22 October 2021
?
23:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Organizations warned of ransomware risk from smaller operators πŸ“’

They may not have the financial muscle, but small-time cyber crooks can cause havoc for critical systems

πŸ“– Read

via "ITPro".
23:26
πŸ“’ IT Pro News in Review: MacBook refresh, Facebook creating jobs and facial recognition in schools πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
23:26
πŸ“’ The IT Pro Podcast: Should the US cyber army be more aggressive? πŸ“’

Is a more proactive strategy the answer to increasing attacks from Russia and China?

πŸ“– Read

via "ITPro".
23:26
πŸ“’ Iranian hacking group continues to target US citizens πŸ“’

APT35 used phishing attacks and uploaded spyware onto Google Play Store

πŸ“– Read

via "ITPro".
23:26
πŸ“’ Oak9’s IaC security platform now available on AWS πŸ“’

The solution speeds up app deployment while providing comprehensive security

πŸ“– Read

via "ITPro".
23:26
πŸ“’ The best remote access solutions πŸ“’

We round up the top remote access software for mobile workers, including those with collaboration, screen-sharing and support tools

πŸ“– Read

via "ITPro".
23:26
πŸ“’ Almost 70% of CISOs expect a ransomware attack πŸ“’

Many companies are willing to make ransomware payments in the face of the growing threat

πŸ“– Read

via "ITPro".
25 October 2021
?
07:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40371 β€Ό

Gridpro Request Management for Windows Azure Pack before 2.0.7912 allows Directory Traversal for remote code execution, as demonstrated by ..\\ in a scriptName JSON value to ServiceManagerTenant/GetVisibilityMap.

πŸ“– Read

via "National Vulnerability Database".
07:13
β€Ό CVE-2021-21703 β€Ό

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

πŸ“– Read

via "National Vulnerability Database".
?
07:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cybersecurity Awareness Month: Listen up – CYBERSECURITY FIRST! ⚠

Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!

πŸ“– Read

via "Naked Security".
07:43
⚠ REvil ransomware gang allegedly forced offline by law enforcement counterattacks ⚠

One down. Lots more to go. Here's what to do...

πŸ“– Read

via "Naked Security".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40527 β€Ό

Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.

πŸ“– Read

via "National Vulnerability Database".
09:13
β€Ό CVE-2021-40526 β€Ό

Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike

πŸ“– Read

via "National Vulnerability Database".
?
11:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Listen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks ⚠

Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.

πŸ“– Read

via "Naked Security".
11:46
πŸ—“οΈ Polygon pays out record $2 million bug bounty reward for critical vulnerability πŸ—“οΈ

Ethical hacker bags top prize for double spend flaw in smart contract

πŸ“– Read

via "The Daily Swig".
?
12:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Discourse fixes critical validation-related vulnerability in forum software πŸ—“οΈ

We need to talk about lack of validation

πŸ“– Read

via "The Daily Swig".
12:30
❌ CISA Urges Sites to Patch Critical RCE in Discourse ❌

The patch, urgently rushed out on Friday, is an emergency fix for the widely deployed platform, whose No. 1 most trafficked site is Amazon’s Seller Central.

πŸ“– Read

via "Threat Post".
12:43
⚠ Listen up 3 – CYBERSECURITY FIRST! Cyberinsurance, help or hindrance? ⚠

Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.

πŸ“– Read

via "Naked Security".
?
13:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-24774 β€Ό

The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-24515 β€Ό

The Video Gallery ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ Vimeo and YouTube Gallery WordPress plugin through 1.1.4 does not escape the Title and Description of the videos in a gallery before outputting them in attributes, leading to Stored Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-24608 β€Ό

The Formidable Form Builder ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ Contact Form, Survey & Quiz Forms Plugin for WordPress plugin before 5.0.07 does not sanitise and escape its Form's Labels, allowing high privileged users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-24489 β€Ό

The Request a Quote WordPress plugin before 2.3.5 does not sanitise, validate or escape some of its settings in the admin dashboard, leading to authenticated Stored Cross-Site Scripting issues even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-24884 β€Ό

The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject certain HTML Tags like <audio>,<video>,<img>,<a> and<button>.This could allow an unauthenticated, remote attacker to exploit a HTML-injection byinjecting a malicous link. The HTML-injection may trick authenticated users to follow the link. If the Link gets clicked, Javascript code can be executed. The vulnerability is due to insufficient sanitization of the "data-frmverify" tag for links in the web-based entry inspection page of affected systems. A successful exploitation incomibantion with CSRF could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These actions include stealing the users account by changing their password or allowing attackers to submit their own code through an authenticated user resulting in Remote Code Execution. If an authenticated user who is able to edit Wordpress PHP Code in any kind, clicks the malicious link, PHP code can be edited.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0939 β€Ό

In set_default_passthru_cfg of passthru.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186026549References: N/A

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0410 β€Ό

In flv extractor, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561360; Issue ID: ALPS05561360.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2020-7859 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2020-14264 β€Ό

"HCL Traveler Companion is vulnerable to an iOS weak cryptographic process vulnerability via the included MobileIron AppConnect SDK"

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0414 β€Ό

In flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561384; Issue ID: ALPS05561384.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0633 β€Ό

In display driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05585423; Issue ID: ALPS05585423.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0409 β€Ό

In flv extractor, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561359; Issue ID: ALPS05561359.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0935 β€Ό

In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168607263References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-24544 β€Ό

The Responsive WordPress Slider WordPress plugin through 2.2.0 does not sanitise and escape some of the Slider options, allowing Cross-Site Scripting payloads to be set in them. Furthermore, as by default any authenticated user is allowed to create Sliders (https://wordpress.org/support/topic/slider-can-be-changed-from-any-user-even-subscriber/, such settings can be changed in the plugin's settings), this would allow user with a role as low as subscriber to perform Cross-Site Scripting attacks against logged in admins viewing the slider list and could lead to privilege escalation by creating a rogue admin account for example.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-24779 β€Ό

The WP Debugging WordPress plugin before 2.11.0 has its update_settings() function hooked to admin_init and is missing any capability and CSRF checks, as a result, the settings can be updated by unauthenticated users.

πŸ“– Read

via "National Vulnerability Database".
13:13
β€Ό CVE-2021-0634 β€Ό

In display driver, there is a possible memory corruption due to uninitialized data. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594994; Issue ID: ALPS05594994.

πŸ“– Read

via "National Vulnerability Database".
13:14
β€Ό CVE-2021-0625 β€Ό

In ccu, there is a possible memory corruption due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594996; Issue ID: ALPS05594996.

πŸ“– Read

via "National Vulnerability Database".
13:14
β€Ό CVE-2021-0613 β€Ό

In asf extractor, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05489178.

πŸ“– Read

via "National Vulnerability Database".
13:14
β€Ό CVE-2021-41035 β€Ό

In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.

πŸ“– Read

via "National Vulnerability Database".
13:14
β€Ό CVE-2021-24514 β€Ό

The Visual Form Builder WordPress plugin before 3.0.4 does not sanitise or escape its Form Name, allowing high privilege users such as admin to set Cross-Site Scripting payload in them, even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
13:16
πŸ—“οΈ Popular NPM package UA-Parser-JS poisoned with cryptomining, password-stealing malware πŸ—“οΈ

Developer moves quickly to address vulnerabilities after his account was compromised

πŸ“– Read

via "The Daily Swig".
13:23
β€Ό CVE-2021-24699 β€Ό

The Easy Media Download WordPress plugin before 1.1.7 does not escape the text argument of its shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-0663 β€Ό

In audio DSP, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05844458; Issue ID: ALPS05844458.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-24744 β€Ό

The WordPress Contact Forms by Cimatti WordPress plugin before 1.4.12 does not sanitise and escape the Form Title before outputting it in some admin pages. which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-0662 β€Ό

In audio DSP, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05844434; Issue ID: ALPS05844434.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-0411 β€Ό

In flv extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561362; Issue ID: ALPS05561362.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-0941 β€Ό

In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-24414 β€Ό

The Video Player for YouTube WordPress plugin before 1.4 does not sanitise or validate the parameters from its shortcode, allowing users with a role as low as contributor to set Cross-Site Scripting payload in them which will be triggered in the page/s with the embed malicious shortcode

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-24885 β€Ό

The YOP Poll WordPress plugin before 6.1.2 does not escape the perpage parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-0615 β€Ό

In flv extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561369; Issue ID: ALPS05561369.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-0630 β€Ό

In wifi driver, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05551397; Issue ID: ALPS05551397.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2020-20908 β€Ό

Akaunting v1.3.17 was discovered to contain a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Company Name input field.

πŸ“– Read

via "National Vulnerability Database".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 REvil ransomware group reportedly taken offline by multi-nation effort 🦿

Law enforcement officials and cyber specialists hacked into REvil's network, gaining control of some of its servers, sources told Reuters.

πŸ“– Read

via "Tech Republic".
13:42
🦿 Companies that pay ransomware attackers get thumbs down from consumers 🦿

More than half of those surveyed by data management firm Cohesity said that companies that pay the ransom in an attack encourage ransomware and bad actors.

πŸ“– Read

via "Tech Republic".
13:45
⚠ Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries ⚠

Michelle Farenci knows her stuff, because she's a cybersecurity practitioner inside a cybersecurity company! Learn why thinking like an attacker makes you a better defender.

πŸ“– Read

via "Naked Security".
?
14:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries ⚠

Michelle Farenci knows her stuff, because she's a cybersecurity practitioner inside a cybersecurity company! Learn why thinking like an attacker makes you a better defender.

πŸ“– Read

via "Naked Security".
14:13
⚠ Cybersecurity Awareness Month: Listen up – CYBERΒ­SECURITY FIRST! ⚠

Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!

πŸ“– Read

via "Naked Security".
14:13
⚠ Listen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks ⚠

Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.

πŸ“– Read

via "Naked Security".
14:13
⚠ Listen up 3 – CYBERSECURITY FIRST! Cyberinsurance, help or hindrance? ⚠

Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.

πŸ“– Read

via "Naked Security".
?
14:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  GNU Privacy Guard 2.2.32 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
14:45
πŸ›  GNU Privacy Guard 2.3.3 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37624 β€Ό

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing. By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the `auth-messages` parameter to `true`, it is not the default setting. Abuse of this security issue allows attackers to send SIP MESSAGE messages to any SIP user agent that is registered with the server without requiring authentication. Additionally, since no authentication is required, chat messages can be spoofed to appear to come from trusted entities. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. This issue is patched in version 1.10.7. Maintainers recommend that this SIP message type is authenticated by default so that FreeSWITCH administrators do not need to be explicitly set the `auth-messages` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34854 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in an uncontrolled memory allocation. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13544.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34863 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the var:page parameter provided to the webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13271.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34855 β€Ό

This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13592.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34856 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the virtio-gpu virtual device. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13581.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-41176 β€Ό

Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. In affected versions of Pterodactyl a malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.** This is fixed in version 1.6.3.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34861 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the webproc endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12104.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34862 β€Ό

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the var:menu parameter provided to the webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13270.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34857 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13601.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-21319 β€Ό

Galette is a membership management web application geared towards non profit organizations. In versions prior to 0.9.5, malicious javascript code can be stored to be displayed later on self subscription page. The self subscription feature can be disabled as a workaround (this is the default state). Malicious javascript code can be executed (not stored) on login and retrieve password pages. This issue is patched in version 0.9.5.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34864 β€Ό

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the WinAppHelper component. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13543.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34859 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TeamViewer 15.16.8.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TVS files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13697.

πŸ“– Read

via "National Vulnerability Database".
15:14
β€Ό CVE-2021-34860 β€Ό

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the getpage parameter provided to the webproc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-12103.

πŸ“– Read

via "National Vulnerability Database".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Conti Ransom Gang Starts Selling Access to Victims β™ŸοΈ

The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti's malware who refuse to negotiate a ransom payment are added to Conti's victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.

πŸ“– Read

via "Krebs on Security".
17:13
β€Ό CVE-2021-39220 β€Ό

Nextcloud is an open-source, self-hosted productivity platform The Nextcloud Mail application prior to versions 1.10.4 and 1.11.0 does by default not render images in emails to not leak the read state or user IP. The privacy filter failed to filter images with a relative protocol. It is recommended that the Nextcloud Mail application is upgraded to 1.10.4 or 1.11.0. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
17:13
β€Ό CVE-2021-39221 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Contacts application prior to version 4.0.3 was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Contacts application is upgraded to 4.0.3. As a workaround, one may use a browser that has support for Content-Security-Policy.

πŸ“– Read

via "National Vulnerability Database".
?
18:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ BillQuick Billing App Rigged to Inflict Ransomware ❌

A SQL injection bug in the BillQuick billing app has not only leaked sensitive information, it’s also let malicious actors remotely execute code and deploy ransomware.

πŸ“– Read

via "Threat Post".
?
18:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Groove Calls for Cyberattacks on US as REvil Payback ❌

The bold move signals a looming clash between Russian ransomware groups and the U.S.

πŸ“– Read

via "Threat Post".
18:30
πŸ•΄ Who's In Your Wallet? Exploring Mobile Wallet Security πŸ•΄

Security flaws in contactless payments for transportation systems could lead to fraud for stolen devices, researchers find.

πŸ“– Read

via "Dark Reading".
?
19:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Industrial Goods & Services Tops Ransomware Targets in 2021 πŸ•΄

While the industrial goods and services sector saw a decline in attacks during the third quarter, it remains the most targeted sector for ransomware this year.

πŸ“– Read

via "Dark Reading".
19:00
❌ Defending Assets You Don’t Know About Against Cyberattacks ❌

No security defense is perfect, and shadow IT means no company can inventory every single asset that it has. David β€œmoose” Wolpoff, CTO at Randori, discusses strategies for core asset protection given this reality.

πŸ“– Read

via "Threat Post".
?
19:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat πŸ•΄

Microsoft says the group has attacked more than 140 service providers, and compromised 14 of them, between May and October of this year.

πŸ“– Read

via "Dark Reading".
?
21:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41177 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-41179 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. Prior to Nextcloud Server versions 20.0.13, 21.0.5, and 22.2.0, the Two-Factor Authentication wasn't enforced for pages marked as public. Any page marked as `@PublicPage` could thus be accessed with a valid user session that isn't authenticated. This particularly affects the Nextcloud Talk application, as this could be leveraged to gain access to any private chat channel without going through the Two-Factor flow. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-39224 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-41105 β€Ό

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-38258 β€Ό

NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostProcessCallback().

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-41145 β€Ό

Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. FreeSWITCH prior to version 1.10.7 is susceptible to Denial of Service via SIP flooding. When flooding FreeSWITCH with SIP messages, it was observed that after a number of seconds the process was killed by the operating system due to memory exhaustion. By abusing this vulnerability, an attacker is able to crash any FreeSWITCH instance by flooding it with SIP messages, leading to Denial of Service. The attack does not require authentication and can be carried out over UDP, TCP or TLS. This issue was patched in version 1.10.7.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-39225 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3 allows another authenticated users to access Deck cards of another user. It is recommended that the Nextcloud Deck App is upgraded to 1.2.9, 1.4.5 or 1.5.3. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-38260 β€Ό

NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor().

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-41178 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, a file traversal vulnerability makes an attacker able to download arbitrary SVG images from the host system, including user provided files. This could also be leveraged into a XSS/phishing attack, an attacker could upload a malicious SVG file that mimics the Nextcloud login form and send a specially crafted link to victims. The XSS risk here is mitigated due to the fact that Nextcloud employs a strict Content-Security-Policy disallowing execution of arbitrary JavaScript. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5 or 22.2.0. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
21:14
β€Ό CVE-2021-39223 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings.

πŸ“– Read

via "National Vulnerability Database".
?
21:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Forcepoint Completes Acquisition of Bitglass πŸ•΄

The acquisition of Bitglass will be the third technology acquisition for Forcepoint this year.

πŸ“– Read

via "Dark Reading".
21:30
πŸ•΄ Jumio Launches End-to-end Orchestration for its KYX Platform πŸ•΄

Platform combines digital identity proofing, compliance verification and anti-money laundering checks.

πŸ“– Read

via "Dark Reading".
?
22:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ OpenText Strengthens Ransomware Resilience πŸ•΄

New detection and alert functions within Carbonite Server increase data protection against ransomware.

πŸ“– Read

via "Dark Reading".
26 October 2021
?
09:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Wardrivers Can Still Easily Crack 70% of WiFi Passwords πŸ•΄

Weaknesses in the current WiFi standard and poorly chosen passwords allowed one wardriver to recover 70% of wireless network passwords.

πŸ“– Read

via "Dark Reading".
09:14
β€Ό CVE-2020-5669 β€Ό

Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-40344 β€Ό

An issue was discovered in Nagios XI 5.8.5. In the Custom Includes section of the Admin panel, an administrator can upload files with arbitrary extensions as long as the MIME type corresponds to an image. Therefore it is possible to upload a crafted PHP script to achieve remote command execution.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34583 β€Ό

Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34585 β€Ό

In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34595 β€Ό

A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34584 β€Ό

Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-40345 β€Ό

An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34596 β€Ό

A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-42343 β€Ό

An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-40343 β€Ό

An issue was discovered in Nagios XI 5.8.5. Insecure file permissions on the nagios_unbundler.py file allow the nagios user to elevate their privileges to the root user.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34593 β€Ό

In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.

πŸ“– Read

via "National Vulnerability Database".
09:14
β€Ό CVE-2021-34586 β€Ό

In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
?
09:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Millions of Android Users Scammed in SMS Fraud Driven by Tik-Tok Ads ❌

UltimaSMS leverages at least 151 apps that have been downloaded collectively more than 10 million times, to extort money through a fake premium SMS subscription service.

πŸ“– Read

via "Threat Post".
?
11:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Pulling Back the Curtain on Bug Bounties πŸ•΄

It's critical that infosec professionals and consumers understand threats and vulnerabilities, but they are being kept in the dark.

πŸ“– Read

via "Dark Reading".
11:14
β€Ό CVE-2021-26607 β€Ό

An Improper input validation in execDefaultBrowser method of NEXACRO17 allows a remote attacker to execute arbitrary command on affected systems.

πŸ“– Read

via "National Vulnerability Database".
11:14
β€Ό CVE-2021-41873 β€Ό

Penguin Aurora TV Box 41502 is a high-end network HD set-top box produced by Tencent Video and Skyworth Digital. An unauthorized access vulnerability exists in the Penguin Aurora Box. An attacker can use the vulnerability to gain unauthorized access to a specific link to remotely control the TV.

πŸ“– Read

via "National Vulnerability Database".
11:14
β€Ό CVE-2021-37371 β€Ό

Online Student Admission System 1.0 is affected by an unauthenticated SQL injection bypass vulnerability in /admin/login.php.

πŸ“– Read

via "National Vulnerability Database".
11:14
β€Ό CVE-2021-26609 β€Ό

A vulnerability was found in Mangboard(WordPress plugin). A SQL-Injection vulnerability was found in order_type parameter. The order_type parameter makes a SQL query using unfiltered data. This vulnerability allows a remote attacker to steal user information.

πŸ“– Read

via "National Vulnerability Database".
11:14
β€Ό CVE-2011-2195 β€Ό

A flaw was found in WebSVN 2.3.2. Without prior authentication, if the 'allowDownload' option is enabled in config.php, an attacker can invoke the dl.php script and pass a well formed 'path' argument to execute arbitrary commands against the underlying operating system.

πŸ“– Read

via "National Vulnerability Database".
11:15
β€Ό CVE-2021-37372 β€Ό

Online Student Admission System 1.0 is affected by an insecure file upload vulnerability. A low privileged user can upload malicious PHP files by updating their profile image to gain remote code execution.

πŸ“– Read

via "National Vulnerability Database".
11:15
β€Ό CVE-2021-41078 β€Ό

Nameko through 2.13.0 can be tricked into performing arbitrary code execution when deserializing the config file.

πŸ“– Read

via "National Vulnerability Database".
11:15
β€Ό CVE-2011-4119 β€Ό

caml-light <= 0.75 uses mktemp() insecurely, and also does unsafe things in /tmp during make install.

πŸ“– Read

via "National Vulnerability Database".
?
11:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Africa sees increase in ransomware, botnet attacks – but online scams still pose biggest threat πŸ—“οΈ

Fraud is still the primary goal of cybercriminals operating across the continent, Interpol warns in latest market report

πŸ“– Read

via "The Daily Swig".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ SQL injection flaw in billing software app tied to US ransomware infection πŸ—“οΈ

BillQuick customers blindsided by recently patched web security flaw

πŸ“– Read

via "The Daily Swig".
?
12:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Cybersecurity Talent Gap Shrinks to 2.72 Million Individuals πŸ”

A new report suggests the job market saw 700,000 new cybersecurity professionals since 2020. While the number is an improvement, the gap continues to outpace what’s needed.

