πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-22400 β€Ό

Some Huawei Smartphones has an insufficient input validation vulnerability due to the lack of parameter validation. An attacker may trick a user into installing a malicious APP. The app can modify specific parameters, causing the system to crash. Affected product include:OxfordS-AN00A 10.0.1.10(C00E10R1P1),10.0.1.105(C00E103R3P3),10.0.1.115(C00E110R3P3),10.0.1.123(C00E121R3P3),10.0.1.135(C00E130R3P3),10.0.1.135(C00E130R4P1),10.0.1.152(C00E140R4P1),10.0.1.160(C00E160R4P1),10.0.1.167(C00E166R4P1),10.0.1.173(C00E172R5P1),10.0.1.178(C00E175R5P1) and 10.1.0.202(C00E79R5P1).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36159 β€Ό

libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\0' terminator one byte too late.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27953 β€Ό

A NULL pointer dereference vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to cause a denial of service, forcing the device to reboot via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27954 β€Ό

A heap-based buffer overflow vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HKProcessConfig function of the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to force the device to connect to a SSID or cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32772 β€Ό

Poddycast is a podcast app made with Electron. Prior to version 0.8.1, an attacker can create a podcast or episode with malicious characters and execute commands on the client machine. The application does not clean the HTML characters of the podcast information obtained from the Feed, which allows the injection of HTML and JS code (cross-site scripting). Being an application made in electron, cross-site scripting can be scaled to remote code execution, making it possible to execute commands on the machine where the application is running. The vulnerability is patched in Poddycast version 0.8.1.

πŸ“– Read

via "National Vulnerability Database".
🦿 Cybersecurity professionals: Positive reinforcement works wonders with users 🦿

The blame game is not working; experts suggest using positive reinforcement to improve employee attitude and performance.

πŸ“– Read

via "Tech Republic".
🦿 Beef up security in Firefox with Fission 🦿

Jack Wallen shows you how to enable Fission. Firefox developers understand web browser security is at a premium, so they've rolled out a site isolation feature.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-37556 β€Ό

A SQL injection vulnerability in reporting export in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/reporting/dashboard/csvExport/csv_HostGroupLogs.php start and end parameters.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33486 β€Ό

All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21578 β€Ό

Dell EMC iDRAC9 versions prior to 4.40.40.00 contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21576 β€Ό

Dell EMC iDRAC9 versions prior to 4.40.40.00 contain a DOM-based cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victimÒ€ℒs browser by tricking a victim in to following a specially crafted link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32814 β€Ό

Skytable is a NoSQL database with automated snapshots and TLS. Versions prior to 0.5.1 are vulnerable to a a directory traversal attack enabling remotely connected clients to destroy and/or manipulate critical files on the host's file system. This security bug has been patched in version 0.5.1. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21579 β€Ό

Dell EMC iDRAC9 versions prior to 4.40.40.00 contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36763 β€Ό

In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32017 β€Ό

An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the listing of the content of the remote file system. This can be used to identify the complete server filesystem structure, i.e., identifying all the directories and files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21577 β€Ό

Dell EMC iDRAC9 versions prior to 4.40.40.00 contain a DOM-based cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victimÒ€ℒs browser by tricking a victim in to following a specially crafted link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31503 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop Build 16.6.3.84 (package 16.6.3.134). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IGS files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12690.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21581 β€Ό

Dell EMC iDRAC9 versions prior to 5.00.00.00 contain a cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victimÒ€ℒs browser by tricking a victim in to following a specially crafted link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31504 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of OpenText Brava! Desktop Build 16.6.3.84 (package 16.6.3.134). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12691.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37558 β€Ό

A SQL injection vulnerability in a MediaWiki script in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote unauthenticated attackers to execute arbitrary SQL commands via the host_name and service_description parameters. The vulnerability can be exploited only when a valid Knowledge Base URL is configured on the Knowledge Base configuration page and points to a MediaWiki instance. This relates to the proxy feature in class/centreon-knowledge/ProceduresProxy.class.php and include/configuration/configKnowledge/proxy/proxy.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33485 β€Ό

CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.

πŸ“– Read

via "National Vulnerability Database".