๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25.8K subscribers
89.2K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2023-26449 โ€ผ

The "OX Chat" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26451 โ€ผ

Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ“ข Data breach costs: Businesses lose 73% of their income in the year following an incident ๐Ÿ“ข

Erosion of trust, remediation costs, and potential regulatory fines create a confluence of financial burdens for businesses

๐Ÿ“– Read

via "ITPro".
โค1
โ€ผ CVE-2023-33383 โ€ผ

Shelly 4PM Pro four-channel smart switch 0.11.0 allows an attacker to trigger a BLE out of bounds read fault condition that results in a device reload.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38330 โ€ผ

OXID eShop Enterprise Edition 6.5.0 รขโ‚ฌโ€œ 6.5.2 before 6.5.3 allows uploading files with modified headers in the administration area. An attacker can upload a file with a modified header to create a HTTP Response Splitting attack.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-40609 โ€ผ

IBM SDK, Java Technology Edition 7.1.5.18 and 8.0.8.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236069.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2023-33257 โ€ผ

Verint Engagement Management 15.3 Update 2023R2 is vulnerable to HTML injection via the user data form in the live chat.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-23476 โ€ผ

IBM Robotic Process Automation 21.0.0 through 21.0.7.latest is vulnerable to unauthorized access to data due to insufficient authorization validation on some API routes. IBM X-Force ID: 245425.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2023-26317 โ€ผ

A vulnerability has been discovered in Xiaomi routers that could allow command injection through an external interface. This vulnerability arises from inadequate filtering of responses returned from the external interface. Attackers could exploit this vulnerability by hijacking the ISP or an upper-layer router to gain privileges on the Xiaomi router. Successful exploitation of this flaw could permit remote code execution and complete compromise of the device.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2022-46484 โ€ผ

Information disclosure in password protected surveys in Data Illusion Survey Software Solutions NGSurvey v2.4.28 and below allows attackers to view the password to access and arbitrarily submit surveys.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-26316 โ€ผ

A XSS vulnerability exists in the Xiaomi cloud service Application product. The vulnerability is caused by Webview's whitelist checking function allowing javascript protocol to be loaded and can be exploited by attackers to steal Xiaomi cloud service account's cookies.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
โ€ผ CVE-2022-46485 โ€ผ

Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vulnerable to Denial of Service if a survey contains a "Text Field", "Comment Field" or "Contact Details".

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด Cyber-Insurance Underwriting Is Still Stuck in the Dark Ages ๐Ÿ•ด

Innovations in continuous controls monitoring may be the only way underwriters can offer cyber-insurance policies that make sense in the market.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2023-3470 โ€ผ

Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account. ร‚ The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password. ร‚ On vCMP systems, all Guests share the same deterministic password, allowing those with TMSH access on one Guest to access keys of a different Guest.The following BIG-IP hardware platforms are affected: 10350v-F, i5820-DF, i7820-DF, i15820-DF, 5250v-F, 7200v-F, 10200v-F, 6900-F, 8900-F, 11000-F, and 11050-F.The BIG-IP rSeries r5920-DF and r10920-DF are not affected, nor does the issue affect software FIPS implementations or network HSM configurations.Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38423 โ€ผ

A cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.ร‚  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38419 โ€ผ

An authenticated attacker with guest privileges or higher can cause the iControl SOAP process to terminate by sending undisclosed requests.ร‚ ร‚ Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38138 โ€ผ

A reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which allows an attacker to run JavaScript in the context of the currently logged-in user.ร‚  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-36494 โ€ผ

Audit logs on F5OS-A may contain undisclosed sensitive information.ร‚  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-36858 โ€ผ

An insufficient verification of data vulnerability exists in BIG-IP Edge Client for Windows and macOS that may allow an attacker to modify its configured server list.ร‚ ร‚ Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-38418 โ€ผ

The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process.ร‚  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ‘1
๐Ÿ•ด Iranian Company Plays Host to Reams of Ransomware, APT Groups ๐Ÿ•ด

Cloudzy is a command-and-control provider (C2P) to APT groups in Iran, North Korea, and Russia, according to Halcyon.

๐Ÿ“– Read

via "Dark Reading".