πŸ“– Read

via "".
12:46
πŸ—“οΈ Infosec skills gap widens in all regions bar Asia-Pacific – report πŸ—“οΈ

Overall worldwide shortfall shrinks 400k to 2.7m unfilled positions

πŸ“– Read

via "The Daily Swig".
13:01
❌ Mozilla Firefox Blocks Malicious Add-Ons Installed by 455K Users ❌

The misbehaving Firefox add-ons were misusing an API that controls how Firefox connects to the internet.

πŸ“– Read

via "Threat Post".
13:14
β€Ό CVE-2021-41173 β€Ό

Go Ethereum is the official Golang implementation of the Ethereum protocol. Prior to version 1.10.9, a vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer. Version v1.10.9 contains patches to the vulnerability. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41184 β€Ό

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41185 β€Ό

Mycodo is an environmental monitoring and regulation system. An exploit in versions prior to 8.12.7 allows anyone with access to endpoints to download files outside the intended directory. A patch has been applied and a release made. Users should upgrade to version 8.12.7. As a workaround, users may manually apply the changes from the fix commit.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41157 β€Ό

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. By default, SIP requests of the type SUBSCRIBE are not authenticated in the affected versions of FreeSWITCH. Abuse of this security issue allows attackers to subscribe to user agent event notifications without the need to authenticate. This abuse poses privacy concerns and might lead to social engineering or similar attacks. For example, attackers may be able to monitor the status of target SIP extensions. Although this issue was fixed in version v1.10.6, installations upgraded to the fixed version of FreeSWITCH from an older version, may still be vulnerable if the configuration is not updated accordingly. Software upgrades do not update the configuration by default. SIP SUBSCRIBE messages should be authenticated by default so that FreeSWITCH administrators do not need to explicitly set the `auth-subscriptions` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41183 β€Ό

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41175 β€Ό

Pi-hole's Web interface (based on AdminLTE) provides a central location to manage one's Pi-hole and review the statistics generated by FTLDNS. Prior to version 5.8, cross-site scripting is possible when adding a client via the groups-clients management page. This issue was patched in version 5.8.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-37364 β€Ό

OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41188 β€Ό

Shopware is open source e-commerce software. Versions prior to 5.7.6 contain a cross-site scripting vulnerability. This issue is patched in version 5.7.6. Two workarounds are available. Using the security plugin or adding a particular following config to the `.htaccess` file will protect against cross-site scripting in this case. There is also a config for those using nginx as a server. The plugin and the configs can be found on the GitHub Security Advisory page for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41158 β€Ό

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, an attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH's SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway. Abuse of this vulnerability allows attackers to potentially recover gateway passwords by performing a fast offline password cracking attack on the challenge response. The attacker does not require special network privileges, such as the ability to sniff the FreeSWITCH's network traffic, to exploit this issue. Instead, what is required for this attack to work is the ability to cause the victim server to send SIP request messages to the malicious party. Additionally, to exploit this issue, the attacker needs to specify the correct realm which might in some cases be considered secret. However, because many gateways are actually public, this information can easily be retrieved. The vulnerability appears to be due to the code which handles challenges in `sofia_reg.c`, `sofia_reg_handle_sip_r_challenge()` which does not check if the challenge is originating from the actual gateway. The lack of these checks allows arbitrary UACs (and gateways) to challenge any request sent by FreeSWITCH with the realm of the gateway being targeted. This issue is patched in version 10.10.7. Maintainers recommend that one should create an association between a SIP session for each gateway and its realm to make a check be put into place for this association when responding to challenges.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41172 β€Ό

AS_Redis is an AntSword plugin for Redis. The Redis Manage plugin for AntSword prior to version 0.5 is vulnerable to Self-XSS due to due to insufficient input validation and sanitization via redis server configuration. Self-XSS in the plugin configuration leads to code execution. This issue is patched in version 0.5.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-37363 β€Ό

An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.

πŸ“– Read

via "National Vulnerability Database".
13:15
β€Ό CVE-2021-41182 β€Ό

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

πŸ“– Read

via "National Vulnerability Database".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 9 key security threats that organizations will face in 2022 🦿

Supply chain attacks, misinformation campaigns, mobile malware and larger scale data breaches are just some of the threats to watch for next year, Check Point Software says.

πŸ“– Read

via "Tech Republic".
13:42
🦿 Phishing attack exploits Craigslist and Microsoft OneDrive 🦿

A phishing campaign took advantage of the mail relay function on Craigslist, which allows attackers to remain anonymous, Inky says.

πŸ“– Read

via "Tech Republic".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Attackers Hijack Craigslist Emails to Deliver Malware ❌

Fake Craigslist emails that abuse Microsoft OneDrive warn users that their ads contain β€˜inappropriate content.”

πŸ“– Read

via "Threat Post".
14:14
⚠ Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries ⚠

Michelle Farenci knows her stuff, because she's a cybersecurity practitioner inside a cybersecurity company! Learn why thinking like an attacker makes you a better defender.

πŸ“– Read

via "Naked Security".
14:14
⚠ Cybersecurity Awareness Month: Listen up – CYBERΒ­SECURITY FIRST! ⚠

Fraser Howard of SophosLabs is truly a world expert in fighting malware. Read now, and learn from the best!

πŸ“– Read

via "Naked Security".
14:14
⚠ Banking scam uses Docusign phish to thieve 2FA codes ⚠

This scam is obviously inapplicable to 999 people in every 1000... but there are LOTS of 1-in-1000 people in the world!

πŸ“– Read

via "Naked Security".
14:14
⚠ Listen up 2 – CYBERSECURITY FIRST! How to protect yourself from supply chain attacks ⚠

Everyone remembers this year's big-news supply chain attacks on Kaseya and SolarWinds. Sophos expert Chester Wisniewski explains how to control the risk.

πŸ“– Read

via "Naked Security".
14:14
⚠ Listen up 3 – CYBERSECURITY FIRST! Cyberinsurance, help or hindrance? ⚠

Dr Jason Nurse, Associate Professor in Cybersecurity at the University of Kent, takes on the controversial topic of cyberinsurance.

πŸ“– Read

via "Naked Security".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ FBI Raids Chinese Point-of-Sale Giant PAX Technology β™ŸοΈ

U.S. federal investigators today raided the U.S. offices of PAX Technology, a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. KrebsOnSecurity has learned the raid is tied to reports that PAX's systems may have been involved in cyberattacks on U.S. and E.U. organizations.

πŸ“– Read

via "Krebs on Security".
15:15
β€Ό CVE-2021-35499 β€Ό

The Web Reporting component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Stored Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: versions 10.4.0 and below.

πŸ“– Read

via "National Vulnerability Database".
?
15:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ DoJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation πŸ•΄

Operation Dark HunTor targeted opioid traffickers on the DarkNet, leading to the seizure of weapons, drugs, and $31 million.

πŸ“– Read

via "Dark Reading".
15:32
πŸ•΄ Are Baby Boomers More Vulnerable Online Than Younger Generations? You Might Be Surprised πŸ•΄

Growing up with computers and the Internet doesn't necessarily convey all the advantages often attributed to younger users.

πŸ“– Read

via "Dark Reading".
15:36
❌ Why the Next-Generation of Application Security Is Needed ❌

New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security is here.

πŸ“– Read

via "Threat Post".
15:42
🦿 You definitely don't want to play: Squid Game-themed malware is here 🦿

The stakes may not be as high as in the hit Netflix show, but you could still lose your data or identity if you fail to follow the rules for dodging the latest brand of pop-culture-themed scams.

πŸ“– Read

via "Tech Republic".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Lazarus Attackers Turn to the IT Supply Chain ❌

Kaspersky researchers saw The North Korean state APT use a new variant of the BlindingCan RAT to breach a Latvian IT vendor and then a South Korean think tank.

πŸ“– Read

via "Threat Post".
?
18:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybersecurity Talent Gap Narrows as Workforce Grows πŸ•΄

Job satisfaction and salaries have both increased for cybersecurity professionals, as younger workers seek specific training to prepare for a cybersecurity career.

πŸ“– Read

via "Dark Reading".
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA Announces Appointment of Washington Secretary of State Kim Wyman as Senior Election Security Lead πŸ•΄

As an expert on elections, her appointment speaks to the Agency’s dedication to working with election officials throughout the nation in a non-partisan manner to ensure the security and resilience of our election infrastructure.

πŸ“– Read

via "Dark Reading".
18:32
πŸ•΄ Gas Stations in Iran Downed by Cyberattack πŸ•΄

Unknown attackers hijacked gasoline pump machines and defaced them with a message that reportedly included a phone number for Supreme Leader Ayatollah Ali Khamenei's office.

πŸ“– Read

via "Dark Reading".
18:32
πŸ•΄ IBM Announces Advances and New Collaborations in AI-Powered Automation, 5G Connectivity and Security at Mobile World Congress Los Angeles πŸ•΄

IBM collaborates with Boston Dynamics, Cisco, Palo Alto Networks and Turnium Technology Group to help equip businesses in next phase of digital transformation.

πŸ“– Read

via "Dark Reading".
18:32
πŸ•΄ Ready to Play? Squid Game Becomes an Attractive Lure to Spread Cyberthreats πŸ•΄

Following demand from viewers, cybercriminals are not shy in taking advantage of fans’ eagerness to watch the show, with well-known fraud schemes hitting the web.

πŸ“– Read

via "Dark Reading".
18:36
❌ Public Clouds & Shared Responsibility: Lessons from Vulnerability Disclosure ❌

Much is made of shared responsibility for cloud security. But Oliver Tavakoli, CTO at Vectra AI, notes there's no guarantee that Azure or AWS are delivering services in a hardened and secure manner.

πŸ“– Read

via "Threat Post".
?
19:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-3556 β€Ό

HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0.

πŸ“– Read

via "National Vulnerability Database".
?
19:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ North Korea's Lazarus Group Turns to Supply Chain Attacks πŸ•΄

State-backed group is among a growing number of threat actors looking at supply chain companies as an entry point into enterprise networks.

πŸ“– Read

via "Dark Reading".
19:36
❌ SquirrelWaffle Loader Malspams, Packing Qakbot, Cobalt Strike ❌

Say hello to what could be the next big spam player: SquirrelWaffle, which is spreading with increasing frequency via spam campaigns and infecting systems with a new malware loader.

πŸ“– Read

via "Threat Post".
?
20:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Free Tool Helps Security Teams Measure Their API Attack Surface πŸ•΄

Data Theorem's free API Attack Surface Calculator helps security teams understand potential API exposures.

πŸ“– Read

via "Dark Reading".
?
21:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23877 β€Ό

Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP.

πŸ“– Read

via "National Vulnerability Database".
21:15
β€Ό CVE-2020-22864 β€Ό

A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor 3.1.0 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
21:15
β€Ό CVE-2021-41866 β€Ό

MyBB before 1.8.28 allows stored XSS because the displayed Template Name value in the Admin CP's theme management is not escaped properly.

πŸ“– Read

via "National Vulnerability Database".
27 October 2021
?
10:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyber Attack Cripples Iranian Fuel Distribution Network ❌

The incident triggered shutdowns at pumps across the country as attackers flashed the phone number of Supreme Leader Ali Khamenei across video screens.

πŸ“– Read

via "Threat Post".
10:47
πŸ—“οΈ Attack the block – How a security researcher cracked 70% of urban WiFi networks in one hit πŸ—“οΈ

A new attack takes advantage of weak WiFi passwords

πŸ“– Read

via "The Daily Swig".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Identity-Focused Security Controls Prevail πŸ•΄

How identity and access management strategies held up during the pandemic and tips for putting together an identity security road map.

πŸ“– Read

via "Dark Reading".
11:04
πŸ•΄ Annual Cyber Risk Survey Finds Businesses Are Sharpening Their Focus on Cybersecurity but Also Reveals Much Room for Improvement in Building Cyber-Resilience πŸ•΄

This year's survey features the highest percentage of cyber insurance buyers since the beginning of the survey 11 years ago.

πŸ“– Read

via "Dark Reading".
11:04
πŸ•΄ Cynerio Launches IoT Attack Detection and Response Module for Healthcare IoT Devices πŸ•΄

Module helps hospitals identify, contain, and mitigate threats on devices exhibiting malicious or suspicious behavior.

πŸ“– Read

via "Dark Reading".
11:04
πŸ•΄ Onfido Acquires EYN to Provide Acoustic-Based Liveness Detection πŸ•΄

Technology will be incorporated into Onfido’s Real Identity Platform.

πŸ“– Read

via "Dark Reading".
11:04
πŸ•΄ Cyber Readiness Institute Names Karen S. Evans as New Managing Director πŸ•΄

Former assistant secretary for cybersecurity, energy security, and emergency response at US Department of Energy and Homeland Security CIO to lead strategic vision and day-to-day operations.

πŸ“– Read

via "Dark Reading".
11:04
πŸ•΄ Avast Business Introduces Network Discovery for SMBs πŸ•΄

Avast's Network Discovery enables network administrators to easily analyze their entire IT network and deploy Avast Business security services.

πŸ“– Read

via "Dark Reading".
11:04
πŸ•΄ ThycoticCentrify Integrates Secret Server With Privileged Access Management Platform πŸ•΄

Combination avails Secret Server customers to a range of SaaS services.

πŸ“– Read

via "Dark Reading".
11:15
β€Ό CVE-2021-41872 β€Ό

Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
?
11:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Data breach at Colorado university impacts 30,000 students πŸ—“οΈ

Atlassian vulnerability believed to be attack vector

πŸ“– Read

via "The Daily Swig".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Microsoft warns of new supply chain attacks by Russian-backed Nobelium group 🦿

The cybercrime group behind the SolarWinds hack remains focused on the global IT supply chain, says Microsoft, with 140 resellers and service providers targeted since May.

πŸ“– Read

via "Tech Republic".
12:47
πŸ—“οΈ β€˜Professional cybercriminals’ blamed for DDoS attacks against UK telecoms providers πŸ—“οΈ

Packet in, says industry group

πŸ“– Read

via "The Daily Swig".
?
13:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41590 β€Ό

In Gradle Enterprise through 2021.3, probing of the server-side network environment can occur via an SMTP configuration test. The installation configuration user interface available to administrators allows testing the configured SMTP server settings. This test function can be used to identify the listening TCP ports available to the server, revealing information about the internal network environment.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2021-38379 β€Ό

The Hub in CFEngine Enterprise 3.6.7 through 3.18.0 has Insecure Permissions that allow local Information Disclosure.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2021-22101 β€Ό

Cloud Controller versions prior to 1.118.0 are vulnerable to unauthenticated denial of Service(DoS) vulnerability allowing unauthenticated attackers to cause denial of service by using REST HTTP requests with label_selectors on multiple V3 endpoints by generating an enormous SQL query.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2021-36756 β€Ό

CFEngine Enterprise 3.15.0 through 3.15.4 has Missing SSL Certificate Validation.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2020-24932 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Complaint Management System 1.0 via the cid parameter in complaint-details.php.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2021-41589 β€Ό

In Gradle Enterprise before 2021.3 (and Enterprise Build Cache Node before 10.0), there is potential cache poisoning and remote code execution when running the build cache node with its default configuration. This configuration allows anonymous access to the configuration user interface and anonymous write access to the build cache. If access control to the build cache is not changed from the default open configuration, a malicious actor with network access can populate the cache with manipulated entries that may execute malicious code as part of a build process. This applies to the build cache provided with Gradle Enterprise and the separate build cache node service if used. If access control to the user interface is not changed from the default open configuration, a malicious actor can undo build cache access control in order to populate the cache with manipulated entries that may execute malicious code as part of a build process. This does not apply to the build cache provided with Gradle Enterprise, but does apply to the separate build cache node service if used.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2021-41619 β€Ό

An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of these options, such as -XX:OnOutOfMemoryError, allow specifying a command to be run on the host. This can be abused to run arbitrary commands on the host, should an attacker gain administrative access to the application.

πŸ“– Read

via "National Vulnerability Database".
13:16
β€Ό CVE-2021-37221 β€Ό

A file upload vulnerability exists in Sourcecodester Customer Relationship Management System 1.0 via the account update option & customer create option, which could let a remote malicious user upload an arbitrary php file. .

πŸ“– Read

via "National Vulnerability Database".
?
13:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple Patches Critical iOS Bugs; One Under Attack ❌

Researchers found that one critical flaw in question is exploitable from the browser, allowing watering-hole attacks.

πŸ“– Read

via "Threat Post".
13:35
πŸ•΄ Cybercriminals Ramp Up Attacks on Web APIs πŸ•΄

As more organizations use application programming interfaces for Web applications, attacks and security incidents targeting APIs continue to grow.

πŸ“– Read

via "Dark Reading".
13:48
πŸ›  Zeek 4.1.1 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
14:02
❌ War-Driving Technique Allows Wi-Fi Password-Cracking at Scale ❌

A researcher was able to crack 70 percent of the gathered hashes in an experiment in a residential neighborhood.

πŸ“– Read

via "Threat Post".
14:05
πŸ•΄ 6 Eye-Opening Statistics About Software Supply Chain Security πŸ•΄

The latest facts and figures on the state of software supply chain security in the enterprise.

πŸ“– Read

via "Dark Reading".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Kaspersky Buys Brain4Net to Build SASE & XDR Tools πŸ•΄

Brain4Net builds tools to help enterprises and service providers add SD-WAN and NFV technologies to their existing infrastructure.

πŸ“– Read

via "Dark Reading".
15:16
β€Ό CVE-2021-37807 β€Ό

An SQL Injection vulneraility exists in https://phpgurukul.com Online Shopping Portal 3.1 via the email parameter on the /check_availability.php endpoint that serves as a checker whether a new user's email is already exist within the database.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-37803 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Online Covid Vaccination Scheduler System 1.0 via the username in lognin.php .

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-37808 β€Ό

SQL Injection vulnerabilities exist in https://phpgurukul.com News Portal Project 3.1 via the (1) category, (2) subcategory, (3) sucatdescription, and (4) username parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-20526 β€Ό

IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 198755.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-29774 β€Ό

IBM Jazz Team Server products could allow an authenticated user to obtain elevated privileges under certain configurations. IBM X-Force ID: 203025.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-29786 β€Ό

IBM Jazz Team Server products stores user credentials in clear text which can be read by an authenticated user. IBM X-Force ID: 203172.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-29844 β€Ό

IBM Jazz Team Server products is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-29673 β€Ό

IBM Jazz Team Server products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199482.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-29868 β€Ό

IBM i2 iBase 8.9.13 and 9.0.0 could allow a local attacker to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 206213.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-29713 β€Ό

IBM Jazz Team Server products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-37805 β€Ό

A Stored Cross Site Scripting (XSS) vunerability exists in Sourcecodeste Vehicle Parking Management System affected version 1.0 is via the add-vehicle.php endpoint.

πŸ“– Read

via "National Vulnerability Database".
15:16
β€Ό CVE-2021-37806 β€Ό

An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.

πŸ“– Read

via "National Vulnerability Database".
?
16:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Develop the skills required for an in-demand cybersecurity career 🦿

It's not necessary to spend a great deal of time or money to learn the skills required to work in some of the most exciting and highly paid positions in the tech industry.

πŸ“– Read

via "Tech Republic".
?
16:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Adobe’s Surprise Security Bulletin Dominated by Critical Patches ❌

Out of 92 security vulnerabilities, 66 are rated critical in severity, mostly allowing code execution. The most severe can lead to information disclosure.

πŸ“– Read

via "Threat Post".
16:35
πŸ•΄ Read Between the Lines: Finding Flaws in EPUB Reading Systems πŸ•΄

Security researchers who analyzed 97 free EPUB reading applications found half are not compliant with security recommendations.

πŸ“– Read

via "Dark Reading".
16:35
πŸ” iOS 14 Update Fixes Memory Corruption Zero Day πŸ”

Apple fixed CVE-2021-30883, a iOS zero day weeks ago in iOS 15. Now a patch has arrived for those still running iOS 14.

