πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-32224 β€Ό

D-Link DSL-224 firmware version 3.0.10 CWE-307: Improper Restriction of Excessive Authentication Attempts

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3243 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** [An attacker can capture an authenticating hashand utilize it to create new sessions. The hash is also a poorly salted MD5hash, which could result in a successful brute force password attack.Γ‚ Recommended fix: Upgrade to a supported product suchas AlertonACM.] Out of an abundance of caution, this CVE ID is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3355 β€Ό

A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34652 β€Ό

PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21517 β€Ό

Heap out-of-bound write vulnerability in Exynos baseband prior to SMR Jun-2023 Release 1 allows remote attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3389 β€Ό

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.We recommend upgrading past commit 4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable andΓ‚ 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34650 β€Ό

PHPgurukl Small CRM v.1.0 is vulnerable to Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32222 β€Ό

D-Link DSL-G256DG version vBZ_1.00.27 web management interface allows authentication bypass via an unspecified method.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25827 β€Ό

Emby Server < 4.7.12.0 is vulnerable to a login bypass attack by setting the X-Forwarded-For header to a local IP-address.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21513 β€Ό

Improper privilege management vulnerability in CC Mode prior to SMR Jun-2023 Release 1 allows physical attackers to manipulate device to operate in way that results in unexpected behavior in CC Mode under specific condition.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Russian Spies, War Ministers Reliant on Cybercrime in Pariah State πŸ•΄

Swiss intelligence warns that Russia ramping up cyberattacks on infrastructure and cyber espionage as on-the-ground options evaporate.

πŸ“– Read

via "Dark Reading".
❀1
β€Ό CVE-2023-36475 β€Ό

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-3358 β€Ό

A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36474 β€Ό

Interactsh is an open-source tool for detecting out-of-band interactions. Domains configured with interactsh server prior to version 1.0.0 were vulnerable to subdomain takeover for a specific subdomain, i.e `app.` Interactsh server used to create cname entries for `app` pointing to `projectdiscovery.github.io` as default, which intended to used for hosting interactsh web client using GitHub pages. This is a security issue with a self-hosted interactsh server in which the user may not have configured a web client but still have a CNAME entry pointing to GitHub pages, making them vulnerable to subdomain takeover. This allows a threat actor to host / run arbitrary client side code (cross-site scripting) in a user's browser when browsing the vulnerable subdomain. Version 1.0.0 fixes this issue by making CNAME optional, rather than default.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34736 β€Ό

Guantang Equipment Management System version 4.12 is vulnerable to Arbitrary File Upload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3357 β€Ό

A NULL pointer dereference flaw was found in the Linux kernel AMD Sensor Fusion Hub driver. This flaw allows a local user to crash the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34647 β€Ό

PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3359 β€Ό

An issue was discovered in the Linux kernel brcm_nvram_parse in drivers/nvmem/brcm_nvram.c. Lacks for the check of the return value of kzalloc() can cause the NULL Pointer Dereference.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3447 β€Ό

The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Injection in versions up to, and including, 4.1.5. This is due to insufficient escaping on the supplied username value. This makes it possible for unauthenticated attackers to extract potentially sensitive information from the LDAP directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23264 β€Ό

Microsoft Edge (Chromium-based) Spoofing Vulnerability

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Encryption-less ransomware: Warning issued over emerging attack method for threat actors πŸ“’

Researchers at Zscaler have observed a marked increase in the frequency of encryption-less ransomware attacks over the last year

πŸ“– Read

via "ITPro".