability Database".
end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.📖 Read
via "National Vulnerability Database".