πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ StackRot Linux Kernel Bug Has Exploit Code on the Way πŸ•΄

Linus Torvalds led a Linux kernel team in developing a set of patches that should be available by the end of July.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-3531 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30195 β€Ό

In the module "Detailed Order" (lgdetailedorder) in version up to 1.1.20 from Linea Grafica for PrestaShop, a guest can download personal informations without restriction formatted in json.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35934 β€Ό

yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for `curl` and `httpie` (version 3.1.0 or later).At the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped.yt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the `Cookie` header upon HTTP redirects; having native downloaders calculate the `Cookie` header from the cookiejar, utilizing external downloaders' built-in support for cookies instead of passing them as header arguments, disabling HTTP redirectiong if the external downloader does not have proper cookie support, processing cookies passed as HTTP headers to limit their scope, and having a separate field for cookies in the info dict storing more information about scopingSome workarounds are available for those who are unable to upgrade. Avoid using cookies and user authentication methods. While extractors may set custom cookies, these usually do not contain sensitive information. Alternatively, avoid using `--load-info-json`. Or, if authentication is a must: verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp; use `curl` as external downloader, since it is not impacted; and/or avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36462 β€Ό

Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 2.6.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, an attacker can craft a verified profile link using specific formatting to conceal arbitrary parts of the link, enabling it to appear to link to a different URL altogether. The link is visually misleading, but clicking on it will reveal the actual link. This can still be used for phishing, though, similar to IDN homograph attacks. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29824 β€Ό

A use-after-free issue was discovered in Py_FindObjects() function in SciPy versions prior to 1.8.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-20899 β€Ό

VMware SD-WAN (Edge) contains a bypass authentication vulnerability. An unauthenticated attacker can download the Diagnostic bundle of the application under VMware SD-WAN Management.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36859 β€Ό

PiiGAB M-Bus SoftwarePack 900Sdoes not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36829 β€Ό

Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31277 β€Ό

PiiGAB M-Bus transmits credentials in plaintext format.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33868 β€Ό

The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-35987 β€Ό

PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34433 β€Ό

PiiGAB M-Bus stores passwords using a weak hash algorithm.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32652 β€Ό

PiiGAB M-BusΓ‚ does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37192 β€Ό

Memory management and protection issues in Bitcoin Core v22 allows attackers to modify the stored sending address within the app's memory, potentially allowing them to redirect Bitcoin transactions to wallets of their own choosing.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34995 β€Ό

There are no requirements for setting a complex passwordΓ‚ for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3532 β€Ό

Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35120 β€Ό

PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35890 β€Ό

IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35765 β€Ό

PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ Why are cyber criminals targeting the UK? πŸ“’

Attacks will continue until threat actors are hit in their wallets

πŸ“– Read

via "ITPro".