πŸ“– Read

via "".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-34756 β€Ό

Multiple vulnerabilities in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-40117 β€Ό

A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because incoming SSL/TLS packets are not properly processed. An attacker could exploit this vulnerability by sending a crafted SSL/TLS packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-40125 β€Ό

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34764 β€Ό

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an attacker to execute a cross-site scripting (XSS) attack or an open redirect attack. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34787 β€Ό

A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34790 β€Ό

Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34763 β€Ό

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an attacker to execute a cross-site scripting (XSS) attack or an open redirect attack. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34793 β€Ό

A vulnerability in the TCP Normalizer of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software operating in transparent mode could allow an unauthenticated, remote attacker to poison MAC address tables, resulting in a denial of service (DoS) vulnerability. This vulnerability is due to incorrect handling of certain TCP segments when the affected device is operating in transparent mode. An attacker could exploit this vulnerability by sending a crafted TCP segment through an affected device. A successful exploit could allow the attacker to poison the MAC address tables in adjacent devices, resulting in network disruption.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34762 β€Ό

A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to perform a directory traversal attack on an affected device. The attacker would require valid device credentials. The vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTPS request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the device.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34792 β€Ό

A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34781 β€Ό

A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to a lack of proper error handling when an SSH session fails to be established. An attacker could exploit this vulnerability by sending a high rate of crafted SSH connections to the instance. A successful exploit could allow the attacker to cause resource exhaustion, which causes a DoS condition on the affected device. The device must be manually reloaded to recover.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-40116 β€Ό

Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34755 β€Ό

Multiple vulnerabilities in the CLI of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands with root privileges. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34761 β€Ό

A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-40114 β€Ό

Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-40118 β€Ό

Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. These vulnerabilities are due to improper input validation when parsing HTTPS requests. An attacker could exploit these vulnerabilities by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34783 β€Ό

A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient validation of SSL/TLS messages when the device performs software-based SSL/TLS decryption. An attacker could exploit this vulnerability by sending a crafted SSL/TLS message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Datagram TLS (DTLS) messages cannot be used to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-3900 β€Ό

firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34794 β€Ό

A vulnerability in the Simple Network Management Protocol version 3 (SNMPv3) access control functionality of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to query SNMP data. This vulnerability is due to ineffective access control. An attacker could exploit this vulnerability by sending an SNMPv3 query to an affected device from a host that is not permitted by the SNMPv3 access control list. A successful exploit could allow the attacker to send an SNMP query to an affected device and retrieve information from the device. The attacker would need valid credentials to perform the SNMP query.

πŸ“– Read

via "National Vulnerability Database".
17:16
β€Ό CVE-2021-34791 β€Ό

Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.

πŸ“– Read

via "National Vulnerability Database".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Teen Rakes in $2.74M Worth of Bitcoin in Phishing Scam ❌

The kid was busted after abusing Google Ads to lure users to his fake gift card site.Β 

πŸ“– Read

via "Threat Post".
17:32
❌ Ransomware Attacks Are Evolving. Your Security Strategy Should, Too ❌

Defending against ransomware will take a move to zero-trust, argues Daniel Spicer, CSO, Ivanti.

πŸ“– Read

via "Threat Post".
?
18:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ QR Codes Help Attackers Sneak Emails Past Security Controls πŸ•΄

A recently discovered campaign shows how attackers are constantly developing new techniques to deceive phishing victims.

πŸ“– Read

via "Dark Reading".
?
19:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ WordPress Plugin Bug Lets Subscribers Wipe Sites ❌

The flaw, found in the Hashthemes Demo Importer plugin, allows any authenticated user to exsanguinate a vulnerable site, deleting nearly all database content and uploaded media.

πŸ“– Read

via "Threat Post".
19:05
πŸ•΄ Defenders Worry Orgs Are More Vulnerable Than Last Year πŸ•΄

Most IT and security leaders are confident their cybersecurity strategy is on the right track, but they still believe their organizations are as vulnerable as they were a year ago.

πŸ“– Read

via "Dark Reading".
19:16
β€Ό CVE-2021-25219 β€Ό

In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2021-1117 β€Ό

Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an attacker through specific configuration and with local unprivileged system access may cause improper input validation, which may lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2021-3901 β€Ό

firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2021-1115 β€Ό

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for private IOCTLs, where an attacker with local unprivileged system access may cause a NULL pointer dereference, which may lead to denial of service in a component beyond the vulnerable component.

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2021-41191 β€Ό

Roblox-Purchasing-Hub is an open source Roblox product purchasing hub. A security risk in versions 1.0.1 and prior allowed people who have someone's API URL to get product files without an API key. This issue is fixed in version 1.0.2. As a workaround, add `@require_apikey` in `BOT/lib/cogs/website.py` under the route for `/v1/products`.

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2021-1116 β€Ό

NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a NULL pointer dereference in the kernel, created within user mode code, may lead to a denial of service in the form of a system crash.

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2021-3903 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
19:16
β€Ό CVE-2020-21250 β€Ό

CSZ CMS v1.2.4 was discovered to contain an arbitrary file upload vulnerability in the component /core/MY_Security.php.

πŸ“– Read

via "National Vulnerability Database".
?
19:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple ships Monterey with security updates, fixes 0-day in Watch and TV products, updates iDevices ⚠

A slew of security bulletins from Apple HQ, including 37 bugs listed as fixed in the initial public release of macOS Monterey.

πŸ“– Read

via "Naked Security".
?
21:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ HelpSystems Acquires Digital Guardian, Extends DLP Capabilities πŸ•΄

The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.

πŸ“– Read

via "Dark Reading".
21:16
β€Ό CVE-2021-3906 β€Ό

bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type

πŸ“– Read

via "National Vulnerability Database".
21:16
β€Ό CVE-2021-3904 β€Ό

grav is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
28 October 2021
?
09:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-19810 β€Ό

Zoom Call Recording 6.3.1 from ZOOM International is vulnerable to Java Deserialization attacks targeting the inbuilt RMI service. A remote unauthenticated attacker can exploit this vulnerability by sending crafted RMI requests to execute arbitrary code on the target host.

πŸ“– Read

via "National Vulnerability Database".
?
09:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Grief Ransomware Targets NRA ❌

Grief, a ransomware group with ties to Russia-based Evil Corp, claims to have stolen data from the gun-rights group and has posted files on its dark web site.Β 

πŸ“– Read

via "Threat Post".
?
10:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep56: Cryptotrading rodent, ransomware hackback, and a Docusign phish [Podcast] ⚠

Latest episode - listen now! Serious security explained with personality in plain English.

πŸ“– Read

via "Naked Security".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ You've Just Been Ransomed ... Now What? πŸ•΄

Six crucial steps executives and IT teams should be prepared to take immediately after a ransomware attack.

πŸ“– Read

via "Dark Reading".
11:17
β€Ό CVE-2021-22475 β€Ό

There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22454 β€Ό

A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause core dump.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-36990 β€Ό

There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22462 β€Ό

A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22486 β€Ό

There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22458 β€Ό

A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22470 β€Ό

A component of the HarmonyOS has a Privileges Controls vulnerability. Local attackers may exploit this vulnerability to expand the Recording Trusted Domain.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22403 β€Ό

There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22464 β€Ό

A component of the HarmonyOS has a Out-of-bounds Read vulnerability. Local attackers may exploit this vulnerability to cause system Soft Restart.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22278 β€Ό

A certificate validation vulnerability in PCM600 Update Manager allows attacker to get unwanted software packages to be installed on computer which has PCM600 installed.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22474 β€Ό

There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22488 β€Ό

There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22481 β€Ό

There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-36988 β€Ό

There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22485 β€Ό

There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22490 β€Ό

There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22472 β€Ό

There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22471 β€Ό

A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause nearby process crash.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-36987 β€Ό

There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart.

πŸ“– Read

via "National Vulnerability Database".
11:17
β€Ό CVE-2021-22473 β€Ό

There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22450 β€Ό

A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22466 β€Ό

A component of the HarmonyOS has a Use After Free vulnerability. Local attackers may exploit this vulnerability to cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-37748 β€Ό

Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22436 β€Ό

There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-37002 β€Ό

There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22404 β€Ό

There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22401 β€Ό

There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-36995 β€Ό

There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22456 β€Ό

A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel System unavailable.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22457 β€Ό

A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to cause out-of-bounds write.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22455 β€Ό

A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause the memory which is not released.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22487 β€Ό

There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22459 β€Ό

A component of the HarmonyOS has a NULL Pointer Dereference vulnerability. Local attackers may exploit this vulnerability to cause System functions which are unavailable.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22407 β€Ό

There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22405 β€Ό

There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22452 β€Ό

A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-36991 β€Ό

There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22402 β€Ό

There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22451 β€Ό

A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-22406 β€Ό

There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly.

πŸ“– Read

via "National Vulnerability Database".
?
11:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Critical flaw in GoCD provides platform for supply chain attacks πŸ—“οΈ

Vulnerability in software used by Fortune 500 firms raises fears of SolarWinds-like impact

πŸ“– Read

via "The Daily Swig".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to prepare your team to address a significant security issue 🦿

As you work to resolve a security issue, technical knowledge is necessaryβ€”and a team with a broad base of expertise is invaluable.

πŸ“– Read

via "Tech Republic".
12:17
πŸ—“οΈ WordPress plugin vulnerability opened up one million sites to remote takeover πŸ—“οΈ

Gaping OptinMonster security hole patched

πŸ“– Read

via "The Daily Swig".
?
12:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  TOR Virtual Network Tunneling Tool 0.4.6.8 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
13:03
❌ EU’s Green Pass Vaccination ID Private Key Leaked ❌

The private key used to sign the vaccine passports was leaked and is being passed around to create fake passes for the likes of Mickey Mouse and Adolf Hitler.

πŸ“– Read

via "Threat Post".
13:17
β€Ό CVE-2021-3823 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects: Bitdefender GravityZone versions prior to 3.3.8.249.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2020-22312 β€Ό

A cross-site scripting (XSS) vulnerability was discovered in the OJ/admin-tool /cal_scores.php function of HZNUOJ v1.0.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2018-1105 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2021-3576 β€Ό

Execution with Unnecessary Privileges vulnerability in Bitdefender Endpoint Security Tools, Total Security allows a local attacker to elevate to 'NT AUTHORITY\System. Impersonation enables the server thread to perform actions on behalf of the client but within the limits of the client's security context. This issue affects: Bitdefender Endpoint Security Tools versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 25.0.26.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2021-37254 β€Ό

In M-Files Web product with versions before 20.10.9524.1 and 20.10.9445.0, a remote attacker could use a flaw to obtain unauthenticated access to 3rd party component license key information on server.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2021-41728 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Sourcecodester News247 CMS 1.0 via the search function in articles.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2021-3579 β€Ό

Incorrect Default Permissions vulnerability in the bdservicehost.exe and Vulnerability.Scan.exe components as used in Bitdefender Endpoint Security Tools for Windows, Total Security allows a local attacker to elevate privileges to NT AUTHORITY\SYSTEM This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 7.2.1.65.

πŸ“– Read

via "National Vulnerability Database".
13:17
β€Ό CVE-2018-14640 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Security Lessons Learned From the Kaseya Ransomware Attack πŸ•΄

Organizations can better prepare themselves and their customers for these attacks with some strategies to identify threats before they become a widespread issue.

πŸ“– Read

via "Dark Reading".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-22097 β€Ό

In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.

πŸ“– Read

via "National Vulnerability Database".
15:17
β€Ό CVE-2021-22044 β€Ό

In Spring Cloud OpenFeign 3.0.0 to 3.0.4, 2.2.0.RELEASE to 2.2.9.RELEASE, and older unsupported versions, applications using type-level `@RequestMapping`annotations over Feign client interfaces, can be involuntarily exposing endpoints corresponding to `@RequestMapping`-annotated interface methods.

πŸ“– Read

via "National Vulnerability Database".
15:17
β€Ό CVE-2021-22047 β€Ό

In Spring Data REST versions 3.4.0 - 3.4.13, 3.5.0 - 3.5.5, and older unsupported versions, HTTP resources implemented by custom controllers using a configured base API path and a controller type-level request mapping are additionally exposed under URIs that can potentially be exposed for unauthorized access depending on the Spring Security configuration.

πŸ“– Read

via "National Vulnerability Database".
15:17
β€Ό CVE-2021-22096 β€Ό

In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.

πŸ“– Read

via "National Vulnerability Database".
15:17
β€Ό CVE-2020-7875 β€Ό

DEXT5 Upload 5.0.0.117 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.

πŸ“– Read

via "National Vulnerability Database".
15:17
β€Ό CVE-2021-3745 β€Ό

flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type

πŸ“– Read

via "National Vulnerability Database".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What is Phishing? Common Attacks & How to Avoid Them πŸ”

The goal of nearly every phishing attempt is to steal information but attacks can come in different forms. In today's blog, we break down common phishing types, tactics and 50 examples of phishing attacks.

πŸ“– Read

via "".
16:36
πŸ•΄ US to Create Diplomatic Bureau to Lead Cybersecurity Policy πŸ•΄

As part of its modernization initiative, the Department of State will increase its IT budget by 50% and add a new bureau to lead cybersecurity and digital policy.

πŸ“– Read

via "Dark Reading".
16:36
πŸ•΄ Stop Zero-Day Ransomware Cold With AI πŸ•΄

AI can help recognize ransomware attacks and stop them at computer speed.

πŸ“– Read

via "Dark Reading".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-10005 β€Ό

A resource exhaustion issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. An attacker in a privileged network position may be able to perform denial of service.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30814 β€Ό

A memory corruption issue was addressed with improved input validation. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted image may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2020-25422 β€Ό

A cross site scripting (XSS) vulnerability in menuedit.php of Mara CMS 7.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30840 β€Ό

This issue was addressed with improved checks. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted dfont file may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30808 β€Ό

This issue was addressed with improved checks. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. A malicious application may be able to modify protected parts of the file system.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30834 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, watchOS 8, Security Update 2021-007 Catalina. Processing a malicious audio file may result in unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30813 β€Ό

This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. A person with access to a host Mac may be able to bypass the Login Window in Remote Desktop for a locked instance of macOS.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30823 β€Ό

A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2020-9897 β€Ό

An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1. Processing a maliciously crafted PDF may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-1821 β€Ό

A logic issue was addressed with improved state management. This issue is fixed in watchOS 7.6, macOS Big Sur 11.5. Visiting a maliciously crafted webpage may lead to a system denial of service.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30821 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30836 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30824 β€Ό

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30818 β€Ό

A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2020-29629 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to read restricted memory.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30809 β€Ό

A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30817 β€Ό

A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.5. A malicious application may be able to access data about the accounts the user is using Family Sharing with.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30831 β€Ό

An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted font may result in the disclosure of process memory.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30816 β€Ό

The issue was addressed with improved permissions logic. This issue is fixed in iOS 15 and iPadOS 15. An attacker with physical access to a device may be able to see private contact information.

πŸ“– Read

via "National Vulnerability Database".
17:17
β€Ό CVE-2021-30833 β€Ό

This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. Unpacking a maliciously crafted archive may allow an attacker to write arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
?
17:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Suspected REvil Gang Insider Identified ❌

German investigators have identified a deep-pocketed, big-spending Russian billionaire whom they suspect of being a core member of the REvil ransomware gang.

πŸ“– Read

via "Threat Post".
17:36
πŸ•΄ NSA-CISA Series on Securing 5G Cloud Infrastructures πŸ•΄

CISA encourages 5G providers, integrators, and network operators to review the guidance and consider the recommendations.

πŸ“– Read

via "Dark Reading".
17:36
πŸ•΄ Tech Companies Create Security Baseline for Enterprise Software πŸ•΄

The Minimum Viable Secure Product is written as a checklist of minimum-security requirements for business-to-business software.

πŸ“– Read

via "Dark Reading".
17:36
πŸ•΄ Ordr Unveils Cybersecurity Innovations and Ransom-Aware Rapid Assessment Service to Expand Its Leadership In Connected Device Security πŸ•΄

Enhanced ransomware detection, visualization of ransomware communications, and risk customization helps organizations respond to cyberattacks in minutes.

πŸ“– Read

via "Dark Reading".
?
18:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ICS Security Firm Dragos Reaches $1.7B Valuation in Latest Funding Round πŸ•΄

The $200M Series D represents the company's largest funding round to date.

πŸ“– Read

via "Dark Reading".
?
18:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SEO Poisoning Used to Distribute Ransomware πŸ•΄

This tactic β€” used to distribute REvil ransomware and the SolarMarker backdoor β€” is part of a broader increase in such attacks in recent months, researchers say.

πŸ“– Read

via "Dark Reading".
?
19:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ All Sectors Are Now Prey as Cyber Threats Expand Targeting ❌

Aamir Lakhani, security researcher at Fortinet, says no sector is off limits these days: It's time for everyone to strengthen the kill chain.

πŸ“– Read

via "Threat Post".
?
19:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36547 β€Ό

A remote code execution (RCE) vulnerability in the component /codebase/dir.php?type=filenew of Mara v7.5 allows attackers to execute arbitrary commands via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-36551 β€Ό

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-36550 β€Ό

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-36548 β€Ό

A remote code execution (RCE) vulnerability in the component /admin/index.php?id=themes&action=edit_template&filename=blog of Monstra v3.0.4 allows attackers to execute arbitrary commands via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-41194 β€Ό

FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs.

πŸ“– Read

via "National Vulnerability Database".
?
20:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft Edge finally arrives on Linux – β€œOfficial” build lands in repos ⚠

Microsoft Edge for Linux makes an Official landing.

πŸ“– Read

via "Naked Security".
?
20:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 6 Ways to Rewrite the Impossible Job Description πŸ•΄

It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.

πŸ“– Read

via "Dark Reading".
?
21:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-23549 β€Ό

IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted .cr2 file, related to a "Data from Faulting Address controls Branch Selection starting at FORMATS!GetPlugInInfo+0x00000000000047f6".

πŸ“– Read

via "National Vulnerability Database".
21:22
β€Ό CVE-2020-23546 β€Ό

IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted XBM file, related to a "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FORMATS!ReadMosaic+0x0000000000000981.

πŸ“– Read

via "National Vulnerability Database".
29 October 2021
?
07:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ β€˜Inaction isn’t an option’ – US lawmakers back mandatory standards for transport and logistics cybersecurity πŸ—“οΈ

House Committee on Homeland Security hearing pulls focus on securing β€˜planes, trains, and pipelines’

πŸ“– Read

via "The Daily Swig".
?
09:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-31624 β€Ό

Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter.

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2020-22079 β€Ό

Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg.

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2021-31862 β€Ό

SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.

πŸ“– Read

via "National Vulnerability Database".
09:18
β€Ό CVE-2021-31627 β€Ό

Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter.

πŸ“– Read

via "National Vulnerability Database".
?
09:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Google, Salesforce, others team up to launch MVSP security baseline project πŸ—“οΈ

The collaboration is focused on creating a vendor-neutral security standard

πŸ“– Read

via "The Daily Swig".
?
10:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Microsoft documents β€œSHROOTLESS” hack patched in latest Apple updates ⚠

We'd have called this bug "SHROOTMORE", but naming it wasn't our call.

πŸ“– Read

via "Naked Security".
10:48
πŸ—“οΈ Trickbot arrest: Russian national extradited to US for alleged role in developing notorious banking trojan πŸ—“οΈ

Vladimir Dunaev made his first appearance in federal court this week

πŸ“– Read

via "The Daily Swig".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Finding the Right Approach to Cloud Security Posture Management (CSPM) πŸ•΄

Cloud security is maturing β€” it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.

πŸ“– Read

via "Dark Reading".
11:18
β€Ό CVE-2021-3441 β€Ό

A potential security vulnerability has been identified for the HP OfficeJet 7110 Wide Format ePrinter that enables Cross-Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2021-3662 β€Ό

Certain HP Enterprise LaserJet and PageWide MFPs may be vulnerable to stored cross site scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2021-22037 β€Ό

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.

πŸ“– Read

via "National Vulnerability Database".
11:18
β€Ό CVE-2021-22038 β€Ό

On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers.

πŸ“– Read

via "National Vulnerability Database".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Treehouse of Security Horrors πŸ•΄

True-life horrors from conversations with software engineers and developers. D'oh!

πŸ“– Read

via "Dark Reading".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Google Chrome is Abused to Deliver Malware as β€˜Legit’ Win 10 App ❌

Malware delivered via a compromised website on Chrome browsers can bypass User Account Controls to infect systems and steal sensitive data, such as credentials and cryptocurrency.

πŸ“– Read

via "Threat Post".
12:37
πŸ•΄ What Exactly Is Secure Access Service Edge (SASE)? πŸ•΄

Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach.

πŸ“– Read

via "Dark Reading".
12:48
πŸ—“οΈ All Day DevOps 2021: Securing the software supply chain with ephemerality and the least-privilege principle πŸ—“οΈ

β€˜The new boundary for systems engineering is how ephemeral can you make any given process with a privilege’

πŸ“– Read

via "The Daily Swig".
?
13:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41186 β€Ό

Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don't use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2021-35237 β€Ό

A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server.

πŸ“– Read

via "National Vulnerability Database".
13:18
β€Ό CVE-2021-39179 β€Ό

DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ - exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user - the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade.

πŸ“– Read

via "National Vulnerability Database".
13:21
πŸ›  GRAudit Grep Auditing Tool 3.2 πŸ› 

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility, grep. It's comparable to other static analysis applications like RATS, SWAAT, and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

πŸ“– Read

via "Packet Storm Security".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cybercriminals Take Aim at Connected Car Infrastructure πŸ•΄

While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.

