๐Ÿ›ก Cybersecurity & Privacy ๐Ÿ›ก - News
25K subscribers
88.4K links
๐Ÿ—ž The finest daily news on cybersecurity and privacy.

๐Ÿ”” Daily releases.

๐Ÿ’ป Is your online life secure?

๐Ÿ“ฉ lalilolalo.dev@gmail.com
Download Telegram
โ€ผ CVE-2023-35180 โ€ผ

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows authenticated users to abuse SolarWinds ARM API.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35183 โ€ผ

The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows authenticated users to abuse local resources to Privilege Escalation.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-5654 โ€ผ

The React Developer Tools extension registers a message listener with window.addEventListener('message', <listener>) in a content script that is accessible to any webpage that is active in the browser. Within the listener is code that requests a URL derived from the received message via fetch(). The URL is not validated or sanitised before it is fetched, thus allowing a malicious web page to arbitrarily fetch URLรขโ‚ฌโ„ขs via the victim's browser.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35184 โ€ผ

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse a SolarWinds service resulting in a remote code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35182 โ€ผ

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability can be abused by unauthenticated users on SolarWinds ARM Server.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35187 โ€ผ

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability allows an unauthenticated user to achieve the Remote Code Execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-43251 โ€ผ

XNSoft Nconvert 7.136 has an Exception Handler Chain Corrupted via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35185 โ€ผ

The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability using SYSTEM privileges.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-31046 โ€ผ

A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an attacker to achieve read-only access to the server's filesystem.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35186 โ€ผ

The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-46042 โ€ผ

An issue in GetSimpleCMS v.3.4.0a allows a remote attacker to execute arbitrary code via a crafted payload to the phpinfo().

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35181 โ€ผ

The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows users to abuse incorrect folder permission resulting in Privilege Escalation.

๐Ÿ“– Read

via "National Vulnerability Database".
๐Ÿ•ด AI-Powered Israeli 'Cyber Dome' Defense Operation Comes to Life ๐Ÿ•ด

The Israelis are building a cyber defense system that will use ChatGPT-like generative AI platforms to parse threat intelligence.

๐Ÿ“– Read

via "Dark Reading".
๐Ÿ•ด Tips for a Successful SecOps Game Plan ๐Ÿ•ด

Dark Reading's special report on SecOps data analytics looks at the elements needed to set up a proper data foundation. Getting the data right when collecting, aggregating, and analyzing it is essential.

๐Ÿ“– Read

via "Dark Reading".
โ€ผ CVE-2023-45277 โ€ผ

Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-45278 โ€ผ

Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-46033 โ€ผ

** UNSUPPORTED WHEN ASSIGNED ** D-Link (Non-US) DSL-2750U N300 ADSL2+ and (Non-US) DSL-2730U N150 ADSL2+ are vulnerable to Incorrect Access Control. The UART/Serial interface on the PCB, provides log output and a root terminal without proper access control.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-45281 โ€ผ

An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2022-47583 โ€ผ

Terminal character injection in Mintty before 3.6.3 allows code execution via unescaped output to the terminal.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-35126 โ€ผ

An out-of-bounds write vulnerability exists within the parsers for both the "DocumentViewStyles" and "DocumentEditStyles" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

๐Ÿ“– Read

via "National Vulnerability Database".
โ€ผ CVE-2023-45665 โ€ผ

** REJECT ** This CVE is a duplicate of another CVE.

๐Ÿ“– Read

via "National Vulnerability Database".