πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ›  Zed Attack Proxy 2.11.0 Cross Platform Package πŸ› 

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-3312 β€Ό

An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35979 β€Ό

An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41133 β€Ό

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36767 β€Ό

In Digi RealPort through 4.8.488.0, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35977 β€Ό

An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five 10/8 πŸ”

News on CISA's new system to attract cyber talent, an Apache zero day, and Microsoft on the lack of acceptance around MFA - catch up on the news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ•΄ 'FontOnLake' Malware Family Targets Linux Systems πŸ•΄

Researchers report that the location of its C2 server, the countries where samples were uploaded, may indicate targets include Southeast Asia.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms πŸ•΄

Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.

πŸ“– Read

via "Dark Reading".
🦿 Motion Picture Academy employs cutting-edge tech to keep Oscar contenders secure 🦿

With video use on the rise across the board, new technologies are being deployed to prevent it from being pirated or showing up in places it shouldn't.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-41564 β€Ό

Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41802 β€Ό

HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other userÒ€ℒs policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41975 β€Ό

TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41920 β€Ό

webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41916 β€Ό

A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41825 β€Ό

Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML injection via the /wfo/control/signin username parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41919 β€Ό

webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41917 β€Ό

webTareas version 2.4 and earlier allows an authenticated user to store arbitrary web script or HTML by creating or editing a client name in the clients section, due to incorrect sanitization of user-supplied data and achieve a Stored Cross-Site Scripting attack against the platform users and administrators. The affected endpoint is /clients/editclient.php, on the HTTP POST cn parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41566 β€Ό

The file extension of the TadTools file upload function fails to filter, thus remote attackers can upload any types of files and execute arbitrary code without logging in.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41976 β€Ό

Tad Uploader edit book list function is vulnerable to authorization bypass, thus remote attackers can use the function to amend the folder names in the book list without logging in.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41563 β€Ό

Tad Book3 editing book function does not filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.

πŸ“– Read

via "National Vulnerability Database".