πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-36132 β€Ό

PHP Jabbers Availability Booking Calendar 5.0 is vulnerable to Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4140 β€Ό

The WP Ultimate CSV Importer plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 7.9.8 due to insufficient restriction on the 'get_header_values' function. This makes it possible for authenticated attackers, with minimal permissions such as an author, if the administrator previously grants access in the plugin settings, to modify their user role by supplying the 'wp_capabilities->cus1' parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30146 β€Ό

Assmann Digitus Plug&View IP Camera family allows unauthenticated attackers to download a copy of the camera's settings and the administrator credentials.

πŸ“– Read

via "National Vulnerability Database".
❀1
β€Ό CVE-2023-36131 β€Ό

PHPJabbers Availability Booking Calendar 5.0 is vulnerable to Incorrect Access Control due to improper input validation of password parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36158 β€Ό

Cross Site Scripting (XSS) vulnerability in sourcecodester Toll Tax Management System 1.0 allows remote attackers to run arbitrary code via the First Name and Last Name fields on the My Account page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30297 β€Ό

An issue found in N-able Technologies N-central Server before 2023.4 allows a local attacker to execute arbitrary code via the monitoring function of the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4139 β€Ό

The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Sensitive Information Exposure via Directory Listing due to missing restriction in export folder indexing in versions up to, and including, 7.9.8. This makes it possible for unauthenticated attackers to list and view exported files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33665 β€Ό

ai-dev aitable before v0.2.2 was discovered to contain a SQL injection vulnerability via the component /includes/ajax.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36134 β€Ό

In PHP Jabbers Class Scheduling System 1.0, lack of verification when changing an email address and/or password (on the Profile Page) allows remote attackers to take over accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39379 β€Ό

Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product's maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Google, Microsoft Take Refuge in Rust Language's Better Security πŸ•΄

More tech giants turn to the Rust programming language for its built-in memory safety and other security features.

πŸ“– Read

via "Dark Reading".
πŸ‘1
πŸ•΄ How To Deal With the Vagueness in New Cyber Regulations πŸ•΄

Recent regulations for privacy, AI, and breaches tend to be overly broad, suggesting that the rulemakers lack tech acumen.

πŸ“– Read

via "Dark Reading".
β™ŸοΈ Teach a Man to Phish and He’s Set for Life β™ŸοΈ

One frustrating aspect of email phishing is the frequency with which scammers fall back on tried-and-true methods that really have no business working these days. Like attaching a phishing email to a traditional, clean email message, or leveraging link redirects on LinkedIn, or abusing an encoding method that makes it easy to disguise booby-trapped Microsoft Windows files as relatively harmless documents.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ How to Talk So Your CISO Will Listen πŸ•΄

Tailor your business project proposal to suit the language your company's CISO speaks, be it business, technical, or compliance. Do your research first and gather support from around the company.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34038 β€Ό

VMware Horizon Server contains an information disclosure vulnerability. A malicious actor with network access may be able to access information relating to the internal network configuration.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-34037 β€Ό

VMware Horizon Server contains a HTTP request smuggling vulnerability. A malicious actor with network access may be able to perform HTTP smuggle requests.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
🦿 8 Best Identity and Access Management (IAM) Solutions for 2023 🦿

Identity and access management software helps you maintain control of your environment by allowing authorized users to access company resources. Learn 10 of the top IAM tools to see which might be the best fit for your business.

πŸ“– Read

via "Tech Republic".
❀2
β€Ό CVE-2023-36480 β€Ό

The Aerospike Java client is a Java application that implements a network protocol to communicate with an Aerospike server. Prior to version 7.0.0, some of the messages received from the server contain Java objects that the client deserializes when it encounters them without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running on. Version 7.0.0 contains a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29689 β€Ό

PyroCMS 3.9 contains a remote code execution (RCE) vulnerability that can be exploited through a server-side template injection (SSTI) flaw. This vulnerability allows a malicious attacker to send customized commands to the server and execute arbitrary code on the affected system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4135 β€Ό

A heap out-of-bounds memory read flaw was found in the virtual nvme device in QEMU. The QEMU process does not validate an offset provided by the guest before computing a host heap pointer, which is used for copying data back to the guest. Arbitrary heap memory relative to an allocated buffer can be disclosed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29505 β€Ό

An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking.

πŸ“– Read

via "National Vulnerability Database".