πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  OpenSSH 8.7p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
🦿 It's time to retire the Social Security number 🦿

With 40 million people having their SSN exposed during the T-Mobile hack, it's time to reconsider the usefulness of the Social Security number.

πŸ“– Read

via "Tech Republic".
🦿 Great Resignation hits IT departments and companies are switching strategies 🦿

To ensure business continuity amid high turnover, many CIOs are planning to alter their strategies to make the company "less dependent on employee institutional knowledge," says PwC.

πŸ“– Read

via "Tech Republic".
⚠ Japanese cryptocoin exchange robbed of $100,000,000 ⚠

Another week, another cryptocurrency catastrophe. This time, it's "only" $100 million's worth...

πŸ“– Read

via "Naked Security".
⚠ S3 Ep46: Copyright scams, video snooping and Grand Theft Crypto [Podcast] ⚠

Lastest episode - listen, laugh and learn! This week, Chester Wisniewski joins us on the show.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-36474 β€Ό

SafeCurl before 0.9.2 has a DNS rebinding vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18886 β€Ό

Unrestricted File Upload in PHPMyWind v5.6 allows remote attackers to execute arbitrary code via the component 'admin/upload_file_do.php'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18879 β€Ό

Unrestricted File Upload in Bludit v3.8.1 allows remote attackers to execute arbitrary code by uploading malicious files via the component 'bl-kereln/ajax/upload-logo.php'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18885 β€Ό

Command Injection in PHPMyWind v5.6 allows remote attackers to execute arbitrary code via the "text color" field of the component '/admin/web_config.php'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18877 β€Ό

SQL Injection in Wuzhi CMS v4.1.0 allows remote attackers to obtain sensitive information via the 'flag' parameter in the component '/coreframe/app/order/admin/index.php'.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five 8/20 πŸ”

Exposed web cams, mistakes made when hiring cybersecurity roles, and a $1 million breach settlement - catch up on the week's infosec news with the Friday Five!

πŸ“– Read

via "".
β€Ό CVE-2021-34228 β€Ό

Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34218 β€Ό

Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34223 β€Ό

Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34207 β€Ό

Cross-site scripting in ddns.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Domain Name" field, "Server Address" field, "User Name/Email", or "Password/Key" field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34215 β€Ό

Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Service Name" field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34220 β€Ό

Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "User Name" field or "Password" field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34433 β€Ό

In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35529 β€Ό

Insufficiently Protected Credentials vulnerability in client environment of Hitachi ABB Power Grids Retail Operations and Counterparty Settlement Billing (CSB) allows an attacker or unauthorized user to access database credentials, shut down the product and access or alter. This issue affects: Hitachi ABB Power Grids Retail Operations version 5.7.2 and prior versions. Hitachi ABB Power Grids Counterparty Settlement Billing (CSB) version 5.7.2 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35984 β€Ό

Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability achieve an application denial-of-service in the context of the current user. Exploitation of this issue does not requires user interaction.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28636 β€Ό

Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker with access to the victim's C:/ folder could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".