πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-3309 β€Ό

packages/wekan-ldap/server/ldap.js in Wekan before 4.87 can process connections even though they are not authorized by the Certification Authority trust store,

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26271 β€Ό

It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21271 β€Ό

Tendermint Core is an open source Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine - written in any programming language - and securely replicates it on many machines. Tendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this, we added a new Timestamp field to Evidence structs. This timestamp would be calculated using the same algorithm that is used when a block is created and proposed. (This algorithm relies on the timestamp of the last commit from this specific block.) In Tendermint Core v0.34.0-v0.34.2, the consensus reactor is responsible for forming DuplicateVoteEvidence whenever double signs are observed. However, the current block is still Ò€œin flightҀ� when it is being formed by the consensus reactor. It hasnÒ€ℒt been finalized through network consensus yet. This means that different nodes in the network may observe different Ò€œlast commitsҀ� when assigning a timestamp to DuplicateVoteEvidence. In turn, different nodes could form DuplicateVoteEvidence objects at the same height but with different timestamps. One DuplicateVoteEvidence object (with one timestamp) will then eventually get finalized in the block, but this means that any DuplicateVoteEvidence with a different timestamp is considered invalid. Any node that formed invalid DuplicateVoteEvidence will continue to propose invalid evidence; its peers may see this, and choose to disconnect from this node. This bug means that double signs are DoS vectors in Tendermint Core v0.34.0-v0.34.2. Tendermint Core v0.34.3 is a security release which fixes this bug. As of v0.34.3, DuplicateVoteEvidence is no longer formed by the consensus reactor; rather, the consensus reactor passes the Votes themselves into the EvidencePool, which is now responsible for forming DuplicateVoteEvidence. The EvidencePool has timestamp info that should be consistent across the network, which means that DuplicateVoteEvidence formed in this reactor should have consistent timestamps. This release changes the API between the consensus and evidence reactors.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3156 β€Ό

Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character:

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2013-2512 β€Ό

The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3317 β€Ό

KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3165 β€Ό

SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3272 β€Ό

jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.

πŸ“– Read

via "National Vulnerability Database".
❌ Apple Patches Three Actively Exploited Zero-Days, Part of iOS Emergency Update ❌

An anonymous researcher identified bugs in the software’s kernel and WebKit browser engine that are likely part of an exploit chain.

πŸ“– Read

via "Threat Post".
⚠ Apple critical patches fix in-the-wild iPhone exploits – update now! ⚠

Apple says. "Additional details available soon", which you can translate as "this one took us by surprise". So patch now!

πŸ“– Read

via "Naked Security".
🦿 How ghost accounts could leave your organization vulnerable to ransomware 🦿

Active accounts for people who have left your organization are ripe for exploitation, according to Sophos.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Security's Inevitable Shift to the Edge πŸ•΄

As the edge becomes the place for DDoS mitigation, Web app security, and other controls, SASE is the management platform to handle them all.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-4967 β€Ό

IBM Cloud Pak for Security (CP4S) 1.3.0.1 could disclose sensitive information through HTTP headers which could be used in further attacks against the system. IBM X-Force ID: 192425.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4816 β€Ό

IBM Cloud Pak for Security (CP4S) 1.4.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 189703.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-36012 β€Ό

Stored XSS vulnerability in BDTASK Multi-Store Inventory Management System 1.0 allows a local admin to inject arbitrary code via the Customer Name Field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4820 β€Ό

IBM Cloud Pak for Security (CP4S) 1.4.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4628 β€Ό

IBM Cloud Pak for Security (CP4S) 1.3.0.1 and 1.4.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 185369.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4815 β€Ό

IBM Cloud Pak for Security (CP4S) 1.4.0.0 could allow a remote user to obtain sensitive information from HTTP response headers that could be used in further attacks against the system.

πŸ“– Read

via "National Vulnerability Database".
🦿 Why Ubuntu 21.04 is an important release, even without GNOME 40 🦿

Jack Wallen discusses why the upcoming Ubuntu 21.04 is more important than some of its features would imply.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-16106 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".