βΌ CVE-2023-35001 βΌ
π Read
via "National Vulnerability Database".
Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespaceπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34106 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33335 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in Sophos Sophos iView (The EOL was December 31st 2020) in grpname parameter that allows arbitrary script to be executed.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34337 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where a user may cause an inadequate encryption strength by hash-based message authentication code (HMAC). A successful exploit of this vulnerabilityΓ may lead to a loss of confidentiality, integrity, and availability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35863 βΌ
π Read
via "National Vulnerability Database".
In MADEFORNET HTTP Debugger through 9.12, the Windows service does not set the seclevel registry key before launching the driver. Thus, it is possible for an unprivileged application to obtain a handle to the NetFilterSDK wrapper before the service obtains exclusive access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34473 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where a valid user may cause a use of hard-coded credentials. A successful exploit of this vulnerabilityΓ may lead to a loss of confidentiality, integrity, and availability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31248 βΌ
π Read
via "National Vulnerability Database".
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespaceπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34472 βΌ
π Read
via "National Vulnerability Database".
AMI SPx contains a vulnerability in the BMC where an Attacker may cause an improper neutralization of CRLF sequences in HTTP Headers. A successful exploit of this vulnerability may lead to a loss of integrity.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30607 βΌ
π Read
via "National Vulnerability Database".
icingaweb2-module-jira provides integration with Atlassian Jira. Starting in version 1.3.0 and prior to version 1.3.2, template and field configuration forms perform the deletion action before user input is validated, including the cross site request forgery token. This issue is fixed in version 1.3.2. There are no known workarounds.π Read
via "National Vulnerability Database".
π΄ Microsoft Teams Exploit Tool Auto-Delivers Malware π΄
π Read
via "Dark Reading".
The "TeamsPhisher" cyberattack tool gives pentesters β and adversaries β a way to deliver malicious files directly to a Teams user from an external account, or tenant.π Read
via "Dark Reading".
Dark Reading
Microsoft Teams Exploit Tool Auto-Delivers Malware
The "TeamsPhisher" cyberattack tool gives pen testers β and adversaries β a way to deliver malicious files directly to a Teams user from an external account, or tenant.
π΄ 3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems π΄
π Read
via "Dark Reading".
Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.π Read
via "Dark Reading".
Dark Reading
3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems
Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.
π΄ 83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill π΄
π Read
via "Dark Reading".
70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB.π Read
via "Dark Reading".
Dark Reading
83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill
70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB.
βΌ CVE-2023-35936 βΌ
π Read
via "National Vulnerability Database".
Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library. Starting in version 1.13 and prior to version 3.1.4, Pandoc is susceptible to an arbitrary file write vulnerability, which can be triggered by providing a specially crafted image element in the input when generating files using the `--extract-media` option or outputting to PDF format. This vulnerability allows an attacker to create or overwrite arbitrary files on the system ,depending on the privileges of the process running pandoc. It only affects systems that pass untrusted user input to pandoc and allow pandoc to be used to produce a PDF or with the `--extract-media` option.The fix is to unescape the percent-encoding prior to checking that the resource is not above the working directory, and prior to extracting the extension. Some code for checking that the path is below the working directory was flawed in a similar way and has also been fixed. Note that the `--sandbox` option, which only affects IO done by readers and writers themselves, does not block this vulnerability. The vulnerability is patched in pandoc 3.1.4. As a workaround, audit the pandoc command and disallow PDF output and the `--extract-media` option.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36624 βΌ
π Read
via "National Vulnerability Database".
Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27197 βΌ
π Read
via "National Vulnerability Database".
PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow an attacker to gain root access by running a crafted binary leveraging an exported function from a shared library. The attacker must have shell access to the device in order to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36457 βΌ
π Read
via "National Vulnerability Database".
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories. The vulnerability has been fixed in v1.3.6.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36458 βΌ
π Read
via "National Vulnerability Database".
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal. The vulnerability has been fixed in v1.3.6.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35939 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a on a file accessible by an authenticated user (or not for certain actions), allows a threat actor to interact, modify, or see Dashboard data. Version 10.0.8 contains a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36808 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35940 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27198 βΌ
π Read
via "National Vulnerability Database".
PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow the execution of arbitrary commands by using the exec service and including a specific word in the command to be executed. The attacker must have physical USB access to the device in order to exploit this vulnerability.π Read
via "National Vulnerability Database".