πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-36630 β€Ό

In CloudPanel before 2.3.1, insecure file upload leads to privilege escalation and authentication bypass.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-20109 β€Ό

end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36632 β€Ό

The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘2
β€Ό CVE-2023-36663 β€Ό

it-novum openITCOCKPIT (aka open IT COCKPIT) 4.6.4 before 4.6.5 allows SQL Injection (by authenticated users) via the sort parameter of the API interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36660 β€Ό

The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36664 β€Ό

Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Active Directory Bridging Extends Security Automation to Hybrid IT Environments πŸ•΄

AD bridging extends the reach of your AD domain to non-Windows systems, providing centralized security, single sign-on, and compliance.

πŸ“– Read

via "Dark Reading".
πŸ€”1
β€Ό CVE-2023-36675 β€Ό

An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. BlockLogFormatter.php in BlockLogFormatter allows XSS in the partial blocks feature.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-29424 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Plainware ShiftController Employee Shift Scheduling plugin <=Γ‚ 4.9.23 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28988 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PI Websolution Direct checkout, Add to cart redirect, Quick purchase button, Buy now button, Quick View button for WooCommerce plugin <=Γ‚ 2.1.48 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29430 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CTHthemes TheRoof plugin <=Γ‚ 1.0.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3398 β€Ό

Denial of Service in GitHub repository jgraph/drawio prior to 18.1.3.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 3 Steps to Successfully & Ethically Navigate a Data Breach πŸ•΄

In this day of "not if, but when" for breaches, transparency and full disclosure are important to salvage a company's reputation and keep public trust.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-29438 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eric Martin SimpleModal Contact Form (SMCF) plugin <=Γ‚ 1.2.9 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36631 β€Ό

** DISPUTED ** Lack of access control in wfc.exe in Malwarebytes Binisoft Windows Firewall Control 6.9.2.0 allows local unprivileged users to bypass Windows Firewall restrictions via the user interface's rules tab. NOTE: the vendor's perspective is "this is intended behavior as the application can be locked using a password."

πŸ“– Read

via "National Vulnerability Database".
⚠ Aussie PM says, β€œShut down your phone every 24 hours for 5 mins” – but that’s not enough on its own ⚠

Don't treat rebooting your phone once a day as a cybersecurity talisman... here are 8 additional tips for better mobile phone security.

πŸ“– Read

via "Naked Security".
⚠ UK hacker busted in Spain gets 5 years over Twitter hack and more ⚠

Not just that infamous Twitter hack, but SIM-swapping, stalking and swatting too...

πŸ“– Read

via "Naked Security".
πŸ•΄ Trojanized Super Mario Installer Goes After Gamer Data πŸ•΄

A legitimate installer for the popular Nintendo game infects Windows machines with various malware, including a cryptominer and an infostealer, again showcasing the importance of remote worker security hygiene.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-36301 β€Ό

Talend Data Catalog before 8.0-20230221 contain a directory traversal vulnerability in HeaderImageServlet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25306 β€Ό

MultiMC Launcher <= 0.6.16 is vulnerable to Directory Traversal.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Infrastructure as Code Can Help Minimize Human Error πŸ•΄

Infrastructure as code lets organizations manage cloud infrastructure with the same versioning, testing, and automation processes they use for application code.

πŸ“– Read

via "Dark Reading".