πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-20600 β€Ό

MetInfo 7.0 beta contains a stored cross-site scripting (XSS) vulnerability in the $name parameter of admin/?n=column&c=index&a=doAddColumn.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20595 β€Ό

A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-20597 β€Ό

A cross-site scripting (XSS) vulnerability in the potrtalItemName parameter in \web\PortalController.java of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44548 β€Ό

An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45463 β€Ό

GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4144 β€Ό

TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ—“οΈ US clothing supplier Pro Wrestling Tees hit by data breach πŸ—“οΈ

Law enforcement alerted company to compromise of payment card info

πŸ“– Read

via "The Daily Swig".
⚠ Plundered bitcoins recovered by FBI – all 3,879-and-one-sixth of them! ⚠

Phew! An audacious crime... that didn't work out.

πŸ“– Read

via "Naked Security".
❌ β€˜Spider-Man: No Way Home’ Download Installs Cryptominer ❌

The origin of the Monero cryptominer file has been traced to a Russian torrent website, researchers report.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-44600 β€Ό

The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44599 β€Ό

The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Wireless coexistence – New attack technique exploits Bluetooth, WiFi performance features for β€˜inter-chip privilege escalation’ πŸ—“οΈ

Attackers can use connections between wireless chips to steal data or credentials, researchers find

πŸ“– Read

via "The Daily Swig".
❌ Telegram Abused to Steal Crypto-Wallet Credentials ❌

Attackers use the Telegram handle β€œSmokes Night” to spread the malicious Echelon infostealer, which steals credentials for cryptocurrency and other user accounts, researchers said.

πŸ“– Read

via "Threat Post".
🦿 How to deploy a Bitwarden server with Docker 🦿

Are you looking to deploy an in-house password manager server? Jack Wallen shows you how with Bitwarden and Docker.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Popular WordPress platform Flywheel vulnerable to subdomain takeover πŸ—“οΈ

Malicious actors could wreak havoc by impersonating legitimate websites

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-44526 β€Ό

Zoho ManageEngine ServiceDesk Plus before 12003 allows authentication bypass in certain admin configurations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23175 β€Ό

NVIDIA GeForce Experience contains a vulnerability in user authorization, where GameStream does not correctly apply individual user access controls for users on the same device, which, with user intervention, may lead to escalation of privileges, information disclosure, data tampering, and denial of service, affecting other resources beyond the intended security authority of GameStream.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3892 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
⚠ The cool retro phone with a REAL DIAL… plus plenty of IoT problems ⚠

You know you want one, because this retro phone is NOT A TOY... except when it comes to cybersecurity.

πŸ“– Read

via "Naked Security".
❌ 4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code ❌

The security vulnerability could expose passwords and access tokens, along with blueprints for internal infrastructure and finding software vulnerabilities.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-43854 β€Ό

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this class, or these two functions, are vulnerable to the ReDoS attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability. For users unable to upgrade the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit.

πŸ“– Read

via "National Vulnerability Database".