πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-37538 β€Ό

HCL Digital Experience is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44981 β€Ό

Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like 'eve@EXAMPLE.COM', the authorization check will be skipped.Γ‚ As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree.Γ‚ Quorum Peer authentication is not enabled by default.Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue.Alternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue.See the documentation for more details on correct cluster administration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44107 β€Ό

Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44106 β€Ό

API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5520 β€Ό

Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Reassessing the Impacts of Risk Management With NIST Framework 2.0 πŸ•΄

The latest NIST Cybersecurity Framework draft highlights four major themes that organizations should pay attention to for managing risk.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-44110 β€Ό

Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44111 β€Ό

Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44100 β€Ό

Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44104 β€Ό

Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5521 β€Ό

Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44118 β€Ό

Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality.

πŸ“– Read

via "National Vulnerability Database".
🦿 How Australia’s Banking Sector Can Embrace Cross-Collaboration to Combat the Scam Epidemic 🦿

The ACCC has given the green light for cross-banking collaboration to address scams. Here's how IT pros in financial services can take advantage of this opportunity.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Data Thieves Test-Drive Unique Certificate Abuse Tactic πŸ•΄

An SEO poisoning campaign is spreading the RecordBreaker/Raccoon Stealer and LummaC2 infostealers by attempting to confound software certificate checks.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-4957 β€Ό

A vulnerability of authentication bypass has been found on a Zebra Technologies ZTC ZT410-203dpi ZPL printer. This vulnerability allows an attacker that is in the same network as the printer, to change the username and password for the Web Page by sending a specially crafted POST request to the setvarsResults.cgi file. For this vulnerability to be exploitable, the printers protected mode must be disabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45396 β€Ό

An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Magecart Campaign Hijacks 404 Pages to Steal Data πŸ•΄

The novel technique helps hide the cybercriminal campaign's efforts to steal credit card information from visitors to major websites, and it represents an evolution for Magecart.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Addressing a Breach Starts With Getting Everyone on the Same Page πŸ•΄

The best incident-response plans cover contingencies and are fine-tuned in stress tests to ensure collaboration, remediation, and recovery efforts align.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-28381 β€Ό

An OS command injection vulnerability exists in the admin.cgi MVPN_trial_init functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35966 β€Ό

Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32645 β€Ό

A leftover debug code vulnerability exists in the httpd debug credentials functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to authentication bypass. An attacker can send a network request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".