πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-30906 β€Ό

The vulnerability could be locally exploited to allow escalation of privilege.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32965 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CRUDLab Jazz Popups plugin <=Γ‚ 1.8.7 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36383 β€Ό

Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in MagePeople Team Event Manager and Tickets Selling Plugin for WooCommerce plugin <=Γ‚ 3.9.5 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31441 β€Ό

In NATO Communications and Information Agency anet (aka Advisor Network) through 3.3.0, an attacker can provide a crafted JSON file to sanitizeJson and cause an exception. This is related to the U+FFFD Unicode replacement character. A for loop does not consider that a data structure is being modified during loop execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23911 β€Ό

An issue was discovered in asn1c through v0.9.28. A NULL pointer dereference exists in the function _default_error_logger() located in asn1fix.c. It allows an attacker to cause Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
⚠ Microsoft hit by Storm season – a tale of two semi-zero days ⚠

The first compromise didn't get the crooks as far as they wanted, so they found a second one that did...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-34035 β€Ό

Spring Security versions 5.8Γ‚ prior to 5.8.5, 6.0Γ‚ prior to 6.0.5,Γ‚ and 6.1Γ‚ prior to 6.1.2Γ‚ could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String)Γ‚ and multiple servlets, one of them being Spring MVCÒ€ℒs DispatcherServlet.Γ‚ (DispatcherServletΓ‚ is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)Specifically, an application is vulnerable when all of the following are true: * Spring MVC is on the classpath * Spring Security is securing more than one servlet in a single application (one of them being Spring MVCÒ€ℒs DispatcherServlet) * The application uses requestMatchers(String)Γ‚ to refer to endpoints that are not Spring MVC endpointsAn application is not vulnerable if any of the following is true: * The application does not have Spring MVC on the classpath * The application secures no servlets other than Spring MVCÒ€ℒs DispatcherServlet * The application uses requestMatchers(String)Γ‚ only for Spring MVC endpoints

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33265 β€Ό

In Hazelcast through 5.0.4, 5.1 through 5.1.6, and 5.2 through 5.2.3, executor services don't check client permissions properly, allowing authenticated users to execute tasks on members without the required permissions granted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0160 β€Ό

A deadlock flaw was found in the Linux kernelÒ€ℒs BPF subsystem. This flaw allows a local user to potentially crash the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2263 β€Ό

The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. Γ‚ The new ENIP connections cannot be established if impacted by this vulnerability, Γ‚ which prohibits operational capabilities of the device resulting in a denial-of-service attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33231 β€Ό

XSS attack was possible in DPA 2023.2 due to insufficient input validation

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37259 β€Ό

matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored Cross site scripting (XSS). Since the Export Chat feature generates a separate document, an attacker can only inject code run from the `null` origin, restricting the impact. However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side. This issue has been addressed in commit `22fcd34c60` which is included in release version 3.76.0. Users are advised to upgrade. The only known workaround for this issue is to disable or to not use the Export Chat feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4428 β€Ό

A vulnerability has been found in what3words Autosuggest Plugin up to 4.0.0 on WordPress and classified as problematic. Affected by this vulnerability is the function enqueue_scripts of the file w3w-autosuggest/public/class-w3w-autosuggest-public.php of the component Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 4.0.1 is able to address this issue. The patch is named dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-234247.

πŸ“– Read

via "National Vulnerability Database".
🦿 E-Waste: Australia’s Hidden ESG Nightmare 🦿

Australia has an e-waste problem, and for all the conversations around climate change, energy use, plastics and other ESG matters, it's surprising that more isn't said about it.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-36670 β€Ό

A remotely exploitable command injection vulnerability was found on the Kratos NGC-IDU 9.1.0.4. An attacker can execute arbitrary Linux commands as root by sending crafted TCP requests to the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30383 β€Ό

TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38257 β€Ό

Iagona ScrutisWeb versions 2.1.37 and prior are vulnerable to an insecure direct object reference vulnerability that could allow an unauthenticated user to view profile information, including user login names and encrypted passwords.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37477 β€Ό

1Panel is an open source Linux server operation and maintenance management panel. An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. 1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands. An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system. This issue has been addressed in commit `e17b80cff49` which is included in release version `1.4.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37480 β€Ό

Fides is an open-source privacy engineering platform for managing data privacy requests and privacy regulations. The Fides webserver is vulnerable to a type of Denial of Service (DoS) attack. Attackers can exploit a weakness in the connector template upload feature to upload a malicious zip bomb file, resulting in resource exhaustion and service unavailability for all users of the Fides webserver. This vulnerability affects Fides versions `2.11.0` through `2.15.1`. Exploitation is limited to users with elevated privileges with the `CONNECTOR_TEMPLATE_REGISTER` scope, which includes root users and users with the owner role. The vulnerability has been patched in Fides version `2.16.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There is no known workaround to remediate this vulnerability without upgrading. If an attack occurs, the impact can be mitigated by manually or automatically restarting the affected container.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34330 β€Ό

AMI SPx contains a vulnerability in the BMC where a User may cause a improper control of generation of code by Dynamic Redfish Extension. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22159 β€Ό

EVERTZ devices 3080IPX exe-guest-v1.2-r26125, 7801FC 1.3 Build 27, and 7890IXG V494 are vulnerable to Arbitrary File Upload, allowing an authenticated attacker to upload a webshell or overwrite any critical system files.

πŸ“– Read

via "National Vulnerability Database".