πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-23585 β€Ό

Experion server DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-22435 β€Ό

Experion server may experience a DoS due to a stack overflow when handling a specially crafted message.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24480 β€Ό

Controller DoS due to stack overflow when decoding a message from the server

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29452 β€Ό

Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field Ò€œAttribution textҀ� when selected Ò€œOtherҀ� Tile provider.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25770 β€Ό

Controller DoS may occur due to buffer overflow when an error is generated in response to a specially crafted message.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25078 β€Ό

Server or Console Station DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-24474 β€Ό

Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29455 β€Ό

Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25178 β€Ό

Controller may be loaded with malicious firmware which could enable remote code execution

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3657 β€Ό

A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. This issue affects some unknown processing of the file Master.php?f=save_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-234011.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3658 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester AC Repair and Services System 1.0. Affected is an unknown function of the file Master.php?f=delete_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234012.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29457 β€Ό

Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3659 β€Ό

A vulnerability has been found in SourceCodester AC Repair and Services System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=user/manage_user. The manipulation of the argument firstname/middlename leads to cross site scripting. The attack can be launched remotely. The identifier VDB-234013 was assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29451 β€Ό

Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.

πŸ“– Read

via "National Vulnerability Database".
🦿 How Google Keeps Company Data Safe While Using Generative AI Chatbots 🦿

Google's Behshad Behzadi weighs in on how to use generative AI chatbots without compromising company information.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-26597 β€Ό

Controller DoS due to buffer overflow in the handling of a specially crafted message received by the controller.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3661 β€Ό

A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. This affects an unknown part of the file /classes/Master.php?f=save_inquiry. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234015.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2003 β€Ό

Embedded malicious code vulnerability in Vision1210, in the build 5 of operating system version 4.3, which could allow a remote attacker to store base64-encoded malicious code in the device's data tables via the PCOM protocol, which can then be retrieved by a client and executed on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3660 β€Ό

A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/add_user_modal.php. The manipulation of the argument un leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-234014 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25948 β€Ό

Server information leak of configuration data when an error is generated in response to a specially crafted message.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Creating a Patch Management Playbook: 6 Key Questions πŸ•΄

The vulnerability gap continues to persist, and IT and security teams can play a major role in reducing their attack surface.

πŸ“– Read

via "Dark Reading".