‼ CVE-2023-35159 ‼
📖 Read
via "National Vulnerability Database".
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 3.4-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-42834 ‼
📖 Read
via "National Vulnerability Database".
An access issue was addressed with improved access restrictions. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13, macOS Big Sur 11.7.3. An app may be able to access mail folder attachments through a temporary directory used during compression📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28202 ‼
📖 Read
via "National Vulnerability Database".
This issue was addressed with improved state management. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. An app firewall setting may not take effect after exiting the Settings app📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32404 ‼
📖 Read
via "National Vulnerability Database".
This issue was addressed with improved entitlements. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5. An app may be able to bypass Privacy preferences📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32417 ‼
📖 Read
via "National Vulnerability Database".
This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 9.5. An attacker with physical access to a locked Apple Watch may be able to view user photos or contacts via accessibility features📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32413 ‼
📖 Read
via "National Vulnerability Database".
A race condition was addressed with improved state handling. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to gain root privileges📖 Read
via "National Vulnerability Database".
🕴 NSA: BlackLotus BootKit Patching Won't Prevent Compromise 🕴
📖 Read
via "Dark Reading".
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.📖 Read
via "Dark Reading".
Dark Reading
NSA: BlackLotus BootKit Patching Won't Prevent Compromise
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.
🕴 Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023 🕴
📖 Read
via "Dark Reading".
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.📖 Read
via "Dark Reading".
Dark Reading
Silobreaker Unveils Geopolitical Threat Intelligence Capabilities With RANE at Infosecurity Europe 2023
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.
‼ CVE-2023-35165 ‼
📖 Read
via "National Vulnerability Database".
AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. In the packages `aws-cdk-lib` 2.0.0 until 2.80.0 and `@aws-cdk/aws-eks` 1.57.0 until 1.202.0, `eks.Cluster` and `eks.FargateCluster` constructs create two roles, `CreationRole` and `default MastersRole`, that have an overly permissive trust policy. The first, referred to as the `CreationRole`, is used by lambda handlers to create the cluster and deploy Kubernetes resources (e.g `KubernetesManifest`, `HelmChart`, ...) onto it. Users with CDK version higher or equal to 1.62.0 (including v2 users) may be affected. The second, referred to as the `default MastersRole`, is provisioned only if the `mastersRole` property isn't provided and has permissions to execute `kubectl` commands on the cluster. Users with CDK version higher or equal to 1.57.0 (including v2 users) may be affected.The issue has been fixed in `@aws-cdk/aws-eks` v1.202.0 and `aws-cdk-lib` v2.80.0. These versions no longer use the account root principal. Instead, they restrict the trust policy to the specific roles of lambda handlers that need it. There is no workaround available for CreationRole. To avoid creating the `default MastersRole`, use the `mastersRole` property to explicitly provide a role.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36345 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in POS Codekop v2.0 allows attackers to escalate privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35932 ‼
📖 Read
via "National Vulnerability Database".
jcvi is a Python library to facilitate genome assembly, annotation, and comparative genomics. A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. This vulnerability does not currently have a fix.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3197 ‼
📖 Read
via "National Vulnerability Database".
The MStore API plugin for WordPress is vulnerable to Unauthenticated Blind SQL Injection via the 'id' parameter in versions up to, and including, 4.0.1 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-1721 ‼
📖 Read
via "National Vulnerability Database".
Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.📖 Read
via "National Vulnerability Database".
❤1👍1
‼ CVE-2023-36612 ‼
📖 Read
via "National Vulnerability Database".
Directory traversal can occur in the Basecamp com.basecamp.bc3 application before 4.2.1 for Android, which may allow an attacker to write arbitrary files in the application's private directory. Additionally, by using a malicious intent, the attacker may redirect the server's responses (containing sensitive information) to third-party applications by using a custom-crafted deeplink scheme.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36630 ‼
📖 Read
via "National Vulnerability Database".
In CloudPanel before 2.3.1, insecure file upload leads to privilege escalation and authentication bypass.📖 Read
via "National Vulnerability Database".
‼ CVE-2015-20109 ‼
📖 Read
via "National Vulnerability Database".
end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36632 ‼
📖 Read
via "National Vulnerability Database".
The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class.📖 Read
via "National Vulnerability Database".
👍2
‼ CVE-2023-36663 ‼
📖 Read
via "National Vulnerability Database".
it-novum openITCOCKPIT (aka open IT COCKPIT) 4.6.4 before 4.6.5 allows SQL Injection (by authenticated users) via the sort parameter of the API interface.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36660 ‼
📖 Read
via "National Vulnerability Database".
The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36664 ‼
📖 Read
via "National Vulnerability Database".
Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).📖 Read
via "National Vulnerability Database".
🕴 How Active Directory Bridging Extends Security Automation to Hybrid IT Environments 🕴
📖 Read
via "Dark Reading".
AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.📖 Read
via "Dark Reading".
Dark Reading
How Active Directory Bridging Extends Security Automation to Hybrid IT Environments
AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.
🤔1