πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-37714 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromRouteStatic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37718 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromSafeClientFilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3668 β€Ό

Improper Encoding or Escaping of Output in GitHub repository froxlor/froxlor prior to 2.0.21.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37721 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromSafeMacFilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37716 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408) and FH1202_V1.2.0.19_EN, AC10 V1.0, AC1206 V1.0, AC7 V1.0, AC5 V1.0, and AC9 V3.0 were discovered to contain a stack overflow in the page parameter in the function fromNatStaticSetting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37723 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromqossetting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37719 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromP2pListFilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37722 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromSafeUrlFilter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37715 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function frmL7ProtForm.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37717 β€Ό

Tenda F1202 V1.0BR_V1.2.0.20(408) and FH1202_V1.2.0.19_EN, AC10 V1.0, AC1206 V1.0, AC7 V1.0, AC5 V1.0, and AC9 V3.0 were discovered to contain a stack overflow in the page parameter in the function fromDhcpListClient.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ JumpCloud reveals threat actors breached internal systems, following customer speculation πŸ“’

Suspicious activity was discovered in June, but a customer link took longer than a week to establish

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-3672 β€Ό

Cross-site Scripting (XSS) - DOM in GitHub repository plaidweb/webmention.js prior to 0.5.5.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to Check If Someone Else Accessed Your Google Account 🦿

Review your recent Gmail access, browser sign-in history and Google account activity to make sure no one other than you has used your account.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Electrical Grid Stability Relies on Balancing Digital Substation Security πŸ•΄

Because digital substations are critical elements of electrical systems, they are a prime target for sophisticated cyberattacks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-3433 β€Ό

The "nickname" field within Savoir-faire Linux's Jami application is susceptible to a failed state when a user inserts special characters into the field. When present, these special characters, make it so the application cannot create the signature for the user and results in a local denial of service to the application.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3434 β€Ό

Improper Input Validation in the hyperlink interpretation inΓ‚ Savoir-faire Linux's Jami (version 20222284)Γ‚ on Windows. This allows an attacker to send a custom HTML anchor tag to pass a string value to the Windows QRC Handler through the Jami messenger.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3673 β€Ό

SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.24.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2975 β€Ό

Issue summary: The AES-SIV cipher implementation contains a bug that causesit to ignore empty associated data entries which are unauthenticated asa consequence.Impact summary: Applications that use the AES-SIV algorithm and want toauthenticate empty data entries as associated data can be mislead by removingadding or reordering such empty entries as these are ignored by the OpenSSLimplementation. We are currently unaware of any such applications.The AES-SIV algorithm allows for authentication of multiple associateddata entries along with the encryption. To authenticate empty data theapplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) withNULL pointer as the output buffer and 0 as the input buffer length.The AES-SIV implementation in OpenSSL just returns success for such a callinstead of performing the associated data authentication operation.The empty data thus will not be authenticated.As this issue does not affect non-empty associated data authentication andwe expect it to be rare for an application to use empty associated dataentries this is qualified as Low severity issue.

πŸ“– Read

via "National Vulnerability Database".
❀1
πŸ›  Faraday 4.5.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-36119 β€Ό

File upload vulnerability in PHPGurukul Online Security Guards Hiring System v.1.0 allows a remote attacker to execute arbitrary code via a crafted php file to the \osghs\admin\images file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36831 β€Ό

An Improper Check or Handling of Exceptional Conditions vulnerability in the UTM (Unified Threat Management) Web-Filtering feature of Juniper Networks Junos OS on SRX Series causes a jbuf memory leak to occur when accessing certain websites, eventually leading to a Denial of Service (DoS) condition. Service restoration is only possible by rebooting the system.The jbuf memory leak only occurs in SSL Proxy and UTM Web-Filtering configurations. Other products, platforms, and configurations are not affected by this vulnerability.This issue affects Juniper Networks Junos OS on SRX Series:22.2 versions prior to 22.2R3;22.3 versions prior to 22.3R2-S1, 22.3R3;22.4 versions prior to 22.4R1-S2, 22.4R2.This issue does not affect Juniper Networks Junos OS versions prior to 22.2R2.

πŸ“– Read

via "National Vulnerability Database".