βΌ CVE-2023-46256 βΌ
π Read
via "National Vulnerability Database".
PX4-Autopilot provides PX4 flight control solution for drones. In versions 1.14.0-rc1 and prior, PX4-Autopilot has a heap buffer overflow vulnerability in the parser function due to the absence of `parserbuf_index` value checking. A malfunction of the sensor device can cause a heap buffer overflow with leading unexpected drone behavior. Malicious applications can exploit the vulnerability even if device sensor malfunction does not occur. Up to the maximum value of an `unsigned int`, bytes sized data can be written to the heap memory area. As of time of publication, no fixed version is available.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46245 βΌ
π Read
via "National Vulnerability Database".
Kimai is a web-based multi-user time-tracking application. Versions 2.1.0 and prior are vulnerable to a Server-Side Template Injection (SSTI) which can be escalated to Remote Code Execution (RCE). The vulnerability arises when a malicious user uploads a specially crafted Twig file, exploiting the software's PDF and HTML rendering functionalities. As of time of publication, no patches or known workarounds are available.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43796 βΌ
π Read
via "National Vulnerability Database".
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cached device information of remote users can be queried from Synapse. This can be used to enumerate the remote users known to a homeserver. System administrators are encouraged to upgrade to Synapse 1.95.1 or 1.96.0rc1 to receive a patch. As a workaround, the `federation_domain_whitelist` can be used to limit federation traffic with a homeserver.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5739 βΌ
π Read
via "National Vulnerability Database".
Certain versions of HP PC Hardware Diagnostics Windows are potentially vulnerable to elevation of privilege.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46250 βΌ
π Read
via "National Vulnerability Database".
pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions 3.7.0 through 3.16.4 can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case when the pypdf-user manipulates an incoming malicious PDF e.g. by merging it with another PDF or by adding annotations. The issue was fixed in version 3.17.0. As a workaround, apply the patch manually by modifying `pypdf/generic/_data_structures.py`.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46249 βΌ
π Read
via "National Vulnerability Database".
authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46722 βΌ
π Read
via "National Vulnerability Database".
The Pimcore Admin Classic Bundle provides a backend UI for Pimcore. Prior to version 1.2.0, a cross-site scripting vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 1.2.0 to receive a patch or, as a workaround, apply the patch manually.π Read
via "National Vulnerability Database".
π΄ US Leads 40-Country Alliance to Cut Off Ransomware Payments π΄
π Read
via "Dark Reading".
The parties within the International Counter Ransomware Initiative intend to use information-sharing tools and AI to achieve their goals of cutting off the financial resources of threat actors.π Read
via "Dark Reading".
Dark Reading
US Leads 40-Country Alliance to Cut Off Ransomware Payments
The parties within the International Counter Ransomware Initiative intend to use information-sharing tools and AI to achieve their goals of cutting off the financial resources of threat actors.
π¦Ώ Google Offers Bug Bounties for Generative AI Security Vulnerabilities π¦Ώ
π Read
via "Tech Republic".
Google's Vulnerability Reward Program offers up to $31,337 for discovering potential hazards. Google joins OpenAI and Microsoft in rewarding AI bug hunts.π Read
via "Tech Republic".
TechRepublic
Google Offers Bug Bounties for Generative AI Security Vulnerabilities
Googleβs Vulnerability Reward Program offers up to $31,337 for discovering potential hazards.
π₯1
π΄ Malware 'Meal Kits' Serve Up No-Fuss RAT Attacks π΄
π Read
via "Dark Reading".
The wider availability of turnkey cyberattack kits in the criminal underground is leading to a glut of campaigns using remote access Trojans (RATs).π Read
via "Dark Reading".
Dark Reading
Malware 'Meal Kits' Serve Up No-Fuss RAT Attacks
The wider availability of turnkey cyberattack kits in the criminal underground is leading to a glut of campaigns using remote access Trojans (RATs).
βΌ CVE-2023-37831 βΌ
π Read
via "National Vulnerability Database".
An issue discovered in Elenos ETG150 FM transmitter v3.12 allows attackers to enumerate user accounts based on server responses when credentials are submitted.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37832 βΌ
π Read
via "National Vulnerability Database".
A lack of rate limiting in Elenos ETG150 FM transmitter v3.12 allows attackers to obtain user credentials via brute force and cause other unspecified impacts.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45955 βΌ
π Read
via "National Vulnerability Database".
An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands.π Read
via "National Vulnerability Database".
π΄ SEC Charges Against SolarWinds CISO Send Shockwaves Through Security Ranks π΄
π Read
via "Dark Reading".
The legal actions may have a chilling effect on hiring CISOs, who are already in short supply, but may also expose just how budget-constrained most security executives are.π Read
via "Dark Reading".
Dark Reading
SEC Charges Against SolarWinds CISO Send Shockwaves Through Security Ranks
The legal actions may have a chilling effect on hiring CISOs, who are already in short supply, but may also expose just how budget-constrained most security executives are.
βΌ CVE-2023-46485 βΌ
π Read
via "National Vulnerability Database".
An issue in TOTOlink X6000R V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the setTracerouteCfg function of the stecgi.cgi component.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3955 βΌ
π Read
via "National Vulnerability Database".
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3676 βΌ
π Read
via "National Vulnerability Database".
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43295 βΌ
π Read
via "National Vulnerability Database".
Cross Site Request Forgery vulnerability in Click Studios (SA) Pty Ltd Passwordstate v.Build 9785 and before allows a local attacker to execute arbitrary code via a crafted request.π Read
via "National Vulnerability Database".
βΌ CVE-2023-46484 βΌ
π Read
via "National Vulnerability Database".
An issue in TOTOlink X6000R V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the setLedCfg function.π Read
via "National Vulnerability Database".
βΌ CVE-2023-41377 βΌ
π Read
via "National Vulnerability Database".
In certain conditions for Calico Typha (v3.26.2, v3.25.1 and below), and Calico Enterprise Typha (v3.17.1, v3.16.3, v3.15.3 and below), a client TLS handshake can block the Calico Typha server indefinitely, resulting in denial of service. The TLS Handshake() call is performed inside the main server handle for loop without any timeout allowing an unclean TLS handshake to block the main loop indefinitely while other connections will be idle waiting for that handshake to finish.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39610 βΌ
π Read
via "National Vulnerability Database".
An issue in TP-Link Tapo C100 v1.1.15 Build 211130 Rel.15378n(4555) and before allows attackers to cause a Denial of Service (DoS) via supplying a crafted web request.π Read
via "National Vulnerability Database".