πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Why Should I Care About HTTP Request Smuggling? πŸ•΄

HTTP request smuggling is a growing vulnerability, but you can manage the risk with proper server configuration.

πŸ“– Read

via "Dark Reading".
πŸ•΄ DAST to the Future: Shifting the Modern AppSec Paradigm πŸ•΄

NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches happen β€” in production.

πŸ“– Read

via "Dark Reading".
❌ Conti Ransomware Expands Ability to Blow Up Backups ❌

The Conti ransomware gang has developed novel tactics to demolish backups, especially the Veeam recovery software.

πŸ“– Read

via "Threat Post".
🦿 How people concoct their passwords, and why they often stink 🦿

Less than a third of the people surveyed by NordPass follow best practices when devising a password.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Russian Officials Arrest Group-IB CEO, Accuse Him of Treason πŸ•΄

Ilya Sachkov, founder and CEO of the massive cybersecurity firm, was arrested on treason charges and will be in custody for two months.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-25961 β€Ό

In Ò€œSuiteCRMҀ� application, v7.1.7 through v7.10.31 and v7.11-beta through v7.11.20 fail to properly invalidate password reset links that is associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25960 β€Ό

In Ò€œSuiteCRMҀ� application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by Ò€œCSV InjectionҀ� vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25959 β€Ό

In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25962 β€Ό

Ò€œShuupҀ� application in versions 0.4.2 to 2.10.8 is affected by the Ò€œFormula InjectionҀ� vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.

πŸ“– Read

via "National Vulnerability Database".
🦿 Ping Identity buys Singular Key and promises smoother ID verification and access management 🦿

The purchase of Singular Key will add to Ping's identity and access management service with a no-code method of creating workflows for identity verification for enterprises.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Cyberspace, Cybergames, and Cyberspies πŸ•΄

How cyberspace has become a global cybergames stage, where all of us are actors.

πŸ“– Read

via "Dark Reading".
❌ GriftHorse Money-Stealing Trojan Takes 10M Android Users for a Ride ❌

The mobile malware has fleeced hundreds of millions of dollars from victims globally, using sophisticated techniques.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-29834 β€Ό

IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3,20.0.0.1, 20.0.0.2, and 21.0.2 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204832.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39831 β€Ό

Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39846 β€Ό

Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39851 β€Ό

Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39838 β€Ό

Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetCaption action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40708 β€Ό

Adobe Genuine Service versions 7.3 (and earlier) are affected by a privilege escalation vulnerability in the AGSService installer. An authenticated attacker could leverage this vulnerability to achieve read / write privileges to execute arbitrary code. User interaction is required to abuse this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39865 β€Ό

Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39862 β€Ό

Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39855 β€Ό

Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.

πŸ“– Read

via "National Vulnerability Database".