πŸ“– Read

via "Dark Reading".
14:48
πŸ” Friday Five 10/29 πŸ”

Apple fixes a critical SIP bypass and personal data protection becomes a fundamental right in Brazil - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3756 β€Ό

libmysofa is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-41674 β€Ό

An SQL Injection vulnerability exists in Sourcecodester E-Negosyo System 1.0 via the user_email parameter in /admin/login.php.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-41643 β€Ό

Remote Code Execution (RCE) vulnerability exists in Sourcecodester Church Management System 1.0 via the image upload field.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-41675 β€Ό

A Remote Code Execution (RCE) vulnerabilty exists in Sourcecodester E-Negosyo System 1.0 in /admin/produts/controller.php via the doInsert function, which validates images with getImageSizei. .

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-41645 β€Ό

Remote Code Execution (RCE) vulnerability exists in Sourcecodester Budget and Expense Tracker System 1.0 that allows a remote malicious user to inject arbitrary code via the image upload field. .

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-41676 β€Ό

An SQL Injection vulnerabilty exists in the oretnom23 Pharmacy Point of Sale System 1.0 in the login function in actions.php.

πŸ“– Read

via "National Vulnerability Database".
15:18
β€Ό CVE-2021-41644 β€Ό

Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters.

πŸ“– Read

via "National Vulnerability Database".
?
17:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41748 β€Ό

An Incorrect Access Control issue exists in all versions of Portainer.via an unauthorized access vulnerability. The vulnerability is also CNVD-2021-49547

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2021-41646 β€Ό

Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2021-41746 β€Ό

SQL Injection vulnerability exists in all versions of Yonyou TurboCRM.via the orgcode parameter in changepswd.php. Attackers can use the vulnerabilities to obtain sensitive database information.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2021-41874 β€Ό

An unauthorized access vulnerabiitly exists in all versions of Portainer, which could let a malicious user obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
17:18
β€Ό CVE-2021-41189 β€Ό

DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in 7.0 and does not impact 6.x or below. This issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings.

πŸ“– Read

via "National Vulnerability Database".
?
17:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybercrime: Europol arrests 12 people for ransomware activities possibly affecting 1,800 victims in 71 countries 🦿

The European police force stated the ransomware activities targeted critical infrastructures and mostly large corporations.

πŸ“– Read

via "Tech Republic".
?
18:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm πŸ•΄

A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.

πŸ“– Read

via "Dark Reading".
?
18:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Snyk Agrees to Acquire CloudSkiff, Creators of driftctl πŸ•΄

New capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift.

πŸ“– Read

via "Dark Reading".
?
19:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-1121 β€Ό

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel driver, where a vGPU can cause resource starvation among other vGPUs hosted on the same GPU, which may lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2020-25881 β€Ό

A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-1120 β€Ό

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a string provided by the guest OS may not be properly null terminated. The guest OS or attacker has no ability to push content to the plugin through this vulnerability, which may lead to information disclosure, data tampering, unauthorized code execution, and denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2020-25872 β€Ό

A vulnerability exists within the FileManagerController.php function in FrogCMS 0.9.5 which allows an attacker to perform a directory traversal attack via a GET request urlencode parameter.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-1119 β€Ό

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can double-free a pointer, which may lead to denial of service. This flaw may result in a write-what-where condition, allowing an attacker to execute arbitrary code impacting integrity and availability.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-1122 β€Ό

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-1118 β€Ό

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to execute privileged operations by the guest OS, which may lead to information disclosure, data tampering, escalation of privileges, and denial of service

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2021-1123 β€Ό

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can deadlock, which may lead to denial of service.

πŸ“– Read

via "National Vulnerability Database".
19:18
β€Ό CVE-2020-25873 β€Ό

A directory traversal vulnerability in the component system/manager/class/web/database.php was discovered in Baijiacms V4 which allows attackers to arbitrarily delete folders on the server via the "id" parameter.

πŸ“– Read

via "National Vulnerability Database".
19:21
β™ŸοΈ Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018 β™ŸοΈ

In December 2018, bling vendor Signet Jewelers fixed a weakness in their Kay Jewelers and Jared websites that exposed the order information for all of their online customers. This week, Signet subsidiary Zales.com updated its website to remediate a nearly identical customer data exposure.

πŸ“– Read

via "Krebs on Security".
?
20:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Europol announce β€œtargeting” of 12 suspects in ransomware attacks ⚠

More anti-ransomware activity by law enforcement, this time in Switzerland and Ukraine.

πŸ“– Read

via "Naked Security".
30 October 2021
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Enterprises Allocating More IT Dollars on Cybersecurity πŸ•΄

Enterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows.

πŸ“– Read

via "Dark Reading".
?
11:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36808 β€Ό

A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115.

πŸ“– Read

via "National Vulnerability Database".
?
21:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ IT Pro News in Review: SolarWinds cyber attack, AWS deal with MI5, UK VoIP providers under attack πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
21:29
πŸ“’ Avast launches premium browser with built-in VPN πŸ“’

Avast Secure Browser Pro is available now on Windows 10, iOS and Android

πŸ“– Read

via "ITPro".
21:29
πŸ“’ 70% of IT workers skip key security steps due to work pressures πŸ“’

Report finds that a fifth of DevOps and security professionals have considered quitting their jobs due to stress

πŸ“– Read

via "ITPro".
21:29
πŸ“’ BlackMatter ransomware victims reclaim data using secret decryptor πŸ“’

Emsisoft discovered a critical flaw in the ransomware that allowed them to help victims recover their files

πŸ“– Read

via "ITPro".
21:29
πŸ“’ What is your digital footprint? πŸ“’

Your digital footprint is always growing – so we explore how you can keep it under control

πŸ“– Read

via "ITPro".
21:29
πŸ“’ What is Emotet? πŸ“’

A deep dive into malware's most infamous and prolific strain

πŸ“– Read

via "ITPro".
21:29
πŸ“’ Ransomware hit industrial sector the hardest in the third quarter πŸ“’

Cyber criminals are now also targeting the technology sector, which saw a 30% rise in attack volume

πŸ“– Read

via "ITPro".
21:30
πŸ“’ F-Secure Safe review: Simple security struggles to outdo Defender πŸ“’

F-Secure Safe doesn’t have the protection or features to stand out against its rivals.

πŸ“– Read

via "ITPro".
21:30
πŸ“’ BillQuick billing software exploit lets hackers deploy ransomware πŸ“’

The now-patched critical zero-day vulnerability also leaked sensitive data from the time and billing platform

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Telstra to acquire Digicel Pacific for $1.6 billion with help from government πŸ“’

The deal is being called a 'political buy' to counter Chinese influence in the region

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Tesco services knocked offline after suspected cyber attack πŸ“’

Customers were left unable to make or cancel orders, or amend their scheduled deliveries

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Microsoft to work with community colleges to fill 250,000 cyber security roles πŸ“’

Free course materials will be supplied to every community college in the US

πŸ“– Read

via "ITPro".
21:30
πŸ“’ DDoS attacks are crippling UK VoIP operators πŸ“’

Businesses and emergency services are among customers hit by outages at VoIP firms

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Critical macOS vulnerability found to bypass SIP restrictions πŸ“’

The flawΒ lies in how the OS handles software packagesΒ and post-installation scripts

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Australian Federal Police plots "aggressive" cyber division following law change πŸ“’

New powers allow law enforcement to launch disruptive operations and collect data on suspected criminals

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Luxury hotel chain hit twice by hackers after reneging on ransomware payment πŸ“’

The group claims to have information belonging to millions of customers who stayed at Centara hotels and resorts between 2003 and 2021

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Microsoft resellers warned of Nobelium attacks on IT supply chain πŸ“’

Microsoft believes that 22,868 attacks have been conducted against 609 partners since July

πŸ“– Read

via "ITPro".
21:30
πŸ“’ UK gov must act now to regulate Facebook, says whistleblower πŸ“’

Frances Haugen told members of the Online Safety Bill committee that the social network "is closing the door on us being able to act”

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Critical vulnerability discovered in popular CI/CD framework πŸ“’

Flaw in GoCD software delivery pipeline thought to have affected a host of NGOs and Fortune 500 companies

πŸ“– Read

via "ITPro".
21:30
πŸ“’ Ransomware gang claims to have hacked the NRA πŸ“’

β€œGrief" gang says it has already leaked some of its stolen data to the dark web

πŸ“– Read

via "ITPro".
31 October 2021
?
17:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25912 β€Ό

A XML External Entity (XXE) vulnerability was discovered in symphony\lib\toolkit\class.xmlelement.php in Symphony 2.7.10 which can lead to an information disclosure or denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
17:20
β€Ό CVE-2020-25911 β€Ό

A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
17:20
β€Ό CVE-2021-33259 β€Ό

Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history.

πŸ“– Read

via "National Vulnerability Database".
1 November 2021
?
06:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ β€˜Trojan Source’ Bug Threatens the Security of All Code β™ŸοΈ

Virtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities into any software without being detected, new research released today warns. The vulnerability disclosure was coordinated with multiple organizations, some of whom are now releasing updates to address the security weakness.

πŸ“– Read

via "Krebs on Security".
?
07:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-24789 β€Ό

The Flat Preloader WordPress plugin before 1.5.5 does not escape some of its settings when outputting them in attribute in the frontend, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
07:20
β€Ό CVE-2018-25019 β€Ό

The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server

πŸ“– Read

via "National Vulnerability Database".
07:20
β€Ό CVE-2021-24793 β€Ό

The WPeMatico RSS Feed Fetcher WordPress plugin before 2.6.12 does not escape the Feed URL added to a campaign before outputting it in an attribute, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
07:20
β€Ό CVE-2021-24799 β€Ό

The Far Future Expiry Header WordPress plugin before 1.5 does not have CSRF check when saving its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.

πŸ“– Read

via "National Vulnerability Database".
07:20
β€Ό CVE-2021-24742 β€Ό

The Logo Slider and Showcase WordPress plugin before 1.3.37 allows Editor users to update the plugin's settings via the rtWLSSettings AJAX action because it uses a nonce for authorisation instead of a capability check.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24570 β€Ό

The Accept Donations with PayPal WordPress plugin before 1.3.1 offers a function to create donation buttons, which internally are posts. The process to create a new button is lacking a CSRF check. An attacker could use this to make an authenticated admin create a new button. Furthermore, one of the Button field is not escaped before being output in an attribute when editing a Button, leading to a Stored Cross-Site Scripting issue as well.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24624 β€Ό

The MP3 Audio Player for Music, Radio & Podcast by Sonaar WordPress plugin before 2.4.2 does not properly sanitize or escape data in some of its Playlist settings, allowing high privilege users to perform Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24682 β€Ό

The Cool Tag Cloud WordPress plugin before 2.26 does not escape the style attribute of the cool_tag_cloud shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24794 β€Ό

The Connections Business Directory WordPress plugin before 10.4.3 does not escape the Address settings when creating an Entry, which could allow high privilege users to perform Cross-Site Scripting when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24572 β€Ό

The Accept Donations with PayPal WordPress plugin before 1.3.1 provides a function to create donation buttons which are internally stored as posts. The deletion of a button is not CSRF protected and there is no control to check if the deleted post was a button post. As a result, an attacker could make logged in admins delete arbitrary posts

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24715 β€Ό

The WP Sitemap Page WordPress plugin before 1.7.0 does not properly sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24809 β€Ό

The BP Better Messages WordPress plugin before 1.9.9.41 does not check for CSRF in multiple of its AJAX actions: bp_better_messages_leave_chat, bp_better_messages_join_chat, bp_messages_leave_thread, bp_messages_mute_thread, bp_messages_unmute_thread, bp_better_messages_add_user_to_thread, bp_better_messages_exclude_user_from_thread. This could allow attackers to make logged in users do unwanted actions

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-40348 β€Ό

Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24770 β€Ό

The Stylish Price List WordPress plugin before 6.9.1 does not perform capability checks in its spl_upload_ser_img AJAX action (available to authenticated users), which could allow any authenticated users, such as subscriber, to upload arbitrary images.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24773 β€Ό

The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24685 β€Ό

The Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload)

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2020-36505 β€Ό

The Delete All Comments Easily WordPress plugin through 1.3 is lacking Cross-Site Request Forgery (CSRF) checks, which could result in an unauthenticated attacker making a logged in admin delete all comments from the blog.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-24716 β€Ό

The Modern Events Calendar Lite WordPress plugin before 5.22.3 does not properly sanitize or escape values set by users with access to adjust settings withing wp-admin.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2021-41973 β€Ό

In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.

πŸ“– Read

via "National Vulnerability Database".
07:21
β€Ό CVE-2020-36503 β€Ό

The Connections Business Directory WordPress plugin before 9.7 does not validate or sanitise some connections' fields, which could lead to a CSV injection issue

πŸ“– Read

via "National Vulnerability Database".
?
09:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-27644 β€Ό

In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)

πŸ“– Read

via "National Vulnerability Database".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Understanding the Human Communications Attack Surface πŸ•΄

Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.

πŸ“– Read

via "Dark Reading".
11:21
β€Ό CVE-2021-25874 β€Ό

AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior is affected by a SQL Injection SQL injection in the catName parameter which allows a remote unauthenticated attacker to retrieve databases information such as application passwords hashes.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-22563 β€Ό

Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-22564 β€Ό

For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-27004 β€Ό

System Manager 9.x versions 9.7 and higher prior to 9.7P16, 9.8P7 and 9.9.1P2 are susceptible to a vulnerability which could allow a local attacker to discover plaintext iSCSI CHAP credentials.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-25876 β€Ό

AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the u parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-25877 β€Ό

AVideo/YouPHPTube 10.0 and prior is affected by Insecure file write. An administrator privileged user is able to write files on filesystem using flag and code variables in file save.php.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-25875 β€Ό

AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the searchPhrase parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-25878 β€Ό

AVideo/YouPHPTube 10.0 and prior is affected by multiple reflected Cross Script Scripting vulnerabilities via the videoName parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.

πŸ“– Read

via "National Vulnerability Database".
11:21
β€Ό CVE-2021-42557 β€Ό

In Jeedom through 4.1.19, a bug allows a remote attacker to bypass API access and retrieve users credentials.

πŸ“– Read

via "National Vulnerability Database".
11:34
πŸ—“οΈ Ransomware cybercriminals linked to Norsk Hydro attack fall prey to Europol swoop πŸ—“οΈ

Two-year investigation results in interrogation of β€˜high-value’ targets and seizure of cash and computers

πŸ“– Read

via "The Daily Swig".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for November 2021 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
13:16
🦿 10 ways ransomware attackers pressure you to pay the ransom 🦿

Attackers will vow to publicly release the stolen data, try to delete any backups and even deploy DDoS attacks to convince victims to give in to the ransom demands, says Sophos.

πŸ“– Read

via "Tech Republic".
13:21
β€Ό CVE-2021-3704 β€Ό

Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow a Denial of Service on the device.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2021-38847 β€Ό

S-Cart v6.4.1 and below was discovered to contain an arbitrary file upload vulnerability in the Editor module on the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted IMG file.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2021-3440 β€Ό

HP Print and Scan Doctor, an application within the HP Smart App for Windows, is potentially vulnerable to local elevation of privilege.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2021-27005 β€Ό

Clustered Data ONTAP versions 9.6 and higher prior to 9.6P16, 9.7P16, 9.8P7 and 9.9.1P3 are susceptible to a vulnerability which could allow a remote attacker to cause a crash of the httpd server.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2021-29212 β€Ό

A remote unauthenticated directory traversal security vulnerability has been identified in HPE iLO Amplifier Pack versions 1.80, 1.81, 1.90 and 1.95. The vulnerability could be remotely exploited to allow an unauthenticated user to run arbitrary code leading complete impact to confidentiality, integrity, and availability of the iLO Amplifier Pack appliance.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2021-3705 β€Ό

Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow an unauthorized user to reconfigure, reset the device.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2021-29213 β€Ό

A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server's system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity.

πŸ“– Read

via "National Vulnerability Database".
13:21
β€Ό CVE-2020-28702 β€Ό

A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information.

πŸ“– Read

via "National Vulnerability Database".
?
14:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜Trojan Source’ Hides Invisible Bugs in Source Code ❌

The old RLO trick of exploiting how Unicode handles script ordering and a related homoglyph attack can imperceptibly switch the real name of malware.

πŸ“– Read

via "Threat Post".
14:04
πŸ—“οΈ Multiple flaws in telecoms stack software FreeSwitch uncovered πŸ—“οΈ

Authentication and denial of service risks for DIY PBX tech patched

πŸ“– Read

via "The Daily Swig".
?
15:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Edge Toon: Parting Thoughts πŸ•΄

Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
15:21
β€Ό CVE-2021-26740 β€Ό

Arbitrary file upload vulnerability sysupload.php in millken doyocms 2.3 allows attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
15:21
β€Ό CVE-2021-26739 β€Ό

SQL Injection vulnerability in pay.php in millken doyocms 2.3, allows attackers to execute arbitrary code, via the attribute parameter.

πŸ“– Read

via "National Vulnerability Database".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Virtual Conferencing Software Must Improve Data Protection, Regulators Warn πŸ”

Following an investigation, six countries and four companies outlined best practices for mitigating privacy risks in video conferencing apps.

πŸ“– Read

via "".
?
17:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42917 β€Ό

Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.

πŸ“– Read

via "National Vulnerability Database".
17:36
❌ Pirate Sports Streamer Gets Busted, Pivots to MLB Extortion ❌

An alleged sports content pirate is accused of not only hijacking leagues' streams but also threatening to tell reporters how he accessed their systems.

πŸ“– Read

via "Threat Post".
17:47
πŸ•΄ Free Tool Scans Web Servers for Vulnerability to HTTP Header-Smuggling Attacks πŸ•΄

A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.

πŸ“– Read

via "Dark Reading".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SonicWall: 'The Year of Ransomware' Continues with Unprecedented Late-Summer Surge πŸ•΄

2021 will be the most costly and dangerous year on record.

πŸ“– Read

via "Dark Reading".
18:17
πŸ•΄ New 'Trojan Source' Method Lets Attackers Hide Vulns in Source Code πŸ•΄

Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.

πŸ“– Read

via "Dark Reading".
?
19:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zscaler’s 2021 Encrypted Attacks Report Reveals 314% Spike in HTTPS Threats πŸ•΄

Massive increase in cyberattacks targeting technology and retail industries confirms immediate need for zero-trust security

πŸ“– Read

via "Dark Reading".
19:17
πŸ•΄ CISA and Partners Coordinate on Security, Combatting Misinformation for Election Day πŸ•΄

CISA will host an election situational awareness room to coordinate with federal partners, state and local election officials, private sector election partners, and political organizations to share real-time information and provide support as needed.

πŸ“– Read

via "Dark Reading".
19:21
β€Ό CVE-2021-39341 β€Ό

The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-31849 β€Ό

SQL injection vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker logged into ePO as an administrator to inject arbitrary SQL into the ePO database through the user management section of the DLP ePO extension.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-20136 β€Ό

ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an attacker-controlled database and to force Log360 to restart. An attacker can leverage this vulnerability to achieve remote code execution by replacing files executed by Log360 on startup.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-39340 β€Ό

The Notification WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/src/classes/Utils/Settings.php file which made it possible for attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 7.2.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-31848 β€Ό

Cross site scripting (XSS) vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker to highjack an active DLP ePO administrator session by convincing the logged in administrator to click on a carefully crafted link in the case management part of the DLP ePO extension.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-38356 β€Ό

The NextScripts: Social Networks Auto-Poster <= 4.3.20 WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $_REQUEST['page'] parameter which is echoed out on inc/nxs_class_snap.php by supplying the appropriate value 'nxssnap-post' to load the page in $_GET['page'] along with malicious JavaScript in $_POST['page'].

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-39346 β€Ό

The Google Maps Easy WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.9.33. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2021-39333 β€Ό

The Hashthemes Demo Importer Plugin <= 1.1.1 for WordPress contained several AJAX functions which relied on a nonce which was visible to all logged-in users for access control, allowing them to execute a function that truncated nearly all database tables and removed the contents of wp-content/uploads.

πŸ“– Read

via "National Vulnerability Database".
19:21
β€Ό CVE-2018-10909 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
19:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How AI-Driven Security Analytics Speeds Up Enterprise Defense πŸ•΄

Fresh off a $250 million Series E round, Devo Technology plans to expand the core security analytics platform with new features to help enterprise defenders work with security data faster and more effectively.

πŸ“– Read

via "Dark Reading".
?
21:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43058 β€Ό

An open redirect vulnerability exists in Replicated Classic versions prior to 2.53.1 that could lead to spoofing. To exploit this vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link, redirecting the user to an untrusted site.

πŸ“– Read

via "National Vulnerability Database".
21:34
β€Ό CVE-2021-41187 β€Ό

DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL injection security vulnerability has been found in specific versions of DHIS2. This vulnerability affects the API endpoints for /api/trackedEntityInstances and api/events in DHIS2. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. However, we strongly recommend that all DHIS2 implementations using versions 2.32, 2.33, 2.34, 2.35 and 2.36 install these patches as soon as possible. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the /api/trackedEntityInstance and /api/events endpoints as a temporary workaround while waiting to upgrade.

