πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.1K subscribers
88.4K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-3164 β€Ό

A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-43336 β€Ό

Sangoma Technologies FreePBX before cdr 15.0.18, 16.0.40, 15.0.16, and 16.0.17 was discovered to contain an access control issue via a modified parameter value, e.g., changing extension=self to extension=101.

πŸ“– Read

via "National Vulnerability Database".
🦿 G7 Countries Establish Voluntary AI Code of Conduct 🦿

The code of conduct provides guidelines for AI regulation across G7 countries and includes cybersecurity considerations and international standards.

πŸ“– Read

via "Tech Republic".
🦿 UK AI Safety Summit: Global Powers Make β€˜Landmark’ Pledge to AI Safety 🦿

Global leaders from 28 nations have gathered in the U.K. for an influential summit dedicated to AI regulation and safety. Here’s what you need to know.

πŸ“– Read

via "Tech Republic".
πŸ•΄ 'Scarred Manticore' Unleashes the Most Advanced Iranian Cyber Espionage Yet πŸ•΄

The government-backed APT's new malware framework represents a step up in Iran's cyber sophistication.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2023-45336 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45345 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45346 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_role' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45342 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/register-router.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45339 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'type' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26452 β€Ό

Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29044 β€Ό

Documents operations could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now get escaped to avoid code execution. No publicly available exploits are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45332 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'deleted' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-29047 β€Ό

Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45334 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'status' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45340 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/details-router.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45337 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26455 β€Ό

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45328 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45326 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-45329 β€Ό

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'role' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

πŸ“– Read

via "National Vulnerability Database".