πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-32494 β€Ό

Radare2 has a division by zero vulnerability in Mach-O parser's rebase_buffer function. This allow attackers to create malicious inputs that can cause denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36992 β€Ό

PHP injection in TravianZ 8.3.4 and 8.3.3 in the config editor in the admin page allows remote attackers to execute PHP code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36256 β€Ό

The Online Examination System Project 1.0 version is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious link that, when clicked by an admin user, will delete a user account from the database without the admin's consent. The email of the user to be deleted is passed as a parameter in the URL, which can be manipulated by the attacker. This could result in a loss of data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32495 β€Ό

Radare2 has a use-after-free vulnerability in pyc parser's get_none_object function. Attacker can read freed memory afterwards. This will allow attackers to cause denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36994 β€Ό

In TravianZ 8.3.4 and 8.3.3, Incorrect Access Control in the installation script allows an attacker to overwrite the server configuration and inject PHP code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36993 β€Ό

The cryptographically insecure random number generator being used in TravianZ 8.3.4 and 8.3.3 in the password reset function allows an attacker to guess the password reset.parameters and to take over accounts.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Top Suspect in 2015 Ashley Madison Hack Committed Suicide in 2014 β™ŸοΈ

When the marital infidelity website AshleyMadison.com learned in July 2015 that hackers were threatening to publish data stolen from 37 million users, the company’s then-CEO Noel Biderman was quick to point the finger at an unnamed former contractor. But as a new documentary series on Hulu reveals [SPOILER ALERT!], there was just one problem with that theory: Their top suspect had killed himself more than a year before the hackers began publishing stolen user data.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Truebot Malware Variants Abound, According to CISA Advisory πŸ•΄

US and Canadian government agencies find that new variants of the malware are increasingly being utilized.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Meta's Rush to Topple Twitter Sets Up Looming Privacy Debate πŸ•΄

GDPR is halting Meta's new Threads app from entering EU markets, portending a broader struggle over the right ways to collect user data on social apps.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Safely Architect AI in Your Cybersecurity Programs πŸ•΄

Guardrails need to be set in place to ensure confidentiality of sensitive information, while still leveraging AI as a force multiplier for productivity.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Global Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses πŸ•΄

Hack The Box launches Capture The Flag competition, including offensive and defensive challenges, to unite teams as cyberattacks increase in 2023 to unprecedented levels.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-37269 β€Ό

Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Users with the `backend.manage_branding` permission can upload SVGs as the application logo. Prior to version 1.2.3, SVG uploads were not sanitized, which could have allowed a stored cross-site scripting (XSS) attack. To exploit the vulnerability, an attacker would already need to have developer or super user level permissions in Winter CMS. This means they would already have extensive access and control within the system. Additionally, to execute the XSS, the attacker would need to convince the victim to directly visit the URL of the maliciously uploaded SVG, and the application would have to be using local storage where uploaded files are served under the same domain as the application itself instead of a CDN. This is because all SVGs in Winter CMS are rendered through an `img` tag, which prevents any payloads from being executed directly. These two factors significantly limit the potential harm of this vulnerability. This issue has been patched in v1.2.3 through the inclusion of full support for SVG uploads and automatic sanitization of uploaded SVG files. As a workaround, one may apply the patches manually.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37270 β€Ό

Piwigo is open source photo gallery software. Prior to version 13.8.0, there is a SQL Injection vulnerability in the login of the administrator screen. The SQL statement that acquires the HTTP Header `User-Agent` is vulnerable at the endpoint that records user information when logging in to the administrator screen. It is possible to execute arbitrary SQL statements. Someone who wants to exploit the vulnerability must be log in to the administrator screen, even with low privileges. Any SQL statement can be executed. Doing so may leak information from the database. Version 13.8.0 contains a fix for this issue. As another mitigation, those who want to execute a SQL statement verbatim with user-enterable parameters should be sure to escape the parameter contents appropriately.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-32000 β€Ό

A Cross-Site Scripting (XSS) vulnerability found in UniFi Network (Version 7.3.83 and earlier) allows a malicious actor with Site Administrator credentials to escalate privileges by persuading an Administrator to visit a malicious web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3552 β€Ό

Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-3553 β€Ό

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

πŸ“– Read

via "National Vulnerability Database".
❀1πŸ‘1
β€Ό CVE-2023-3551 β€Ό

Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ•΄ How to Use Log Management to Retrace Your Digital Footsteps πŸ•΄

Log management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems.

πŸ“– Read

via "Dark Reading".
❀1
β€Ό CVE-2023-37288 β€Ό

SmartBPM.NET has a vulnerability of using hard-coded authentication key. An unauthenticated remote attacker can exploit this vulnerability to access system with regular user privilege to read application data, and execute submission and approval processes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37287 β€Ό

SmartBPM.NET has a vulnerability of using hard-coded authentication key. An unauthenticated remote attacker can exploit this vulnerability to access system with regular user privilege to read application data, and execute submission and approval processes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37286 β€Ό

SmartSoft SmartBPM.NET has a vulnerability of using hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code and disrupt service.

πŸ“– Read

via "National Vulnerability Database".