πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-4150 β€Ό

The User Activity Tracking and Log WordPress plugin before 4.0.9 does not have proper CSRF checks when managing its license, which could allow attackers to make logged in admins update and deactivate the plugin's license via CSRF attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4023 β€Ό

The All Users Messenger WordPress plugin through 1.24 does not prevent non-administrator users from deleting messages from the all-users messenger.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34180 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in KAPlugins Google Fonts For WordPress plugin <=Γ‚ 3.0.0 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41537 β€Ό

phpjabbers Business Directory Script 3.2 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4109 β€Ό

The Ninja Forms WordPress Ninja Forms Contact Form WordPress plugin before 3.6.26 was affected by a HTML Injection security vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4035 β€Ό

The Simple Blog Card WordPress plugin before 1.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Performance-Enhanced Android MMRat Scurries onto Devices Via Fake App Stores πŸ•΄

The stealthy Trojan targets users in Southeast Asia, allowing attackers to remotely control devices to commit bank fraud.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 4 Strategies to Safeguard the Finance Industry Against Deepfake Onslaught πŸ•΄

Through strategic measures and a united front, the finance industry can overcome the looming threat of deepfakes.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-40843 β€Ό

Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "sub_73004."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25453 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ian Sadovy WordPress Tables plugin <=Γ‚ 1.3.9 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40842 β€Ό

Tengda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "R7WebsSecurityHandler."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-25466 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Mahlamusa Who Hit The Page Γ’β‚¬β€œ Hit Counter plugin <=Γ‚ 1.4.14.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40596 β€Ό

In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege escalation on the Windows machine.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40592 β€Ό

In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the Ò€œ/app/search/tableҀ� web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40598 β€Ό

In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40847 β€Ό

Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via the function "initIpAddrInfo." In the function, it reads in a user-provided parameter, and the variable is passed to the function without any length check.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-28692 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kevon Adonis WP Abstracts plugin <=Γ‚ 2.6.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40839 β€Ό

Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin function 'sub_ADF3C' contains a command execution vulnerability. In the "formSetIptv" function, obtaining the "list" and "vlanId" fields, unfiltered passing these two fields as parameters to the "sub_ADF3C" function to execute commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40837 β€Ό

Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin function 'sub_ADD50' contains a command execution vulnerability. In the "formSetIptv" function, obtaining the "list" and "vlanId" fields, unfiltered passing these two fields as parameters to the "sub_ADD50" function to execute commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40597 β€Ό

In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-20266 β€Ό

A vulnerability in Cisco Emergency Responder, Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability exists because the application does not properly restrict the files that are being used for upgrades. An attacker could exploit this vulnerability by providing a crafted upgrade file. A successful exploit could allow the attacker to elevate privileges to root. To exploit this vulnerability, the attacker must have valid platform administrator credentials on an affected device.

πŸ“– Read

via "National Vulnerability Database".