πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β™ŸοΈ Meet the Brains Behind the Malware-Friendly AI Chat Service β€˜WormGPT’ β™ŸοΈ

WormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to help write malicious software without all the pesky prohibitions on such activity enforced by ChatGPT and Google Bard, has started adding restrictions on how the service can be used. Faced with customers trying to use WormGPT to create ransomware and phishing scams, the 23-year-old Portuguese programmer who created the project now says his service is slowly morphing into β€œa more controlled environment.”The large language models (LLMs) made by ChatGPT parent OpenAI or Google or Microsoft all have various safety measures designed to prevent people from abusing them for nefarious purposes β€” such as creating malware or hate speech. In contrast, WormGPT has promoted itself as a new LLM that was created specifically for cybercrime activities.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2023-37646 β€Ό

An issue in the CAB file extraction function of Bitberry File Opener v23.0 allows attackers to execute a directory traversal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38763 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the FundRaiserID parameter within the /FundRaiserEditor.php endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38770 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the group parameter within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38765 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the membermonth parameter within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38773 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp1 and volopp2 parameters within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38759 β€Ό

Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3522 β€Ό

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38762 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the friendmonths parameter within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38768 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the PropertyID parameter within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38769 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the searchstring and searchwhat parameters within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39532 β€Ό

SES is a JavaScript environment that allows safe execution of arbitrary programs in Compartments. In version 0.18.0 prior to 0.18.7, 0.17.0 prior to 0.17.1, 0.16.0 prior to 0.16.1, 0.15.0 prior to 0.15.24, 0.14.0 prior to 0.14.5, an 0.13.0 prior to 0.13.5, there is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host.Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding hostÒ€ℒs dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`.On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin.Within an XS worker, an attacker can use the hostÒ€ℒs module system to the extent that the host has been configured. This typically only allows access to module code on the hostÒ€ℒs file system and is of limited use to an attacker.Within Node.js, the attacker gains access to Node.jsÒ€ℒs module system. Importing the powerful builtins is not useful except insofar as there are side-effects and tempered because dynamic import returns a promise. Spreading a promise into an object renders the promises useless. However, Node.js allows importing data URLs, so this is a clear path to arbitrary execution.Versions 0.18.7, 0.17.1, 0.16.1, 0.15.24, 0.14.5, and 0.13.5 contain a patch for this issue. Some workarounds are available. On the web, providing a suitably constrained Content-Security-Policy mitigates most of the threat. With XS, building a binary that lacks the ability to load modules at runtime mitigates the entirety of the threat. That will look like an implementation of `fxFindModule` in a file like `xsPlatform.c` that calls `fxRejectModuleFile`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38764 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the birthmonth and percls parameters within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38758 β€Ό

Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the license_author field in the add-ingredient function in the templates/ingredients/view.html, models/ingredients.py, and views/ingredients.py components.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38771 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp parameter within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38767 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the 'value' and 'custom' parameters within the /QueryView.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38760 β€Ό

SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the role and gender parameters within the /QueryView.php component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38766 β€Ό

Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the PersonView.php component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3386 β€Ό

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 Camera Trap Tracking System allows SQL Injection.This issue affects Camera Trap Tracking System: before 3.1905.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38761 β€Ό

Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the systemSettings.php component.

πŸ“– Read

via "National Vulnerability Database".
❀1
⚠ Serious Security: Why learning to touch-type could protect you from audio snooping ⚠

Fast, quiet, smooth, consistent and low impact... why true hacker-grade touch-typing might keep you more secure.

πŸ“– Read

via "Naked Security".