πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-5774 β€Ό

The Animated Counters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Falco 0.36.2 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2023-5705 β€Ό

The VK Filter Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vk_filter_search' shortcode in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44376 β€Ό

Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'add2' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5807 β€Ό

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TRtek Software Education Portal allows SQL Injection.This issue affects Education Portal: before 3.2023.29.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-44377 β€Ό

Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'add3' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5570 β€Ό

Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5821 β€Ό

The Thumbnail carousel slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing nonce validation on the deleteselected function. This makes it possible for unauthenticated attackers to delete sliders in bulk via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5820 β€Ό

The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the addedit functionality. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-5443 β€Ό

Improper Protection for Outbound Error Messages and Alert Signals vulnerability in EDM Informatics E-invoice allows Account Footprinting.This issue affects E-invoice: before 2.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46604 β€Ό

Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiateΓ‚ any class on the classpath.Γ‚ Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46394 β€Ό

A stored cross-site scripting (XSS) vulnerability in /home/user/edit_submit of gougucms v4.08.18 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the headimgurl parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-46393 β€Ό

gougucms v4.08.18 was discovered to contain a password reset poisoning vulnerability which allows attackers to arbitrarily reset users' passwords via a crafted packet.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Hacktivist Activity Related to Gaza Conflict Dwindles πŸ•΄

Groups have fallen silent after bold claims of action at the start of the conflict.

πŸ“– Read

via "Dark Reading".
🦿 New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail 🦿

After reading the technical details about this zero-day that targeted governmental entities and a think tank in Europe and learning about the Winter Vivern threat actor, get tips on mitigating this cybersecurity attack.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Understand the True Cost of a UEM Before Making the Switch πŸ•΄

When investing in a unified endpoint management solution, prioritize the needs of your network and users ahead of brand names. This Tech Tip focuses on questions to ask.

πŸ“– Read

via "Dark Reading".
🦿 TunnelBear VPN Review 2023: Pricing, Ease of Use & Security 🦿

Read our in-depth analysis of TunnelBear VPN, covering its pricing, ease of use, security features, and more. Find out if this is the right VPN for you.

πŸ“– Read

via "Tech Republic".
🦿 5 Best Chrome VPN Extensions for 2023: Complete Buyer’s Guide 🦿

Looking for the best VPNs for Chrome extension to enhance your online security and privacy? Dive into our list of top rated VPNs and find your best fit.

πŸ“– Read

via "Tech Republic".
🦿 The Top 6 Enterprise VPN Solutions to Use in 2023 🦿

Enterprise VPNs are critical for connecting remote workers to company resources via reliable and secure links to foster communication and productivity. Read about six viable choices for businesses.

πŸ“– Read

via "Tech Republic".
🦿 Apple Vulnerability Can Expose iOS and macOS History and Passwords 🦿

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually.

πŸ“– Read

via "Tech Republic".