πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-42524 β€Ό

Certain WithSecure products allow an infinite loop in a scanning engine via unspecified file types. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34999 β€Ό

A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Supporting Africa's Cybersecurity Talent Makes the World Safer πŸ•΄

The global infosec community needs to help African nations defend against growing threats.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-42359 β€Ό

SQL injection vulnerability in Exam Form Submission in PHP with Source Code v.1.0 allows a remote attacker to escalate privileges via the val-username parameter in /index.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34195 β€Ό

An issue was discovered in SystemFirmwareManagementRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The implementation of the GetImage method retrieves the value of a runtime variable named GetImageProgress, and later uses this value as a function pointer. This variable is wiped out by the same module near the end of the function. By setting this UEFI variable from the OS to point into custom code, an attacker could achieve arbitrary code execution in the DXE phase, before several chipset locks are set.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A Playbook for Bridging Africa's Cybersecurity Skills Shortage πŸ•΄

A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-42387 β€Ό

An issue in TDSQL Chitu management platform v.10.3.19.5.0 allows a remote attacker to obtain sensitive information via get_db_info function in install.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42371 β€Ό

Cross Site Scripting vulnerability in Summernote Rich Text Editor v.0.8.18 and before allows a remote attacker to execute arbitrary code via a crafted script to the insert link function in the editor component.

πŸ“– Read

via "National Vulnerability Database".
🦿 Best IT Asset Management Software for 2023 🦿

These top IT asset management tools can increase visibility of your IT assets for improved risk reduction. Find out which one is best for your business.

πŸ“– Read

via "Tech Republic".
❀1
πŸ•΄ Dragos Raises $74M in Latest Funding Round πŸ•΄

The funds will be used to expand its global presence beyond Europe and the US.

πŸ“– Read

via "Dark Reading".
🦿 What Does Closed-Door Meeting With AI Industry Leaders Mean for Business? 🦿

Businesses should plan for the development of AI regulation in the US, but knowing what it will look like is still a challenge.

πŸ“– Read

via "Tech Republic".
πŸ•΄ How to Get Your Board on Board With Cybersecurity πŸ•΄

CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-4527 β€Ό

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42328 β€Ό

An issue in PeppermintLabs Peppermint v.0.2.4 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the hardcoded session cookie.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42320 β€Ό

Buffer Overflow vulnerability in Tenda AC10V4 v.US_AC10V4.0si_V16.03.10.13_cn_TDC01 allows a remote attacker to cause a denial of service via the mac parameter in the GetParentControlInfo function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41595 β€Ό

An issue in xui-xray v1.8.3 allows attackers to obtain sensitive information via default password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4806 β€Ό

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

πŸ“– Read

via "National Vulnerability Database".
🦿 CISA Aims For More Robust Open Source Software Security for Government and Critical Infrastructure 🦿

The agency’s roadmap outlines a plan for prioritizing where open source software makes infrastructure potentially vulnerable.

πŸ“– Read

via "Tech Republic".
❀1
πŸ•΄ Companies Explore Ways to Safeguard Data in the Age of LLMs πŸ•΄

Generative AI models are forcing companies to become creative in how they keep employees from giving away sensitive data.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-41030 β€Ό

Hard-coded credentials inΓ‚ Juplink RX4-1500 versions V1.0.2 through V1.0.5Γ‚ allow unauthenticated attackers to log in to the web interface or telnet service as the 'user' user.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security Conferences Keep Us Honest πŸ•΄

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions β€” in public.

πŸ“– Read

via "Dark Reading".