πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Coding Tips to Sidestep JavaScript Vulnerabilities πŸ•΄

This Tech Tip focuses on best security practices to write secure JavaScript code.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-4772 β€Ό

The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'newsletter_form' shortcode in versions up to, and including, 7.8.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4792 β€Ό

The Duplicate Post Page Menu & Custom Post Type plugin for WordPress is vulnerable to unauthorized page and post duplication due to a missing capability check on the duplicate_ppmc_post_as_draft function in versions up to, and including, 2.3.1. This makes it possible for authenticated attackers with subscriber access or higher to duplicate posts and pages.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38031 β€Ό

ASUS RT-AC86U Adaptive QoS - Web History function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34357 β€Ό

Soar Cloud Ltd. HR Portal has a weak Password Recovery Mechanism for Forgotten Password. The reset password link sent out through e-mail, and the link will remain valid after the password has been reset and after the expected expiration date. An attacker with access to the browser history or has the line can thus use the URL again to change the password in order to take over the account.

πŸ“– Read

via "National Vulnerability Database".
🦿 Vendor Comparison: DIY Home Security Systems 🦿

When it comes to DIY home security, there are many systems and components to consider and many decisions to make. This vendor comparison guide from TechRepublic Premium provides advice you can follow as you make decisions regarding how you will deploy a home security system. The accompanying comparison tool will document your research and provide ...

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-39238 β€Ό

It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability is caused by lacking validation for a specific valueΓ‚ within its set_iperf3_svr.cgi module. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39240 β€Ό

It is identified a format string vulnerability in ASUS RT-AX56U V2Ò€ℒs iperf client function API. This vulnerability is caused by lacking validation for a specific value within its set_iperf3_cli.cgi module. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4815 β€Ό

Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39239 β€Ό

It is identified a format string vulnerability in ASUS RT-AX56U V2Ò€ℒs General function API. This vulnerability is caused by lacking validation for a specific value within its apply.cgi module. An unauthenticated remote attacker can exploit this vulnerability without privilege to perform remote arbitrary code execution, arbitrary system operation or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39237 β€Ό

ASUS RT-AC86U Traffic Analyzer - Apps analysis function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38032 β€Ό

ASUS RT-AC86U AiProtection security- related function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38033 β€Ό

ASUS RT-AC86U unused Traffic Analyzer legacy Statistic function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39236 β€Ό

ASUS RT-AC86U Traffic Analyzer - Statistic function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40699 β€Ό

ColdFusion version 2021 update 1 (and earlier) and versions 2018.10 (and earlier) are impacted by an improper access control vulnerability when checking permissions in the CFIDE path. An authenticated attacker could leverage this vulnerability to access and manipulate arbitrary data on the environment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-39422 β€Ό

TheΓ‚ /irmdata/api/ endpoints exposed by theΓ‚ IRM Next Generation booking engine authenticates requests using HMAC tokens. These tokens are however exposed in a JavaScript file loaded on the client side, thus rendering this extra safety mechanism useless.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-43753 β€Ό

Adobe Lightroom versions 4.4 (and earlier) are affected by a use-after-free vulnerability in the processing of parsing TIF files that could result in privilege escalation. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-39421 β€Ό

The RDPWin.dll component as used in the IRM Next Generation booking engine includes a set of hardcoded API keys for third-party services such as Twilio and Vonage. These keys allow unrestricted interaction with these services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43751 β€Ό

Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42265 β€Ό

Adobe Premiere Pro versions 22.0 (and earlier) and 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".