πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-21285 β€Ό

In setMetadata of MediaSessionRecord.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21290 β€Ό

In update of MmsProvider.java, there is a possible way to bypass file permission checks due to a race condition. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27947 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. Processing an image may result in disclosure of process memory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21275 β€Ό

In decideCancelProvisioningDialog of AdminIntegratedFlowPrepareActivity.java, there is a possible way to bypass factory reset protections due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21280 β€Ό

In setMediaButtonBroadcastReceiver of MediaSessionRecord.java, there is a possible permanent DoS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21292 β€Ό

In openContentUri of ActivityManagerService.java, there is a possible way for a third party app to obtain restricted files due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-32876 β€Ό

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13. A shortcut may be able to view the hidden photos album without authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48503 β€Ό

The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21273 β€Ό

In SDP_AddAttribute of sdp_db.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21274 β€Ό

In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21282 β€Ό

In TRANSPOSER_SETTINGS of lpp_tran.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21271 β€Ό

In parseInputs of ShimPreparedModel.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46725 β€Ό

A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.4 and iPadOS 16.4. Visiting a malicious website may lead to address bar spoofing.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-21233 β€Ό

In multiple locations of avrc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4347 β€Ό

Cross-site Scripting (XSS) - Reflected in GitHub repository librenms/librenms prior to 23.8.0.

πŸ“– Read

via "National Vulnerability Database".
❀2πŸ‘1
β€Ό CVE-2023-4308 β€Ό

The User Submitted Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Γ’β‚¬Λœuser-submitted-contentÒ€ℒ parameter in versions up to, and including, 20230809 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2916 β€Ό

The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including configuration. It can only be exploited if the plugin has not been configured yet. If combined with another arbitrary plugin installation and activation vulnerability, it may be possible to connect a site to InfiniteWP which would make remote management possible and allow for elevation of privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ“’ More than 100,000 hackers have details exposed through malware on cyber crime forums πŸ“’

Hackers accidentally falling foul of malware is becoming more common, researchers said

πŸ“– Read

via "ITPro".
πŸ•΄ How & Why Cybercriminals Fabricate Data Leaks πŸ•΄

A closer look at the nature of fake leaks can provide guidance on how to effectively mitigate associated risks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-24478 β€Ό

Use of insufficiently random values for some Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux before version 22.4 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30778 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Blubrry PowerPress Podcasting plugin by Blubrry plugin <=Γ‚ 10.0.1 versions.

πŸ“– Read

via "National Vulnerability Database".