βΌ CVE-2020-19046 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in S-CMS v1.0 allows remote attackers to execute arbitrary code via the component '/admin/tpl.php?page='.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19048 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in MyBB v1.8.20 allows remote attackers to inject arbitrary web script or HTML via the "Title" field found in the "Add New Forum" page by doing an authenticated POST HTTP request to '/Upload/admin/index.php?module=forum-management&action=add'.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21679 βΌ
π Read
via "National Vulnerability Database".
Jenkins Azure AD Plugin 179.vf6841393099e and earlier allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins.π Read
via "National Vulnerability Database".
π Dr Checker 4 Linux π
π Read
via "Packet Storm Security".
This is an LLVM based tool to audit Linux kernel module security using both pointer and taint analyses that are flow-sensitive, context-sensitive, and fieldsensitive on kernel drivers. It is port of Dr. Checker.π Read
via "Packet Storm Security".
Packetstormsecurity
Dr Checker 4 Linux β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Hashcat Advanced Password Recovery 6.2.4 Source Code π
π Read
via "Packet Storm Security".
Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
Hashcat Advanced Password Recovery 6.2.4 Source Code β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Flawfinder 2.0.19 π
π Read
via "Packet Storm Security".
Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.π Read
via "Packet Storm Security".
Packetstormsecurity
Flawfinder 2.0.19 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Hashcat Advanced Password Recovery 6.2.4 Binary Release π
π Read
via "Packet Storm Security".
Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.π Read
via "Packet Storm Security".
Packetstormsecurity
Hashcat Advanced Password Recovery 6.2.4 Binary Release β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π GNU Privacy Guard 2.2.30 π
π Read
via "Packet Storm Security".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.π Read
via "Packet Storm Security".
Packetstormsecurity
GNU Privacy Guard 2.2.30 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π¦Ώ Data privacy, governance and insights are all important obligations for businesses π¦Ώ
π Read
via "Tech Republic".
Expert: Information management can also lead to a massive value proposition in being able to tap into governed data for business insights.π Read
via "Tech Republic".
TechRepublic
Data privacy, governance and insights are all important obligations for businesses
Expert: Information management can also lead to a massive value proposition in being able to tap into governed data for business insights.
π¦Ώ Data compliance: "The world is still waking up to the challenges ahead," expert says π¦Ώ
π Read
via "Tech Republic".
Bringing together siloed data from all parts of the business is a huge challenge to IT departments when meeting compliance requirements.π Read
via "Tech Republic".
TechRepublic
Data compliance: "The world is still waking up to the challenges ahead," expert says
Bringing together siloed data from all parts of the business is a huge challenge to IT departments when meeting compliance requirements.
β Big bad decryption bug in OpenSSL β but no cause for alarm β
π Read
via "Naked Security".
The buggy code's in there, alright. Fortunately, it's hard to get OpenSSL to use it even if you want to, which mitigates the risk.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Skimming the CREAM β recursive withdrawals loot $13M in cryptocash β
π Read
via "Naked Security".
Recursion [noun]: see recursion.π Read
via "Naked Security".
Naked Security
Skimming the CREAM β recursive withdrawals loot $13M in cryptocash
Recursion [noun]: see recursion.
βΌ CVE-2021-22943 βΌ
π Read
via "National Vulnerability Database".
A vulnerability found in UniFi Protect application V1.18.1 and earlier permits a malicious actor who has already gained access to a network to subsequently control the Protect camera(s) assigned to said network. This vulnerability is fixed in UniFi Protect application V1.19.0 and later.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39163 βΌ
π Read
via "National Vulnerability Database".
Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where the vulnerable homeserver is in the room and untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. Server administrators should upgrade to 1.41.1 or higher to patch the vulnerability. There are two potential workarounds. Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the endpoints `/_matrix/client/r0/groups/{group_id}/rooms` and `/_matrix/client/unstable/groups/{group_id}/rooms`.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35223 βΌ
π Read
via "National Vulnerability Database".
The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of Γ’β¬Λuser string variables,Γ’β¬οΏ½ allowing remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22944 βΌ
π Read
via "National Vulnerability Database".
A vulnerability found in UniFi Protect application V1.18.1 and earlier allows a malicious actor with a view-only role and network access to gain the same privileges as the owner of the UniFi Protect application. This vulnerability is fixed in UniFi Protect application V1.19.0 and later.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39134 βΌ
π Read
via "National Vulnerability Database".
`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37701 βΌ
π Read
via "National Vulnerability Database".
The npm package "tar" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35239 βΌ
π Read
via "National Vulnerability Database".
A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22684 βΌ
π Read
via "National Vulnerability Database".
Tizen RT RTOS version 3.0.GBB is vulnerable to integer wrap-around in functions_calloc and mm_zalloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crashπ Read
via "National Vulnerability Database".
βΌ CVE-2021-29907 βΌ
π Read
via "National Vulnerability Database".
IBM OpenPages with Watson 8.1 and 8.2 could allow an authenticated user to upload a file that could execute arbitrary code on the system. IBM X-Force ID: 207633.π Read
via "National Vulnerability Database".