πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-40413 β€Ό

The issue was addressed with improved handling of caches. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to read sensitive location information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26583 β€Ό

Unauthenticated SQL injection in the GetCurrentPeriod method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40444 β€Ό

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.1. An app may be able to access user-sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26580 β€Ό

Unauthenticated arbitrary file read in the IDAttendÒ€ℒs IDWeb application 3.1.013 allows the retrieval of any file present on the web server by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26568 β€Ό

Unauthenticated SQL injection in the GetStudentGroupStudents method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-34048 β€Ό

vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.Γ‚ A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-31581 β€Ό

Dromara Sureness before v1.0.8 was discovered to use a hardcoded key.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38485 β€Ό

A directory traversal vulnerability exists in the AgeVolt Portal prior to version 0.1 that leads to Information Disclosure. A remote authenticated attacker could leverage this vulnerability to read files from any location on the target operating system with web server privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26574 β€Ό

Missing authentication in the SearchStudents method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction sensitive student data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3112 β€Ό

A vulnerability was reported in Elliptic Labs Virtual Lock Sensor for ThinkPad T14 Gen 3 that could allow an attacker with local access to execute code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26569 β€Ό

Unauthenticated SQL injection in the StudentPopupDetails_Timetable method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26575 β€Ό

Missing authentication in the SearchStudentsStaff method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction sensitive student and teacher data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26219 β€Ό

The Hawk Console and Hawk Agent components of TIBCO Software Inc.'s TIBCO Hawk, TIBCO Hawk Distribution for TIBCO Silver Fabric, TIBCO Operational Intelligence Hawk RedTail, and TIBCO Runtime Agent contain a vulnerability that theoretically allows an attacker with access to the Hawk ConsoleÒ€ℒs and AgentÒ€ℒs log to obtain credentials used to access associated EMS servers. Affected releases are TIBCO Software Inc.'s TIBCO Hawk: versions 6.2.2 and below, TIBCO Hawk Distribution for TIBCO Silver Fabric: versions 6.2.2 and below, TIBCO Operational Intelligence Hawk RedTail: versions 7.2.1 and below, and TIBCO Runtime Agent: versions 5.12.2 and below.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46191 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Niels van Renselaar Open Graph Metabox plugin <=Γ‚ 1.4.4 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42842 β€Ό

The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.1. An app may be able to access sensitive user data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46120 β€Ό

The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. `maxBodyLebgth` was not used when receiving Message objects. Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. Users of RabbitMQ may suffer from DoS attacks from RabbitMQ Java client which will ultimately exhaust the memory of the consumer. This vulnerability was patched in version 5.18.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5732 β€Ό

An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox < 117, Firefox ESR < 115.4, and Thunderbird < 115.4.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-36085 β€Ό

The sisqualWFM 7.1.319.103 thru 7.1.319.111 for Android, has a host header injection vulnerability in its "/sisqualIdentityServer/core/" endpoint. By modifying the HTTP Host header, an attacker can change webpage links and even redirect users to arbitrary or malicious locations. This can lead to phishing attacks, malware distribution, and unauthorized access to sensitive resources.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46189 β€Ό

Cross-Site Request Forgery (CSRF) vulnerability in Simple Calendar Γ’β‚¬β€œ Google Calendar Plugin <=Γ‚ 3.2.5 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37908 β€Ό

XWiki Rendering is a generic Rendering system that converts textual input in a given syntax into another syntax. The cleaning of attributes during XHTML rendering, introduced in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid attribute names. This can be exploited, e.g., via the link syntax in any content that supports XWiki syntax like comments in XWiki. When a user moves the mouse over a malicious link, the malicious JavaScript code is executed in the context of the user session. When this user is a privileged user who has programming rights, this allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. While this attribute was correctly recognized as not allowed, the attribute was still printed with a prefix `data-xwiki-translated-attribute-` without further cleaning or validation. This problem has been patched in XWiki 14.10.4 and 15.0 RC1 by removing characters not allowed in data attributes and then validating the cleaned attribute again. There are no known workarounds apart from upgrading to a version including the fix.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-40405 β€Ό

A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1. An app may be able to read sensitive location information.

πŸ“– Read

via "National Vulnerability Database".