πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  RansomLord Anti-Ransomware Exploit Tool 1.0 πŸ› 

RansomLord is a proof-of-concept tool that automates the creation of PE files, used to compromise ransomware pre-encryption. This tool uses dll hijacking to defeat ransomware.

πŸ“– Read

via "Packet Storm Security".
πŸ”₯1
πŸ•΄ Call of Duty Self-Spreading Worm Takes Aim at Player Lobbies πŸ•΄

The revival of the beloved online multiplayer video game was short-lived once players detected unusual activity and behavior that portended malware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-4010 β€Ό

A flaw was found in the USB Host Controller Driver framework in the Linux kernel. The usb_giveback_urb function has a logic loophole in its implementation. Due to the inappropriate judgment condition of the goto statement, the function cannot return under the input of a specific malformed descriptor file, so it falls into an endless loop, resulting in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37771 β€Ό

Art Gallery Management System v1.0 contains a SQL injection vulnerability via the cid parameter at /agms/product.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4004 β€Ό

A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34916 β€Ό

Fuge CMS v1.0 contains an Open Redirect vulnerability via /front/ProcessAct.java.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3997 β€Ό

Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the userÒ€ℒs terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal userÒ€ℒs action.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3817 β€Ό

Issue summary: Checking excessively long DH keys or parameters may be very slow.Impact summary: Applications that use the functions DH_check(), DH_check_ex()or EVP_PKEY_param_check() to check a DH key or DH parameters may experience longdelays. Where the key or parameters that are being checked have been obtainedfrom an untrusted source this may lead to a Denial of Service.The function DH_check() performs various checks on DH parameters. After fixingCVE-2023-3446 it was discovered that a large q parameter value can also triggeran overly long computation during some of these checks. A correct q value,if present, cannot be larger than the modulus p parameter, thus it isunnecessary to perform these checks if q is larger than p.An application that calls DH_check() and supplies a key or parameters obtainedfrom an untrusted source could be vulnerable to a Denial of Service attack.The function DH_check() is itself called by a number of other OpenSSL functions.An application calling any of those other functions may similarly be affected.The other functions affected by this are DH_check_ex() andEVP_PKEY_param_check().Also vulnerable are the OpenSSL dhparam and pkeyparam command line applicationswhen using the "-check" option.The OpenSSL SSL/TLS implementation is not affected by this issue.The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36763 β€Ό

Cross Site Scripting (XSS) vulnerability in DuxCMS 2.1 allows remote attackers to run arbitrary code via the content, time, copyfrom parameters when adding or editing a post.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4026 β€Ό

** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4024. Reason: This record is a duplicate of CVE-2023-4024. Notes: All CVE users should reference CVE-2023-4024 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34917 β€Ό

Fuge CMS v1.0 contains an Open Redirect vulnerability in member/RegisterAct.java.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37580 β€Ό

Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41 allows XSS in the Zimbra Classic Web Client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38750 β€Ό

In Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41, 9 before 9.0.0 Patch 34, and 10 before 10.0.2, internal JSP and XML files can be exposed.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Abyss Locker Ransomware Looks to Drown VMware's ESXi Servers πŸ•΄

The 4-month-old ransomware gang is now actively targeting VMware's virtual environments with a second variant of its custom malware.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Air-Gapped ICS Systems Targeted by Sophisticated Malware πŸ•΄

Researchers uncovered new worming second-stage tools used to locally exfiltrate data from air gapped ICS environments, putting threat actors one step away from transmission of the info to a C2.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-38989 β€Ό

An issue in the delete function in the UserController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete the Administrator's role information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3983 β€Ό

An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Protecting Intellectual Property When It Needs to Be Shared πŸ•΄

Companies should use a variety of tools and strategies, both technical and policy, to protect their IP from third-party risk.

πŸ“– Read

via "Dark Reading".
πŸ•΄ China's Volt Typhoon APT Burrows Deeper into US Critical Infrastructure πŸ•΄

US officials are concerned that the Beijing-directed cyberattacks could be a precursor to military disruption and broader destructive attacks on citizens and businesses.

πŸ“– Read

via "Dark Reading".
🦿 Reducing Generative AI Hallucinations and Trusting Your Data: Interview With Cognite CPO Moe Tanabian 🦿

In a conversation with Cognite CPO Moe Tanabian, learn how industrial software can combine human and AI skills to create smarter digital twins.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2022-42183 β€Ό

Precisely Spectrum Spatial Analyst 20.01 is vulnerable to Server-Side Request Forgery (SSRF).

πŸ“– Read

via "National Vulnerability Database".
❀1