🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2021-44315

In Bus Pass Management System v1.0, Directory Listing/Browsing is enabled on the web server which allows an attacker to view the sensitive files of the application, for example: Any file which contains sensitive information of the user or server.

📖 Read

via "National Vulnerability Database".
CVE-2021-44317

In Bus Pass Management System v1.0, parameters 'pagedes' and `About Us` are affected with a Stored Cross-site scripting vulnerability.

📖 Read

via "National Vulnerability Database".
CVE-2020-35213

An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.

📖 Read

via "National Vulnerability Database".
CVE-2020-35215

An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states.

📖 Read

via "National Vulnerability Database".
CVE-2021-41028

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

📖 Read

via "National Vulnerability Database".
CVE-2021-42550

In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.

📖 Read

via "National Vulnerability Database".
CVE-2021-26800

Cross Site Request Forgery (CSRF) vulnerability in Change-password.php in phpgurukul user management system in php using stored procedure V1.0, allows attackers to change the password to an arbitrary account.

📖 Read

via "National Vulnerability Database".
CVE-2021-43812

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before 1.6.2 do not filter out certain returnTo parameter values from the login url, which expose the application to an open redirect vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

📖 Read

via "National Vulnerability Database".
CVE-2021-41261

Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to stored cross site scripting attacks via the preferences footer. The preference footer can only be altered by a site admin. This issue has been resolved in the 0.9.6 release and all users are advised to upgrade. There are no known workarounds.

📖 Read

via "National Vulnerability Database".
CVE-2021-41262

Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to SQL injection attacks by users with "member" privilege. Users are advised to upgrade to version 0.9.6 as soon as possible. There are no known workarounds.

📖 Read

via "National Vulnerability Database".
CVE-2020-35209

An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.

📖 Read

via "National Vulnerability Database".
CVE-2021-44857

An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn't have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead.

📖 Read

via "National Vulnerability Database".
CVE-2021-41843

An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.

📖 Read

via "National Vulnerability Database".
CVE-2021-45038

An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents.

📖 Read

via "National Vulnerability Database".
🕴 Mobile App Developers Keep Fraudulent Traffic at Bay with Anti-Fraud API 🕴

The new API and SDK from Pixalate helps mobile developers avoid getting their apps delisted from app stores by detecting and blocking fraudulent traffic.

📖 Read

via "Dark Reading".
🗓️ Desjardins data breach: Class action lawsuit agreement reaches $201 million 🗓️

Final amount to be confirmed in 2022

📖 Read

via "The Daily Swig".
🗓️ Respect in Security: Anti-harassment infosec industry group gains momentum with code of conduct campaign 🗓️

Take the pledge, companies are urged

📖 Read

via "The Daily Swig".
Conti Gang Suspected of Ransomware Attack on McMenamins

The incident occurred last weekend at the popular chain of restaurants, hotels and breweries, which is still facing disruptions.

📖 Read

via "Threat Post".
🛠 Google OSS Fuzz 🛠

Google's OSS Fuzz tool aims to make common open source software more secure and stable by combining modern fuzzing techniques with scalable, distributed execution.

📖 Read

via "Packet Storm Security".
🛠 TOR Virtual Network Tunneling Tool 0.4.6.9 🛠

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

📖 Read

via "Packet Storm Security".
🕴 Is Data Security Worthless if the Data Life Cycle Lacks Clarity? 🕴

If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.

📖 Read

via "Dark Reading".