🕴 Microsoft Teams Exploit Tool Auto-Delivers Malware 🕴
📖 Read
via "Dark Reading".
The "TeamsPhisher" cyberattack tool gives pentesters — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.📖 Read
via "Dark Reading".
Dark Reading
Microsoft Teams Exploit Tool Auto-Delivers Malware
The "TeamsPhisher" cyberattack tool gives pen testers — and adversaries — a way to deliver malicious files directly to a Teams user from an external account, or tenant.
🕴 3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems 🕴
📖 Read
via "Dark Reading".
Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.📖 Read
via "Dark Reading".
Dark Reading
3 Critical RCE Bugs Threaten Industrial Solar Panels, Endangering Grid Systems
Exposed and unpatched solar power monitoring systems have been exploited by both amateurs and professionals, including Mirai botnet hackers.
🕴 83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill 🕴
📖 Read
via "Dark Reading".
70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB.📖 Read
via "Dark Reading".
Dark Reading
83% of Brits Demand Messaging Apps Remain Private, Ahead of Threat From Online Safety Bill
70% think criminals will move from WhatsApp etc to non-regulated apps, post OSB.
‼ CVE-2023-35936 ‼
📖 Read
via "National Vulnerability Database".
Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library. Starting in version 1.13 and prior to version 3.1.4, Pandoc is susceptible to an arbitrary file write vulnerability, which can be triggered by providing a specially crafted image element in the input when generating files using the `--extract-media` option or outputting to PDF format. This vulnerability allows an attacker to create or overwrite arbitrary files on the system ,depending on the privileges of the process running pandoc. It only affects systems that pass untrusted user input to pandoc and allow pandoc to be used to produce a PDF or with the `--extract-media` option.The fix is to unescape the percent-encoding prior to checking that the resource is not above the working directory, and prior to extracting the extension. Some code for checking that the path is below the working directory was flawed in a similar way and has also been fixed. Note that the `--sandbox` option, which only affects IO done by readers and writers themselves, does not block this vulnerability. The vulnerability is patched in pandoc 3.1.4. As a workaround, audit the pandoc command and disallow PDF output and the `--extract-media` option.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36624 ‼
📖 Read
via "National Vulnerability Database".
Loxone Miniserver Go Gen.2 through 14.0.3.28 allows an authenticated operating system user to escalate privileges via the Sudo configuration. This allows the elevated execution of binaries without a password requirement.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27197 ‼
📖 Read
via "National Vulnerability Database".
PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow an attacker to gain root access by running a crafted binary leveraging an exported function from a shared library. The attacker must have shell access to the device in order to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36457 ‼
📖 Read
via "National Vulnerability Database".
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories. The vulnerability has been fixed in v1.3.6.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36458 ‼
📖 Read
via "National Vulnerability Database".
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal. The vulnerability has been fixed in v1.3.6.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35939 ‼
📖 Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a on a file accessible by an authenticated user (or not for certain actions), allows a threat actor to interact, modify, or see Dashboard data. Version 10.0.8 contains a patch for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36808 ‼
📖 Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35940 ‼
📖 Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27198 ‼
📖 Read
via "National Vulnerability Database".
PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow the execution of arbitrary commands by using the exec service and including a specific word in the command to be executed. The attacker must have physical USB access to the device in order to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34244 ‼
📖 Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 9.4.0 and prior to version 10.0.8, a malicious link can be crafted by an unauthenticated user that can exploit a reflected XSS in case any authenticated user opens the crafted link. Users should upgrade to version 10.0.8 to receive a patch.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2023-34654 ‼
📖 Read
via "National Vulnerability Database".
taocms <=3.0.2 is vulnerable to Cross Site Scripting (XSS).📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2023-30207 ‼
📖 Read
via "National Vulnerability Database".
A divide by zero issue discovered in Kodi Home Theater Software 19.5 and earlier allows attackers to cause a denial of service via use of crafted mp3 file.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-36622 ‼
📖 Read
via "National Vulnerability Database".
The websocket configuration endpoint of the Loxone Miniserver Go Gen.2 before 14.1.5.9 allows remote authenticated administrators to inject arbitrary OS commands via the timezone parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27199 ‼
📖 Read
via "National Vulnerability Database".
PAX Technology A930 PayDroid_7.1.1_Virgo_V04.5.02_20220722 allows attackers to compile a malicious shared library and use LD_PRELOAD to bypass authorization checks.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2023-36623 ‼
📖 Read
via "National Vulnerability Database".
The root password of the Loxone Miniserver Go Gen.2 before 14.2 is calculated using hard-coded secrets and the MAC address. This allows a local user to calculate the root password and escalate privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-35924 ‼
📖 Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34457 ‼
📖 Read
via "National Vulnerability Database".
MechanicalSoup is a Python library for automating interaction with websites. Starting in version 0.2.0 and prior to version 1.3.0, a malicious web server can read arbitrary files on the client using a `<input type="file" ...>` inside HTML form. All users of MechanicalSoup's form submission are affected, unless they took very specific (and manual) steps to reset HTML form field values. Version 1.3.0 contains a patch for this issue.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2023-34107 ‼
📖 Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue.📖 Read
via "National Vulnerability Database".