πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-19001 β€Ό

Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component 'simiki/blob/master/simiki/config.py'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28694 β€Ό

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28700 β€Ό

xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an administrator originally configured.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18998 β€Ό

Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component '/admin/custom/blog-plugin/add'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19000 β€Ό

Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28698 β€Ό

long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of "cooperating" guests may, however, cause the effects to be more severe.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32758 β€Ό

OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23226 β€Ό

Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) datat.ph_inpup, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php.

πŸ“– Read

via "National Vulnerability Database".
❌ Winning the Cyber-Defense Race: Understand the Finish Line ❌

Kerry Matre, Mandiant senior director, clears up misconceptions about the value to business for enterprise cyber-defense. Hint: It's not achieving visibility.

πŸ“– Read

via "Threat Post".
❌ Experts: WH Cybersecurity Summit Should Be Followed by Regulation, Enforcement ❌

Amazon, Google, Microsoft etc. making major commitments to shore up nation’s cyber-defenses just won't be enough, researchers say.

πŸ“– Read

via "Threat Post".
🦿 Security alert: The threat is coming from inside your Docker container images 🦿

Five malicious Docker container images were recently detected on Docker Hub, totaling more than 120,000 pulls.

πŸ“– Read

via "Tech Republic".
❌ Parallels Offers β€˜Inconvenient’ Fix for High-Severity Bug ❌

Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-18106 β€Ό

The GET parameter "id" in WMS v1.0 is passed without filtering, which allows attackers to perform SQL injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18114 β€Ό

An arbitrary file upload vulnerability in the /uploads/dede component of DedeCMS V5.7SP2 allows attackers to upload a webshell in HTM format.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18116 β€Ό

A lack of filtering for searched keywords in the search bar of YouDianCMS 8.0 allows attackers to perform SQL injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39174 β€Ό

Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.

πŸ“– Read

via "National Vulnerability Database".
❌ T-Mobile’s Security Is β€˜Awful,’ Says Purported Thief ❌

John Binns, claiming to be behind the massive T-Mobile theft of >50m customer records, dissed the security measures of the US's No. 2 wireless biggest carrier. T-Mobile is "humbled," it said, announcing new partnerships with security heavyweights on Friday.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-40176 β€Ό

Zoho ManageEngine Log360 before Build 5225 allows stored XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40172 β€Ό

Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40175 β€Ό

Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40177 β€Ό

Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.

πŸ“– Read

via "National Vulnerability Database".