πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft πŸ•΄

Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft πŸ•΄

Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-45085 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45096 β€Ό

KNIME Analytics Platform before 4.5.0 is vulnerable to XXE (external XML entity injection) via a crafted workflow file (.knwf), aka AP-17730.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45095 β€Ό

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45100 β€Ό

The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45087 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44023 β€Ό

A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45086 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45102 β€Ό

An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45101 β€Ό

An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
β€Ό CVE-2021-45099 β€Ό

** DISPUTED ** The addon.stdin service in addon-ssh (aka Home Assistant Community Add-on: SSH & Web Terminal) before 10.0.0 has an attack surface that requires social engineering. NOTE: the vendor does not agree that this is a vulnerability; however, addon.stdin was removed as a defense-in-depth measure against complex social engineering situations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45088 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45098 β€Ό

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45092 β€Ό

Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45097 β€Ό

KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Rise in API-Based Attacks Underscore Investments in New Tools πŸ•΄

Noname Security's Series C fundraising tips the startup to over $1 billion in valuation, a sign that organizations are beginning to look for API security tools and investor are looking for innovation in the space.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-4121 β€Ό

yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4123 β€Ό

livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ How expired web domains help criminal hackers unlock enterprise defenses πŸ—“οΈ

Allow domains to β€˜drop’ and you’re increasing the effectiveness of a variety of attacks

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-40835 β€Ό

An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar.

πŸ“– Read

via "National Vulnerability Database".