πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-44228 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Onclick show popup plugin <=Γ‚ 8.1 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44263 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Riyaz Social Metrics plugin <=Γ‚ 2.2 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Making Sense of Today's Payment Cybersecurity Landscape πŸ•΄

PCI DSS v4.0 is the future of the payment card industry's information security standard, but businesses must continue to look beyond this guidance and engage in proactive strategies of their own.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-5106 β€Ό

An issue has been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41580 β€Ό

Phpipam before v1.5.2 was discovered to contain a LDAP injection vulnerability via the dname parameter at /users/ad-search-result.php. This vulnerability allows attackers to enumerate arbitrary fields in the LDAP server and access sensitive data via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.8.7 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ›  jSQL Injection 0.93 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
β™ŸοΈ Don’t Let Zombie Zoom Links Drag You Down β™ŸοΈ

Many organizations β€” including quite a few Fortune 500 firms β€” have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. These company-specific Zoom links, which include a permanent user ID number and an embedded passcode, can work indefinitely and expose an organization’s employees, customers or partners to phishing and other social engineering attacks.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2023-4659 β€Ό

Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3769 β€Ό

Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3770 β€Ό

Γ‚ Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3744 β€Ό

Server-Side Request Forgery vulnerability in SLims version 9.6.0. This vulnerability could allow an authenticated attacker to send requests to internal services or upload the contents of relevant files via the "scrape_image.php" file in the imageURL parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5290 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2015-10124 β€Ό

A vulnerability was found in Most Popular Posts Widget Plugin up to 0.8 on WordPress. It has been classified as critical. Affected is the function add_views/show_views of the file functions.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 0.9 is able to address this issue. The patch is identified as a99667d11ac8d320006909387b100e9a8b5c12e1. It is recommended to upgrade the affected component. VDB-241026 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Iran-Linked APT34 Spy Campaign Targets Saudis πŸ•΄

The Menorah malware can upload and download files, as well as execute shell commands.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Which DFIR Challenges Does the Middle East Face? πŸ•΄

Demand for digital forensics and incident response (DFIR) surges in the Middle East, a new IDC report finds. Is automation the answer?

πŸ“– Read

via "Dark Reading".
πŸ•΄ Norway Urges Europe-Wide Ban on Meta's Targeted Ad Data Collection πŸ•΄

Norway wants to permanently ban the owner of Facebook and Instagram from collecting sensitive user data across Europe, saying its current policies violate GDPR rules.

πŸ“– Read

via "Dark Reading".
πŸ•΄ FBI: Crippling 'Dual Ransomware Attacks' on the Rise πŸ•΄

Once they compromise an victim with an initial ransomware attack, threat actors are ready to deploy a secondary attack with a different strain, which could leave even more damage.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-37605 β€Ό

Buffer Overflow vulnerability in baramundi software GmbH EMM Agent 23.1.50 and before allows an attacker to cause a denial of service via a crafted request to the password parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40744 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2023. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0809 β€Ό

In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.

πŸ“– Read

via "National Vulnerability Database".