πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-3781 β€Ό

there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41882 β€Ό

vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35652 β€Ό

In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35648 β€Ό

In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-41881 β€Ό

vantage6 is privacy preserving federated learning infrastructure. When a collaboration is deleted, the linked resources (such as tasks from that collaboration) should be deleted. This is partly to manage data properly, but also to prevent a potential (but unlikely) side-effect that affects versions prior to 4.0.0, where if a collaboration with id=10 is deleted, and subsequently a new collaboration is created with id=10, the authenticated users in that collaboration could potentially see results of the deleted collaboration in some cases. Version 4.0.0 contains a patch for this issue. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35661 β€Ό

In ProfSixDecomTcpSACKoption of RohcPacketCommon.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44186 β€Ό

An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.This issue affects:Juniper Networks Junos OS: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R2.Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S8-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S6-EVO; * 21.3 versions prior to 21.3R3-S5-EVO; * 21.4 versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions prior to 22.2R3-S2-EVO; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R2-EVO.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35646 β€Ό

In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35649 β€Ό

In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45132 β€Ό

NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42298 β€Ό

An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-1943 β€Ό

Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘2
πŸ•΄ Pan-African Financial Apps Leak Encryption, Authentication Keys πŸ•΄

Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New California Delete Act Tightens Rules for Data Brokers πŸ•΄

Companies with customers in California need to prepare for a new process for demanding deletion of personal data.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How to Scan Your Environment for Vulnerable Versions of Curl πŸ•΄

This Tech Tip outlines how enterprise defenders can mitigate the risks of the curl and libcurl vulnerabilities in their environment.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-45058 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in KaizenCoders Short URL plugin <=Γ‚ 1.6.8 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43789 β€Ό

A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23737 β€Ό

Unauth. SQL Injection (SQLi) vulnerability in MainWP MainWP Broken Links Checker Extension plugin <=Γ‚ 4.0 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5045 β€Ό

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Kayisi allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Kayisi: before 1286.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45048 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin <=Γ‚ 5.00 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-23651 β€Ό

Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP Google Analytics ExtensionΓ‚ plugin <= 4.0.4 versions.

πŸ“– Read

via "National Vulnerability Database".