πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-37203 β€Ό

Insufficient validation in the Drag and Drop API in conjunction with social engineering, may have allowed an attacker to trick end-users into creating a shortcut to local system files. This could have been leveraged to execute arbitrary code. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37209 β€Ό

A use-after-free condition existed in `NotifyOnHistoryReload` where a `LoadingSessionHistoryEntry` object was freed and a reference to that object remained. This resulted in a potentially exploitable condition when the reference to that object was later reused. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37211 β€Ό

Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 115, Firefox ESR < 102.13, and Thunderbird < 102.13.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37204 β€Ό

A website could have obscured the fullscreen notification by using an option element by introducing lag via an expensive computational function. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37205 β€Ό

The use of RTL Arabic characters in the address bar may have allowed for URL spoofing. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37212 β€Ό

Memory safety bugs present in Firefox 114. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3336 β€Ό

TN-5900 Series version 3.3 and prior versions is vulnearble to user enumeration vulnerability. The vulnerability may allow a remote attacker to determine whether a user is valid during password recovery through the web login page and enable a brute force attack with valid users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3482 β€Ό

When Firefox is configured to block storage of all cookies, it was still possible to store data in localstorage by using an iframe with a source of 'about:blank'. This could have led to malicious websites storing tracking data without permission. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37210 β€Ό

A website could prevent a user from exiting full-screen mode via alert and prompt calls. This could lead to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-37206 β€Ό

Uploading files which contain symlinks may have allowed an attacker to trick a user into submitting sensitive data to a malicious website. This vulnerability affects Firefox < 115.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3089 β€Ό

A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3455 β€Ό

Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2538 β€Ό

A CWE-552 "Files or Directories Accessible to External PartiesҀ� in the web interface of the Tyan S5552 BMC version 3.00 allows an unauthenticated remote attacker to retrieve the private key of the TLS certificate in use by the BMC via forced browsing. This can then be abused to perform Man-in-the-Middle (MitM) attacks against victims that access the web interface through HTTPS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46890 β€Ό

Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46891 β€Ό

Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46893 β€Ό

Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Can Fix Ransomware Tomorrow πŸ•΄

You can't encrypt a file you can't open β€” Microsoft could dramatically impact ransomware by slowing it down.

πŸ“– Read

via "Dark Reading".
πŸ‘2❀1
πŸ•΄ China's Mustang Panda Linked to SmugX Attacks on European Governments πŸ•΄

Attackers use HTML smuggling to spread the PlugX RAT in the campaign, which has been ongoing since at least December.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-36665 β€Ό

protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype.<new-property> = ...;" whereas CVE-2022-25878 was about "Object.__proto__.<new-property> = ...;" instead.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35971 β€Ό

A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker toΓ‚ conduct a stored cross-site scripting (XSS) attack against aΓ‚ user of the interface. A successful exploit couldΓ‚ allow an attacker to execute arbitrary script code in aΓ‚ victim's browser in the context of the affected interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35974 β€Ό

Authenticated command injection vulnerabilities exist inΓ‚ the ArubaOS command line interface. Successful exploitationΓ‚ of these vulnerabilities result in the ability to executeΓ‚ arbitrary commands as a privileged user on the underlyingΓ‚ operating system.

πŸ“– Read

via "National Vulnerability Database".