πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Flawfinder 2.0.18 πŸ› 

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

πŸ“– Read

via "Packet Storm Security".
πŸ” Friday Five 6/25 πŸ”

Ransomware debates, spyware indictments, and CISA confirmations- catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "".
πŸ•΄ Data Privacy Is in 23andMe CSO's DNA πŸ•΄

How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ourselves," says the biotech and genetic testing company's head of security.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3314 β€Ό

** UNSUPPORTED WHEN ASSIGNED ** Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35501 β€Ό

PandoraFMS <=7.54 allows Stored XSS by placing a payload in the name field of a visual console. When a user or an administrator visits the console, the XSS payload will be executed.

πŸ“– Read

via "National Vulnerability Database".
❌ FIN7 β€˜Pen Tester’ Headed to Jail Amid $1B in Payment-Card Losses ❌

One of the Carbanak cybergang's highest-level hackers is destined to serve seven years while making $2.5 million in restitution payments.

πŸ“– Read

via "Threat Post".
🦿 Ransomware-as-a-service business model takes a hit in the aftermath of the Colonial Pipeline attack 🦿

Cybercrime gangs are finding it harder to recruit partners for the affiliate programs that power ransomware attacks.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-33529 β€Ό

In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33532 β€Ό

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33542 β€Ό

Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected.

πŸ“– Read

via "National Vulnerability Database".
🦿 Linux: How to find details about user logins 🦿

If you need to gather information on user logins for your Linux servers, Jack Wallen has just the tool for you.

πŸ“– Read

via "Tech Republic".
❌ PS3 Players Ban: Latest Victims of Surging Attacks on Gaming Industry   ❌

Every Sony PlayStation 3 ID out there was compromised, provoking bans of legit players on the network.

πŸ“– Read

via "Threat Post".
πŸ•΄ New CPU Baseline for Windows 11 Will Ensure Better Security, Microsoft Says πŸ•΄

Redmond's latest OS will run only on systems with TPM 2.0 chips.

πŸ“– Read

via "Dark Reading".
❌ Mercedes-Benz Customer Data Flies Out the Window ❌

For over three years, a vendor was recklessly driving the cloud-stored data of luxury-car-owning customers and wannabe buyers.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-35502 β€Ό

app/View/Elements/genericElements/IndexTable/Fields/generic_field.ctp in MISP 2.4.144 does not sanitize certain data related to generic-template:index.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25654 β€Ό

An arbitrary code execution vulnerability was discovered in Avaya Aura Device Services that may potentially allow a local user to execute specially crafted scripts. Affects 7.0 through 8.1.4.0 versions of Avaya Aura Device Services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1073 β€Ό

NVIDIA GeForce Experience, all versions prior to 3.23, contains a vulnerability where, if a user clicks on a maliciously formatted link that opens the GeForce Experience login page in a new browser tab instead of the GeForce Experience application and enters their login information, the malicious site can get access to the token of the user login session. Such an attack may lead to these targeted users' data being accessed, altered, or lost.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35513 β€Ό

Mermaid before 8.11.0 allows XSS when the antiscript feature is used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20751 β€Ό

Cross-site scripting vulnerability in EC-CUBE EC-CUBE 4.0.0 to 4.0.5-p1 (EC-CUBE 4 series) allows a remote attacker to inject an arbitrary script by leading an administrator or a user to a specially crafted page and to perform a specific operation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20745 β€Ό

Inkdrop versions prior to v5.3.1 allows an attacker to execute arbitrary OS commands on the system where it runs by loading a file or code snippet containing an invalid iframe into Inkdrop.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20749 β€Ό

Cross-site scripting vulnerability in Fudousan plugin ver5.7.0 and earlier, Fudousan Plugin Pro Single-User Type ver5.7.0 and earlier, and Fudousan Plugin Pro Multi-User Type ver5.7.0 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".