πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-45607 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin <=Γ‚ 6.3.2 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45630 β€Ό

Unauth. Stored Cross-Site Scripting (XSS) vulnerability in wpdevart Gallery Γ’β‚¬β€œ Image and Video Gallery with Thumbnails plugin <=Γ‚ 2.0.3 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45604 β€Ό

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Scott Reilly Get Custom Field Values plugin <=Γ‚ 4.0.1 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-30781 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Theme Blvd Tweeple plugin <=Γ‚ 0.9.5 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5631 β€Ό

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attackerto load arbitrary JavaScript code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45602 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Shopfiles Ltd Ebook Store plugin <=Γ‚ 5.785 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45632 β€Ό

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WebDorado SpiderVPlayer plugin <=Γ‚ 1.5.22 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45628 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in QROkes QR Twitter Widget plugin <=Γ‚ 0.2.3 versions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ North Korea's Kimsuky Doubles Down on Remote Desktop Control πŸ•΄

The sophisticated APT employs various tactics to abuse Windows and other built-in protocols with both custom and public malware to take over victim systems.

πŸ“– Read

via "Dark Reading".
🦿 ExpressVPN Review (2023): Pricing, Features, Pros, & Cons 🦿

Editor has the option to alter SEO's meta description or write their own DEK to draw readers into the article most effectively. Alternatively, editor can assign DEK writing to the assigned writer. Consider the top picks or major editorial call-outs for inclusion.

πŸ“– Read

via "Tech Republic".
πŸ•΄ D-Link Confirms Breach, Rebuts Hacker's Claims About Scope πŸ•΄

The router specialist says the attacker's claims to have heisted millions and millions of records are significantly overblown. But an incident did happen, stemming from a successful phish.

πŸ“– Read

via "Dark Reading".
πŸ•΄ What CISOs Should Exclude From SEC Cybersecurity Filings πŸ•΄

Should CISOs include only known information in the SEC filings for a material security incident, or is there room to include details that may change during the investigation?

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-35656 β€Ό

In multiple functions of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45813 β€Ό

Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4601 β€Ό

A stack-based buffer overflow vulnerability exists in NI System Configuration that could result in information disclosure and/or arbitrary code execution. Successful exploitation requires that an attacker can provide a specially crafted response. This affects NI System Configuration 2023 Q3 and all previous versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43803 β€Ό

Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-35663 β€Ό

In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43802 β€Ό

Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate their privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45145 β€Ό

Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34441 β€Ό

Baker Hughes Γ’β‚¬β€œ Bently Nevada 3500 System TDI Firmware version 5.05 containsΓ‚ a cleartext transmission vulnerability which could allow an attacker to steal the authentication secret from communication traffic to the device and reuse it for arbitrary requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37503 β€Ό

HCL Compass is vulnerable to insecure password requirements. An attacker could easily guess the password and gain access to user accounts.

πŸ“– Read

via "National Vulnerability Database".