πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-24826 β€Ό

A vulnerability in the elf::section::as_strtab function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24824 β€Ό

A global buffer overflow issue in the dwarf::line_table::line_table function of Libelfin v0.3 allows attackers to cause a denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24827 β€Ό

A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29765 β€Ό

IBM PowerVM Hypervisor FW940 and FW950 could allow an attacker to obtain sensitive information if they gain service access to the FSP. IBM X-Force ID: 202476.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32590 β€Ό

Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow an attacker with regular user's privileges to execute arbitrary commands on the underlying SQL database via specifically crafted HTTP requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35463 β€Ό

Cross-site scripting (XSS) vulnerability in the Frontend Taglib module in Liferay Portal 7.4.0 allows remote attackers to inject arbitrary web script or HTML into the management toolbar search via the `keywords` parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24821 β€Ό

A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26098 β€Ό

An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24010 β€Ό

Improper limitation of a pathname to a restricted directoryΓ‚ vulnerabilities in FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated user to obtain unauthorized access to files and data via specifially crafted web requests.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32594 β€Ό

An unrestricted file upload vulnerability in the web interface of FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow a low-privileged user to potentially tamper with the underlying system's files via the upload of specifically crafted files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4707 β€Ό

IBM API Connect 5.0.0.0 through 5.0.8.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187370.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36764 β€Ό

In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36168 β€Ό

A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted GET requestΓ‚ with maliciousΓ‚ parameter values.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36765 β€Ό

In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24018 β€Ό

A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33338 β€Ό

The Layout module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 6, exposes the CSRF token in URLs, which allows man-in-the-middle attackers to obtain the token and conduct Cross-Site Request Forgery (CSRF) attacks via the p_auth parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3678 β€Ό

showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

πŸ“– Read

via "National Vulnerability Database".
🦿 Cybersecurity pros wanted: Tips for hiring IT and security talent right now 🦿

Companies are pulling out all of the stops to attract top talent in a tight labor market. These tips could help companies attract and retain cybersecurity pros in the months ahead.

πŸ“– Read

via "Tech Republic".
πŸ” How Much Does a Data Breach Cost in 2021? πŸ”

The cost of data breaches continues to rise; according to this annual report, the global shift to remote work is partly to blame.

πŸ“– Read

via "".
β€Ό CVE-2021-34845 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14034.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34835 β€Ό

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14015.

πŸ“– Read

via "National Vulnerability Database".