🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 Looking Beyond the Hype Cycle of AI/ML in Cybersecurity 🕴

Artificial intelligence and machine learning aren't yet delivering on their cybersecurity promises. How can we close the gaps?

📖 Read

via "Dark Reading".
1
🦿 How To Implement Zero Trust: Best Practices and Guidelines 🦿

Implement a Zero Trust security model with confidence with these best practices and tool suggestions to secure your organization.

📖 Read

via "Tech Republic".
🕴 Novel ZenRAT Scurries Onto Systems via Fake Password Manager Tool 🕴

Attackers exclusively target Windows users with an impersonation website that distributes information-stealing malware.

📖 Read

via "Dark Reading".
CVE-2023-5187

Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

📖 Read

via "National Vulnerability Database".
CVE-2023-5217

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

📖 Read

via "National Vulnerability Database".
CVE-2023-39195

** REJECT ** CVE-2023-39195 was found to be a duplicate of CVE-2023-42755. Please see https://access.redhat.com/security/cve/CVE-2023-42755 for more information.

📖 Read

via "National Vulnerability Database".
CVE-2023-5186

Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)

📖 Read

via "National Vulnerability Database".
CVE-2023-30415

Sourcecodester Packers and Movers Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /inquiries/view_inquiry.php.

📖 Read

via "National Vulnerability Database".
🕴 Q&A: UK Ambassador on Creating New Cybersecurity Agencies Around the World 🕴

How the UK is assisting other nations in forming their own versions of a National Centre for Cybersecurity (NCSC).

📖 Read

via "Dark Reading".
CVE-2023-40375

Integrated application server for IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 263580.

📖 Read

via "National Vulnerability Database".
CVE-2023-5256

In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.The core REST and contributed GraphQL modules are not affected.

📖 Read

via "National Vulnerability Database".
CVE-2023-43044

IBM License Metric Tool 9.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 266893.

📖 Read

via "National Vulnerability Database".
CVE-2023-43663

PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2023-43664

PrestaShop is an Open Source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method `ajaxProcessGetPossibleHookingListForModule` doesn't check access rights. This issue has been addressed in commit `15bd281c` which is included in version 8.1.2. Users are advised to upgrade. There are no known workaround for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2023-43657

discourse-encrypt is a plugin that provides a secure communication channel through Discourse. Improper escaping of encrypted topic titles could lead to a cross site scripting (XSS) issue when a site has content security policy (CSP) headers disabled. Having CSP disabled is a non-default configuration, and having it disabled with discourse-encrypt installed will result in a warning in the Discourse admin dashboard. This has been fixed in commit `9c75810af9` which is included in the latest version of the discourse-encrypt plugin. Users are advised to upgrade. Users unable to upgrade should ensure that CSP headers are enabled and properly configured.

📖 Read

via "National Vulnerability Database".
🕴 Johnson Controls International Disrupted by Major Cyberattack 🕴

The company filed with the SEC and is assessing its operations and financial damages.

📖 Read

via "Dark Reading".
🕴 New Cisco IOS Zero-Day Delivers a Double Punch 🕴

The networking giant discloses new vulnerabilities the same day as warnings get issued that Cisco gear has been targeted in a Chinese APT attack.

📖 Read

via "Dark Reading".
🕴 Chrome Flags Third Zero-Day This Month That's Tied to Spying Exploits 🕴

So far this year, Google has disclosed six vulnerabilities that attackers were actively exploiting before the company had a patch for them.

📖 Read

via "Dark Reading".
CVE-2023-5185

Gym Management System Project v1.0 is vulnerable toan Insecure File Upload vulnerability on the 'file'parameter of profile/i.php page, allowing anauthenticated attacker to obtain Remote Code Executionon the server hosting the application.

📖 Read

via "National Vulnerability Database".
CVE-2023-5004

Hospital management system version 378c157 allows to bypass authentication.This is possible because the application is vulnerable to SQLI.

📖 Read

via "National Vulnerability Database".
CVE-2023-43323

mooSocial 3.1.8 is vulnerable to external service interaction on post function. When executed, the server sends a HTTP and DNS request to external server. The Parameters effected are multiple - messageText, data[wall_photo], data[userShareVideo] and data[userShareLink].

📖 Read

via "National Vulnerability Database".