πŸ“– Read

via "National Vulnerability Database".
21:37
β€Ό CVE-2021-41310 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1.

πŸ“– Read

via "National Vulnerability Database".
21:37
❌ Office 365 Phishing Campaign Uses Kaspersky’s Amazon SES Token ❌

It's a legitimate access token, stolen from a third-party contractor, that lets the attackers send phishing emails from kaspersky.com email addresses.

πŸ“– Read

via "Threat Post".
2 November 2021
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-35249 β€Ό

Cross Site Scripting (XSS) vulnerability in ElkarBackup 1.3.3, allows attackers to execute arbitrary code via the name parameter to the add client feature.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-33611 β€Ό

Missing output sanitization in test sources in org.webjars.bowergithub.vaadin:vaadin-menu-bar versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-27722 β€Ό

An issue was discovered in Nsasoft US LLC SpotAuditor 5.3.5. The program can be crashed by entering 300 bytes char data into the "Key" or "Name" field while registering.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2020-27406 β€Ό

Cross Site Scripting (XSS) vulnerability in DynPG 4.9.1, allows authenticated attackers to execute arbitrary code via the groupname.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-27723 β€Ό

An issue was discovered in Nsasoft US LLC Product Key Explorer 4.2.7. The program can be crashed by entering 300 bytes char data into the "Key" or "Name" field while registering.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-36560 β€Ό

Phone Shop Sales Managements System using PHP with Source Code 1.0 is vulnerable to authentication bypass which leads to account takeover of the admin.

πŸ“– Read

via "National Vulnerability Database".
?
11:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Hackers Are Targeting Cryptocurrency πŸ•΄

Crypto exchanges that want to maintain credibility must implement some of the same "know your customer" controls used by banks and similar institutions.

πŸ“– Read

via "Dark Reading".
11:22
β€Ό CVE-2021-42763 β€Ό

Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2021-37842 β€Ό

metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2021-36923 β€Ό

RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access to USB device privileged IN and OUT instructions (leading to Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2021-36922 β€Ό

RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access to USB devices (Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2021-36925 β€Ό

RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve an arbitrary read or write operation from/to physical memory (leading to Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2021-42568 β€Ό

Sonatype Nexus Repository Manager 3.x through 3.35.0 allows attackers to access the SSL Certificates Loading function via a low-privileged account.

πŸ“– Read

via "National Vulnerability Database".
11:22
β€Ό CVE-2021-36924 β€Ό

RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve a pool overflow (leading to Escalation of Privileges, Denial of Service, and Code Execution) via a crafted Device IO Control packet to a device.

πŸ“– Read

via "National Vulnerability Database".
11:35
πŸ—“οΈ Data breach at US physical therapy center impacts more than 6,500 patients πŸ—“οΈ

Minnesota healthcare provider hit by cyber-attack A US physical therapy center has announced that the personal data of more than 6,500 patients has been breached in a security incident. Viverant PT, b

πŸ“– Read

via "The Daily Swig".
?
12:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Mitre-for-malware project MalAPI seeks community support πŸ—“οΈ

Windows malware catalogued by API calls

πŸ“– Read

via "The Daily Swig".
?
12:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ The β€˜Groove’ Ransomware Gang Was a Hoax β™ŸοΈ

A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests online. It now appears that Groove was all a big hoax designed to toy with security firms and journalists.

πŸ“– Read

via "Krebs on Security".
?
13:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple macOS Flaw Allows Kernel-Level Compromise ❌

β€˜Shrootless’ allows bypass of System Integrity Protection IT security measures to install a malicious rootkit that goes undetected and performs arbitrary device operations.

πŸ“– Read

via "Threat Post".
13:22
β€Ό CVE-2021-36794 β€Ό

In Siren Investigate before 11.1.4, when enabling the cluster feature of the Siren Alert application, TLS verifications are disabled globally in the Siren Investigate main process.

πŸ“– Read

via "National Vulnerability Database".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ NIST unveils draft criteria for β€˜seal of approval’ scheme on consumer software security πŸ—“οΈ

Baseline standards proposed for secure development, handling vulnerabilities, and protecting sensitive data

πŸ“– Read

via "The Daily Swig".
14:19
πŸ•΄ SaaS and Third-Party Risk: Is Your Organization Asking the Hard Questions? πŸ•΄

An investment in due diligence might prevent your organization from being part of next week's breach news cycle.

πŸ“– Read

via "Dark Reading".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Android Patches Actively Exploited Zero-Day Kernel Bug ❌

Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.

πŸ“– Read

via "Threat Post".
?
15:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Phishing and Spam Lures Feature Sports, Aim to Steal Credentials πŸ•΄

Spam volume declined slightly in the third quarter, but attackers sent almost 36 million malicious e-mail attachments, up 5% from the previous quarter, one security firm says.

πŸ“– Read

via "Dark Reading".
15:22
β€Ό CVE-2021-29737 β€Ό

IBM InfoSphere Data Flow Designer Engine (IBM InfoSphere Information Server 11.7 ) component has improper validation of the REST API server certificate. IBM X-Force ID: 201301.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-29888 β€Ό

IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 207123.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-38948 β€Ό

IBM InfoSphere Information Server 11.7 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 211402.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-29771 β€Ό

IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-29875 β€Ό

IBM InfoSphere Information Server 11.7 could allow an attacker to obtain sensitive information due to a insecure third party domain access vulnerability. IBM X-Force ID: 206572.

πŸ“– Read

via "National Vulnerability Database".
15:22
β€Ό CVE-2021-29738 β€Ό

IBM InfoSphere Data Flow Designer (IBM InfoSphere Information Server 11.7 ) is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 201302.

πŸ“– Read

via "National Vulnerability Database".
?
17:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-21573 β€Ό

An issue was discoverered in in abhijitnathwani image-processing v0.1.0, allows local attackers to cause a denial of service via a crafted image file.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2021-32595 β€Ό

Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2021-42754 β€Ό

An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2020-18439 β€Ό

An issue was discoverered in in function edit_save_f in framework/admin/tpl_control.php in qinggan phpok 5.1, allows attackers to write arbitrary files or get a shell.

πŸ“– Read

via "National Vulnerability Database".
17:22
β€Ό CVE-2021-36172 β€Ό

An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-36176 β€Ό

Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-23754 β€Ό

Cross Site Scripting (XSS) vulnerability in infusions/member_poll_panel/poll_admin.php in PHP-Fusion 9.03.50, allows attackers to execute arbitrary code, via the polls feature.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-26107 β€Ό

An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-36183 β€Ό

An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-21574 β€Ό

Buffer overflow vulnerability in YotsuyaNight c-http v0.1.0, allows attackers to cause a denial of service via a long url request which is passed to the delimitedread function.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-21572 β€Ό

Buffer overflow vulnerability in function src_parser_trans_stage_1_2_3 trgil gilcc before commit 803969389ca9c06237075a7f8eeb1a19e6651759, allows attackers to cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-41238 β€Ό

Hangfire is an open source system to perform background job processing in a .NET or .NET Core applications. No Windows Service or separate process required. Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted. If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted. Patched versions (1.7.26) are available both on Nuget.org and as a tagged release on the github repo. Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. For users who are unable to upgrade it is possible to mitigate the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-23719 β€Ό

Cross site scripting (XSS) vulnerability in application/controllers/AdminController.php in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the bbsmeta parameter.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-12814 β€Ό

A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiAnalyzer version 6.0.6 and below, version 6.4.4 allows attacker to execute unauthorized code or commands via specifically crafted requests to the web GUI.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-41019 β€Ό

An improper validation of certificate with host mismatch [CWE-297] vulnerability in FortiOS versions 6.4.6 and below may allow the connection to a malicious LDAP server via options in GUI, leading to disclosure of sensitive information, such as AD credentials.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-41023 β€Ό

A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-41022 β€Ό

A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-15940 β€Ό

An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-36186 β€Ό

A stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-36184 β€Ό

A improper neutralization of Special Elements used in an SQL Command ('SQL Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclosure device, users and database information via crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
17:36
❌ Ransomware Gangs Target Corporate Financial Activities ❌

The FBI is warning about a fresh extortion tactic: threatening to tank share prices for publicly held companies.

πŸ“– Read

via "Threat Post".
17:49
πŸ•΄ Female-Founded Cybersecurity Startup Wabbi Raises Over $2M in Seed Funding πŸ•΄

Wabbi enables companies to assimilate application security processes into development pipelines to produce and scale application security across enterprises.

πŸ“– Read

via "Dark Reading".
17:49
πŸ•΄ FBI: Ransomware Actors Use Financial Events to Extort Victims πŸ•΄

Attackers research financial information about an organization and threaten to disclose it if they don't receive ransom quickly.

πŸ“– Read

via "Dark Reading".
17:49
πŸ•΄ China Hosts More Malware Than Russia: Findings from DNSFilter's 2021 Domain Threat Report πŸ•΄

Cryptomining has also had a resurgence over the last year as blockchain technology and NFTs rise in popularity.

πŸ“– Read

via "Dark Reading".
?
18:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Squid Game Crypto Scammers Rips Off Investors for Millions ❌

Anti-dumping code kept investors from selling SQUID while fraudsters cashed out.

πŸ“– Read

via "Threat Post".
18:19
πŸ•΄ 44% of Parents Struggle to Follow Tech Rules They Set for Their Kids πŸ•΄

Parents perceive norms of behavior to be different for themselves and their children, according to Kaspersky..

πŸ“– Read

via "Dark Reading".
18:19
πŸ•΄ Microsoft Expands Security to AWS in Multicloud Push πŸ•΄

Microsoft will expand its cloud security tools to AWS within a suite called Defender for Cloud and launch a new Defender for Business in preview later this month.

πŸ“– Read

via "Dark Reading".
18:19
πŸ•΄ Dragos Launches ServiceNow’s OT Asset Discovery App πŸ•΄

Integration with Dragos Platform will help joint customers to expand the visibility of ICS/OT assets.

πŸ“– Read

via "Dark Reading".
18:19
πŸ•΄ Vaultree Raises $3.3M for Encryption Solution πŸ•΄

The company's platform uses Enhanced Searchable Symmetric Encryption (ESSE) and Fully Homomorphic Encryption (FHE) technologies.

πŸ“– Read

via "Dark Reading".
18:19
πŸ•΄ The Executive Women's Forum on Information Security, Risk Management & Privacy Elects Three Board Advisers πŸ•΄

Security executives hail from Target, Eli Lilley, and SecurityCurve/SaltCybersecurity.

πŸ“– Read

via "Dark Reading".
18:22
🦿 Secure SSH logins with knockd 🦿

You need to lock down your servers so that only you have access via SSH. One way to help that is with knockd. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2018-6058 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11215. Reason: This candidate is a reservation duplicate of CVE-2017-11215. Notes: All CVE users should reference CVE-2017-11215 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-37978 β€Ό

Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-37980 β€Ό

Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-37960 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-30631 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2018-6059 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11225. Reason: This candidate is a reservation duplicate of CVE-2017-11225. Notes: All CVE users should reference CVE-2017-11225 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2019-5863 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-37979 β€Ό

heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-37977 β€Ό

Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2018-6044 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-16064. Reason: This candidate is a reservation duplicate of CVE-2018-16064. Notes: All CVE users should reference CVE-2018-16064 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Flaunt Remote Access Credentials, Threaten Supply Chain πŸ•΄

Attackers advertise access to computers within shipping and logistics companies as the global supply chain struggles to meet post-COVID demands.

πŸ“– Read

via "Dark Reading".
?
20:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ McAfee Total Protection review: Expensive at full price πŸ“’

Protects your PC and includes a decent firewall, but costly and less effective than some rivals

πŸ“– Read

via "ITPro".
20:31
πŸ“’ What is end-to-end encryption and why is everyone fighting over it? πŸ“’

End-to-end encryption is considered one of the best ways to protect user data, but not everyone thinks it's a good idea

πŸ“– Read

via "ITPro".
20:31
πŸ“’ 17 Windows 10 problems - and how to fix them πŸ“’

Tips and tricks for everything from upgrade issues and freeing up storage, to solving privacy errors and using safe mode

πŸ“– Read

via "ITPro".
20:31
πŸ“’ Hackers could use new Wslink malware in highly targeted cyber attacks πŸ“’

Malware acts as a server, but its origins baffle boffins

πŸ“– Read

via "ITPro".
20:31
πŸ“’ Celebrity data leaked after ransomware attack on London's Graff jewellers πŸ“’

Russia-based Conti ransomware group is demanding tens of millions in cryptocurrency

πŸ“– Read

via "ITPro".
20:31
πŸ“’ Manufacturers forced to improve cyber security of wireless devices under new EU rule πŸ“’

Businesses will have 30 months to comply with the new rules if they want to ship their products to the EU

πŸ“– Read

via "ITPro".
20:31
πŸ“’ Apple's ad transparency policy has cost Facebook, YouTube, Snap almost $10 billion so far πŸ“’

Estimate from the Financial Times says Facebook has been hit hardest by new rule requiring user consent

πŸ“– Read

via "ITPro".
20:31
πŸ“’ Microsoft Exchange Servers are being used to distribute SquirrelWaffle malware πŸ“’

Exploiting an unpatched Exchange Server vulnerability and a less-than-foolproof malicious URL strategy is leading to mounting infections in businesses

πŸ“– Read

via "ITPro".
?
21:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43267 β€Ό

An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37982 β€Ό

Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-43264 β€Ό

In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, adjusting the path component for the page help file allows attackers to bypass the intended access control for HTML files via directory traversal. It replaces the - character with the / character.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37993 β€Ό

Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-43270 β€Ό

Datalust Seq.App.HtmlEmail (aka Seq.App.EmailPlus) 3.1.0-dev-00148, 3.1.0-dev-00170, and 3.1.0-dev-00176 can use cleartext SMTP on port 25 in some cases where encryption on port 465 was intended.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37991 β€Ό

Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-42697 β€Ό

Akka HTTP 10.1.x and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37990 β€Ό

Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37996 β€Ό

Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2019-13776 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: some publications have used this number when they meant to use CVE-2019-13376.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2020-16048 β€Ό

Out of bounds read in ANGLE allowed a remote attacker to obtain sensitive data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37983 β€Ό

Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2018-6125 β€Ό

Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37984 β€Ό

Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37994 β€Ό

Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2017-5123 β€Ό

Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37989 β€Ό

Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37988 β€Ό

Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37987 β€Ό

Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
21:23
β€Ό CVE-2021-37995 β€Ό

Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
3 November 2021
?
02:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41312 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2020-5955 β€Ό

An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38497 β€Ό

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-20706 β€Ό

Improper input validation vulnerability in the WebManager CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote file upload via network.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-39237 β€Ό

Certain HP LaserJet, HP LaserJet Managed, HP PageWide, and HP PageWide Managed printers may be vulnerable to potential information disclosure.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-20703 β€Ό

Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote code execution via a network.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38500 β€Ό

Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38491 β€Ό

Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-20707 β€Ό

Improper input validation vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to read files upload via network..

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2020-27820 β€Ό

A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38499 β€Ό

Mozilla developers reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38494 β€Ό

Mozilla developers reported memory safety bugs present in Firefox 91. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 92.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-20135 β€Ό

Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus).

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-29991 β€Ό

Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox < 91.0.1 and Thunderbird < 91.0.1.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-41036 β€Ό

In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-20705 β€Ό

Improper input validation vulnerability in the WebManager CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to remote file upload via network.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38493 β€Ό

Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38502 β€Ό

Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-29993 β€Ό

Firefox for Android allowed navigations through the `intent://` protocol, which could be used to cause crashes and UI spoofs. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92.

πŸ“– Read

via "National Vulnerability Database".
02:23
β€Ό CVE-2021-38492 β€Ό

When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.

πŸ“– Read

via "National Vulnerability Database".
?
05:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Simulation Game Teaches Non-Security Staff How to Handle a Cyber Crisis πŸ•΄

In this card-based game from Kaspersky, players work through a cyberattack scenario and learn how each decision they make has consequences.

πŸ“– Read

via "Dark Reading".
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40849 β€Ό

In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, the account associated with a web services token is vulnerable to being exploited and logged into, resulting in information disclosure (at a minimum) and often escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-40848 β€Ό

In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, exported CSV files could contain characters that a spreadsheet program could interpret as a command, leading to execution of a malicious string locally on a device, aka CSV injection.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-33209 β€Ό

An issue was discovered in Fimer Aurora Vision before 2.97.10. The response to a failed login attempt discloses whether the username or password is wrong, helping an attacker to enumerate usernames. This can make a brute-force attack easier.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-33210 β€Ό

An issue was discovered in Fimer Aurora Vision before 2.97.10. An attacker can (in the WebUI) obtain plant information without authentication by reading the response of APIs from a kiosk view of a plant.

πŸ“– Read

via "National Vulnerability Database".
09:23
β€Ό CVE-2021-36192 β€Ό

An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiManager 7.0.1 and below, 6.4.6 and below, 6.2.x, 6.0.x, 5.6.0 may allow a FortiGate user to see scripts from other ADOMS.

πŸ“– Read

via "National Vulnerability Database".
09:37
❌ Report: BlackMatter Ransomware Gang Goes Dark, Again ❌

The former DarkSide cybercriminal group will shut down due to increased pressure from authorities, who may have nabbed a key team member.

πŸ“– Read

via "Threat Post".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Ransomware gangs leaking sensitive financial information to extort organizations 🦿

Attackers will threaten to release confidential data that could affect a company's stock price to pressure them to pay the ransom, says the FBI.

πŸ“– Read

via "Tech Republic".
10:53
🦿 Digital natives more likely to fall for phishing attacks at work than their Gen X and Boomer colleagues 🦿

SailPoint survey finds that younger workers also are more likely to use company email addresses for online shopping and subscriptions.

πŸ“– Read

via "Tech Republic".
10:53
🦿 Rootkits: Expensive to build, cheap to rent 🦿

Positive Technology analysts found ready-made malware for any budget as well as the option to have a custom-build rootkit on Dark Web forums.

πŸ“– Read

via "Tech Republic".
11:06
πŸ—“οΈ RCE vulnerability found in Sitecore enterprise CMS software πŸ—“οΈ

Vendor update is available now

πŸ“– Read

via "The Daily Swig".
11:20
πŸ•΄ Risk Quantification: A Powerful Tool in Your Cyberthreat Defense Arsenal πŸ•΄

Three ways that understanding your cyber-risk in real dollars can help your organization survive the threat of ransomware and other attacks.

πŸ“– Read

via "Dark Reading".
11:23
β€Ό CVE-2021-36697 β€Ό

With an admin account, the .htaccess file in Artica Pandora FMS <=755 can be overwritten with the File Manager component. The new .htaccess file contains a Rewrite Rule with a type definition. A normal PHP file can be uploaded with this new "file type" and the code can be executed with an HTTP request.

πŸ“– Read

via "National Vulnerability Database".
11:23
β€Ό CVE-2021-36698 β€Ό

Pandora FMS through 755 allows XSS via a new Event Filter with a crafted name.

πŸ“– Read

via "National Vulnerability Database".
?
11:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Valtix Delivers Free Cloud Security for Departmental, Development, and Test Applications πŸ•΄

Company aims to make cloud network security more accessible to all organizations.

πŸ“– Read

via "Dark Reading".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Dangerous uXSS bug in Google Chrome’s β€˜New Tab’ page bypassed security features πŸ—“οΈ

β€˜Chrome’s NTP only has a really weak CSP that doesn’t mitigate XSS’

πŸ“– Read

via "The Daily Swig".
12:17
🦿 Report: More than half of organizations do not effectively defend against cyberattacks 🦿

Accenture's State of Cyber Resilience study also revealed key traits of cyber resilient leaders. The report found an average of 270 attacks per year per company.

πŸ“– Read

via "Tech Republic".
?
13:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43130 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Customer Relationship Management System (CRM) 1.0 via the username parameter in customer/login.php.

πŸ“– Read

via "National Vulnerability Database".
13:23
β€Ό CVE-2021-43324 β€Ό

LibreNMS through 21.10.2 allows XSS via a widget title.

πŸ“– Read

via "National Vulnerability Database".
13:36
πŸ—“οΈ Mozilla debuts Site Isolation technology with Firefox update πŸ—“οΈ

Sandboxing technology levels up browser security

πŸ“– Read

via "The Daily Swig".
?
14:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Predicting the Next OWASP API Security Top 10 ❌

API security risk has dramatically evolved in the last two years. Jason Kent, Hacker-in-Residence at Cequence Security, discusses the top API security concerns today and how to address them.

πŸ“– Read

via "Threat Post".
14:20
πŸ•΄ Is Sandboxing Dead? πŸ•΄

Organizations should start to evaluate other security measures to replace or complement the once-venerable security sandbox.

