🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
🕴 4 Tips on How Small to Midsize Businesses Can Combat Cyberattacks 🕴

The first step in improving your cybersecurity is understanding your risk of attack.

📖 Read

via "Dark Reading".
CVE-2021-42669

A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.

📖 Read

via "National Vulnerability Database".
CVE-2021-42666

A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

📖 Read

via "National Vulnerability Database".
CVE-2021-42671

An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization.

📖 Read

via "National Vulnerability Database".
CVE-2021-42667

A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.

📖 Read

via "National Vulnerability Database".
CVE-2021-42663

An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.

📖 Read

via "National Vulnerability Database".
CVE-2021-42664

A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.

📖 Read

via "National Vulnerability Database".
CVE-2021-42668

A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.

📖 Read

via "National Vulnerability Database".
CVE-2021-42665

An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.

📖 Read

via "National Vulnerability Database".
CVE-2021-42670

A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.

📖 Read

via "National Vulnerability Database".
🦿 Voice phishing attack spoofs Amazon to steal credit card information 🦿

Impersonating an Amazon order notification, the attackers end up calling victims to try to obtain their credit card details, says Avanan.

📖 Read

via "Tech Republic".
🗓️ Cisco patches critical bug trio in Policy Suite and ONT networking devices 🗓️

Critical severity bugs disclosed by networking titan

📖 Read

via "The Daily Swig".
Proofpoint Phish Harvests Microsoft O365, Google Logins

A savvy campaign impersonating the cybersecurity company skated past Microsoft email security.

📖 Read

via "Threat Post".
🕴 To Secure DevOps, Security Teams Must be Agile 🕴

The evolution of agile development and infrastructure-as-code has given security teams the tools they need to gain visibility, find vulnerabilities early, and continuously evaluate infrastructure.

📖 Read

via "Dark Reading".
🗓️ Lessons learned: How a severe vulnerability in the OWASP ModSecurity Core Rule Set sparked much-needed change 🗓️

Years-old WAF bypass flaw was discovered in June

📖 Read

via "The Daily Swig".
Google Ads for Faux Cryptowallets Net Scammers At Least $500K

Malicious Phantom, MetaMask cryptowallets are on the prowl to drain victim funds. 

📖 Read

via "Threat Post".
🦿 US government unveils $10 million bounty for DarkSide ransomware gang leaders 🦿

The $10 million is for intel that leads to the identification or location of anyone who holds a leadership position in the DarkSide group.

📖 Read

via "Tech Republic".
CVE-2021-3924

grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

📖 Read

via "National Vulnerability Database".
CVE-2021-3928

vim is vulnerable to Stack-based Buffer Overflow

📖 Read

via "National Vulnerability Database".
CVE-2021-3916

bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

📖 Read

via "National Vulnerability Database".
CVE-2021-39412

Multiple Cross Site Scripting (XSS) vulnerabilities exists in PHPGurukul Shopping v3.1 via the (1) callback parameter in (a) server_side/scripts/id_jsonp.php, (b) server_side/scripts/jsonp.php, and (c) scripts/objects_jsonp.php, the (2) value parameter in examples_support/editable_ajax.php, and the (3) PHP_SELF parameter in captcha/index.php.

📖 Read

via "National Vulnerability Database".