πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-32522 β€Ό

A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32531 β€Ό

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32532 through 32535.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32536 β€Ό

Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32537.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35164 β€Ό

DataEase is an open source data visualization analysis tool to analyze data and gain insight into business trends. In affected versions a missing authorization check allows unauthorized users to manipulate a dashboard created by the administrator. This vulnerability has been fixed in version 1.18.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32528 β€Ό

Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32527.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32535 β€Ό

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32534.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32526 β€Ό

Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32525.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28929 β€Ό

Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32604 β€Ό

Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32605.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34148 β€Ό

An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-3371 β€Ό

The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-3423 β€Ό

Weak Password Requirements in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v 1.2.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Preventing Cyberattacks on Schools Starts With K–12 Cybersecurity Education πŸ•΄

By investing in a strong future cybersecurity workforce, we can prevent future attacks on US critical infrastructure before they occur.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34395 β€Ό

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider.In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution.Starting version 4.0.0 driver can be set only from the hook constructor.This issue affects Apache Airflow ODBC Provider: before 4.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35798 β€Ό

Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.ThisΓ‚ vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specificallyΓ‚ updating the connection to exploit it.This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1.It is recommended toΓ‚ upgrade to a version that is not affected

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ›  Proxmark3 4.16717 Custom Firmware πŸ› 

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-0873 β€Ό

The Kanban Boards for WordPress plugin before 2.5.21 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1166 β€Ό

The USM-Premium WordPress plugin before 16.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2627 β€Ό

The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Zscaler plots a course for zero trust leader ahead of Zenith Live conference πŸ“’

Zscaler will be hoping to capitalise on recent successes by giving a strong showing at the company's annual cyber security conference in Berlin

πŸ“– Read

via "ITPro".
⚠ UK hacker busted in Spain gets 5 years over Twitter hack and more ⚠

Not just that infamous Twitter hack, but SIM-swapping, stalking and swatting too...

πŸ“– Read

via "Naked Security".