πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ S3 Ep144: When threat hunting goes down a rabbit hole ⚠

Latest episode - check it out now!

πŸ“– Read

via "Naked Security".
🦿 8 Best Enterprise Password Managers for 2023 🦿

This is a comprehensive list of the top enterprise password managers. Use this guide to compare and choose which one is best for your business.

πŸ“– Read

via "Tech Republic".
🦿 Europol’s IOCTA 2023 Report Reveals Cybercriminals are Increasingly Interdependent 🦿

The Europol report also reported on cybercriminals' use of cryptocurrencies and how their techniques are more sophisticated. However, there was good cybersecurity news, too.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-26301 β€Ό

Certain HP LaserJet Pro print products are potentially vulnerable to an Elevation of Privilege and/or Information Disclosure related to a lack of authentication with certain endpoints.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37742 β€Ό

WebBoss.io CMS before v3.6.8.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3102 β€Ό

A sensitive information leak issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows access to titles of private issue and MR.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Few Fortune 100 Firms List Security Pros in Their Executive Ranks β™ŸοΈ

Many things have changed since 2018, such as the names of the companies in the Fortune 100 list. But one aspect of that vaunted list that hasn't shifted much since is that very few of these companies list any security professionals within their top executive ranks.The next time you receive a breach notification letter that invariably says a company you trusted places a top priority on customer security and privacy, consider this: Only four of the Fortune 100 companies currently list a security professional in the executive leadership pages of their websites. This is actually down from five of the Fortune 100 in 2018, the last time KrebsOnSecurity performed this analysis.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2023-35392 β€Ό

Microsoft Edge (Chromium-based) Spoofing Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37901 β€Ό

Indico is an open source a general-purpose, web based event management tool. There is a Cross-Site-Scripting vulnerability in confirmation prompts commonly used when deleting content from Indico. Exploitation requires someone with at least submission privileges (such as a speaker) and then someone else to attempt to delete this content. Considering that event organizers may want to delete suspicious-looking content when spotting it, there is a non-negligible risk of such an attack to succeed. The risk of this could be further increased when combined with some some social engineering pointing the victim towards this content. Users need to update to Indico 3.2.6 as soon as possible. See the docs for instructions on how to update. Users who cannot upgrade should only let trustworthy users manage categories, create events or upload materials ("submission" privileges on a contribution/event). This should already be the case in a properly-configured setup when it comes to category/event management. Note that a conference doing a Call for Abstracts actively invites external speakers (who the organizers may not know and thus cannot fully trust) to submit content, hence the need to update to a a fixed version ASAP in particular when using such workflows.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25841 β€Ό

There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 Γ’β‚¬β€œ 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victimÒ€ℒs browser.Mitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38173 β€Ό

Microsoft Edge for Android Spoofing Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25840 β€Ό

There is a Cross-site Scripting vulnerabilityΓ‚ in ArcGIS Server in versions 10.8.1 Γ’β‚¬β€œ 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. Γ‚ The privileges required to execute this attack are high.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38187 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3247 β€Ό

In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce.Γ‚ 

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3827 β€Ό

A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /listplace/user/ticket/create of the component HTTP POST Request Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235148. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3826 β€Ό

A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=recruit/resume/edit&op=status of the component Interview Handler. The manipulation of the argument resumeid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235147. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38195 β€Ό

Datalust Seq before 2023.2.9489 allows insertion of sensitive information into an externally accessible file or directory. This is exploitable only when external (SQL Server or PostgreSQL) metadata storage is used. Exploitation can only occur from a high-privileged user account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38633 β€Ό

A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3834 β€Ό

A vulnerability was found in Bug Finder EX-RATE 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3832 β€Ό

A vulnerability was found in Bug Finder Wedding Wonders 1.0. It has been classified as problematic. Affected is an unknown function of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-235158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3833 β€Ό

A vulnerability was found in Bug Finder Montage 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
πŸ”₯1