βΌ CVE-2023-39250 βΌ
π Read
via "National Vulnerability Database".
Dell Storage Integration Tools for VMware (DSITV) 06.01.00.016 contain an information disclosure vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to retrieve an encryption key that could aid in further attacks.π Read
via "National Vulnerability Database".
β FBI warns about scams that lure you in as a mobile beta-tester β
π Read
via "Naked Security".
Apps on your iPhone must come from the App Store. Except when they don't... we explain what to look out for.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2023-4389 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38737 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server Liberty 22.0.0.13 through 23.0.0.7 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 262567.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4387 βΌ
π Read
via "National Vulnerability Database".
A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.π Read
via "National Vulnerability Database".
π΄ Call for Applications Open for DataTribe's Sixth Annual Cybersecurity Startup Challenge π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Call for Applications Open for DataTribe's Sixth Annual Cybersecurity Startup Challenge
Fulton, MD, August 16, 2023 β DataTribe, a global cyber foundry that invests in and co-builds next-generation cybersecurity and data science companies, today opened its call for applications for the 2023 Cybersecurity Startup Challenge. The deadline for submissionsβ¦
π΄ Beyond Identity Launches Passkey Adoption Tool, The Passkey Journey π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Beyond Identity Launches Passkey Adoption Tool, The Passkey Journey
NEW YORK--(BUSINESS WIRE)-- Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, today announced the launch of The Passkey Journey β a free, GDPR-compliant tool built to help development and user experience (UX) teams understandβ¦
π΄ 67% of Federal Government Agencies Are Confident in Meeting Zero Trust Executive Order Deadline π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
67% of Federal Government Agencies Are Confident in Meeting Zero Trust Executive Order Deadline
BOULDER, Colo. β August 15, 2023 β Swimlane today announced the release of its report "Security Automation: A Strategic Imperative for Federal Agencies" based on research conducted by Dimensional Research. The report reveals that federal agencies are preparedβ¦
π΄ Dig Security State of Cloud Data Security 2023 Report Finds Exposed Sensitive Data in More Than 30% of Cloud Assets π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Dig Security State of Cloud Data Security 2023 Report Finds Exposed Sensitive Data in More Than 30% of Cloud Assets
TEL AVIV, Israel, August 16, 2023 -- Dig Security, the cloud data security leader, today released findings from its first-ever "State of Cloud Data Security 2023 Report." The analysis of more than 13 billion files stored in public cloud environments revealsβ¦
π΄ Researchers Harvest, Analyze 100K Cybercrime Forum Credentials π΄
π Read
via "Dark Reading".
Researchers found that many Dark Web forums have stronger password rules than most government and military entities. π Read
via "Dark Reading".
Dark Reading
Researchers Harvest, Analyze 100K Cybercrime Forum Credentials
Researchers found that many Dark Web forums have stronger password rules than most government and military entities.
βΌ CVE-2023-20209 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4383 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in MicroWorld eScan Anti-Virus 7.0.32 on Linux. This affects an unknown part of the file runasroot. The manipulation leads to incorrect execution-assigned permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237315. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20228 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-32453 βΌ
π Read
via "National Vulnerability Database".
Dell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40034 βΌ
π Read
via "National Vulnerability Database".
Woodpecker is a community fork of the Drone CI system. In affected versions an attacker can post malformed webhook data witch lead to an update of the repository data that can e.g. allow the takeover of an repo. This is only critical if the CI is configured for public usage and connected to a forge witch is also in public usage. This issue has been addressed in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should secure the CI system by making it inaccessible to untrusted entities, for example, by placing it behind a firewall.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4894 βΌ
π Read
via "National Vulnerability Database".
Certain HP and Samsung Printer software packages may potentially be vulnerable to elevation of privilege due to Uncontrolled Search Path Element.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4384 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in MaximaTech Portal Executivo 21.9.1.140 and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to missing encryption of sensitive data. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237316. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40033 βΌ
π Read
via "National Vulnerability Database".
Flarum is an open source forum software. Flarum is affected by a vulnerability that allows an attacker to conduct a Blind Server-Side Request Forgery (SSRF) attack or disclose any file on the server, even with a basic user account on any Flarum forum. By uploading a file containing a URL and spoofing the MIME type, an attacker can manipulate the application to execute unintended actions. The vulnerability is due to the behavior of the `intervention/image` package, which attempts to interpret the supplied file contents as a URL, which then fetches its contents. This allows an attacker to exploit the vulnerability to perform SSRF attacks, disclose local file contents, or conduct a blind oracle attack. This has been patched in Flarum version 1.8.0. Users are advised to upgrade. Users unable to upgrade may disable PHP's `allow_url_fopen` which will prevent the fetching of external files via URLs as a temporary workaround for the SSRF aspect of the vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28075 βΌ
π Read
via "National Vulnerability Database".
Dell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-20242 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified CM Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40021 βΌ
π Read
via "National Vulnerability Database".
Oppia is an online learning platform. When comparing a received CSRF token against the expected token, Oppia uses the string equality operator (`==`), which is not safe against timing attacks. By repeatedly submitting invalid tokens, an attacker can brute-force the expected CSRF token character by character. Once they have recovered the token, they can then submit a forged request on behalf of a logged-in user and execute privileged actions on that user's behalf. In particular the function to validate received CSRF tokens is at `oppia.core.controllers.base.CsrfTokenManager.is_csrf_token_valid`. An attacker who can lure a logged-in Oppia user to a malicious website can perform any change on Oppia that the user is authorized to do, including changing profile information; creating, deleting, and changing explorations; etc. Note that the attacker cannot change a user's login credentials. An attack would need to complete within 1 second because every second, the time used in computing the token changes. This issue has been addressed in commit `b89bf80837` which has been included in release `3.3.2-hotfix-2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.π Read
via "National Vulnerability Database".