πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-28972 β€Ό

In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25284 β€Ό

An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27225 β€Ό

In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25329 β€Ό

The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25122 β€Ό

When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ How Criminals Job Hunt on the Dark Web πŸ•΄

How's your 'Probiv'? How about customer service? Here's how Dark Web forums connect cybercriminals looking for talent with those looking for work -- and which skills are hot right now.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Building a Next-Generation SOC Starts With Holistic Operations πŸ•΄

The proper template for a modernized SOC team is one that operates seamlessly across domains with a singular, end-to-end view.

πŸ“– Read

via "Dark Reading".
⚠ Naked Security Live – Beware copyright scams ⚠

Here's the latest Naked Security Live talk - watch now!

πŸ“– Read

via "Naked Security".
❌ Firewall Vendor Patches Critical Auth Bypass Flaw ❌

Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users.

πŸ“– Read

via "Threat Post".
πŸ›  American Fuzzy Lop plus plus 3.10c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
πŸ›  Faraday 3.14.2 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
πŸ•΄ MSP Provider Builds Red Team as Attackers Target Industry πŸ•΄

NinjaRMM, which provides tools for managed service providers, aims to create a red team capability following years of attacks against MSPs.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-25829 β€Ό

An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25833 β€Ό

A file extension handling issue was found in [server] module of ONLYOFFICE DocumentServer v4.2.0.71-v5.6.0.21. The file extension is controlled by an attacker through the request data and leads to arbitrary file overwriting. Using this vulnerability, a remote attacker can obtain remote code execution on DocumentServer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25831 β€Ό

A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. An attacker must request the conversion of the crafted file from PPTT into PPTX format. Using the chain of two other bugs related to improper string handling, a remote attacker can obtain remote code execution on DocumentServer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7929 β€Ό

A user authorized to perform database queries may trigger denial of service by issuing specially crafted query contain a type of regex. This issue affects: MongoDB Inc. MongoDB Server v3.6 versions prior to 3.6.21 and MongoDB Server v4.0 versions prior to 4.0.20.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25832 β€Ό

A heap buffer overflow vulnerability inside of BMP image processing was found at [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v6.0.0. Using this vulnerability, an attacker is able to gain remote code executions on DocumentServer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9479 β€Ό

When loading a UDF, a specially crafted zip file could allow files to be placed outside of the UDF deployment directory. This issue affected Apache AsterixDB unreleased builds between commits 580b81aa5e8888b8e1b0620521a1c9680e54df73 and 28c0ee84f1387ab5d0659e9e822f4e3923ddc22d. Note: this CVE may be REJECTed as the issue did not affect any released versions of Apache AsterixDB

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25830 β€Ό

A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.2.0.236-v5.6.4.13. An attacker must request the conversion of the crafted file from DOCT into DOCX format. Using the chain of two other bugs related to improper string handling, an attacker can achieve remote code execution on DocumentServer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-25004 β€Ό

A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22114 β€Ό

Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder.

πŸ“– Read

via "National Vulnerability Database".