πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-38459 β€Ό

The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38475 β€Ό

The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38465 β€Ό

The webinstaller is a Golang web server executable that enables the generation of an Auvesy image agent. Resource consumption can be achieved by generating large amounts of installations, which are then saved without limitation in the temp folder of the webinstaller executable.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38479 β€Ό

Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38467 β€Ό

A specific function code receives a raw pointer supplied by the user and deallocates this pointer. The user can then control what memory regions will be freed and cause use-after-free condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38461 β€Ό

The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38477 β€Ό

There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41744 β€Ό

All versions of yongyou PLM are affected by a command injection issue. UFIDA PLM (Product Life Cycle Management) is a strategic management method. It applies a series of enterprise application systems to support the entire process from conceptual design to the end of product life, and the collaborative creation, distribution, application and management of product information across organizations. Yonyou PLM uses jboss by default, and you can access the management control background without authorization An attacker can use this vulnerability to gain server permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35230 β€Ό

As a result of an unquoted service path vulnerability present in the Kiwi CatTools Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38481 β€Ό

The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38455 β€Ό

The affected productÒ€ℒs OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31682 β€Ό

The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36357 β€Ό

An issue was discovered in OpenPOWER 2.6 firmware. unpack_timestamp() calls le32_to_cpu() for endian conversion of a uint16_t "year" value, resulting in a type mismatch that can truncate a higher integer value to a smaller one, and bypass a timestamp check. The fix is to use the right endian conversion function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41747 β€Ό

Cross-Site Scripting (XSS) vulnerability exists in Csdn APP 4.10.0, which can be exploited by attackers to obtain sensitive information such as user cookies.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38471 β€Ό

There are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38457 β€Ό

The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.

πŸ“– Read

via "National Vulnerability Database".
❌ Cisco SD-WAN Security Bug Allows Root Code Execution ❌

The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Node.js sandboxes are open to prototype pollution πŸ—“οΈ

Sandbox breakout can lead to remote code execution, researchers warn

πŸ“– Read

via "The Daily Swig".
πŸ›  Faraday 3.18.0 πŸ› 

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-0702 β€Ό

In RevertActiveSessions of apexd.cpp, there is a possible way to share the wrong file due to an unintentional MediaStore downgrade. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-193932765

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42540 β€Ό

The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality.

πŸ“– Read

via "National Vulnerability Database".