πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-24678 β€Ό

The CM Tooltip Glossary WordPress plugin before 3.9.21 does not escape some glossary_tooltip shortcode attributes, which could allow users a role as low as Contributor to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41878 β€Ό

A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24676 β€Ό

The Better Find and Replace WordPress plugin before 1.2.9 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24465 β€Ό

The Meow Gallery WordPress plugin before 4.1.9 does not sanitise, validate or escape the ids attribute of its gallery shortcode (available for users as low as Contributor) before using it in an SQL statement, leading to an authenticated SQL Injection issue. The injection also allows the returned values to be manipulated in a way that could lead to data disclosure and arbitrary objects to be deserialized.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24679 β€Ό

The Bitcoin / AltCoin Payment Gateway for WooCommerce WordPress plugin before 1.6.1 does not escape the 's' GET parameter before outputting back in the All Masking Rules page, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41511 β€Ό

The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24673 β€Ό

The Appointment Hour Booking WordPress plugin before 1.3.16 does not escape some of the Calendar Form settings, allowing high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Cryptocurrency funds removed from 6,000 Coinbase accounts due to flaw in SMS authentication πŸ—“οΈ

Victims are told they will be reimbursed

πŸ“– Read

via "The Daily Swig".
❌ Transnational Fraud Ring Bilks U.S. Military Service Members Out of Millions ❌

A former medical records tech stole PII that was then used to fraudulently claim DoD and VA benefits, particularly targeting disabled veterans.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-37331 β€Ό

Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control. On the Verifications page, after uploading an ID Card or Trade License and viewing it, ID Cards and Trade Licenses of other vendors/users can be viewed by changing the URL.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41868 β€Ό

OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37330 β€Ό

Laravel Booking System Booking Core 2.0 is vulnerable to Cross Site Scripting (XSS). The Avatar upload in the My Profile section could be exploited to upload a malicious SVG file which contains Javascript. Now if another user/admin views the profile and clicks to view his avatar, an XSS will trigger.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37777 β€Ό

Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). Thumbnails uploaded by one site owner are visible by another site owner just by knowing the other site name and fuzzing for picture names. This leads to sensitive information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39486 β€Ό

A Stored XSS via Malicious File Upload exists in Gila CMS version 2.2.0. An attacker can use this to steal cookies, passwords or to run arbitrary code on a victim's browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37333 β€Ό

Laravel Booking System Booking Core 2.0 is vulnerable to Session Management. A password change at sandbox.bookingcore.org/user/profile/change-password does not invalidate a session that is opened in a different browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41867 β€Ό

An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25964 β€Ό

In Ò€œCalibre-webҀ� application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in Ò€œMetadataҀ�. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38822 β€Ό

A Stored Cross Site Scripting vulnerability via Malicious File Upload exists in multiple pages of IceHrm 30.0.0.OS that allows for arbitrary execution of JavaScript commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38823 β€Ό

The IceHrm 30.0.0 OS website was found vulnerable to Session Management Issue. A signout from an admin account does not invalidate an admin session that is opened in a different browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36051 β€Ό

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a specially-crafted .cpp file.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Let's Encrypt root cert update catches out many big-name tech firms πŸ—“οΈ

Back on the chain gang

πŸ“– Read

via "The Daily Swig".