πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ Top 200 most common passwords of 2021 revealed πŸ“’

Unsurprisingly, the vast majority take less than a second to crack

πŸ“– Read

via "ITPro".
πŸ“’ UK and US agree deeper data-sharing partnership πŸ“’

The partnership will see the two nations form a comprehensive strategy to share data that aligns with both domestic data sharing and protection frameworks

πŸ“– Read

via "ITPro".
πŸ“’ HornetSecurity 365 Total Protection review: Keeping email squeaky clean πŸ“’

Tough email protection for Microsoft 365 that’s simple to deploy, easy to manage and very affordable

πŸ“– Read

via "ITPro".
πŸ“’ Android bug prevents users from calling emergency services πŸ“’

Google has confirmed that the glitch is affecting devices that have Microsoft Teams installed

πŸ“– Read

via "ITPro".
β€Ό CVE-2021-44833 β€Ό

The CLI 1.0.0 for Amazon AWS OpenSearch has weak permissions for the configuration file.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
⚠ Log4Shell explained – how it works, why you need to know, and how to fix it ⚠

Find out how to deal with the Log2Shell vulnerability right across your estate. Yes, you need to patch, but that helps everyone else along with you!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-40858 β€Ό

Auerswald COMpact 5500R devices before 8.2B allow Arbitrary File Disclosure. A sub-admin can read the cleartext Admin password via the fileName=../../etc/passwd substring.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44847 β€Ό

A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44154 β€Ό

An issue was discovered in Reprise RLM 14.2. By using an admin account, an attacker can write a payload to /goform/edit_opt, which will then be triggered when running the diagnostics (via /goform/diagnostics_doit), resulting in a buffer overflow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44155 β€Ό

An issue was discovered in /goform/login_process in Reprise RLM 14.2. When an attacker attempts to login, the response if a username is valid includes Login Failed, but does not include this string if the username is invalid. This allows an attacker to enumerate valid users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44151 β€Ό

An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any existing sessions by bruteforcing the 4 hex-character session cookie on the Windows version (the Linux version appears to have 8 characters). An attacker can obtain the static part of the cookie (cookie name) by first making a request to any page on the application (e.g., /goforms/menu) and saving the name of the cookie sent with the response. The attacker can then use the name of the cookie and try to request that same page, setting a random value for the cookie. If any user has an active session, the page should return with the authorized content, when a valid cookie value is hit.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-44848 β€Ό

In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2018-25022 β€Ό

The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44153 β€Ό

An issue was discovered in Reprise RLM 14.2. When editing the license file, it is possible for an admin user to enable an option to run arbitrary executables, as demonstrated by an ISV demo "C:\Windows\System32\calc.exe" entry. An attacker can exploit this to run a malicious binary on startup, or when triggering the Reread/Restart Servers function on the webserver. (Exploitation does not require CVE-2018-15573, because the license file is meant to be changed in the application.)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-25021 β€Ό

The TCP Server module in toxcore before 0.2.8 doesn't free the TCP priority queue under certain conditions, which allows a remote attacker to exhaust the system's memory, causing a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44152 β€Ό

An issue was discovered in Reprise RLM 14.2. Because /goform/change_password_process does not verify authentication or authorization, an unauthenticated user can change the password of any existing user. This allows an attacker to change the password of any known user, thereby preventing valid users from accessing the system and granting the attacker full access to that user's account.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40856 β€Ό

Auerswald COMfortel 1400 IP and 2600 IP before 2.8G devices allow Authentication Bypass via the /about/../ substring.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40857 β€Ό

Auerswald COMpact 5500R devices before 8.2B allow Privilege Escalation via the passwd=1 substring.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42549 β€Ό

Insufficient Input Validation in the search functionality of Wordpress plugin Lets-Box prior to 1.15.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24782 β€Ό

The Flex Local Fonts WordPress plugin through 1.0.0 does not escape the Class Name field when adding a font, which could allow hight privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24819 β€Ό

The Page/Post Content Shortcode WordPress plugin through 1.0 does not have proper authorisation in place, allowing users with a role as low as contributor to access draft/private/password protected/trashed posts/pages they should not be allowed to, including posts created by other users such as admins and editors.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1