πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Edge Poll: XDR Plans πŸ•΄

How likely is your organization to adopt XDR technology?

πŸ“– Read

via "Dark Reading".
πŸ•΄ What CISOs Can Learn From Big Breaches: Focus on the Root Causes πŸ•΄

Address these six technical root causes of breaches in order to keep your company safer.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep24: How not to get snooped, scammed or hoaxed [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-26236 β€Ό

FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28417 β€Ό

A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php and the "search_name" parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28419 β€Ό

The "order_col" parameter in archive.php of SEO Panel 4.8.0 is vulnerable to time-based blind SQL injection, which leads to the ability to retrieve all databases.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23359 β€Ό

This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28418 β€Ό

A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via settings.php and the "category" parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28420 β€Ό

A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via alerts.php and the "from_time" parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Digital Guardian Gives Customers Control Over Collaboration Software πŸ”

Four new policy packs can help customers better control file movement across popular collaboration software like Microsoft Teams, Slack, Zoom, and Skype.

πŸ“– Read

via "Digital Guardian".
❌ Security Researcher Hides ZIP, MP3 Files Inside PNG Files on Twitter ❌

The newly discovered steganography method could be exploited by threat actors to obscure nefarious activity inside photos hosted on the social-media platform.

πŸ“– Read

via "Threat Post".
❌ Zoom Screen-Sharing Glitch β€˜Briefly’ Leaks Sensitive Data ❌

A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-24142 β€Ό

Unvaludated input in the 301 Redirects - Easy Redirect Manager WordPress plugin, versions before 2.51, did not sanitise its "Redirect From" column when importing a CSV file, allowing high privilege users to perform SQL injections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24140 β€Ό

Unvalidated input in the Ajax Load More WordPress plugin, versions before 5.3.2, lead to SQL Injection in POST /wp-admin/admin-ajax.php with param repeater=' or sleep(5)#&type=test.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24137 β€Ό

Unvalidated input in the Blog2Social WordPress plugin, versions before 6.3.1, lead to SQL Injection in the Re-Share Posts feature, allowing authenticated users to inject arbitrary SQL commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24124 β€Ό

Unvalidated input and lack of output encoding in the WP Shieldon WordPress plugin, version 1.6.3 and below, leads to Unauthenticated Reflected Cross-Site Scripting (XSS) when the CAPTCHA page is shown could lead to privileged escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21625 β€Ό

Jenkins CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins in some circumstances.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24129 β€Ό

Unvalidated input and lack of output encoding in the Themify Portfolio Post WordPress plugin, versions before 1.1.6, lead to Stored Cross-Site Scripting (XSS) vulnerabilities allowing low-privileged users (Contributor+) to inject arbitrary JavaScript code or HTML in posts where the Themify Custom Panel is embedded, which could lead to privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24134 β€Ό

Unvalidated input and lack of output encoding in the Constant Contact Forms WordPress plugin, versions before 1.8.8, lead to multiple Stored Cross-Site Scripting vulnerabilities, which allowed high-privileged user (Editor+) to inject arbitrary JavaScript code or HTML in posts where the malicious form is embed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24136 β€Ό

Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters: - Author - Job Title - Location - Company - Email - URL

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24139 β€Ό

Unvalidated input in the Photo Gallery (10Web Photo Gallery) WordPress plugin, versions before 1.5.55, leads to SQL injection via the frontend/models/model.php bwg_search_x parameter.

πŸ“– Read

via "National Vulnerability Database".