πŸ“– Read

via "Dark Reading".
?
14:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook to throw out face recognition, delete all template data ⚠

Publicity stunt? Or privacy progress?

πŸ“– Read

via "Naked Security".
14:47
⚠ Europol announces β€œtargeting” of 12 suspects in ransomware attacks ⚠

More anti-ransomware activity by law enforcement, this time in Switzerland and Ukraine.

πŸ“– Read

via "Naked Security".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” CISA: Patch These Bugs Now πŸ”

CISA is giving federal agencies between two weeks and six months to patch known exploited vulnerabilities.

πŸ“– Read

via "".
15:14
πŸ›  Clam AntiVirus Toolkit 0.104.1 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
15:23
β€Ό CVE-2021-37147 β€Ό

Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-41585 β€Ό

Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-26786 β€Ό

An issue was discoverered in in customercentric-selling-poland PlayTube, allows authenticated attackers to execute arbitrary code via the purchace code to the config.php.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-23680 β€Ό

An issue was discovered in function StartPage in text2pdf.c in pdfcorner text2pdf 1.1, allows attackers to cause denial of service or possibly other undisclosed impacts.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-20982 β€Ό

Cross Site Scripting (XSS) vulnerability in shadoweb wdja v1.5.1, allows attackers to execute arbitrary code and gain escalated privileges, via the backurl parameter to /php/passport/index.php.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-40985 β€Ό

Buffer overflow vulnerability in htmldoc before 1.9.12, allows attackers to cause a denial of service via a crafted BMP image to image_load_bmp.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-38161 β€Ό

Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-23126 β€Ό

Chamilo LMS version 1.11.10 contains an XSS vulnerability in the personal profile edition form, affecting the user him/herself and social network friends.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-27836 β€Ό

An issue was discoverered in in function xls_getWorkSheet in xls.c in libxls 1.6.2, allows attackers to cause a denial of service, via a crafted XLS file.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-37149 β€Ό

Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-23109 β€Ό

Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-37148 β€Ό

Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-24743 β€Ό

An issue was found in /showReports.do Zoho ManageEngine Applications Manager up to 14550, allows attackers to gain escalated privileges via the resourceid parameter.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2021-43082 β€Ό

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-24000 β€Ό

SQL Injection vulnerability in eyoucms cms v1.4.7, allows attackers to execute arbitrary code and disclose sensitive information, via the tid parameter to index.php.

πŸ“– Read

via "National Vulnerability Database".
15:23
β€Ό CVE-2020-23679 β€Ό

Buffer overflow vulnerability in Renleilei1992 Linux_Network_Project 1.0, allows attackers to execute arbitrary code, via the password field.

πŸ“– Read

via "National Vulnerability Database".
15:37
❌ β€˜Tortilla’ Wraps Exchange Servers in ProxyShell Attacks ❌

The Microsoft Exchange ProxyShell vulnerabilities are being exploited yet again for ransomware, this time with Babuk from the new "Tortilla" threat actor.

πŸ“– Read

via "Threat Post".
?
16:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Data and the policies that protect it: 4 essential plans to have in place 🦿

These four sample policies can help you protect your data by ensuring it's properly encrypted, stored safely, only accessible by certain people, and securely backed up.

πŸ“– Read

via "Tech Republic".
16:47
🦿 BlackMatter ransomware gang allegedly disbanding due to pressure from authorities 🦿

Operators of the ransomware-as-a-service group are claiming that the project is closed and that their entire infrastructure will be turned off.

πŸ“– Read

via "Tech Republic".
16:50
πŸ•΄ Infosec and Business Alignment Lowers Breach Cost, Boosts Security πŸ•΄

As attacks and security budgets continue to rise, data shows the most secure organizations are the ones that strike a security-business balance.

πŸ“– Read

via "Dark Reading".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mekotio Banking Trojan Resurges with Tweaked Code, Stealthy Campaign ❌

The banker, aka Metamorfo, is roaring back after Spanish police arrested more than a dozen gang members.

πŸ“– Read

via "Threat Post".
17:20
πŸ•΄ Where is Cloud Permissions Management headed? πŸ•΄

Cloud Permissions Management emerged as a standalone cloud security technology, but is quickly becoming part of a broader set of capabilities

πŸ“– Read

via "Dark Reading".
17:20
πŸ•΄ US Blacklists Israeli Firms NSO Group and Candiru πŸ•΄

The US Commerce Department has also added Russia's Positive Technologies and Singapore's Computer Security Initiative Consultancy.

πŸ“– Read

via "Dark Reading".
17:23
β€Ό CVE-2021-23624 β€Ό

This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-23472 β€Ό

This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-18263 β€Ό

PHP-CMS v1.0 was discovered to contain a SQL injection vulnerability in the component search.php via the search parameter. This vulnerability allows attackers to access sensitive database information.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-23509 β€Ό

This affects the package json-ptr before 3.0.0. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-18259 β€Ό

ED01-CMS v1.0 was discovered to contain a reflective cross-site scripting (XSS) vulnerability in the component sposts.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Post title or Post content fields.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-23807 β€Ό

This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-18262 β€Ό

ED01-CMS v1.0 was discovered to contain a SQL injection in the component cposts.php via the cid parameter.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-43140 β€Ό

SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2020-18261 β€Ό

An arbitrary file upload vulnerability in the image upload function of ED01-CMS v1.0 allows attackers to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-23820 β€Ό

This affects all versions of package json-pointer. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-41134 β€Ό

nbdime provides tools for diffing and merging of Jupyter Notebooks. In affected versions a stored cross-site scripting (XSS) issue exists within the Jupyter-owned nbdime project. It appears that when reading the file name and path from disk, the extension does not sanitize the string it constructs before returning it to be displayed. The diffNotebookCheckpoint function within nbdime causes this issue. When attempting to display the name of the local notebook (diffNotebookCheckpoint), nbdime appears to simply append .ipynb to the name of the input file. The NbdimeWidget is then created, and the base string is passed through to the request API function. From there, the frontend simply renders the HTML tag and anything along with it. Users are advised to patch to the most recent version of the affected product.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-43141 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-41174 β€Ό

Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(ΓƒΒ’Γ’β€šΒ¬Γ‹Ε“alert(1)ΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.

πŸ“– Read

via "National Vulnerability Database".
17:23
β€Ό CVE-2021-23784 β€Ό

This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
17:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Cloud Data Security Startup Launches πŸ•΄

TrustLogix aims to streamline and simplify data governance in the cloud.

πŸ“– Read

via "Dark Reading".
?
18:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cisco Talos reports new variant of Babuk ransomware targeting Exchange servers 🦿

A new bad actor called Tortilla is running the campaign, and most affected users are in the U.S.

πŸ“– Read

via "Tech Republic".
18:20
πŸ•΄ 5 MITRE ATT&CK Tactics Most Frequently Detected by Cisco Secure Firewalls πŸ•΄

Cisco Security examines the most frequently encountered MITRE ATT&CK tactics and techniques.

πŸ“– Read

via "Dark Reading".
18:20
πŸ•΄ CISA Issues New Directive for Patching Known Exploited Vulnerabilities πŸ•΄

The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency says.

πŸ“– Read

via "Dark Reading".
?
19:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researchers Scan the Web to Uncover Malware Infections πŸ•΄

Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.

πŸ“– Read

via "Dark Reading".
19:23
β€Ό CVE-2021-38411 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-22960 β€Ό

The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-43338 β€Ό

In Ericsson Network Location MPS GMPC21, it is possible to creates a new admin user with a SQL Query for file_name in the export functionality.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38420 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38422 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-41562 β€Ό

A vulnerability in Snow Snow Agent for Windows allows a non-admin user to cause arbitrary deletion of files. This issue affects: Snow Snow Agent for Windows version 5.0.0 to 6.7.1 on Windows.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38407 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38416 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2020-28416 β€Ό

HP has identified a security vulnerability with the I.R.I.S. OCR (Optical Character Recognition) software available with HP PageWide and OfficeJet printer software installations that could potentially allow unauthorized local code execution.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38488 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38403 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-41492 β€Ό

Multiple SQL Injection vulnerabilities exist in Sourcecodester Simple Cashiering System (POS) 1.0 via the (1) Product Code in the pos page in cashiering. (2) id parameter in manage_products and the (3) t paramater in actions.php.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-42772 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-43339 β€Ό

In Ericsson Network Location MPS GMPC21, it is possible to inject commands via file_name in the export functionality.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-43032 β€Ό

In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-33800 β€Ό

In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2020-6931 β€Ό

HP Print and Scan Doctor may potentially be vulnerable to local elevation of privilege.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-35053 β€Ό

Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38418 β€Ό

Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization.

πŸ“– Read

via "National Vulnerability Database".
19:23
β€Ό CVE-2021-38424 β€Ό

The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application.

πŸ“– Read

via "National Vulnerability Database".
4 November 2021
?
01:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ β€œTrojan Source” hides flaws in source code from humans πŸ“’

Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks

πŸ“– Read

via "ITPro".
01:11
πŸ“’ Office 365 phishing campaign used stolen Kaspersky Amazon SES token to fool victims πŸ“’

Credentials stolen from users after legitimate-looking email arrives in inboxes

πŸ“– Read

via "ITPro".
01:11
πŸ“’ Microsoft unveils Defender for Business at Ignite 2021 πŸ“’

The new security suite is aimed at SMBs struggling to protect themselves in today's cyber security landscape

πŸ“– Read

via "ITPro".
01:14
πŸ“’ Mitre reveals 10 worst hardware security weaknesses in 2021 πŸ“’

The list aims to highlight common hardware flaws to help eliminate them from product development cycles

πŸ“– Read

via "ITPro".
01:14
πŸ“’ Facebook is shutting down its controversial facial recognition system πŸ“’

The move will see more than a billion facial templates removed from Facebook's records amid a push for more private applications of the technology

πŸ“– Read

via "ITPro".
01:14
πŸ“’ BlackMatter ransomware gang claims to have ceased operation πŸ“’

Despite the announcement made via its client portal, experts believe the hacker group will soon be planning a return

πŸ“– Read

via "ITPro".
?
09:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-25368 β€Ό

A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the PrivateLogin field to Login.

πŸ“– Read

via "National Vulnerability Database".
09:24
β€Ό CVE-2020-25367 β€Ό

A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login.

πŸ“– Read

via "National Vulnerability Database".
09:24
β€Ό CVE-2021-34594 β€Ό

TwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system.

πŸ“– Read

via "National Vulnerability Database".
09:24
β€Ό CVE-2021-34597 β€Ό

Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.

πŸ“– Read

via "National Vulnerability Database".
09:24
β€Ό CVE-2020-25366 β€Ό

An issue in the component /cgi-bin/upload_firmware.cgi of D-Link DIR-823G REVA1 1.02B05 allows attackers to cause a denial of service (DoS) via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
09:24
β€Ό CVE-2021-42624 β€Ό

A local buffer overflow vulnerability exists in the latest version of Miniftpd in ftpproto.c through the tmp variable, where a crafted payload can be sent to the affected function.

πŸ“– Read

via "National Vulnerability Database".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Magecart Credit Card Skimmer Avoids VMs to Fly Under the Radar ❌

The Magecart threat actor uses a browser script to evade detection by researchers and sandboxes so it targets only victims’ machines to steal credentials and personal info.

πŸ“– Read

via "Threat Post".
10:11
πŸ—“οΈ Human rights activists condemn mass denial of service as Sudan’s nationwide internet shutdown enters second week πŸ—“οΈ

β€˜All mobile internet networks are completely cut off,’ one journalist on the ground tells The Daily Swig

πŸ“– Read

via "The Daily Swig".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Having Trouble Finding Cybersecurity Talent? You Might Be the Problem πŸ•΄

Hiring managers must rethink old-school practices to find the right candidates and be ready to engage in meaningful conversations about their company's values. Here are three ways to start.

πŸ“– Read

via "Dark Reading".
11:36
πŸ—“οΈ Remote code execution, SQL injection bugs uncovered in Pentaho Business Analytics software πŸ—“οΈ

Penetration test reveals severe issues in Hitachi Vantara’s business solution

πŸ“– Read

via "The Daily Swig".
?
12:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Avoid Another Let's Encrypt-Like Meltdown πŸ•΄

Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

πŸ“– Read

via "Dark Reading".
?
12:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Appsian Security Announces Acquisition of Q Software, a Leader in JD Edwards Security and Compliance πŸ•΄

The acquisition provides customers of JD Edwards, along with Oracle EBS and Oracle Cloud, with expanded capabilities for data masking, threat detection and response, and real-time analytics across multiple ERP applications.

πŸ“– Read

via "Dark Reading".
?
13:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Linux Kernel Bug Allows Remote Takeover ❌

The bug (CVE-2021-43267) exists in a TIPC message type that allows Linux nodes to send cryptographic keys to each other.

πŸ“– Read

via "Threat Post".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Free Discord Nitro Offer Used to Steal Steam Credentials ❌

A fake Steam pop-up prompts users to β€˜link’ Discord account for free Nitro subs.

πŸ“– Read

via "Threat Post".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Majority of consumer IoT vendors still lack vulnerability disclosure programs – report πŸ—“οΈ

Dismal findings appear to vindicate global efforts to regulate the sector

πŸ“– Read

via "The Daily Swig".
14:11
πŸ—“οΈ US federal agencies ordered to patch hundreds of actively exploited vulnerabilities πŸ—“οΈ

CISA directive establishes tight patching deadlines

πŸ“– Read

via "The Daily Swig".
14:17
🦿 US government orders federal agencies to patch 100s of vulnerabilities 🦿

The Cybersecurity and Infrastructure Security Agency is maintaining a database of known security flaws with details on how and when federal agencies and departments should patch them.

πŸ“– Read

via "Tech Republic".
14:17
🦿 2022 will be the year of convergence between edge, IoT and networking tech, Forrester predicts 🦿

IoT tech will help reduce emissions, satellite internet will challenge 5G, the chip shortage will continue and more will happen in 2022 as pandemic recovery continues to move slowly forward.

πŸ“– Read

via "Tech Republic".
14:31
β™ŸοΈ β€˜Tis the Season for the Wayward Package Phish β™ŸοΈ

The holiday shopping season always means big business for phishers, who tend to find increased success this time of year with a time-honored lure about a wayward package that needs redelivery. Here's a look at a fairly elaborate SMS-based phishing scam that spoofs FedEx in a bid to extract personal and financial information from unwary recipients.

πŸ“– Read

via "Krebs on Security".
?
14:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Facebook to throw out face recognition, delete all template data ⚠

Publicity stunt? Or privacy progress?

πŸ“– Read

via "Naked Security".
14:48
⚠ S3 Ep57: Europol v. Ransomware, Shrootless bug, and Linux browser flamewars [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ US Blacklists Pegasus Spyware Maker ❌

NSO Group plans to fight the trade ban, saying it's "dismayed" and clinging to the mantra that its tools actually help to prevent terrorism and crime.

πŸ“– Read

via "Threat Post".
15:08
❌ 3 Guideposts for Building a Better Incident-Response Plan ❌

Invest and practice: Grant Oviatt, director of incident-response engagements atΒ Red Canary, lays out the key building blocks for effective IR.

πŸ“– Read

via "Threat Post".
?
15:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40115 β€Ό

A vulnerability in Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
15:24
β€Ό CVE-2021-21687 β€Ό

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.

πŸ“– Read

via "National Vulnerability Database".
15:24
β€Ό CVE-2021-34774 β€Ό

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to a specific API request. An attacker could exploit the vulnerability by sending a crafted HTTP request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the users of the application, including security questions and answers. To exploit this vulnerability an attacker would need valid Administrator credentials. Cisco expects to release software updates that address this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
15:24
β€Ό CVE-2021-21688 β€Ό

The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21685 β€Ό

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-1500 β€Ό

A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to persuade users to unknowingly visit malicious sites.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21689 β€Ό

FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-40113 β€Ό

Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21690 β€Ό

Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-34701 β€Ό

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-34784 β€Ό

A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21698 β€Ό

Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-40112 β€Ό

Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-40119 β€Ό

A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-40124 β€Ό

A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-40128 β€Ό

A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-34773 β€Ό

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. These actions could include modifying the device configuration and deleting (but not creating) user accounts.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21693 β€Ό

When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21696 β€Ό

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2021-21694 β€Ό

FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.

πŸ“– Read

via "National Vulnerability Database".
?
15:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 You can configure SSH to use a non-standard port with SELinux set to enforcing 🦿

Switching the SSH listening port is an easy way to help secure remote login on your Linux servers. Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
?
16:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Latest National Data Privacy Legislation Aims to Protect Consumer Data πŸ”

Legislation introduced last week would establish national data privacy standards, mirror elements of the CCPA and require companies to use high-quality data protection standards.

πŸ“– Read

via "".
?
17:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybersecurity, the pandemic and the 2021 holiday shopping season: A perfect storm 🦿

Ping Identity executive advisor Aubrey Turner warns that eager cybercriminals are ready to exploit the current chaotic state of the world, and preparation is essential going into the holidays.

πŸ“– Read

via "Tech Republic".
17:24
β€Ό CVE-2021-41247 β€Ό

JupyterHub is an open source multi-user server for Jupyter notebooks. In affected versions users who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. The only workaround is to make sure that only one JupyterLab tab is open when you log out.

πŸ“– Read

via "National Vulnerability Database".
17:24
β€Ό CVE-2021-43281 β€Ό

MyBB before 1.8.29 allows Remote Code Injection by an admin with the "Can manage settings?" permission. The Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type "php" with PHP code, executed on Change Settings pages.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2021-43293 β€Ό

Sonatype Nexus Repository Manager 3.x before 3.36.0 allows a remote authenticated attacker to potentially perform network enumeration via Server Side Request Forgery (SSRF).

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2021-43389 β€Ό

An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.

πŸ“– Read

via "National Vulnerability Database".
?
18:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Phishing Attack Blends Spoofed Amazon Order and Fraudulent Customer Service Agents πŸ•΄

It's the latest in a series of clever brand impersonation scams that use multiple vectors to lure victims.

πŸ“– Read

via "Dark Reading".
18:22
πŸ•΄ Ripping Off the Blindfold: Illuminating OT Environments πŸ•΄

A security tool monitoring OT devices needs to do so without disrupting operations, which is why the Self-Learning AI acts only on information obtained by passive monitoring of the network.

πŸ“– Read

via "Dark Reading".
18:22
πŸ•΄ US Offers $10M Reward For ID, Location of DarkSide Leadership πŸ•΄

The State Department offers multimillion-dollar rewards for information related to the leaders and members involved in DarkSide ransomware.

πŸ“– Read

via "Dark Reading".
?
18:52
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ API Security Issues Hinder Application Delivery πŸ•΄

A new survey explains why nearly all organizations experience API security problems to varying degrees.

πŸ“– Read

via "Dark Reading".
?
19:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Is Zero Trust Different From Traditional Security? πŸ•΄

Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.

πŸ“– Read

via "Dark Reading".
19:25
β€Ό CVE-2021-43398 β€Ό

Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2021-3896 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2021-41249 β€Ό

GraphQL Playground is a GraphQL IDE for development of graphQL focused applications. All versions of graphql-playground-react older than graphql-playground-react@1.7.28 are vulnerable to compromised HTTP schema introspection responses or schema prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete. In order for the attack to take place, the user must load a malicious schema in graphql-playground. There are several ways this can occur, including by specifying the URL to a malicious schema in the endpoint query parameter. If a user clicks on a link to a GraphQL Playground installation that specifies a malicious server, arbitrary JavaScript can run in the user's browser, which can be used to exfiltrate user credentials or other harmful goals. If you are using graphql-playground-react directly in your client app, upgrade to version 1.7.28 or later.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2021-43396 β€Ό

In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious '\0' character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2021-41248 β€Ό

GraphiQL is the reference implementation of this monorepo, GraphQL IDE, an official project under the GraphQL Foundation. All versions of graphiql older than graphiql@1.4.7 are vulnerable to compromised HTTP schema introspection responses or schema prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete. In order for the attack to take place, the user must load a vulnerable schema in graphiql. There are a number of ways that can occur. By default, the schema URL is not attacker-controllable in graphiql or in its suggested implementations or examples, leaving only very complex attack vectors. If a custom implementation of graphiql's fetcher allows the schema URL to be set dynamically, such as a URL query parameter like ?endpoint= in graphql-playground, or a database provided value, then this custom graphiql implementation is vulnerable to phishing attacks, and thus much more readily available, low or no privelege level xss attacks. The URLs could look like any generic looking graphql schema URL. It should be noted that desktop clients such as Altair, Insomnia, Postwoman, do not appear to be impacted by this. This vulnerability does not impact codemirror-graphql, monaco-graphql or other dependents, as it exists in onHasCompletion.ts in graphiql. It does impact all forks of graphiql, and every released version of graphiql.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2021-42057 β€Ό

Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-21139 β€Ό

EC Cloud E-Commerce System v1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add admin accounts via /admin.html?do=user&act=add.

