πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-39354 β€Ό

The Easy Digital Downloads WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $start_date and $end_date parameters found in the ~/includes/admin/payments/class-payments-table.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.11.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41169 β€Ό

Sulu is an open-source PHP content management system based on the Symfony framework. In versions before 1.6.43 are subject to stored cross site scripting attacks. HTML input into Tag names is not properly sanitized. Only admin users are allowed to create tags. Users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41127 β€Ό

Rasa is an open source machine learning framework to automate text-and voice-based conversations. In affected versions a vulnerability exists in the functionality that loads a trained model `tar.gz` file which allows a malicious actor to craft a `model.tar.gz` file which can overwrite or replace bot files in the bot directory. The vulnerability is fixed in Rasa 2.8.10. For users unable to update ensure that users do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39348 β€Ό

The LearnPress WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping on the $custom_profile parameter found in the ~/inc/admin/views/backend-user-profile.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 4.1.3.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. Please note that this is seperate from CVE-2021-24702.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39352 β€Ό

The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to and including 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27746 β€Ό

"HCL Connections Security Update for Reflected Cross-Site Scripting (XSS) Vulnerability"

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ EU ban on anonymous domain registration welcomed by threat intel firm πŸ—“οΈ

β€˜This raises the bar and makes it expensive for easy cyber criminality,’ argues DomainTools

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Japanese punctuation exacerbates privacy flaw that leaks one-word search terms in Google, Firefox browsers πŸ—“οΈ

Researcher questions efficacy of proposed remedies as debate rumbles on 18 months after disclosure

πŸ“– Read

via "The Daily Swig".
❌ Threat Actors Abuse Discord to Push Malware ❌

The platform’s Content Delivery Network and core features are being used to send malicious filesβ€”including RATs--across its network of 150 million users, putting corporate workplaces at risk.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-31835 β€Ό

Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 11 allows ePO administrators to inject arbitrary web script or HTML via a specific parameter where the administrator's entries were not correctly sanitized.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31834 β€Ό

Stored Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10 Update 11 allows ePO administrators to inject arbitrary web script or HTML via multiple parameters where the administrator's entries were not correctly sanitized.

πŸ“– Read

via "National Vulnerability Database".
🦿 What to do if your small business is a victim of a cyberattack 🦿

Immersed in the throes of a cyberattack is not the time to figure out how to respond. An expert offers suggestions on how to create a company-specific incident-response plan.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Swiss exhibitions organizer MCH Group hit by cyber-attack πŸ—“οΈ

Investigations yet to confirm if any data was exfiltrated

πŸ“– Read

via "The Daily Swig".
⚠ REvil ransomware gang allegedly forced offline by law enforcement counterattacks ⚠

One down. Lots more to go. Here's what to do...

πŸ“– Read

via "Naked Security".
πŸ•΄ What Squid Game Teaches Us About Cybersecurity πŸ•΄

When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-38453 β€Ό

Some API functions allow interaction with the registry, which includes reading values as well as data modification.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38463 β€Ό

The affected product does not properly control the allocation of resources. A user may be able to allocate unlimited memory buffers using API functions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38451 β€Ό

The affected productÒ€ℒs proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38473 β€Ό

The affected productÒ€ℒs code base doesnÒ€ℒt properly control arguments for specific functions, which could lead to a stack overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38459 β€Ό

The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38475 β€Ό

The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.

πŸ“– Read

via "National Vulnerability Database".