πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-2397 β€Ό

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

πŸ“– Read

via "National Vulnerability Database".
❌ Indictments, Attribution Unlikely to Deter Chinese Hacking, Researchers Say ❌

Researchers are skeptical that much will come from calling out China for the Microsoft Exchange attacks and APT40 activity, but the move marks an important foreign-policy change.

πŸ“– Read

via "Threat Post".
❌ NPM Package Steals Passwords via Chrome’s Account-Recovery Tool ❌

In another vast software supply-chain attack, the password-stealer is filching credentials from Chrome on Windows systems.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-22150 β€Ό

A cross site scripting (XSS) vulnerability in /admin.php?page=permalinks of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
🦿 Should we use AI in cybersecurity? Yes, but with caution and human help 🦿

Artificial intelligence is a powerful tool, and an expert says we had better ensure it stays just thatβ€”a useful tool.

πŸ“– Read

via "Tech Republic".
🦿 How to activate Microsoft Defender Application Guard in Windows 10 🦿

Microsoft Defender Application Guard protects your networks and data from malicious applications running in your web browser, but you must install and activate it first.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-19492 β€Ό

There is a floating point exception in ReadImage that leads to a Segmentation fault in sam2p 0.49.4. A crafted input will lead to a denial of service or possibly unspecified other impact.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19475 β€Ό

An issue has been found in function CCITTFaxStream::lookChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid write of size 2 .

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32776 β€Ό

Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, CSRF tokens can be reused by a malicious user, as on Windows servers no cleanup is done on CSRF tokens. This issue is fixed in versions 2.7.4 and 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37220 β€Ό

MuPDF through 1.18.1 has an out-of-bounds write because the cached color converter does not properly consider the maximum key size of a hash table. This can, for example, be seen with crafted "mutool draw" input.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1093 β€Ό

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in firmware where the driver contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary, and may lead to denial of service or system crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1089 β€Ό

NVIDIA GPU Display Driver for Windows contains a vulnerability in nvidia-smi where an uncontrolled DLL loading path may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1090 β€Ό

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for control calls where the software reads or writes to a buffer by using an index or pointer that references a memory location after the end of the buffer, which may lead to data tampering or denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1096 β€Ό

NVIDIA Windows GPU Display Driver for Windows contains a vulnerability in the NVIDIA kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where dereferencing a NULL pointer may lead to a system crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1091 β€Ό

NVIDIA GPU Display driver for Windows contains a vulnerability where an unprivileged user can create a file hard link that causes the driver to overwrite a file that requires elevated privilege to modify, which could lead to data loss or denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1092 β€Ό

NVIDIA GPU Display Driver for Windows contains a vulnerability in the NVIDIA Control Panel application where it is susceptible to a Windows file system symbolic link attack where an unprivileged attacker can cause the applications to overwrite privileged files, resulting in potential denial of service or data loss.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28131 β€Ό

Impala sessions use a 16 byte secret to verify that the session is not being hijacked by another user. However, these secrets appear in the Impala logs, therefore Impala users with access to the logs can use another authenticated user's sessions with specially constructed requests. This means the attacker is able to execute statements for which they don't have the necessary privileges otherwise. Impala deployments with Apache Sentry or Apache Ranger authorization enabled may be vulnerable to privilege escalation if an authenticated attacker is able to hijack a session or query from another authenticated user with privileges not assigned to the attacker. Impala deployments with audit logging enabled may be vulnerable to incorrect audit logging as a user could undertake actions that were logged under the name of a different authenticated user. Constructing an attack requires a high degree of technical sophistication and access to the Impala system as an authenticated user. Mitigation: If an Impala deployment uses Apache Sentry, Apache Ranger or audit logging, then users should upgrade to a version of Impala with the fix for IMPALA-10600. The Impala 4.0 release includes this fix. This hides session secrets from the logs to eliminate the risk of any attack using this mechanism. In lieu of an upgrade, restricting access to logs that expose secrets will reduce the risk of an attack. Restricting access to the Impala deployment to trusted users will also reduce the risk of an attack. Log redaction techniques can be used to redact secrets from the logs.

πŸ“– Read

via "National Vulnerability Database".
❌ Microsoft Issues Windows 10 Workaround Fix for β€˜SeriousSAM’ Bug ❌

A privilege elevation bug in Windows 10 opens all systems to attackers to access data and create new accounts on systems.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-20596 β€Ό

NULL Pointer Dereference in MELSEC-F Series FX3U-ENET firmware version 1.14 and prior, FX3U-ENET-L firmware version 1.14 and prior and FX3U-ENET-P502 firmware version 1.14 and prior allows a remote unauthenticated attacker to cause a DoS condition in communication by sending specially crafted packets. Control by MELSEC-F series PLC is not affected and system reset is required for recovery.

πŸ“– Read

via "National Vulnerability Database".
🦿 Windows "HiveNightmare" bug could expose system files to non-admin users 🦿

An attacker who exploits this flaw could use system privileges to install programs, view or delete data, and create accounts with full user rights.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2019-20467 β€Ό

An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. The device by default has a TELNET interface available (which is not advertised or functionally used, but is nevertheless available). Two backdoor accounts (root and default) exist that can be used on this interface. The usernames and passwords of the backdoor accounts are the same on all devices. Attackers can use these backdoor accounts to obtain access and execute code as root within the device.

πŸ“– Read

via "National Vulnerability Database".