πŸ“– Read

via "National Vulnerability Database".
?
21:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43400 β€Ό

An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2021-39914 β€Ό

A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0 could cause excessive usage of resources when a specially crafted username was used when provisioning a new user

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2021-39903 β€Ό

In all versions of GitLab CE/EE since version 13.0, a privileged user, through an API call, can change the visibility level of a group or a project to a restricted option even after the instance administrator sets that visibility option as restricted in settings.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2021-39902 β€Ό

Incorrect Authorization in GitLab CE/EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident.

πŸ“– Read

via "National Vulnerability Database".
5 November 2021
?
08:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Get the training you need to switch to a cybersecurity career 🦿

With cybercrime becoming more frequent and severe, there's no question that the demand for cybersecurity skills will remain high well into the future, and now you can learn them easily.

πŸ“– Read

via "Tech Republic".
?
09:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ β€˜Focus on brilliance at the basics’ – GitHub CSO Mike Hanley on shifting left and securing the software supply chain πŸ—“οΈ

Security fundamentals often overlooked in favor of eye-catching initiatives, says infosec pro

πŸ“– Read

via "The Daily Swig".
?
09:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42237 β€Ό

Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
09:25
β€Ό CVE-2021-42662 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.

πŸ“– Read

via "National Vulnerability Database".
09:25
β€Ό CVE-2021-26844 β€Ό

A cross-site scripting (XSS) vulnerability in Power Admin PA Server Monitor 8.2.1.1 allows remote attackers to inject arbitrary web script or HTML via Console.exe.

πŸ“– Read

via "National Vulnerability Database".
?
10:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Feds Offer $10 Million Bounty for DarkSide Info ❌

The U.S. State Department ups the ante in its hunt for the ransomware perpetrators by offering a sizeable cash sum for locating and arresting leaders of the cybercriminal group.

πŸ“– Read

via "Threat Post".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Tips on How Small to Midsize Businesses Can Combat Cyberattacks πŸ•΄

The first step in improving your cybersecurity is understanding your risk of attack.

πŸ“– Read

via "Dark Reading".
11:27
β€Ό CVE-2021-42669 β€Ό

A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42666 β€Ό

A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42671 β€Ό

An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42667 β€Ό

A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42663 β€Ό

An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42664 β€Ό

A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42668 β€Ό

A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42665 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.

πŸ“– Read

via "National Vulnerability Database".
11:27
β€Ό CVE-2021-42670 β€Ό

A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

πŸ“– Read

via "National Vulnerability Database".
?
11:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Voice phishing attack spoofs Amazon to steal credit card information 🦿

Impersonating an Amazon order notification, the attackers end up calling victims to try to obtain their credit card details, says Avanan.

πŸ“– Read

via "Tech Republic".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Cisco patches critical bug trio in Policy Suite and ONT networking devices πŸ—“οΈ

Critical severity bugs disclosed by networking titan

πŸ“– Read

via "The Daily Swig".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Proofpoint Phish Harvests Microsoft O365, Google Logins ❌

A savvy campaign impersonating the cybersecurity company skated past Microsoft email security.

πŸ“– Read

via "Threat Post".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Secure DevOps, Security Teams Must be Agile πŸ•΄

The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

πŸ“– Read

via "Dark Reading".
13:07
πŸ—“οΈ Lessons learned: How a severe vulnerability in the OWASP ModSecurity Core Rule Set sparked much-needed change πŸ—“οΈ

Years-old WAF bypass flaw was discovered in June

πŸ“– Read

via "The Daily Swig".
13:10
❌ Google Ads for Faux Cryptowallets Net Scammers At Least $500K ❌

Malicious Phantom, MetaMask cryptowallets are on the prowl to drain victim funds.Β 

πŸ“– Read

via "Threat Post".
13:18
🦿 US government unveils $10 million bounty for DarkSide ransomware gang leaders 🦿

The $10 million is for intel that leads to the identification or location of anyone who holds a leadership position in the DarkSide group.

πŸ“– Read

via "Tech Republic".
13:26
β€Ό CVE-2021-3924 β€Ό

grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-3928 β€Ό

vim is vulnerable to Stack-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-3916 β€Ό

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39412 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exists in PHPGurukul Shopping v3.1 via the (1) callback parameter in (a) server_side/scripts/id_jsonp.php, (b) server_side/scripts/jsonp.php, and (c) scripts/objects_jsonp.php, the (2) value parameter in examples_support/editable_ajax.php, and the (3) PHP_SELF parameter in captcha/index.php.

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-3927 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
13:26
β€Ό CVE-2021-39411 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGurukul Hospital Management System 4.0 via the (1) searchdata parameter in (a) doctor/search.php and (b) admin/patient-search.php, and the (2) fromdate and (3) todate parameters in admin/betweendates-detailsreports.php.

πŸ“– Read

via "National Vulnerability Database".
13:38
πŸ›  Faraday 3.18.1 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Beyond the Basics: Tips for Building Advanced Ransomware Resiliency ❌

Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, offers advice on least privilege, automation, application control and more.

πŸ“– Read

via "Threat Post".
14:09
❌ BrakTooth Bluetooth Bugs Bite: Exploit Code, PoC Released ❌

CISA is urging vendors to patch, given the release of public exploit code & a proof of concept tool for bugs that open billions of devices – phones, PCs, toys, etc. – to DoS & code execution.

πŸ“– Read

via "Threat Post".
14:12
πŸ” Friday Five 11/5 πŸ”

The U.S. blacklists four companies for malicious cyber activities, a ransomware group shuts down, and a new CMMC program gets revamped - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€œCustomer complaint” email scam preys on your fear of getting into trouble at work ⚠

Stop. Think. Connect. Don't let the crooks trick you into acting in haste.

πŸ“– Read

via "Naked Security".
15:18
⚠ S3 Ep57: Europol v. Ransomware, Shrootless bug, and Linux browser flamewars [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
15:23
πŸ•΄ How InfoSec Should Use the Minimum Viable Secure Product Checklist πŸ•΄

Google and Salesforce executives discuss the need for the newly released MVSP, how tech companies came together to work on it, and how organizations should use it.

πŸ“– Read

via "Dark Reading".
15:26
β€Ό CVE-2021-42699 β€Ό

The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the userÒ€ℒs cookie and take over the account.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2020-23566 β€Ό

Irfanview v4.53 was discovered to contain an infinity loop via JPEG2000!ShowPlugInSaveOptions_W+0x1ecd8.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2021-42698 β€Ό

Project files are stored memory objects in the form of binary serialized data that can later be read and deserialized again to instantiate the original objects in memory. Malicious manipulation of these files may allow an attacker to corrupt memory.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2021-42701 β€Ό

An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the userÒ€ℒs cloud account.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2021-39416 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exists in Remote Clinic v2.0 in (1) patients/register-patient.php via the (a) Contact, (b) Email, (c) Weight, (d) Profession, (e) ref_contact, (f) address, (g) gender, (h) age, and (i) serial parameters; in (2) patients/edit-patient.php via the (a) Contact, (b) Email, (c) Weight, Profession, (d) ref_contact, (e) address, (f) serial, (g) age, and (h) gender parameters; in (3) staff/edit-my-profile.php via the (a) Title, (b) First Name, (c) Last Name, (d) Skype, and (e) Address parameters; and in (4) clinics/settings.php via the (a) portal_name, (b) guardian_short_name, (c) guardian_name, (d) opening_time, (e) closing_time, (f) access_level_5, (g) access_level_4, (h) access_level_ 3, (i) access_level_2, (j) access_level_1, (k) currency, (l) mobile_number, (m) address, (n) patient_contact, (o) patient_address, and (p) patient_email parameters.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2020-23567 β€Ό

Irfanview v4.53 allows attackers to to cause a denial of service (DoS) via a crafted JPEG 2000 file. Related to "Integer Divide By Zero starting at JPEG2000!ShowPlugInSaveOptions_W+0x00000000000082ea"

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2021-42543 β€Ό

The affected application uses specific functions that could be abused through a crafted project file, which could lead to code execution, system reboot, and system shutdown.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2021-39413 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exits in SEO Panel v4.8.0 via the (1) to_time parameter in (a) backlinks.php, (b) analytics.php, (c) log.php, (d) overview.php, (e) pagespeed.php, (f) rank.php, (g) review.php, (h) saturationchecker.php, (i) social_media.php, and (j) reports.php; the (2) from_time parameter in (a) backlinks.php, (b) analytics.php, (c) log.php, (d) overview.php, (e) pagespeed.php, (f) rank.php, (g) review.php, (h) saturationchecker.php, (i) social_media.php, (j) webmaster-tools.php, and (k) reports.php; the (3) order_col parameter in (a) analytics.php, (b) review.php, (c) social_media.php, and (d) webmaster-tools.php; and the (4) pageno parameter in (a) alerts.php, (b) log.php, (c) keywords.php, (d) proxy.php, (e) searchengine.php, and (f) siteauditor.php.

πŸ“– Read

via "National Vulnerability Database".
15:26
β€Ό CVE-2020-23565 β€Ό

Irfanview v4.53 allows attackers to execute arbitrary code via a crafted JPEG 2000 file. Related to a "Data from Faulting Address controls Branch Selection starting at JPEG2000!ShowPlugInSaveOptions_W+0x0000000000032850".

πŸ“– Read

via "National Vulnerability Database".
?
17:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Native Tribal Casinos Taking Millions in Ransomware Losses ❌

An FBI notification is warning of an uptick in attacks against tribal casinos.

πŸ“– Read

via "Threat Post".
?
17:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43404 β€Ό

An issue was discovered in FusionPBX before 4.5.30. The FAX file name may have risky characters.

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2021-29753 β€Ό

IBM Business Automation Workflow 18. 19, 20, 21, and IBM Business Process Manager 8.5 and d8.6 transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2021-42837 β€Ό

An issue was discovered in Talend Data Catalog before 7.3-20210930. After setting up SAML/OAuth, authentication is not correctly enforced on the native login page. Any valid user from the SAML/OAuth provider can be used as the username with an arbitrary password, and login will succeed.

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2021-35368 β€Ό

OWASP ModSecurity Core Rule Set 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.2 is affected by a Request Body Bypass via a trailing pathname.

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2021-43405 β€Ό

An issue was discovered in FusionPBX before 4.5.30. The fax_extension may have risky characters (it is not constrained to be numeric).

πŸ“– Read

via "National Vulnerability Database".
17:26
β€Ό CVE-2021-43406 β€Ό

An issue was discovered in FusionPBX before 4.5.30. The fax_post_size may have risky characters (it is not constrained to preset values).

πŸ“– Read

via "National Vulnerability Database".
?
17:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Track data activity before "unusual" becomes "dangerous" 🦿

A security expert raises concerns that a lack of identifying and tracking unusual data activity can have dangerous consequences.

πŸ“– Read

via "Tech Republic".
17:53
πŸ•΄ US Defense Contractor Discloses Data Breach πŸ•΄

Electronic Warfare Associates says an attackers infiltrated EWA email in August, which led to the exfiltration of files with personal data.

πŸ“– Read

via "Dark Reading".
17:53
πŸ•΄ Who's Minding Your Company's Crypto Decisions? πŸ•΄

Security teams must first evaluate security protocols and the reputation of the cryptocurrency payment platform before their companies can proceed to accept the alternative currency as payment.

πŸ“– Read

via "Dark Reading".
?
21:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41230 β€Ό

Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41216 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the shape inference function for `Transpose` is vulnerable to a heap buffer overflow. This occurs whenever `perm` contains negative elements. The shape inference function does not validate that the indices in `perm` are all valid. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41221 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow. This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2020-22222 β€Ό

Stivasoft (Phpjabbers) Fundraising Script v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the pjActionLoadCss function.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41225 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2020-22225 β€Ό

Stivasoft (Phpjabbers) Fundraising Script v1.0 was discovered to contain a SQL injection vulnerability via the pjActionLoadForm function.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41222 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SplitV` can trigger a segfault is an attacker supplies negative arguments. This occurs whenever `size_splits` contains more than one value and at least one value is negative. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2020-22224 β€Ό

Stivasoft (Phpjabbers) Fundraising Script v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the pjActionPreview function.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41250 β€Ό

Python discord bot is the community bot for the Python Discord community. In affected versions when a non-blacklisted URL and an otherwise triggering filter token is included in the same message the token filter does not trigger. This means that by including any non-blacklisted URL moderation filters can be bypassed. This issue has been resolved in commit 67390298852513d13e0213870e50fb3cff1424e0

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41228 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41208 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the code for boosted trees in TensorFlow is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call. Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. We will deprecate TensorFlow's boosted trees APIs in subsequent releases. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41218 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `AllToAll` can be made to execute a division by 0. This occurs whenever the `split_count` argument is 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41209 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the implementations for convolution operators trigger a division by 0 if passed empty filter tensor arguments. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41220 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the async implementation of `CollectiveReduceV2` suffers from a memory leak and a use after free. This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41227 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents. This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2020-22223 β€Ό

Stivasoft (Phpjabbers) Fundraising Script v1.0 was discovered to contain a SQL injection vulnerability via the pjActionLoad function.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2020-22226 β€Ό

Stivasoft (Phpjabbers) Fundraising Script v1.0 was discovered to contain a SQL injection vulnerability via the pjActionSetAmount function.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41213 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41207 β€Ό

TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

πŸ“– Read

via "National Vulnerability Database".
21:26
β€Ό CVE-2021-41251 β€Ό

@sap-cloud-sdk/core contains the core functionality of the SAP Cloud SDK as well as the SAP Business Technology Platform abstractions. This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations. In affected versions and in some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions. By default, destination caching is disabled. The security for caching has been increased. The changes are released in version 1.52.0. Users unable to upgrade are advised to disable destination caching (it is disabled by default).

πŸ“– Read

via "National Vulnerability Database".
?
22:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SecureAuth Buys Acceptto to Deliver Low-Friction Authentication to Enterprises πŸ•΄

Acceptto’s contextual behavior threat intelligence technology will help SecureAuth deliver AI-driven MFA and continuous password-less authentication, SecureAuth says.

πŸ“– Read

via "Dark Reading".
7 November 2021
?
14:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37471 β€Ό

A restricted shell escape sequence is possible on Cradlepoint IBR900-600 7.2.60 devices that can lead to an attacker denying the availability of all console or SSH command-line access.

πŸ“– Read

via "National Vulnerability Database".
14:58
β€Ό CVE-2020-23130 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:58
β€Ό CVE-2020-23129 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
8 November 2021
?
03:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-31601 β€Ό

An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. They implement a series of web services using the SOAP protocol to allow scripting interaction with the backend server. An authenticated user (regardless of privileges) can list all databases connection details and credentials.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42073 β€Ό

An issue was discovered in Barrier before 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" by default but could instead be guessed from hostnames or other publicly available information. In the active session state, an attacker can capture input device events from the server, and also modify the clipboard content on the server.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-31602 β€Ό

An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42371 β€Ό

lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-31599 β€Ό

An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. A reports (.prpt) file allows the inclusion of BeanShell scripts to ease the production of complex reports. An authenticated user can run arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-34684 β€Ό

Hitachi Vantara Pentaho Business Analytics through 9.1 allows an unauthenticated user to execute arbitrary SQL queries on any Pentaho data source and thus retrieve data from the related databases, as demonstrated by an api/repos/dashboards/editor URI.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-34685 β€Ό

UploadService in Hitachi Vantara Pentaho Business Analytics through 9.1 does not properly verify uploaded user files, which allows an authenticated user to upload various files of different file types. Specifically, a .jsp file is not allowed, but a .jsp. file is allowed (and leads to remote code execution).

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42077 β€Ό

PHP Event Calendar before 2021-09-03 allows SQL injection, as demonstrated by the /server/ajax/user_manager.php username parameter. This can be used to execute SQL statements directly on the database, allowing an adversary in some cases to completely compromise the database system. It can also be used to bypass the login form.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42372 β€Ό

A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42078 β€Ό

PHP Event Calendar through 2021-11-04 allows persistent cross-site scripting (XSS), as demonstrated by the /server/ajax/events_manager.php title parameter. This can be exploited by an adversary in multiple ways, e.g., to perform actions on the page in the context of other users, or to deface the site.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-31600 β€Ό

An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. They implement a series of web services using the SOAP protocol to allow scripting interaction with the backend server. An authenticated user (regardless of privileges) can list all valid usernames.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42074 β€Ό

An issue was discovered in Barrier before 2.3.4. An unauthenticated attacker can cause a segmentation fault in the barriers component (aka the server-side implementation of Barrier) by quickly opening and closing TCP connections while sending a Hello message for each TCP session.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42072 β€Ό

An issue was discovered in Barrier before 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage further attacks that could lead to information leaks or integrity corruption.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42075 β€Ό

An issue was discovered in Barrier before 2.3.4. The barriers component (aka the server-side implementation of Barrier) does not correctly close file descriptors for established TCP connections. An unauthenticated remote attacker can thus cause file descriptor exhaustion in the server process, leading to denial of service.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42076 β€Ό

An issue was discovered in Barrier before 2.3.4. An attacker can cause memory exhaustion in the barriers component (aka the server-side implementation of Barrier) and barrierc by sending long TCP messages.

πŸ“– Read

via "National Vulnerability Database".
03:28
β€Ό CVE-2021-42370 β€Ό

A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)

πŸ“– Read

via "National Vulnerability Database".
?
10:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 3 Ways to Deal With the Trojan Source Attack πŸ•΄

These scripts and commands can be used to block the Trojan Source attack.

πŸ“– Read

via "Dark Reading".
?
11:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Interpol issues arrest warrants for members of Clop ransomware gang πŸ—“οΈ

Wanted: cybercriminals behind global malware campaign

πŸ“– Read

via "The Daily Swig".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Campaigning lawyers launch counter-offensive against software patent trolls πŸ—“οΈ

Stemming the tide of β€˜stupid softwareΒ patentsΒ and the trolls they feed’

πŸ“– Read

via "The Daily Swig".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Could Cyber Diplomacy Be the Ultimate Answer to American Ransomware Woes? πŸ•΄

Incentives for good conduct and deterrents for bad behavior in cyberspace are impossible to effectively establish and enforce without international collaboration and commitment.

πŸ“– Read

via "Dark Reading".
12:28
β€Ό CVE-2021-32482 β€Ό

Cloudera Manager 5.x, 6.x, 7.1.x, 7.2.x, and 7.3.x allows XSS via the path parameter.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-32483 β€Ό

Cloudera Manager 7.2.4 has Incorrect Access Control, allowing Escalation of Privileges to view the restricted Dashboard.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-30132 β€Ό

Cloudera Manager 7.2.4 has Incorrect Access Control, allowing Escalation of Privileges.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-29243 β€Ό

Cloudera Manager 5.x, 6.x, 7.1.x, 7.2.x, and 7.3.x allows XSS.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-22051 β€Ό

Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-37850 β€Ό

ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-29994 β€Ό

Cloudera Hue 4.6.0 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
12:28
β€Ό CVE-2021-32481 β€Ό

Cloudera Hue 4.6.0 allows XSS via the type parameter.

πŸ“– Read

via "National Vulnerability Database".
?
13:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Valeo Networks Acquires On Time Tech, Accelerating National Growth Strategy πŸ•΄

Through this latest acquisition, the company adds two more California locations.

πŸ“– Read

via "Dark Reading".
13:38
πŸ—“οΈ Mozilla disables β€˜low usage’ encryption feature to resolve Thunderbird HTTP/2 vulnerability πŸ—“οΈ

Multiple flaws in email client resolved with security update

πŸ“– Read

via "The Daily Swig".
13:41
❌ Zoho Password Manager Flaw Torched by Godzilla Webshell ❌

A new campaign is prying apart a known security vulnerability in the Zoho ManageEngine ADSelfService Plus password manager, researchers warned over the weekend. The threat actors have managed to exploit the Zoho weakness in at least nine global entities across critical sectors so far (technology, defense, healthcare, energy and education), deploying the Godzilla webshell and […]

πŸ“– Read

via "Threat Post".
?
13:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Arctic Wolf Security Operations Cloud Reaches Massive Scale and a Global Footprint πŸ•΄

Global business momentum and technical advancements position the Arctic Wolf platform as a category-defining Security Operations solution

πŸ“– Read

via "Dark Reading".
13:58
πŸ•΄ Kaspersky Finds DDoS Attacks in Q3 Grow by 24%, Become More Sophisticated πŸ•΄

The total number of smart attacks (advanced DDoS attacks that are often targeted) increased by 31% when compared to the same period last year.

πŸ“– Read

via "Dark Reading".
13:58
πŸ•΄ Banking Malware Threats Surging as Mobile Banking Increases – Nokia Threat Intelligence Report πŸ•΄

The Nokia 2021 Threat Intelligence Report announced today shows that banking malware threats are sharply increasing as cyber criminals target the rising popularity of mobile banking on smartphones, with plots aimed at stealing personal banking credentials and credit card information.

