π΄ StackRot Linux Kernel Bug Has Exploit Code on the Way π΄
π Read
via "Dark Reading".
Linus Torvalds led a Linux kernel team in developing a set of patches that should be available by the end of July.π Read
via "Dark Reading".
Dark Reading
StackRot Linux Kernel Bug Has Exploit Code on the Way
Linus Torvalds led a Linux kernel team in developing a set of patches for the privilege escalation flaw.
βΌ CVE-2023-3531 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.π Read
via "National Vulnerability Database".
βΌ CVE-2023-30195 βΌ
π Read
via "National Vulnerability Database".
In the module "Detailed Order" (lgdetailedorder) in version up to 1.1.20 from Linea Grafica for PrestaShop, a guest can download personal informations without restriction formatted in json.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35934 βΌ
π Read
via "National Vulnerability Database".
yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for `curl` and `httpie` (version 3.1.0 or later).At the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped.yt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the `Cookie` header upon HTTP redirects; having native downloaders calculate the `Cookie` header from the cookiejar, utilizing external downloaders' built-in support for cookies instead of passing them as header arguments, disabling HTTP redirectiong if the external downloader does not have proper cookie support, processing cookies passed as HTTP headers to limit their scope, and having a separate field for cookies in the info dict storing more information about scopingSome workarounds are available for those who are unable to upgrade. Avoid using cookies and user authentication methods. While extractors may set custom cookies, these usually do not contain sensitive information. Alternatively, avoid using `--load-info-json`. Or, if authentication is a must: verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp; use `curl` as external downloader, since it is not impacted; and/or avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36462 βΌ
π Read
via "National Vulnerability Database".
Mastodon is a free, open-source social network server based on ActivityPub. Starting in version 2.6.0 and prior to versions 3.5.9, 4.0.5, and 4.1.3, an attacker can craft a verified profile link using specific formatting to conceal arbitrary parts of the link, enabling it to appear to link to a different URL altogether. The link is visually misleading, but clicking on it will reveal the actual link. This can still be used for phishing, though, similar to IDN homograph attacks. Versions 3.5.9, 4.0.5, and 4.1.3 contain a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-29824 βΌ
π Read
via "National Vulnerability Database".
A use-after-free issue was discovered in Py_FindObjects() function in SciPy versions prior to 1.8.0.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20899 βΌ
π Read
via "National Vulnerability Database".
VMware SD-WAN (Edge) contains a bypass authentication vulnerability. An unauthenticated attacker can download the Diagnostic bundle of the application under VMware SD-WAN Management.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36859 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus SoftwarePack 900Sdoes not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36829 βΌ
π Read
via "National Vulnerability Database".
Sentry is an error tracking and performance monitoring platform. Starting in version 23.6.0 and prior to version 23.6.2, the Sentry API incorrectly returns the `access-control-allow-credentials: true` HTTP header if the `Origin` request header ends with the `system.base-hostname` option of Sentry installation. This only affects installations that have `system.base-hostname` option explicitly set, as it is empty by default. Impact is limited since recent versions of major browsers have cross-site cookie blocking enabled by default. However, this flaw could allow other multi-step attacks. The patch has been released in Sentry 23.6.2.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31277 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus transmits credentials in plaintext format.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33868 βΌ
π Read
via "National Vulnerability Database".
The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-35987 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34433 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus stores passwords using a weak hash algorithm.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32652 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-BusΓ does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37192 βΌ
π Read
via "National Vulnerability Database".
Memory management and protection issues in Bitcoin Core v22 allows attackers to modify the stored sending address within the app's memory, potentially allowing them to redirect Bitcoin transactions to wallets of their own choosing.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34995 βΌ
π Read
via "National Vulnerability Database".
There are no requirements for setting a complex passwordΓ for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3532 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35120 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35890 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35765 βΌ
π Read
via "National Vulnerability Database".
PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.π Read
via "National Vulnerability Database".
π’ Why are cyber criminals targeting the UK? π’
π Read
via "ITPro".
Attacks will continue until threat actors are hit in their wallets π Read
via "ITPro".
ITPro
Why are cyber criminals targeting the UK?
Attacks will continue until threat actors are hit in their wallets