🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2023-5837

A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243802 is the identifier assigned to this vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2021-33636

When the isula load command is used to load malicious images, attackers can execute arbitrary code.

📖 Read

via "National Vulnerability Database".
CVE-2021-33637

When the isula export command is used to export a container to an image and the container is controlled by an attacker, the attacker can escape the container.

📖 Read

via "National Vulnerability Database".
CVE-2021-33635

When malicious images are pulled by isula pull, attackers can execute arbitrary code.

📖 Read

via "National Vulnerability Database".
CVE-2021-33638

When the isula cp command is used to copy files from a container to a host machine and the container is controlled by an attacker, the attacker can escape the container.

📖 Read

via "National Vulnerability Database".
CVE-2021-33634

iSulad uses the lcr+lxc runtime (default) to run malicious images, which can cause DOS.

📖 Read

via "National Vulnerability Database".
CVE-2005-10002

A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.

📖 Read

via "National Vulnerability Database".
CVE-2007-10003

A vulnerability, which was classified as critical, has been found in The Hackers Diet Plugin up to 0.9.6b on WordPress. This issue affects some unknown processing of the file ajax_blurb.php of the component HTTP POST Request Handler. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. Upgrading to version 0.9.7b is able to address this issue. The patch is named 7dd8acf7cd8442609840037121074425d363b694. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-243803.

📖 Read

via "National Vulnerability Database".
🕴 CISO Skills in a Changing Security Market: Are You Prepared? 🕴

The CISO role has evolved from a strictly technical position to one that increasingly requires business acumen. Here are some things you need to know.

📖 Read

via "Dark Reading".
👍1
🕴 Getting Smart With Cybersecurity: AI Can Help the Good Guys, Too 🕴

With the rapid advancement and adoption of artificial intelligence (AI) in cybersecurity, the benefits of speed and accuracy are becoming clearer every day.

📖 Read

via "Dark Reading".
🕴 Securing Modern Enterprises in a Borderless Landscape 🕴

CISOs offer recommendations to help secure identities, data, code, and cloud infrastructure and protect against evolving threats and vulnerabilities.

📖 Read

via "Dark Reading".
🛠 Zeek 6.0.2 🛠

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

📖 Read

via "Packet Storm Security".
🕴 What the Boardroom Is Missing: CISOs 🕴

From communicating why security should be a priority to advocating for accountability and greater focus on protecting data in the cloud, CISOs can make the case for keeping people and sensitive data secure.

📖 Read

via "Dark Reading".
CVE-2023-5832

Improper Input Validation in GitHub repository mintplex-labs/anything-llm prior to 0.1.0.

📖 Read

via "National Vulnerability Database".
CVE-2023-45799

In MLSoft TCO!stream versions 8.0.22.1115 and below, a vulnerability exists due to insufficient permission validation. This allows an attacker to make the victim download and execute arbitrary files.

📖 Read

via "National Vulnerability Database".
CVE-2023-45797

A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code.

📖 Read

via "National Vulnerability Database".
CVE-2023-45746

Cross-site scripting vulnerability in Movable Type series allows a remote authenticated attacker to inject an arbitrary script. Affected products/versions are as follows: Movable Type 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Premium 1.58 and earlier, Movable Type Premium Advanced 1.58 and earlier, Movable Type Cloud Edition (Version 7) r.5405 and earlier, and Movable Type Premium Cloud Edition 1.58 and earlier.

📖 Read

via "National Vulnerability Database".
CVE-2023-5844

Unverified Password Change in GitHub repository pimcore/admin-ui-classic-bundle prior to 1.2.0.

📖 Read

via "National Vulnerability Database".
CVE-2023-42431

Cross-site Scripting (XSS) vulnerability in BlueSpiceAvatars extension of BlueSpice allows logged in user to inject arbitrary HTML into the profile image dialog on Special:Preferences. This only applies to the genuine user context.

📖 Read

via "National Vulnerability Database".
CVE-2023-5833

Improper Access Control in GitHub repository mintplex-labs/anything-llm prior to 0.1.0.

📖 Read

via "National Vulnerability Database".
CVE-2023-45798

In Yettiesoft VestCert versions 2.36 to 2.5.29, a vulnerability exists due to improper validation of third-party modules. This allows malicious actors to load arbitrary third-party modules, leading to remote code execution.

📖 Read

via "National Vulnerability Database".