πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-36551 β€Ό

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36550 β€Ό

TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36548 β€Ό

A remote code execution (RCE) vulnerability in the component /admin/index.php?id=themes&action=edit_template&filename=blog of Monstra v3.0.4 allows attackers to execute arbitrary commands via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41194 β€Ό

FirstUseAuthenticator is a JupyterHub authenticator that helps new users set their password on their first login to JupyterHub. When JupyterHub is used with FirstUseAuthenticator, a vulnerability in versions prior to 1.0.0 allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. One may upgrade to version 1.0.0 or apply a patch manually to mitigate the vulnerability. For those who cannot upgrade, there is no complete workaround, but a partial mitigation exists. One can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until a patch or upgrade occurs.

πŸ“– Read

via "National Vulnerability Database".
⚠ Microsoft Edge finally arrives on Linux – β€œOfficial” build lands in repos ⚠

Microsoft Edge for Linux makes an Official landing.

πŸ“– Read

via "Naked Security".
πŸ•΄ 6 Ways to Rewrite the Impossible Job Description πŸ•΄

It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-23549 β€Ό

IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted .cr2 file, related to a "Data from Faulting Address controls Branch Selection starting at FORMATS!GetPlugInInfo+0x00000000000047f6".

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23546 β€Ό

IrfanView 4.54 allows attackers to cause a denial of service or possibly other unspecified impacts via a crafted XBM file, related to a "Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at FORMATS!ReadMosaic+0x0000000000000981.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ β€˜Inaction isn’t an option’ – US lawmakers back mandatory standards for transport and logistics cybersecurity πŸ—“οΈ

House Committee on Homeland Security hearing pulls focus on securing β€˜planes, trains, and pipelines’

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-31624 β€Ό

Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22079 β€Ό

Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31862 β€Ό

SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31627 β€Ό

Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Google, Salesforce, others team up to launch MVSP security baseline project πŸ—“οΈ

The collaboration is focused on creating a vendor-neutral security standard

πŸ“– Read

via "The Daily Swig".
⚠ Microsoft documents β€œSHROOTLESS” hack patched in latest Apple updates ⚠

We'd have called this bug "SHROOTMORE", but naming it wasn't our call.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ Trickbot arrest: Russian national extradited to US for alleged role in developing notorious banking trojan πŸ—“οΈ

Vladimir Dunaev made his first appearance in federal court this week

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Finding the Right Approach to Cloud Security Posture Management (CSPM) πŸ•΄

Cloud security is maturing β€” it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3441 β€Ό

A potential security vulnerability has been identified for the HP OfficeJet 7110 Wide Format ePrinter that enables Cross-Site Scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3662 β€Ό

Certain HP Enterprise LaserJet and PageWide MFPs may be vulnerable to stored cross site scripting (XSS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22037 β€Ό

Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22038 β€Ό

On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers.

πŸ“– Read

via "National Vulnerability Database".