πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-43128 β€Ό

D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4504 β€Ό

Due to failure in validating the length provided by an attacker-crafted PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31719 β€Ό

FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31717 β€Ό

A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23362 β€Ό

An OS command injection vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability allows remote authenticated users to execute commands via susceptible QNAP devices.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2376 build 20230421 and laterQTS 4.5.4.2374 build 20230416 and laterQuTS hero h5.0.1.2376 build 20230421 and laterQuTS hero h4.5.4.2374 build 20230417 and laterQuTScloud c5.0.1.2374 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23364 β€Ό

A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors.We have already fixed the vulnerability in the following versions:Multimedia Console 2.1.1 ( 2023/03/29 ) and laterMultimedia Console 1.4.7 ( 2023/03/20 ) and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31718 β€Ό

FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23363 β€Ό

A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating system. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 4.3.6.2441 build 20230621 and laterQTS 4.3.3.2420 build 20230621 and laterQTS 4.2.6 build 20230621 and laterQTS 4.3.4.2451 build 20230621 and later

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31716 β€Ό

FUXA <= 1.1.12 has a Local File Inclusion vulnerability via file=fuxa.log

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Guardians of the Cyberverse: Building a Resilient Security Culture πŸ•΄

Whether achieved through AI-enabled automation, proactive identification and resolution of issues, or the equitable distribution of risk management responsibilities, the goal must be resilience.

πŸ“– Read

via "Dark Reading".
πŸ•΄ ASPM Is Good, But It's Not a Cure-All for App Security πŸ•΄

What application security posture management does, it does well. But you'll still need to fill in some holes, especially concerning API security.

πŸ“– Read

via "Dark Reading".
🦿 7 Best Cloud Security Posture Management (CSPM) Software for 2023 🦿

What is the best CSPM tool for your business? Use our guide to review our picks for the best cloud security posture management (CSPM) tools for 2023.

πŸ“– Read

via "Tech Republic".
πŸ“’ Ransomware groups are once again targeting smaller businesses for more lucrative payouts πŸ“’

Lower hanging fruit represents a far more lucrative revenue stream for groups such as LockBit

πŸ“– Read

via "ITPro".
β€Ό CVE-2023-34319 β€Ό

The fix for XSA-423 added logic to Linux'es netback driver to deal witha frontend splitting a packet in a way such that not all of the headerswould come in one piece. Unfortunately the logic introduced theredidn't account for the extreme case of the entire packet being splitinto as many pieces as permitted by the protocol, yet still beingsmaller than the area that's specially dealt with to keep all (possible)headers together. Such an unusual packet would therefore trigger abuffer overrun in the driver.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3874 β€Ό

A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23766 β€Ό

An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To do so, an attacker would need write access to the repository. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.6.17, 3.7.15, 3.8.8, 3.9.3, and 3.10.1. This vulnerability was reported via the GitHub Bug Bounty program.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43144 β€Ό

Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the "id" parameter in delete.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-4039 β€Ό

A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5002 β€Ό

A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41029 β€Ό

Command injection vulnerability in theΓ‚ homemng.htm endpointΓ‚ inΓ‚ Juplink RX4-1500 Wifi router firmware versionsΓ‚ V1.0.2,Γ‚ V1.0.3,Γ‚ V1.0.4, andΓ‚ V1.0.5Γ‚ allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42821 β€Ό

The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion `0.0.0-20230922105210-14b16010c2ee`, which corresponds with commit `14b16010c2ee7ff33a940a541d993bd043a88940`, parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability. To exploit the vulnerability, parser needs to have `parser.Mmark` extension set. The panic occurs inside the `citation.go` file on the line 69 when the parser tries to access the element past its length. This can result in a denial of service. Commit `14b16010c2ee7ff33a940a541d993bd043a88940`/pseudoversion `0.0.0-20230922105210-14b16010c2ee` contains a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".