πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-36950 β€Ό

TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the http_host parameter in the function loginAuth.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3392 β€Ό

The Read More & Accordion WordPress plugin before 3.2.7 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Data Changes the Cyber-Insurance Market Outlook πŸ•΄

By using data to drive policy underwriting, cyber-insurance companies can offer coverage without a price tag that drives customers away.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-44987 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Timely - Appointment software Timely Booking Button plugin <=Γ‚ 2.0.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46066 β€Ό

Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Codedrafty Mediabay Γ’β‚¬β€œ Media Library Folders plugin <=Γ‚ 1.6 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  jSQL Injection 0.95 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Falco 0.36.1 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-5575 β€Ό

Improper access control in the permission inheritance in Devolutions Server 2022.3.13.0 and earlier allows an attacker that compromised a low privileged user to access entries via a specific combination of permissions in the entry and in its parent.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46087 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Mahlamusa Who Hit The Page Γ’β‚¬β€œ Hit Counter plugin <=Γ‚ 1.4.14.3 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Pro-Israeli Hacktivist Group Predatory Sparrow Reappears πŸ•΄

It's been a year since its last communication and attack on Iran β€” but the conflict with Hamas appears to have reactivated the group.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Name That Toon: Modern Monarchy πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-45685 β€Ό

Insufficient path validation when extracting a zip archive in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45689 β€Ό

Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-20198 β€Ό

Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system. For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisoryΓ‚  Cisco will provide updates on the status of this investigation and when a software patch is available.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45688 β€Ό

Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45687 β€Ό

A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45686 β€Ό

Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45690 β€Ό

Default file permissions on South River Technologies' Titan MFT and Titan SFTP servers on Linux allows a user that's authentication to the OS to read sensitive files on the filesystem

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 'RomCom' Cyber Campaign Targets Women Political Leaders πŸ•΄

A threat group known as "Void Rabisu" used a spoofed Women Political Leaders Summit website to target attendees to the actual conference with espionage malware.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-45985 β€Ό

TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 were discovered to contain a stack overflow in the function setParentalRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43120 β€Ό

An issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, before 22.7 and before 31.7.1 allows attackers to gain escalated privileges via crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".