πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-21955 β€Ό

An authentication bypass vulnerability exists in the get_aes_key_info_by_packetid() function of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. Generic network sniffing can lead to password recovery. An attacker can sniff network traffic to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20139 β€Ό

An unauthenticated command injection vulnerability exists in the parameters of operation 3 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20146 β€Ό

An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20140 β€Ό

An unauthenticated command injection vulnerability exists in the parameters of operation 10 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40279 β€Ό

An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/bad.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20138 β€Ό

An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower routerÒ€ℒs web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21954 β€Ό

A command execution vulnerability exists in the wifi_country_code_update functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to arbitrary command execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20144 β€Ό

An unauthenticated command injection vulnerability exists in the parameters of operation 49 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41694 β€Ό

An Incorrect Access Control vulnerability exists in Premiumdatingscript 4.2.7.7 via the password change procedure in requests\user.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20145 β€Ό

Gryphon Tower routers contain an unprotected openvpn configuration file which can grant attackers access to the Gryphon homebound VPN network which exposes the LAN interfaces of other users' devices connected to the same service. An attacker could leverage this to make configuration changes to, or otherwise attack victims' devices as though they were on an adjacent network.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20137 β€Ό

A reflected cross-site scripting vulnerability exists in the url parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could exploit this issue by tricking a user into following a specially crafted link, granting the attacker javascript execution in the context of the victim's browser.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20141 β€Ό

An unauthenticated command injection vulnerability exists in the parameters of operation 32 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41697 β€Ό

A reflected Cross Site Scripting (XSS) vulnerability exists in Premiumdatingscript 4.2.7.7 via the aerror_description parameter in assets/sources/instagram.php script.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41695 β€Ό

An SQL Injection vulnerability exists in Premiumdatingscript 4.2.7.7 via the ip parameter in connect.php. .

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Why the Private Sector Is Key to Stopping Russian Hacking Group APT29 πŸ•΄

Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy.

πŸ“– Read

via "Dark Reading".
⚠ S3 Ep62: The S in IoT stands for security (and much more) [Podcast+Transcript] ⚠

Listen now or read as an article! (Full transcript inside.)

πŸ“– Read

via "Naked Security".
🦿 2021 marks another record year for security vulnerabilities 🦿

The number of new security flaws recorded by NIST has already surpassed the total for 2020, the fifth record-breaking year in a row.

πŸ“– Read

via "Tech Republic".
🦿 How to restrict server users to a specific directory in Linux 🦿

Need to lock down that Linux server so certain remote users can only access a specific directory and only for file upload and download purposes? Jack Wallen shows you how.

πŸ“– Read

via "Tech Republic".
πŸ•΄ One-Third of Phishing Pages Gone in a Day πŸ•΄

Security experts say the first hours in a phishing page's life are the most dangerous for users.

πŸ“– Read

via "Dark Reading".
🦿 How to protect your business and its data during the 2021 holiday season 🦿

It's the first year of major holiday travel in the post-pandemic remote work world. Here's what businesses can do to protect themselves from elevated holiday cybersecurity risks.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-20373 β€Ό

IBM Db2 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an Information Disclosure when using the LOAD utility as under certain circumstances the LOAD utility does not enforce directory restrictions. IBM X-Force ID: 199521.

πŸ“– Read

via "National Vulnerability Database".