πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-3888 β€Ό

libmobi is vulnerable to Use of Out-of-range Pointer Offset

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38474 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3858 β€Ό

snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3869 β€Ό

corenlp is vulnerable to Improper Restriction of XML External Entity Reference

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42261 β€Ό

Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36512 β€Ό

An issue was discovered in function scanallsubs in src/sbbs3/scansubs.cpp in Synchronet BBS, which may allow attackers to view sensitive information due to an uninitialized value.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38486 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38478 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3879 β€Ό

snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38464 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have inadequate encryption strength, which may allow an attacker to intercept the communication and steal sensitive information or hijack the session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38484 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38480 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the routerÒ€ℒs management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3851 β€Ό

firefly-iii is vulnerable to URL Redirection to Untrusted Site

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3872 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38462 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38472 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the routerÒ€ℒs management portal and could lure the administrator to perform changes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3863 β€Ό

snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38468 β€Ό

InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ L0phtCrack password auditing tool goes open source πŸ—“οΈ

Original developers invite OS community to develop further capabilities

πŸ“– Read

via "The Daily Swig".
❌ A Guide to Doing Cyberintelligence on a Restricted Budget ❌

Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment.

πŸ“– Read

via "Threat Post".
🦿 How to keep your data off the Dark Web 🦿

Traditional security solutions are no longer enough to protect your organization from a data breach, Bitglass says.

πŸ“– Read

via "Tech Republic".