βΌ CVE-2021-41868 βΌ
π Read
via "National Vulnerability Database".
OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37330 βΌ
π Read
via "National Vulnerability Database".
Laravel Booking System Booking Core 2.0 is vulnerable to Cross Site Scripting (XSS). The Avatar upload in the My Profile section could be exploited to upload a malicious SVG file which contains Javascript. Now if another user/admin views the profile and clicks to view his avatar, an XSS will trigger.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37777 βΌ
π Read
via "National Vulnerability Database".
Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). Thumbnails uploaded by one site owner are visible by another site owner just by knowing the other site name and fuzzing for picture names. This leads to sensitive information disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39486 βΌ
π Read
via "National Vulnerability Database".
A Stored XSS via Malicious File Upload exists in Gila CMS version 2.2.0. An attacker can use this to steal cookies, passwords or to run arbitrary code on a victim's browser.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37333 βΌ
π Read
via "National Vulnerability Database".
Laravel Booking System Booking Core 2.0 is vulnerable to Session Management. A password change at sandbox.bookingcore.org/user/profile/change-password does not invalidate a session that is opened in a different browser.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41867 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25964 βΌ
π Read
via "National Vulnerability Database".
In Γ’β¬ΕCalibre-webΓ’β¬οΏ½ application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in Γ’β¬ΕMetadataΓ’β¬οΏ½. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38822 βΌ
π Read
via "National Vulnerability Database".
A Stored Cross Site Scripting vulnerability via Malicious File Upload exists in multiple pages of IceHrm 30.0.0.OS that allows for arbitrary execution of JavaScript commands.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38823 βΌ
π Read
via "National Vulnerability Database".
The IceHrm 30.0.0 OS website was found vulnerable to Session Management Issue. A signout from an admin account does not invalidate an admin session that is opened in a different browser.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36051 βΌ
π Read
via "National Vulnerability Database".
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a specially-crafted .cpp file.π Read
via "National Vulnerability Database".
ποΈ Let's Encrypt root cert update catches out many big-name tech firms ποΈ
π Read
via "The Daily Swig".
Back on the chain gangπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Letβs Encrypt root cert update catches out many big-name tech firms
Back on the chain gang
π TestSSL 3.0.6 π
π Read
via "Packet Storm Security".
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.π Read
via "Packet Storm Security".
Packetstormsecurity
TestSSL 3.0.6 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π MedSec Network Utility Tool π
π Read
via "Packet Storm Security".
MedSec is a network utility tool developed to perform some network, security administrator, and pentesting tasks. Basic functionality includes port scans, host discovery, banner grabbing, dns checks, subdomain enumeration, and more.π Read
via "Packet Storm Security".
Packetstormsecurity
MedSec Network Utility Tool β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Seth RDP Man-In-The-Middle Tool π
π Read
via "Packet Storm Security".
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests, workshops or talks.π Read
via "Packet Storm Security".
Packetstormsecurity
Seth RDP Man-In-The-Middle Tool β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π PyRDP RDP Man-In-The-Middle Tool π
π Read
via "Packet Storm Security".
PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library.π Read
via "Packet Storm Security".
Packetstormsecurity
PyRDP RDP Man-In-The-Middle Tool β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Bing.com Hostname / IP Enumerator 1.0.5 π
π Read
via "Packet Storm Security".
This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.π Read
via "Packet Storm Security".
Packetstormsecurity
Bing.com Hostname / IP Enumerator 1.0.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π΄ Mandiant Confirms Name Change from FireEye, Inc. to Mandiant, Inc. π΄
π Read
via "Dark Reading".
The decision to change the corporate name and stock ticker symbol reflects the companyβs strategy to focus on Mandiantβs security controls-agnostic solutions delivered through the Mandiant Advantage cloud-based platform.π Read
via "Dark Reading".
Dark Reading
Mandiant Confirms Name Change from FireEye, Inc. to Mandiant, Inc.
The decision to change the corporate name and stock ticker symbol reflects the companyβs strategy to focus on Mandiantβs security controls-agnostic solutions delivered through the Mandiant Advantage cloud-based platform.
π΄ CISA Kicks Off Cybersecurity Awareness Month π΄
π Read
via "Dark Reading".
CISA will dedicate October to encourage everyone to be cyber smart.π Read
via "Dark Reading".
Dark Reading
CISA Kicks Off Cybersecurity Awareness Month
CISA will dedicate October to encourage everyone to be cyber smart.
βΌ CVE-2021-41530 βΌ
π Read
via "National Vulnerability Database".
Forcepoint NGFW Engine versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0 are vulnerable to TCP reflected amplification vulnerability, if HTTP User Response has been configured.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39871 βΌ
π Read
via "National Vulnerability Database".
In all versions of GitLab CE/EE since version 13.0, an instance that has the setting to disable Bitbucket Server import enabled is bypassed by an attacker making a crafted API call.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41596 βΌ
π Read
via "National Vulnerability Database".
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality.π Read
via "National Vulnerability Database".