πŸ“– Read

via "Dark Reading".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41733 β€Ό

Oppia 3.1.4 does not verify that certain URLs are valid before navigating to them.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-28023 β€Ό

Arbitrary file upload in Service import feature in ServiceTonic Helpdesk software version < 9.0.35937 allows a malicious user to execute JSP code by uploading a zip that extracts files in relative paths.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-28024 β€Ό

Unauthorized system access in the login form in ServiceTonic Helpdesk software version < 9.0.35937 allows attacker to login without using a password.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-25979 β€Ό

Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-42770 β€Ό

A Cross-site scripting (XSS) vulnerability was discovered in OPNsense before 21.7.4 via the LDAP attribute return in the authentication tester.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-28022 β€Ό

Blind SQL injection in the login form in ServiceTonic Helpdesk software < 9.0.35937 allows attacker to exfiltrate information via specially crafted HQL-compatible time-based SQL queries.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-39182 β€Ό

EnroCrypt is a Python module for encryption and hashing. Prior to version 1.1.4, EnroCrypt used the MD5 hashing algorithm in the hashing file. Beginners who are unfamiliar with hashes can face problems as MD5 is considered an insecure hashing algorithm. The vulnerability is patched in v1.1.4 of the product. As a workaround, users can remove the `MD5` hashing function from the file `hashing.py`.

πŸ“– Read

via "National Vulnerability Database".
14:39
πŸ—“οΈ Pwn2Own Austin 2021: Synacktiv crowned Masters of Pwn after Sonos One, WD NAS exploits πŸ—“οΈ

French team takes home nearly $200k in winnings as event uncovers 61 zero days

πŸ“– Read

via "The Daily Swig".
?
16:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-24706 β€Ό

The Qwizcards ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ online quizzes and flashcards WordPress plugin before 3.62 does not properly sanitize and escape some of its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-29843 β€Ό

IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack caused by an issue processing message properties. IBM X-Force ID: 205203.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24627 β€Ό

The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24816 β€Ό

The Phoenix Media Rename WordPress plugin before 3.4.4 does not have capability checks in its phoenix_media_rename AJAX action, which could allow users with Author roles to rename any uploaded media files, including ones they do not own.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24791 β€Ό

The Header Footer Code Manager WordPress plugin before 1.1.14 does not validate and escape the "orderby" and "order" request parameters before using them in a SQL statement when viewing the Snippets admin dashboard, leading to SQL injections

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24537 β€Ό

The Similar Posts WordPress plugin through 3.1.5 allow high privilege users to execute arbitrary PHP code in an hardened environment (ie with DISALLOW_FILE_EDIT, DISALLOW_FILE_MODS and DISALLOW_UNFILTERED_HTML set to true) via the 'widget_rrm_similar_posts_condition' widget setting of the plugin.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24806 β€Ό

The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24832 β€Ό

The WP SEO Redirect 301 WordPress plugin before 2.3.2 does not have CSRF in place when deleting redirects, which could allow attackers to make a logged in admin delete them via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24625 β€Ό

The SpiderCatalog WordPress plugin through 1.7.3 does not sanitise or escape the 'parent' and 'ordering' parameters from the admin dashboard before using them in a SQL statement, leading to a SQL injection when adding a category

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24840 β€Ό

The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation. As a result, private and scheduled posts could be retrieved via a crafted request.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24575 β€Ό

The School Management System ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before using POST variable in SQL queries, leading to SQL injection in multiple actions available to various authenticated users, from simple subscribers/students to teachers and above.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24631 β€Ό

The Unlimited PopUps WordPress plugin through 4.5.3 does not sanitise or escape the did GET parameter before using it in a SQL statement, available to users as low as editor, leading to an authenticated SQL Injection

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24835 β€Ό

The WCFM ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible WordPress plugin before 6.5.12, when used in combination with another WCFM - WooCommerce Multivendor plugin such as WCFM - WooCommerce Multivendor Marketplace, does not escape the withdrawal_vendor parameter before using it in a SQL statement, allowing low privilege users such as Subscribers to perform SQL injection attacks

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-29735 β€Ό

IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, and 11.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-40577 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Enrollment Management System in PHP and PayPal Free Source Code 1.0 in the Add-Users page via the Name parameter.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24698 β€Ό

The Simple Download Monitor WordPress plugin before 3.9.6 allows users with a role as low as Contributor to remove thumbnails from downloads they do not own, even if they cannot normally edit the download.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24844 β€Ό

The Affiliates Manager WordPress plugin before 2.8.7 does not validate the orderby parameter before using it in an SQL statement in the admin dashboard, leading to an SQL Injection issue

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24827 β€Ό

The Asgaros Forum WordPress plugin before 1.15.13 does not validate and escape user input when subscribing to a topic before using it in a SQL statement, leading to an unauthenticated SQL injection issue

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24697 β€Ό

The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the 1) sdm_active_tab GET parameter and 2) sdm_stats_start_date/sdm_stats_end_date POST parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-24669 β€Ό

The MAZ Loader ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ Preloader Builder for WordPress plugin before 1.3.3 does not validate or escape the loader_id parameter of the mzldr shortcode, which allows users with a role as low as Contributor to perform SQL injection.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-24829 β€Ό

The Visitor Traffic Real Time Statistics WordPress plugin before 3.9 does not validate and escape user input passed to the today_traffic_index AJAX action (available to any authenticated users) before using it in a SQL statement, leading to an SQL injection issue

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-24695 β€Ό

The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernames

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-4160 β€Ό

IBM QRadar Network Security 5.4.0 and 5.5.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 174340.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-4153 β€Ό

IBM QRadar Network Security 5.4.0 and 5.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174269.

πŸ“– Read

via "National Vulnerability Database".
?
17:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Zebra2104 Initial Access Broker Supports Rival Malware Gangs, APTs ❌

Researchers have uncovered a large, tangled web of infrastructure being used to enable a wide variety of cyberattacks.

πŸ“– Read

via "Threat Post".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What My Optometrist Taught Me About InfoSec Presentations πŸ•΄

A broken pair of eyeglasses brings into focus an important lesson about how to tailor security messages to the right audience.

πŸ“– Read

via "Dark Reading".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DDoS Attacks Shatter Records in Q3, Report Finds   ❌

Q3 DDoS attacks topped thousands daily, with more growth expected.

πŸ“– Read

via "Threat Post".
?
18:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Investor Group to Acquire McAfee for $14B πŸ•΄

The group, made up of Advent, Permira, Crosspoint Capital, CPP Investments, GIC, and ADIA, will take ownership of McAfee.

πŸ“– Read

via "Dark Reading".
18:31
β€Ό CVE-2021-39420 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exist in VFront 0.99.5 via the (1) s parameter in search_all.php and the (2) msg parameter in add.attach.php.

πŸ“– Read

via "National Vulnerability Database".
18:31
β€Ό CVE-2021-41170 β€Ό

### Impact Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. ### Patches Version 1.1.1 has addressed this vulnerability. ```php $params = [ 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1 'value' => 'My website' ] TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated) Template::embrace('<h1>{{reverse(value)}}</h1>', $params); ``` ### Workarounds Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. ### References As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)

πŸ“– Read

via "National Vulnerability Database".
?
19:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Security Strategies Are Driving InfoSec's Decisions Around Defense? πŸ•΄

The data shows security leaders are focusing on multilayered defenses, including multifactor authentication, threat intelligence, and incident response.

πŸ“– Read

via "Dark Reading".
?
19:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Kaseya ransomware suspect nabbed in Poland, $6m seized from absent colleague ⚠

Suspects nabbed, millions seized, in ransomware busts across the globe.

πŸ“– Read

via "Naked Security".
?
20:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Europol arrests three suspects possibly involved in major ransomware activities 🦿

Europol announced new arrests during its "Operation GoldDust." The suspects may have been heavily involved in the Sodinokibi/REvil and GandCrab ransomware activities.

πŸ“– Read

via "Tech Republic".
20:29
β€Ό CVE-2021-41253 β€Ό

Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2020-23572 β€Ό

BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-40260 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester Tailor Management 1.0 via the (1) eid parameter in (a) partedit.php and (b) customeredit.php, the (2) id parameter in (a) editmeasurement.php and (b) addpayment.php, and the (3) error parameter in index.php.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-40261 β€Ό

Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester CASAP Automated Enrollment System 1.0 via the (1) user_username and (2) category parameters in save_class.php, the (3) firstname, (4) class, and (5) status parameters in student_table.php, the (6) category and (7) class_name parameters in add_class1.php, the (8) fname, (9) mname,(10) lname, (11) address, (12) class, (13) gfname, (14) gmname, (15) glname, (16) rship, (17) status, (18) transport, and (19) route parameters in add_student.php, the (20) fname, (21) mname, (22) lname, (23) address, (24) class, (25) fgname, (26) gmname, (27) glname, (28) rship, (29) status, (30) transport, and (31) route parameters in save_stud.php,the (32) status, (33) fname, and (34) lname parameters in add_user.php, the (35) username, (36) firstname, and (37) status parameters in users.php, the (38) fname, (39) lname, and (40) status parameters in save_user.php, and the (41) activity_log, (42) aprjun, (43) class, (44) janmar, (45) Julsep,(46) octdec, (47) Students and (48) users parameters in table_name.

πŸ“– Read

via "National Vulnerability Database".
20:29
πŸ•΄ US Charges Ukrainian National for Kaseya Ransomware Attack πŸ•΄

Yaroslav Vasinskyi is one of seven individuals believed to be responsible for deploying REvil ransomware in attacks against 5,000 organizations.

πŸ“– Read

via "Dark Reading".
?
20:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ UL Launches SafeCyber Platform to Secure IoT πŸ•΄

UL’s SafeCyber will allow organizations to manage cybersecurity governance and processes as well as speed up time spent on firmware development.

πŸ“– Read

via "Dark Reading".
21:10
❌ REvil Affiliates Arrested; DOJ Seizes $6.1M in Ransom ❌

The U.S. is seeking the extradition of a Ukrainian man, Yaroslav Vasinskyi, whom they suspect is behind the Kaseya supply-chain attacks and other REvil attacks.

πŸ“– Read

via "Threat Post".
?
23:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ REvil Ransom Arrest, $6M Seizure, and $10M Reward β™ŸοΈ

The U.S. Department of Justice said today it arrested a Ukrainian man who deployed ransomware on behalf of the REvil ransomware gang, a Russian cybercriminal collective that has extorted hundreds of millions from victim organizations. The DOJ also said it had seized $6.1 million in cryptocurrency sent to another REvil affiliate, and that the State Department is now offering up to $10 million for information leading to the arrest of any key leaders of REvil.

πŸ“– Read

via "Krebs on Security".
9 November 2021
?
09:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Sophos 2022 Threat Report: Malware, Mobile, Machine learning and more! ⚠

The crooks have shown that they're willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.

πŸ“– Read

via "Naked Security".
?
10:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40359 β€Ό

A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files.

πŸ“– Read

via "National Vulnerability Database".
10:29
β€Ό CVE-2021-40366 β€Ό

A vulnerability has been identified in Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31884 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The DHCP client application assumes that the data supplied with the Ò€œHostnameҀ� DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-42025 β€Ό

A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31888 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). FTP server does not properly validate the length of the Ò€œMKD/XMKDҀ� command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0018)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-42021 β€Ό

A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the applicationÒ€ℒs web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-40358 β€Ό

A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2020-10052 β€Ό

A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V2.12). The affected application writes sensitive data, such as usernames and passwords in log files. A local attacker with access to the log files could use this information to launch further attacks.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31883 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2020-10053 β€Ό

A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V2.12). The affected application writes sensitive data, such as database credentials in configuration files. A local attacker with access to the configuration files could use this information to launch further attacks.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31344 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. (FSMD-2021-0004)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31890 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an TCP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0017)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-37207 β€Ό

A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-42026 β€Ό

A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31889 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). Malformed TCP packets with a corrupted SACK option leads to Information Leaks and Denial-of-Service conditions. (FSMD-2021-0015)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31885 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). TFTP server application allows for reading the contents of the TFTP memory buffer via sending malformed TFTP commands. (FSMD-2021-0009)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-42015 β€Ό

A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.26), Mendix Applications using Mendix 8 (All versions < V8.18.12), Mendix Applications using Mendix 9 (All versions < V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache.

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31887 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). FTP server does not properly validate the length of the Ò€œPWD/XPWDҀ� command, leading to stack-based buffer overflows. This may result in Denial-of-Service conditions and Remote Code Execution. (FSMD-2021-0016)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31345 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006)

πŸ“– Read

via "National Vulnerability Database".
10:30
β€Ό CVE-2021-31346 β€Ό

A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.1), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The total length of an ICMP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on the network buffer organization in memory. (FSMD-2021-0007)

πŸ“– Read

via "National Vulnerability Database".
?
11:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Multiple BusyBox Security Bugs Threaten Embedded Linux Devices ❌

Researchers discovered 14 vulnerabilities in the β€˜Swiss Army Knife’ of the embedded OS used in many OT and IoT environments. They allow RCE, denial of service and data leaks.

πŸ“– Read

via "Threat Post".
?
11:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Security breach at trading platform Robinhood sparks phishing fears πŸ—“οΈ

Social engineering attack exposes email addresses of five million investors

πŸ“– Read

via "The Daily Swig".
?
12:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Robinhood Trading Platform Data Breach Hits 7M Customers ❌

The cyberattacker attempted to extort the company after socially engineering a customer service employee to gain access to email addresses and more.

πŸ“– Read

via "Threat Post".
?
12:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The State of the CISO πŸ•΄

Dark Reading survey shows security officer influence is on the rise.

πŸ“– Read

via "Dark Reading".
12:30
πŸ•΄ Building Bridges to a More Secure Hybrid Workplace πŸ•΄

Wherever workers chose to do their jobs, they need technology that's unobtrusive, secure by design, and intuitive to use.

πŸ“– Read

via "Dark Reading".
12:34
β€Ό CVE-2021-43519 β€Ό

Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2021-3641 β€Ό

Improper Link Resolution Before File Access ('Link Following') vulnerability in the EPAG component of Bitdefender Endpoint Security Tools for Windows allows a local attacker to cause a denial of service. This issue affects: Bitdefender GravityZone version 7.1.2.33 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2021-43114 β€Ό

FORT Validator versions prior to 1.5.2 will crash if an RPKI CA publishes an X.509 EE certificate. This will lead to RTR clients such as BGP routers to lose access to the RPKI VRP data set, effectively disabling Route Origin Validation.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2019-18916 β€Ό

A potential security vulnerability has been identified for HP LaserJet Solution Software (for certain HP LaserJet Printers) which may lead to unauthorized elevation of privilege on the client.

πŸ“– Read

via "National Vulnerability Database".
?
13:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SafeBreach Closes $53.5 Million Series D in New Funding to Fuel Momentum πŸ•΄

The new capital will fuel the company's plans to expand its market footprint to new geographies and evolve its offerings in response to client needs.

πŸ“– Read

via "Dark Reading".
13:09
πŸ—“οΈ bZx crypto heist results in reported losses of more than $55 million πŸ—“οΈ

BSC and Polygon funds drained – but Ethereum contracts β€˜safe’ – following phishing attack

πŸ“– Read

via "The Daily Swig".
13:12
❌ The New Frontier of Enterprise Risk: Nth Parties ❌

The average number of vulnerabilities discovered in a Cyberpion scan of external Fortune 500 networks (such as cloud systems) was 296, many critical (with the top of the scale weighing in at a staggering 7,500).

πŸ“– Read

via "Threat Post".
13:12
❌ Security Tool Guts: How Much Should Customers See? ❌

Yaron Kassner, CTO of Silverfort, delves into the pros and cons of transparency when it comes to cybersecurity tools’ algorithms.

πŸ“– Read

via "Threat Post".
?
13:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 US amps up war on ransomware with charges against REvil attackers 🦿

One person fingered for the July 2021 attack against Kaseya is in custody, while the other individual is still at large.

πŸ“– Read

via "Tech Republic".
14:01
πŸ•΄ 83% of Critical Infrastructure Organizations Suffered Breaches, 2021 Cybersecurity Research Reveals πŸ•΄

Supply chain and third-party risk is a major threat to operational technology.

πŸ“– Read

via "Dark Reading".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43193 β€Ό

In JetBrains TeamCity before 2021.1.2, remote code execution via the agent push functionality is possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43201 β€Ό

In JetBrains TeamCity before 2021.1.3, a newly created project could take settings from an already deleted project.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43187 β€Ό

In JetBrains YouTrack Mobile before 2021.2, the client-side cache on iOS could contain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43186 β€Ό

JetBrains YouTrack before 2021.3.24402 is vulnerable to stored XSS.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43183 β€Ό

In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2019-16240 β€Ό

A Buffer Overflow and Information Disclosure issue exists in HP OfficeJet Pro Printers before 001.1937C, and HP PageWide Managed Printers and HP PageWide Pro Printers before 001.1937D exists; A maliciously crafted print file might cause certain HP Inkjet printers to assert. Under certain circumstances, the printer produces a core dump to a local device.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43197 β€Ό

In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43180 β€Ό

In JetBrains Hub before 2021.1.13690, information disclosure via avatar metadata is possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43203 β€Ό

In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2019-18914 β€Ό

A potential security vulnerability has been identified for certain HP printers and MFPs that would allow redirection page Cross-Site Scripting in a clientÒ€ℒs browser by clicking on a third-party malicious link.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43194 β€Ό

In JetBrains TeamCity before 2021.1.2, user enumeration was possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43199 β€Ό

In JetBrains TeamCity before 2021.1.2, permission checks in the Create Patch functionality are insufficient.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43192 β€Ό

In JetBrains YouTrack Mobile before 2021.2, iOS URL scheme hijacking is possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43196 β€Ό

In JetBrains TeamCity before 2021.1, information disclosure via the Docker Registry connection dialog is possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43198 β€Ό

In JetBrains TeamCity before 2021.1.2, stored XSS is possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43184 β€Ό

In JetBrains YouTrack before 2021.3.21051, stored XSS is possible.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43200 β€Ό

In JetBrains TeamCity before 2021.1.2, permission checks in the Agent Push functionality were insufficient.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43188 β€Ό

In JetBrains YouTrack Mobile before 2021.2, access token protection on iOS is incomplete.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43195 β€Ό

In JetBrains TeamCity before 2021.1.2, some HTTP security headers were missing.

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-43181 β€Ό

In JetBrains Hub before 2021.1.13690, stored XSS is possible.

πŸ“– Read

via "National Vulnerability Database".
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Avast Antivirus Free review: Our free favourite for older Windows PCs πŸ“’

Effective free antivirus that’ll work on operating systems all the way back to Windows 7

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Sitecore XP RCE vulnerability actively exploited, ACSC warns πŸ“’

Flaw was fixed last month but hackers now moving against patching laggards

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Investor group snaps up McAfee for $14 billion πŸ“’

The cyber security firm is to be taken private just a year after it returned to the stock market

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Expired certificate to blame for broken Windows 11 apps πŸ“’

Microsoft has released a patch but users are still unable to access the Snipping Tool

πŸ“– Read

via "ITPro".
15:04
πŸ“’ A guide to cyber security certification and training πŸ“’

Cyber security skills are in demand from every organisation, but what training and certification is needed?

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Vulnerability in Linux kernel could let hackers remotely take over systems πŸ“’

Heap overflow attacks can exploit TIPC module in all common Linux distributions

πŸ“– Read

via "ITPro".
15:04
πŸ“’ What is Maze ransomware? πŸ“’

This Windows ransomware has targeted many organisations worldwide

πŸ“– Read

via "ITPro".
15:04
πŸ“’ US government sanctions crypto-exchange Chatex over ransomware allegations πŸ“’

Treasury department moves to sanction another exchange following restriction of Suex in September

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Proofpoint impersonator steal Microsoft, Google logins in phishing campaign πŸ“’

Clever hackers dodged Microsoft security by pretending to be a cyber security firm

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Researcher awarded $50,000 for discovering Samsung Galaxy S21 hack πŸ“’

UK researcher Sam Thomas won the Pwn2Own bounty using a "unique three-bug chain"

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Counting the consequences of cyber attacks πŸ“’

How can governments respond to the growing risk of online attacks by hostile nations?

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Fake Steam phishing baits victims with free Discord Nitro πŸ“’

Victims end up on a fake page where their credentials are stolen

πŸ“– Read

via "ITPro".
15:04
πŸ“’ US offers $10 million for information on BlackMatter ransomware operators πŸ“’

The sizeable reward will be given to anyone who can aid the investigation into those believed to be behind the Colonial Pipeline attack

πŸ“– Read

via "ITPro".
15:04
πŸ“’ IoT privacy and security concerns πŸ“’

We take a look at what's needed to really secure internet-connected devices

πŸ“– Read

via "ITPro".