πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-26837 β€Ό

SQL Injection vulnerability in SearchTextBox parameter in Fortra (Formerly HelpSystems) DeliverNow before version 1.2.18, allows attackers to execute arbitrary code, escalate privileges, and gain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks πŸ•΄

The threat cluster hasn't been seen before, but its custom Windows server backdoors have researchers intrigued thanks to their extremely effective stealth mechanisms.

πŸ“– Read

via "Dark Reading".
πŸ‘1
β€Ό CVE-2023-0773 β€Ό

The vulnerability exists in Uniview IP Camera due to identification and authentication failure at its web-based management interface. A remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.Successful exploitation of this vulnerability could allow the attacker to gain complete control of the targeted device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2567 β€Ό

A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32184 β€Ό

A Insecure Storage of Sensitive Information vulnerability in openSUSE opensuse-welcome allows local attackers to execute code as the user that runs opensuse-welcome if a custom layout is chosenThis issue affects opensuse-welcome: from 0.1 before 0.1.9+git.35.4b9444a.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32649 β€Ό

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32186 β€Ό

A Allocation of Resources Without Limits or Throttling vulnerability in SUSE RKE2 allows attackers with access to K3s servers apiserver/supervisor port (TCP 6443) cause denial of service.This issue affects RKE2: from 1.24.0 before 1.24.17+rke2r1, from v1.25.0 before v1.25.13+rke2r1, from v1.26.0 before v1.26.8+rke2r1, from v1.27.0 before v1.27.5+rke2r1, from v1.28.0 before v1.28.1+rke2r1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29245 β€Ό

A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.Malicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
🦿 How to Create and Use a Docker Secret From a File 🦿

Learn how to create and use a Docker secret from a file for secure storage of sensitive data with this step-by-step tutorial.

πŸ“– Read

via "Tech Republic".
🦿 How to Create and Use a Docker Secret From a File (+Video) 🦿

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Engineering-Grade OT Protection πŸ•΄

The worst-case consequences of cyberattacks are sharply, qualitatively different on IT versus OT networks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-47557 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Vulnerability in ekorCCP and ekorRCI that could allow an attacker with access to the network where the device is located to decrypt the credentials of privileged users, and subsequently gain access to the system to perform malicious actions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47554 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Exposure of sensitive information in ekorCCP and ekorRCI, potentially allowing a remote attacker to obtain critical information from various .xml files, including .xml files containing credentials, without being authenticated within the web server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47553 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Incorrect authorisation in ekorCCP and ekorRCI, which could allow a remote attacker to obtain resources with sensitive information for the organisation, without being authenticated within the web server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23957 β€Ό

An authenticated user can see and modify the value for Γ’β‚¬ΛœnextÒ€ℒ query parameter in Symantec Identity Portal 14.4

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47555 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Operating system command injection in ekorCCP and ekorRCI, which could allow an authenticated attacker to execute commands, create new users with elevated privileges or set up a backdoor.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4092 β€Ό

SQL injection vulnerability in Arconte ΓƒοΏ½urea, in its 1.5.0.0 version. The exploitation of this vulnerability could allow an attacker to read sensitive data from the database, modify data (insert/update/delete), perform database administration operations and, in some cases, execute commands on the operating system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47558 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Devices ekorCCP and ekorRCI are vulnerable due to access to the FTP service using default credentials. Exploitation of this vulnerability can allow an attacker to modify critical files that could allow the creation of new users, delete or modify existing users, modify configuration files, install rootkits or backdoors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47556 β€Ό

** UNSUPPPORTED WHEN ASSIGNED ** Uncontrolled resource consumption in ekorRCI, allowing an attacker with low-privileged access to the web server to send continuous legitimate web requests to a functionality that is not properly validated, in order to cause a denial of service (DoS) on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41834 β€Ό

Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests.Γ‚ Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CapraRAT Impersonates YouTube to Hijack Android Devices πŸ•΄

Pakistani threat group Transparent Tribe targets military and diplomatic personnel in India and Pakistan with romance-themed lures in the latest spyware campaign.

πŸ“– Read

via "Dark Reading".