πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
24.9K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-45904 β€Ό

Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /variable/update.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45906 β€Ό

Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/user/add.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45907 β€Ό

Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/delete.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-20598 β€Ό

An improper privilege management in the AMD RadeonΓ’β€žΒ’Γ‚ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45902 β€Ό

Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/attachment/delete.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43959 β€Ό

An issue in YeaLinkSIP-T19P-E2 v.53.84.0.15 allows a remote privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45905 β€Ό

Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/variable/add.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ Tech CEO Sentenced to 5 Years in IP Address Scheme β™ŸοΈ

Amir Golestan, the 40-year-old CEO of the Charleston, S.C. based technology company Micfo LLC, has been sentenced to five years in prison for wire fraud. Golestan's sentencing comes nearly two years after he pleaded guilty to using an elaborate network of phony companies to secure more than 735,000 Internet Protocol (IP) addresses from the American Registry for Internet Numbers (ARIN), the nonprofit which oversees IP addresses assigned to entities in the U.S., Canada, and parts of the Caribbean.

πŸ“– Read

via "Krebs on Security".
❀1
πŸ•΄ Watch Out: Attackers Are Hiding Malware in 'Browser Updates' πŸ•΄

Updating your browser when prompted is a good practice, just make sure the notification comes from the vendor themselves.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-27133 β€Ό

TSplus Remote Work 16.0.0.0 has weak permissions for .exe, .js, and .html files under the %PROGRAMFILES(X86)%\TSplus-RemoteWork\Clients\www folder. This may enable privilege escalation if a different local user modifies a file. NOTE: CVE-2023-31067 and CVE-2023-31068 are only about the TSplus Remote Access product, not the TSplus Remote Work product.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27132 β€Ό

TSplus Remote Work 16.0.0.0 places a cleartext password on the "var pass" line of the HTML source code for the secure single sign-on web portal. NOTE: CVE-2023-31069 is only about the TSplus Remote Access product, not the TSplus Remote Work product.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ UAE, US Partner to Bolster Financial Services Cybersecurity πŸ•΄

The two countries agree to share financial services information and provide cross-border training and best practices.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 'Etherhiding' Blockchain Technique Masks Malicious Code in WordPress Sites πŸ•΄

The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma stealers.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Zero-Day Alert: Ten Thousand Cisco IOS XE Systems Now Compromised πŸ•΄

Just a day after Cisco disclosed CVE-2023-20198, it remains unpatched, and one vendor says a Shodan scan shows at least 10,000 Cisco devices with an implant for arbitrary code execution on them. The vendor meanwhile has updated the advisory with more mitigation steps.

πŸ“– Read

via "Dark Reading".
🦿 New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware 🦿

Microsoft OneDrive accounts for 26% of the overall usage of cloud storage apps to host malware, ahead of Microsoft PowerPoint and GitHub.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Amazon Quietly Wades Into the Passkey Waters πŸ•΄

The move by the e-commerce kahuna to offer advanced authentication to its 300+ million users has the potential to move the needle on the technology's adoption, security experts say.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Chatbot Offers Roadmap for How to Conduct a Bio Weapons Attack πŸ•΄

Once ethics guardrails are breached, generative AI and LLMs could become nearly unlimited in its capacity to enable evil acts, researchers warn.

πŸ“– Read

via "Dark Reading".
🦿 New Critical Zero-Day Vulnerability Affects Web UI of Cisco IOS XE Software & Allows Attackers to Compromise Routers 🦿

The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-45803 β€Ό

urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4896 β€Ό

A vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45951 β€Ό

lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php.

πŸ“– Read

via "National Vulnerability Database".