🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2023-39415 ‼

Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product's Control Panel and perform an unintended operation.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-39454 ‼

Buffer overflow vulnerability in WRC-X1800GS-B v1.13 and earlier, WRC-X1800GSA-B v1.13 and earlier, and WRC-X1800GSH-B v1.13 and earlier allows an unauthenticated attacker to execute arbitrary code.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-35991 ‼

Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-39445 ‼

Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an unauthenticated attacker to execute arbitrary code by sending a specially crafted file to the product's certain management console.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-38576 ‼

Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an authenticated user to execute arbitrary OS commands on a certain management console.

📖 Read

via "National Vulnerability Database".
📢 Data resiliency in the face of ransomware 📢

Backups on their own are not enough

📖 Read

via "ITPro".
📢 Breached for years: How long-term cyber attacks are able to linger 📢

As the number of major organizations breached over several years stack up, we examine the deeply entrenched issues that facilitate the worst kind of attacks

📖 Read

via "ITPro".
🕴 Unveiling the Hidden Risks of Routing Protocols 🕴

Neglecting security of Border Gateway Protocol (BGP) and other routing protocols has created multiple vulnerabilities that must be addressed.

📖 Read

via "Dark Reading".
‼ CVE-2023-4407 ‼

A vulnerability classified as critical was found in Codecanyon Credit Lite 1.5.4. Affected by this vulnerability is an unknown functionality of the file /portal/reports/account_statement of the component POST Request Handler. The manipulation of the argument date1/date2 leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-237511.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-31094 ‼

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lauri Karisola / WP Trio Stock Sync for WooCommerce plugin <= 2.4.0 versions.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-31228 ‼

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace plugin <= 1.3.0 versions.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-4409 ‼

A vulnerability, which was classified as critical, has been found in NBS&HappySoftWeChat 1.1.6. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237512.

📖 Read

via "National Vulnerability Database".
🕴 Tel Aviv Stock Exchange CISO: Making Better Use Of Your SIEM 🕴

If rule writing for SIEMs isn't managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team.

📖 Read

via "Dark Reading".
🕴 African Cybercrime Operations Shut Down in Law Enforcement Operation 🕴

Interpol- and Afripol-led crackdown disrupts cybercrime ecosystem responsible for some $40 million in losses to victims.

📖 Read

via "Dark Reading".
‼ CVE-2023-32122 ‼

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spiffy Plugins Spiffy Calendar plugin <= 4.9.3 versions.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-32130 ‼

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Daniel Powney Multi Rating plugin <= 5.0.6 versions.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-4415 ‼

A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-4414 ‼

A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237517 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

📖 Read

via "National Vulnerability Database".
🕴 Phishing Attack Targets Hundreds of Zimbra Customers in Four Continents 🕴

A good chunk of the entire user base of a particular email service is being targeted for sensitive credentials.

📖 Read

via "Dark Reading".
🕴 CISA Committee Tackles Remote Monitoring and Management Protections 🕴

CISA's public-private partnership produces RMM strategies to shore up critical infrastructure and to educate the MSPs that provide remote access to them.

📖 Read

via "Dark Reading".
🦿 Top 5 Disaster Recovery as a Service Providers for 2023 🦿

This is a comprehensive list of the top Disaster Recovery as a Service providers. Use this guide to compare and choose the best solution for you.

📖 Read

via "Tech Republic".