πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-40966 β€Ό

A Stored XSS exists in TinyFileManager All version up to and including 2.4.6 in /tinyfilemanager.php when the server is given a file that contains HTML and javascript in its name. A malicious user can upload a file with a malicious filename containing javascript code and it will run on any user browser when they access the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2016-20012 β€Ό

OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33044 β€Ό

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40639 β€Ό

Improper access control in Jfinal CMS 5.1.0 allows attackers to access sensitive information via /classes/conf/db.properties&config=filemanager.config.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21481 β€Ό

An arbitrary file upload vulnerability in RGCMS v1.06 allows attackers to execute arbitrary code via a crafted .txt file which is later changed to a PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21321 β€Ό

emlog v6.0 contains a Cross-Site Request Forgery (CSRF) via /admin/link.php?action=addlink, which allows attackers to arbitrarily add articles.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33045 β€Ό

The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40881 β€Ό

An issue in the BAT file parameters of PublicCMS v4.0 allows attackers to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21483 β€Ό

An arbitrary file upload vulnerability in Jizhicms v1.5 allows attackers to execute arbitrary code via a crafted .jpg file which is later changed to a PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21480 β€Ό

An arbitrary file write vulnerability in RGCMS v1.06 allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21482 β€Ό

A cross-site scripting (XSS) vulnerability in RGCMS v1.06 allows attackers to obtain the administrator's cookie via a crafted payload in the Name field under the Message Board module

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21322 β€Ό

An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ UK armed forces confirms cyber as fifth dimension of warfare πŸ—“οΈ

Armed forces needs to adapt to recruit more digital quartermasters rather than conventional soldiers, conference attendees told

πŸ“– Read

via "The Daily Swig".
❌ HP Omen Hub Exposes Millions of Gamers to Cyberattack ❌

A driver privilege-escalation bug gives attackers kernel-mode access to millions of PCs used for gaming.

πŸ“– Read

via "Threat Post".
❌ REvil/Sodinokibi Ransomware Universal Decryptor Key Is Out ❌

Bitdefender worked with law enforcement to create a key to unlock victims encrypted in ransomware attacks before REvil's servers went belly-up on July 13.

πŸ“– Read

via "Threat Post".
❌ Financial Cybercrime: Following Cryptocurrency via Public Ledgers ❌

John Hammond, security researcher with Huntress, discusses a wallet-hijacking RAT, and how law enforcement recovered millions in Bitcoin after the Colonial Pipeline attack.

πŸ“– Read

via "Threat Post".
❌ DDoS Attacks: A Flourishing Business for Cybercrooks – Podcast ❌

Imperva’s Peter Klimek on how DDoS attacks started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Meris botnet leverages HTTP pipelining to smash DDoS attack records πŸ—“οΈ

Source of attacks β€˜almost entirely composed of Mikrotik devices’

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2020-14119 β€Ό

There is command injection in the addMeshNode interface of xqnetwork.lua, which leads to command execution under administrator authority on Xiaomi router AX3600 with rom versionrom< 1.1.12

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14109 β€Ό

There is command injection in the meshd program in the routing system, resulting in command execution under administrator authority on Xiaomi router AX3600 with ROM version =< 1.1.12

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34576 β€Ό

In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties.

πŸ“– Read

via "National Vulnerability Database".