πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-32510 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin <=Γ‚ 2.2.5 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Wireshark Analyzer 4.0.8 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
🦿 How to Remove a Lost Device From Your Google Account 🦿

Follow this guide to learn how to easily remove any device from your Google account and keep your account secure.

πŸ“– Read

via "Tech Republic".
🦿 Google AI in Workspace Adds New Zero-Trust and Digital Sovereignty Controls 🦿

Google announced security enhancements to Google Workspace focused on enhancing threat defense controls with Google AI.

πŸ“– Read

via "Tech Republic".
πŸ•΄ eBay Users Beware Russian 'Telekopye' Telegram Phishing Bot πŸ•΄

Thanks to a simple Telegram bot that democratizes phishing, ordinary Russians can conduct full-fledged phishing attacks with zero technical knowhow.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-34973 β€Ό

An insufficient entropy vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote users to predict secret via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQuTS hero h5.1.0.2424 build 20230609 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34971 β€Ό

An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQTS 4.5.4.2467 build 20230718 and laterQuTS hero h5.1.0.2424 build 20230609 and laterQuTS hero h4.5.4.2476 build 20230728 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-46884 β€Ό

A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash.*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40706 β€Ό

There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40707 β€Ό

There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40708 β€Ό

The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40710 β€Ό

An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ‚ SNAP PAC S1 Firmware version R10.3b

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34972 β€Ό

A cleartext transmission of sensitive information vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to read the contents of unexpected sensitive data via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQuTS hero h5.1.0.2424 build 20230609 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40709 β€Ό

An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ‚ SNAP PAC S1 Firmware version R10.3b

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Ransomware With an Identity Crisis Targets Small Businesses, Individuals πŸ•΄

TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep149: How many cryptographers does it take to change a light bulb? ⚠

Latest episode - listen now! Full transcript inside...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2023-40895 β€Ό

Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4420 β€Ό

A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40899 β€Ό

Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40893 β€Ό

Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40900 β€Ό

Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList.

πŸ“– Read

via "National Vulnerability Database".