πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-22643 β€Ό

Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13697 β€Ό

An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.

πŸ“– Read

via "National Vulnerability Database".
❌ 10K Microsoft Email Users Hit in FedEx Phishing Attack ❌

Microsoft users are receiving emails pretending to be from mail couriers FedEx and DHL Express - but that really steal their credentials.

πŸ“– Read

via "Threat Post".
πŸ•΄ CVSS as a Framework, Not a Score πŸ•΄

The venerable system has served us well but is now outdated. Not that it's time to throw the system away -- use it as a framework to measure risk using modern, context-based methods.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-20242 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-20176. Reason: This candidate is a reservation duplicate of CVE-2021-20176. Notes: All CVE users should reference CVE-2021-20176 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14359 β€Ό

A vulnerability was found in all versions of keycloak, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Security + Fraud Protection: Your One-Two Punch Against Cyberattacks πŸ•΄

When siloed functions unite in the face of cyberthreats, organizations can continue, uninterrupted, along their paths to digital transformation.

πŸ“– Read

via "Dark Reading".
⚠ Keybase secure messaging fixes photo-leaking bug – patch now! ⚠

It's a bit like Snapchat all over again - but this bug was quickly fixed.

πŸ“– Read

via "Naked Security".
πŸ›  Zeek 3.2.4 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
❌ Finnish IT Giant Hit with Ransomware Cyberattack ❌

A major Finnish IT provider has been hit with a ransomware attack that has forced the company to turn off some services and infrastructure in a disruption to customers, while it takes recovery measures. Norwegian business journal E24 reported the attack on Espoo, Finland-based TietoEVRY on Tuesday, claiming to have spoken with Geir Remman, a […]

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-4953 β€Ό

IBM Planning Analytics 2.0 could allow a remote authenticated attacker to obtain information about an organization's internal structure by exposing sensitive information in HTTP repsonses. IBM X-Force ID: 192029.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28432 β€Ό

All versions of package theme-core are vulnerable to Command Injection via the lib/utils.js file, which is required by main entry of the package. PoC: var a =require("theme-core"); a.utils.sh("touch JHU")

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25630 β€Ό

"loolforkit" is a privileged program that is supposed to be run by a special, non-privileged "lool" user. Before doing anything else "loolforkit" checks, if it was invoked by the "lool" user, and refuses to run with privileges, if it's not the case. In the vulnerable version of "loolforkit" this check was wrong, so a normal user could start "loolforkit" and eventually get local root privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27550 β€Ό

Polaris Office v9.102.66 is affected by a divide-by-zero error in PolarisOffice.exe and EngineDLL.dll that may cause a local denial of service. To exploit the vulnerability, someone must open a crafted PDF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7847 β€Ό

The ipTIME NAS product allows an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. This issue affects: pTIME NAS 1.4.36.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3252 β€Ό

KACO New Energy XP100U Up to XP-JAVA 2.0 is affected by incorrect access control. Credentials will always be returned in plain-text from the local server during the KACO XP100U authentication process, regardless of whatever passwords have been provided, which leads to an information disclosure vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28431 β€Ό

All versions of package wc-cmd are vulnerable to Command Injection via the index.js file. PoC: var a =require("wc-cmd"); a("touch JHU")

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28429 β€Ό

All versions of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28430 β€Ό

All versions of package nuance-gulp-build-common are vulnerable to Command Injection via the index.js file. PoC: /var a = require("nuance-gulp-build-common") a.run("touch JHU")

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Augmenting SMB Defense Strategies With MITRE ATT&CK: A Primer πŸ•΄

Any organization can use MITRE ATT&CK as a force multiplier, but it's especially valuable for small ones.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-22651 β€Ό

When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders.

πŸ“– Read

via "National Vulnerability Database".