βοΈ LastPass: βHorse Gone Barn Boltedβ is Strong Password βοΈ
π Read
via "Krebs on Security".
The password manager service LastPass is now forcing some of its users to pick longer master passwords. LastPass says the changes are needed to ensure all customers are protected by their latest security improvements. But critics say the move is little more than a public relations stunt that will do nothing to help countless early adopters whose password vaults were exposed in a 2022 breach at LastPass.π Read
via "Krebs on Security".
Krebs on Security
LastPass: βHorse Gone Barn Boltedβ is Strong Password
The password manager service LastPass is now forcing some of its users to pick longer master passwords. LastPass says the changes are needed to ensure all customers are protected by their latest security improvements. But critics say the move isβ¦
βΌ CVE-2023-43130 βΌ
π Read
via "National Vulnerability Database".
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43129 βΌ
π Read
via "National Vulnerability Database".
D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of REMOTE_PORT parameters.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5134 βΌ
π Read
via "National Vulnerability Database".
The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5125 βΌ
π Read
via "National Vulnerability Database".
The Contact Form by FormGet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formget' shortcode in versions up to, and including, 5.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-3962 βΌ
π Read
via "National Vulnerability Database".
A content spoofing vulnerability was found in Kiali. It was discovered that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an attacker to perform arbitrary text injection when an error response is retrieved from the URL being accessed.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1625 βΌ
π Read
via "National Vulnerability Database".
An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1260 βΌ
π Read
via "National Vulnerability Database".
An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.π Read
via "National Vulnerability Database".
π₯1
βΌ CVE-2023-1633 βΌ
π Read
via "National Vulnerability Database".
A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1636 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.π Read
via "National Vulnerability Database".
π₯2
βΌ CVE-2023-5144 βΌ
π Read
via "National Vulnerability Database".
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /sysmanage/updateos.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240240. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5143 βΌ
π Read
via "National Vulnerability Database".
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 up to 20151231. This issue affects some unknown processing of the file /log/webmailattach.php. The manipulation of the argument table_name leads to an unknown weakness. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240239. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5142 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
π΄ Don't Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection π΄
π Read
via "Dark Reading".
Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It's time to upgrade. π Read
via "Dark Reading".
Dark Reading
Don't Get Burned by CAPTCHAs: A Recipe for Accurate Bot Protection
Traditional CAPTCHAs, such as reCAPTCHA, no longer protect online businesses adequately. Real users hate them. Bots bypass them. It's time to upgrade.
π¦Ώ Point of Sale Security Guide and Checklist π¦Ώ
π Read
via "Tech Republic".
For retail businesses, the POS system is arguably their most important IT system. This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise. From the guide: ACCESS CONTROLS The first line of defense in any POS system is the control of both physical and network ...π Read
via "Tech Republic".
TechRepublic
Point of Sale Security Guide and Checklist
For retail businesses, the POS system is arguably their most important IT system. This TechRepublic Premium guide, and the accompanying checklist, will
βΌ CVE-2015-6964 βΌ
π Read
via "National Vulnerability Database".
MultiBit HD before 0.1.2 allows attackers to conduct bit-flipping attacks that insert unspendable Bitcoin addresses into the list that MultiBit uses to send fees to the developers. (Attackers cannot realistically steal these fees for themselves.) This occurs because there is no message authentication code (MAC).π Read
via "National Vulnerability Database".
βΌ CVE-2023-39407 βΌ
π Read
via "National Vulnerability Database".
The Watchkit has a risk of unauthorized file access.Successful exploitation of this vulnerability may affect confidentiality and integrity.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39408 βΌ
π Read
via "National Vulnerability Database".
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.π Read
via "National Vulnerability Database".
π’ US government IT contractor could face death penalty over espionage charges π’
π Read
via "ITPro".
The IT pro faces two espionage charges, each of which could lead to a death sentence or life imprisonment, prosecutors said π Read
via "ITPro".
ITPro
US government IT contractor could face death penalty over espionage charges
The IT pro faces two espionage charges, each of which could lead to a death sentence or life imprisonment, prosecutors said
βΌ CVE-2023-39409 βΌ
π Read
via "National Vulnerability Database".
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.π Read
via "National Vulnerability Database".
π΄ Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks π΄
π Read
via "Dark Reading".
Back to basics is a good start, but too often security teams don't handle their deployment correctly. Here's how to avoid the common pitfalls.π Read
via "Dark Reading".
Dark Reading
Cyber Hygiene: A First Line of Defense Against Evolving Cyberattacks
Back to basics is a good start, but too often security teams don't handle their deployment correctly. Here's how to avoid the common pitfalls.
π1