πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-3950 β€Ό

django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3974 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3968 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
❌ California Pizza Kitchen Serves Up Employee SSNs in Data Breach ❌

A hefty slice of data – that of 100K+ current and former employees – was spilled in an β€œexternal system breach,” the pizza chain said. 

πŸ“– Read

via "Threat Post".
πŸ” Friday Five 11/18 πŸ”

The U.K shares some new ransomware statistics, the FBI warns about a new VPN zero day, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ—“οΈ CKEditor vulnerabilities pose XSS threat to Drupal and other downstream applications πŸ—“οΈ

Attackers could bypass content sanitization with malformed HTML

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Zero Trust: An Answer to the Ransomware Menace? πŸ•΄

Zero trust isn't a silver bullet, but if implemented well it can help create a much more robust security defense.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3920 β€Ό

grav-plugin-admin is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
🦿 Policymakers want to regulate AI but lack consensus on how 🦿

Commentary: AI is considered "world changing" by policymakers, but it's unclear how to ensure positive outcomes.

πŸ“– Read

via "Tech Republic".
πŸ•΄ To Beat Ransomware, Apply Zero Trust to Servers Too πŸ•΄

The path out of the ransomware crisis is full inspection and protection of all traffic flows. That means zero trust everywhere β€” even between servers.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Researcher finds SSRF bug in internal Google Cloud project, nabs $10,000 bug bounty πŸ—“οΈ

Now-patched API vulnerability allowed attacker to access sensitive resources

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-36003 β€Ό

Adobe Audition version 14.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39353 β€Ό

The Easy Registration Forms WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the ajax_add_form function found in the ~/includes/class-form.php file which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 2.1.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42363 β€Ό

The Preview E-Mails for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the search_order parameter found in the ~/views/form.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.6.8.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33850 β€Ό

There is a Cross-Site Scripting vulnerability in Microsoft Clarity version 0.3. The XSS payload executes whenever the user changes the clarity configuration in Microsoft Clarity version 0.3. The payload is stored on the configuring project Id page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22053 β€Ό

Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37592 β€Ό

Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43408 β€Ό

The Duplicate Post WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43409 β€Ό

The "WPO365 | LOGIN" WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Packet Fence 11.1.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Read

via "Packet Storm Security".
❌ 6M Sky Routers Left Exposed to Attack for Nearly 1.5 Years ❌

Pen Test Partners didn't disclose the vulnerability after 90 days because it knew ISPs were struggling with a pandemic-increased network load as work from home became the new norm.

πŸ“– Read

via "Threat Post".