πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-5463 β€Ό

A vulnerability was found in XINJE XDPPro up to 3.7.17a. It has been rated as critical. Affected by this issue is some unknown functionality in the library cfgmgr32.dll. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-241586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5462 β€Ό

A vulnerability was found in XINJE XD5E-30R-E 3.5.3b. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Modbus Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-241585 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43641 β€Ό

libcue provides an API for parsing and extracting data from CUE sheets. Versions 2.2.1 and prior are vulnerable to out-of-bounds array access. A user of the GNOME desktop environment can be exploited by downloading a cue sheet from a malicious webpage. Because the file is saved to `~/Downloads`, it is then automatically scanned by tracker-miners. And because it has a .cue filename extension, tracker-miners use libcue to parse the file. The file exploits the vulnerability in libcue to gain code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40310 β€Ό

SAP PowerDesignerΓ‚ ClientΓ‚ - version 16.7, does not sufficiently validate BPMN2Γ‚ XML document imported from an untrusted source. As a result, URLs ofΓ‚ external entities in BPMN2 file, although not used, would be accessedΓ‚ during import.Γ‚ A successful attack could impact availability of SAP PowerDesignerΓ‚ Client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42474 β€Ό

SAP BusinessObjects Web Intelligence - version 420, has a URL with parameter that could be vulnerable to XSS attack. The attacker could send a malicious link to a user that would possibly allow an attacker to retrieve the sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44826 β€Ό

Cross Site Scripting vulnerability in ZenTaoPMS v.18.6 allows a local attacker to obtain sensitive information via a crafted script.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18336 β€Ό

Cross Site Scripting (XSS) vulnerability found in Typora v.0.9.65 allows a remote attacker to obtain sensitive information via the PDF file exporting function.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2023-42477 β€Ό

SAP NetWeaver AS Java (GRMG Heartbeat application) - version 7.50,Γ‚ allows an attacker to send a crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity of the application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42475 β€Ό

The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44848 β€Ό

An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_template.php component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41850 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Morris Bryant, Ruben Sargsyan Outbound Link Manager plugin <=Γ‚ 1.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44259 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Mediavine Mediavine Control Panel plugin <=Γ‚ 2.10.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41854 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Ltd. WpCentral plugin <=Γ‚ 1.5.7 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41853 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in WP iCal Availability plugin <=Γ‚ 1.0.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41858 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin <=Γ‚ 1.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41851 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares WP Custom Post Template <=Γ‚ 1.0 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44257 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Hometory Mang Board WP plugin <=Γ‚ 1.7.6 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41852 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailMunch Γ’β‚¬β€œ Grow your Email List plugin <=Γ‚ 3.1.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45208 β€Ό

A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell commands as root during the setup process of the repeater, via a crafted SSID. Also, network names containing single quotes (in the range of the repeater) can result in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41694 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Realbig Team Realbig For WordPress plugin <=Γ‚ 1.0.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5468 β€Ό

The Slick Contact Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'dcscf-link' shortcode in versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“– Read

via "National Vulnerability Database".