πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-40853 β€Ό

TCMAN GIM does not perform an authorization check when trying to access determined resources. A remote attacker could exploit this vulnerability to access URL that require privileges without having them. The exploitation of this vulnerability might allow a remote attacker to obtain sensible information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-18078 β€Ό

A vulnerability in /include/web_check.php of SEMCMS v3.8 allows attackers to reset the Administrator account's password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8968 β€Ό

Parallels Remote Application Server (RAS) allows a local attacker to retrieve certain profile password in clear text format by uploading a previously stored cyphered file by Parallels RAS. The confidentiality, availability and integrity of the information of the user could be compromised if an attacker is able to recover the profile password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0674 β€Ό

In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38883 β€Ό

IBM Business Automation Workflow 18.0, 19.0, 20,0 and 21.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209165.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32499 β€Ό

SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the command line arguments to pass in any value to the Emulator executable.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4010 β€Ό

A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0676 β€Ό

In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4009 β€Ό

A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40850 β€Ό

TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx.

πŸ“– Read

via "National Vulnerability Database".
❌ Malicious Joker App Scores Half-Million Downloads on Google Play ❌

Joker malware was found lurking in the Color Message app, ready to fleece unsuspecting users with premium SMS charges.

πŸ“– Read

via "Threat Post".
❌ Spider-Man Movie Release Frenzy Bites Fans with Credit-Card Harvesting ❌

Attackers are using the excitement over the new Spider-Man movie to steal bank information and spread malware.  

πŸ“– Read

via "Threat Post".
❌ Facebook Bans Spy-for-Hire Firms for Targeting 50K People ❌

Meta, Facebook’s parent company, said that the seven banned actors run fake accounts on its platforms to deceive users and plant malware on targets’ phones.

πŸ“– Read

via "Threat Post".
πŸ•΄ Meta Acts Against 7 Entities Found Spying on 50,000 Users πŸ•΄

The parent company of Facebook and Instagram has warned some 50,000 account holders they are targets of surveillance.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-23797 β€Ό

All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23803 β€Ό

This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23450 β€Ό

All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41496 β€Ό

Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41495 β€Ό

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating and sort arrays.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33430 β€Ό

A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23814 β€Ό

This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).

πŸ“– Read

via "National Vulnerability Database".