βΌ CVE-2023-36934 βΌ
π Read
via "National Vulnerability Database".
In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27390 βΌ
π Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25399 βΌ
π Read
via "National Vulnerability Database".
A refcounting issue which leads to potential memory leak was discovered in scipy commit 8627df31ab in Py_FindObjects() function.π Read
via "National Vulnerability Database".
π΄ OPERA1ER Cybercrime Group's Leader Arrested by INTERPOL π΄
π Read
via "Dark Reading".
The group's mastermind was nabbed in CΓ΄te d'Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement's Operation Nervone.π Read
via "Dark Reading".
Dark Reading
OPERA1ER Cybercrime Group's Leader Arrested by Interpol
The group's mastermind was nabbed in CΓ΄te d'Ivoire for stealing up to $30 million using malware, phishing campaigns, and BEC scams, as part of international law enforcement's Operation Nervone.
βΌ CVE-2023-34471 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where a user may cause a missing cryptographic step by generating a hash-based message authentication code (HMAC). A successful exploit of this vulnerability may lead to the loss confidentiality, integrity, and authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23452 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Selenium Grid v3.141.59 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the hub parameter under the /grid/console page.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34338 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where an Attacker may cause a use of hard-coded cryptographic key by a hard-coded certificate. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.Γ π Read
via "National Vulnerability Database".
βΌ CVE-2023-35001 βΌ
π Read
via "National Vulnerability Database".
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespaceπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34106 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33335 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in Sophos Sophos iView (The EOL was December 31st 2020) in grpname parameter that allows arbitrary script to be executed.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34337 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where a user may cause an inadequate encryption strength by hash-based message authentication code (HMAC). A successful exploit of this vulnerabilityΓ may lead to a loss of confidentiality, integrity, and availability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35863 βΌ
π Read
via "National Vulnerability Database".
In MADEFORNET HTTP Debugger through 9.12, the Windows service does not set the seclevel registry key before launching the driver. Thus, it is possible for an unprivileged application to obtain a handle to the NetFilterSDK wrapper before the service obtains exclusive access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34473 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where a valid user may cause a use of hard-coded credentials. A successful exploit of this vulnerabilityΓ may lead to a loss of confidentiality, integrity, and availability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31248 βΌ
π Read
via "National Vulnerability Database".
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespaceπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34472 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where an Attacker may cause an improper neutralization of CRLF sequences in HTTP Headers. A successful exploit of this vulnerability may lead to a loss of integrity.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30607 βΌ
π Read
via "National Vulnerability Database".
icingaweb2-module-jira provides integration with Atlassian Jira. Starting in version 1.3.0 and prior to version 1.3.2, template and field configuration forms perform the deletion action before user input is validated, including the cross site request forgery token. This issue is fixed in version 1.3.2. There are no known workarounds.π Read
via "National Vulnerability Database".
π΄ Microsoft Teams Exploit Tool Auto-Delivers Malware π΄
π Read
via "Dark Reading".
The "TeamsPhisher" cyberattack tool gives pentesters β and adversaries β a way to deliver malicious files directly to a Teams user from an external account, or tenant.π Read
via "Dark Reading".
Dark Reading
Microsoft Teams Exploit Tool Auto-Delivers Malware
The "TeamsPhisher" cyberattack tool gives pen testers β and adversaries β a way to deliver malicious files directly to a Teams user from an external account, or tenant.
π΄ 3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems π΄
π Read
via "Dark Reading".
Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.π Read
via "Dark Reading".
Dark Reading
3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems
Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.
π΄ 83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill π΄
π Read
via "Dark Reading".
70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB.π Read
via "Dark Reading".
Dark Reading
83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill
70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB.
βΌ CVE-2023-35936 βΌ
π Read
via "National Vulnerability Database".
Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library. Starting in version 1.13 and prior to version 3.1.4, Pandoc is susceptible to an arbitrary file write vulnerability, which can be triggered by providing a specially crafted image element in the input when generating files using the `--extract-media` option or outputting to PDF format. This vulnerability allows an attacker to create or overwrite arbitrary files on the system ,depending on the privileges of the process running pandoc. It only affects systems that pass untrusted user input to pandoc and allow pandoc to be used to produce a PDF or with the `--extract-media` option.The fix is to unescape the percent-encoding prior to checking that the resource is not above the working directory, and prior to extracting the extension. Some code for checking that the path is below the working directory was flawed in a similar way and has also been fixed. Note that the `--sandbox` option, which only affects IO done by readers and writers themselves, does not block this vulnerability. The vulnerability is patched in pandoc 3.1.4. As a workaround, audit the pandoc command and disallow PDF output and the `--extract-media` option.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36624 βΌ
π Read
via "National Vulnerability Database".
Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement.π Read
via "National Vulnerability Database".