πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-41525 β€Ό

An issue related to modification of otherwise restricted files through a locally authenticated attacker exists in FlexNet inventory agent and inventory beacon versions 2020 R2.5 and prior.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41531 β€Ό

NLnet Labs Routinator prior to 0.10.0 produces invalid RTR payload if an RPKI CA uses too large values in the max-length parameter in a ROA. This will lead to RTR clients such as routers to reject the RPKI data set, effectively disabling Route Origin Validation.

πŸ“– Read

via "National Vulnerability Database".
❌ Hackers Are Going β€˜Deep-Sea Phishing,’ So What Can You Do About It? ❌

Nick Kael, CTO at Ericom, discusses how phishing is gaining sophistication and what it means for businesses.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-23444 β€Ό

This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40868 β€Ό

In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23443 β€Ό

This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39230 β€Ό

Butter is a system usability utility. Due to a kernel error the JPNS kernel is being discontinued. Affected users are recommend to update to the Trinity kernel. There are no workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29831 β€Ό

IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 204775.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29795 β€Ό

IBM PowerVM Hypervisor FW860, FW930, FW940, and FW950 could allow a local user to create a specially crafted sequence of hypervisor calls from a partition that could crash the system. IBM X-Force ID: 203557.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Cryptocurrency Exchange Linked to Ransomware Groups Sanctioned πŸ”

The move, the Treasury's first sanctions designation against a virtual currency exchange, is part of the US government’s attempt to cut off revenue to ransomware gangs.

πŸ“– Read

via "".
❌ Epik Confirms Hack, Gigabytes of Data on Offer ❌

"Time to find out who in your family secretly ran ... [a] QAnon hellhole," said attackers who affiliated themselves with the hacktivist collective Anonymous, noting that Epik had laughable security.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-40847 β€Ό

The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned and downloaded via cleartext HTTP. As such, an attacker with the ability to perform a MitM attack on the device can respond to circled update requests with a crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code. This affects R6400v2 1.0.4.106, R6700 1.0.2.16, R6700v3 1.0.4.106, R6900 1.0.2.16, R6900P 1.3.2.134, R7000 1.0.11.123, R7000P 1.3.2.134, R7850 1.0.5.68, R7900 1.0.4.38, R8000 1.0.4.68, and RS400 1.5.0.68.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19553 β€Ό

Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19551 β€Ό

Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41084 β€Ό

http4s is an open source scala interface for HTTP. In affected versions http4s is vulnerable to response-splitting or request-splitting attacks when untrusted user input is used to create any of the following fields: Header names (`Header.name`ΓƒΒ₯), Header values (`Header.value`), Status reason phrases (`Status.reason`), URI paths (`Uri.Path`), URI authority registered names (`URI.RegName`) (through 0.21). This issue has been resolved in versions 0.21.30, 0.22.5, 0.23.4, and 1.0.0-M27 perform the following. As a matter of practice http4s services and client applications should sanitize any user input in the aforementioned fields before returning a request or response to the backend. The carriage return, newline, and null characters are the most threatening.

πŸ“– Read

via "National Vulnerability Database".
🦿 Is hacking back effective, or does it just scratch an evolutionary itch? 🦿

Retribution by hacking back might make you feel better, but experts urge caution and explain why it's a bad idea.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-35541 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41087 β€Ό

in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35540 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19554 β€Ό

Cross Site Scripting (XSS) vulnerability exists in ManageEngine OPManager <=12.5.174 when the API key contains an XML-based XSS payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41086 β€Ό

jsuites is an open source collection of common required javascript web components. In affected versions users are subject to cross site scripting (XSS) attacks via clipboard content. jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` allowing for javascript injection and thus XSS. Users are advised to update to version 4.9.11 to resolve.

πŸ“– Read

via "National Vulnerability Database".