πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-36584 β€Ό

An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37156 β€Ό

Redmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the user's account, but the intended behavior is for those sessions to be terminated.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32581 β€Ό

Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation.

πŸ“– Read

via "National Vulnerability Database".
❌ Black Hat: New CISA Head Woos Crowd With Public-Private Task Force ❌

Day two Black Hat keynote by CISA Director Jen Easterly includes launch of private-public partnership with Amazon, Google and Microsoft to fight cybercrime.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-22392 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ CISA Launches JCDC, the Joint Cyber Defense Collaborative πŸ•΄

"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.

πŸ“– Read

via "Dark Reading".
🦿 FTC warns of phishing scams over unemployment benefits 🦿

The scam messages try to convince you to enter your Social Security number and other personal info at a website masquerading as your state's workforce agency.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-32587 β€Ό

An improper access control vulnerability in FortiManager and FortiAnalyzer GUI interface 7.0.0, 6.4.5 and below, 6.2.8 and below, 6.0.11and below, 5.6.11and below may allow a remote and authenticated attacker with restricted user profile to retrieve the list of administrative users of other ADOMs and their related configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32597 β€Ό

Multiple improper neutralization of input during web page generation (CWE-79) in FortiManager and FortiAnalyzer versions 7.0.0, 6.4.5 and below, 6.2.7 and below user interface, may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious payload in GET parameters.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five 8/6 πŸ”

An increase in supply chain attacks, RDP brute force attacks explained, and a hacked hotel room - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ•΄ HTTP/2 Implementation Errors Exposing Websites to Serious Risks πŸ•΄

Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.

πŸ“– Read

via "Dark Reading".
⚠ Conti ransomware affiliate goes rogue, leaks β€œgang data” ⚠

Once more unto the breach, dear friends, once more...

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-38149 β€Ό

index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38151 β€Ό

index.php/appointment/todos in Chikitsa Patient Management System 2.0.0 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37388 β€Ό

A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37381 β€Ό

Southsoft GMIS 5.0 is vulnerable to CSRF attacks. Attackers can access other users' private information such as photos through CSRF. For example: any student's photo information can be accessed through /gmis/(S([1]))/student/grgl/PotoImageShow/?bh=[2]. Among them, the code in [1] is a random string generated according to the user's login related information. It can protect the user's identity, but it can not effectively prevent unauthorized access. The code in [2] is the student number of any student. The attacker can carry out CSRF attack on the system by modifying [2] without modifying [1].

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38152 β€Ό

index.php/appointment/insert_patient_add_appointment in Chikitsa Patient Management System 2.0.0 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22295 β€Ό

A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler.

πŸ“– Read

via "National Vulnerability Database".
🦿 Phishing continues to target big businesses and exploit COVID-19 fears in Q2 2021 🦿

Spam as a share of global mail traffic rose, and attackers have started to adapt their scams to other languages to reach wider audiences.

πŸ“– Read

via "Tech Republic".
🦿 Amazon Kindle flaws could have allowed attackers to control the device 🦿

Now patched by Amazon, security vulnerabilities found by Check Point would have given attackers access to a Kindle device and its stored data.

πŸ“– Read

via "Tech Republic".
🦿 The most secure browser for transmitting sensitive data is definitely not Chrome 🦿

Jack Wallen addresses the challenging question of which browser is best to use for transmitting encrypted data.

πŸ“– Read

via "Tech Republic".