πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-46563 β€Ό

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIpQoS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5731 β€Ό

Memory safety bugs present in Firefox 118. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46547 β€Ό

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formSysLog.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26570 β€Ό

Missing authentication in the StudentPopupDetails_Timetable method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction sensitive student data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27254 β€Ό

Unauthenticated SQL injection in the GetRoomChanges method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42490 β€Ό

EisBaer Scada - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-4608 β€Ό

An authenticated XCC user with elevated privileges can perform blind SQL injection in limited cases through a crafted API command.Γ‚ This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46559 β€Ό

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formIPv6Addr.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-27261 β€Ό

Missing authentication in the DeleteAssignments method in IDAttendÒ€ℒs IDWeb application 3.1.052 and earlier allows deletion of data by unauthenticated attackers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-37909 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.1-rc-1 and prior to versions 14.10.8 and 15.3-rc-1, any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. This has been patched in XWiki 14.10.8 and 15.3-rc-1 by adding proper escaping. As a workaround, the patch can be manually applied to the document `Menu.UIExtensionSheet`; only three lines need to be changed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45844 β€Ό

The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42844 β€Ό

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. A website may be able to access sensitive user data when resolving symlinks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46543 β€Ό

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formWlSiteSurvey.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42846 β€Ό

This issue was addressed by removing the vulnerable code. This issue is fixed in watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, tvOS 17.1, iOS 17.1 and iPadOS 17.1. A device may be passively tracked by its Wi-Fi MAC address.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46659 β€Ό

Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape the Trac website URL on the build page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42856 β€Ό

The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, macOS Monterey 12.7.1, macOS Ventura 13.6.1. Processing a file may lead to unexpected app termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46158 β€Ό

IBM WebSphere Application Server Liberty 23.0.0.9 through 23.0.0.10 could provide weaker than expected security due to improper resource expiration handling. IBM X-Force ID: 268775.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46562 β€Ό

TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formDosCfg.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-42492 β€Ό

EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46410 β€Ό

TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 416F60 function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45135 β€Ό

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In `org.xwiki.platform:xwiki-platform-web` versions 7.2-milestone-2 until 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, it is possible to pass a title to the page creation action that isn't displayed at first but then executed in the second step. This can be used by an attacker to trick a victim to execute code, allowing script execution if the victim has script right or remote code execution including full access to the XWiki instance if the victim has programming right.For the attack to work, the attacker needs to convince the victim to visit a link like `<xwiki-host>/xwiki/bin/create/NonExistingSpace/WebHome?title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)` where `<xwiki-host>` is the URL of the Wiki installation and to then click on the "Create" button on that page. The page looks like a regular XWiki page that the victim would also see when clicking the button to create a page that doesn't exist yet, the malicious code is not displayed anywhere on that page. After clicking the "Create" button, the malicious title would be displayed but at this point, the code has already been executed and the attacker could use this code also to hide the attack, e.g., by redirecting the victim again to the same page with an innocent title. It thus seems plausible that this attack could work if the attacker can place a fake "create page" button on a page which is possible with edit right.This has been patched in `org.xwiki.platform:xwiki-platform-web` version 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by displaying the title already in the first step such that the victim can notice the attack before continuing. It is possible to manually patch the modified files from the patch in an existing installation. For the JavaScript change, the minified JavaScript file would need to be obtained from a build of XWiki and replaced accordingly.

πŸ“– Read

via "National Vulnerability Database".