πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-40173 β€Ό

Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40178 β€Ό

Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40174 β€Ό

Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37749 β€Ό

MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26084 β€Ό

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if Γ’β‚¬ΛœAllow people to sign up to create their accountÒ€ℒ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39117 β€Ό

The AssociateFieldToScreens page in Atlassian Jira Server and Data Center before version 8.18.0 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability via the name of a custom field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39272 β€Ό

Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39113 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to continue to view cached content even after losing permissions, via a Broken Access Control vulnerability in the allowlist feature. The affected versions are before version 8.13.9, and from version 8.14.0 before 8.18.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39111 β€Ό

The Editor plugin in Atlassian Jira Server and Data Center before version 8.5.18, from 8.6.0 before 8.13.10, and from version 8.14.0 before 8.18.2 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the handling of supplied content such as from a PDF when pasted into a field such as the description field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36359 β€Ό

OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38385 β€Ό

Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39271 β€Ό

OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.

πŸ“– Read

via "National Vulnerability Database".
🦿 How to use phishing simulations and security mailboxes with Microsoft 365's new security model 🦿

Microsoft 365's "secure by default" stance removes some tools used by security teams. Here's how to work around the new restrictions.

πŸ“– Read

via "Tech Republic".
❌ LockBit Gang to Publish 103GB of Bangkok Air Customer Data ❌

The airline announced the breach on Thursday, and the ransomware gang started a countdown clock the next day.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-24580 β€Ό

The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the admin dashboard before using it in SQL statement, leading to a SQL Injection issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24437 β€Ό

The Favicon by RealFaviconGenerator WordPress plugin through 1.3.20 does not sanitise or escape one of its parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting (XSS) which is executed in the context of a logged administrator.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24528 β€Ό

The FluentSMTP WordPress plugin before 2.0.1 does not sanitize parameters before storing the settings in the database, nor does the plugin escape the values before outputting them when viewing the SMTP settings set by this plugin, leading to a stored cross site scripting (XSS) vulnerability. Only users with roles capable of managing plugins can modify the plugin's settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24593 β€Ό

The Business Hours Indicator WordPress plugin before 2.3.5 does not sanitise or escape its 'Now closed message" setting when outputting it in the backend and frontend, leading to an Authenticated Stored Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37911 β€Ό

The management interface of BenQ smart wireless conference projector does not properly control user's privilege. Attackers can access any system directory of this device through the interface and execute arbitrary commands if he enters the local subnetwork.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24581 β€Ό

The Blue Admin WordPress plugin through 21.06.01 does not sanitise or escape its "Logo Title" setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin does not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24592 β€Ό

The Sitewide Notice WP WordPress plugin before 2.3 does not sanitise some of its settings before outputting them in frontend pages, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".