πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
❌ Accenture Confirms LockBit Ransomware Attack ❌

LockBit offered Accenture's purported databases and made a requisite jab at its purportedly sad security. Accenture says it recovered just fine from backups.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-21363 β€Ό

An arbitrary file deletion vulnerability exists within Maccms10.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25560 β€Ό

In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on Ò€œpingҀ�, Ò€œtracerouteҀ� and Ò€œsnmpҀ� functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33793 β€Ό

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write because the Cross-Reference table is mishandled during Office document conversion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33791 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22098 β€Ό

UAA server versions prior to 75.4.0 are vulnerable to an open redirect vulnerability. A malicious user can exploit the open redirect vulnerability by social engineering leading to take over of victimsÒ€ℒ accounts in certain cases along with redirection of UAA users to a malicious sites.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25565 β€Ό

In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on Ò€œpingҀ�, Ò€œtracerouteҀ� and Ò€œsnmpҀ� functions and execute code on the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-16630 β€Ό

In SapphireIMS 4097_1, a guest user can create a local administrator account on any system that has SapphireIMS installed, because of an Insecure Direct Object Reference (IDOR) in the local user creation function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32438 β€Ό

The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25562 β€Ό

In SapphireIMS 5.0, there is no CSRF token present in the entire application. This can lead to CSRF vulnerabilities in critical application forms like account resent.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32437 β€Ό

The gf_hinter_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25564 β€Ό

In SapphireIMS 5.0, it is possible to create local administrator on any client with credentials of a non-privileged user by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32439 β€Ό

Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25561 β€Ό

SapphireIMS 5 utilized default sapphire:ims credentials to connect the client to server. This credential is saved in ServerConf.config file in the client.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21362 β€Ό

A cross site scripting (XSS) vulnerability in the background search function of Maccms10 allows attackers to execute arbitrary web scripts or HTML via the 'wd' parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25563 β€Ό

In SapphireIMS 5.0, it is possible to create local administrator on any client without requiring any credentials by directly accessing RemoteMgmtTaskSave (Automation Tasks) feature and not having a JSESSIONID.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-16629 β€Ό

In SapphireIMS 4097_1, it is possible to guess the registered/active usernames of the software from the errors it gives out for each type of user on the Login form. For "Incorrect User" - it gives an error "The application failed to identify the user. Please contact administrator for help." For "Correct User and Incorrect Password" - it gives an error "Authentication failed. Please login again."

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33794 β€Ό

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 allow information disclosure or an application crash after mishandling the Tab key during XFA form interaction.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32440 β€Ό

The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21359 β€Ό

An arbitrary file upload vulnerability in the Template Upload function of Maccms10 allows attackers bypass the suffix whitelist verification to execute arbitrary code via adding a character to the end of the uploaded file's name.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2017-16632 β€Ό

In SapphireIMS 4097_1, the password in the database is stored in Base64 format.

πŸ“– Read

via "National Vulnerability Database".