πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-45427 β€Ό

Emerson XWEB 300D EVO 3.0.7--3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ In the Fight Against Cybercrime, Takedowns Are Only Temporary πŸ•΄

Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.

πŸ“– Read

via "Dark Reading".
⚠ Instagram copyright infringment scams – don’t get sucked in! ⚠

We deconstructed a copyright phish so you don't have to. Be warned: the crooks are getting better at these scams...

πŸ“– Read

via "Naked Security".
πŸ•΄ Zero Trust and Access: Protecting the Keys to the Kingdom πŸ•΄

Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-45818 β€Ό

SAFARI Montage 8.7.32 is affected by a CRLF injection vulnerability which can lead to can lead to HTTP response splitting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43861 β€Ό

Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. Prior to version 8.13.8, malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to version 8.13.8 to receive a patch. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45815 β€Ό

Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Swig Security Review 2021 – Part II πŸ—“οΈ

Key thinkers on the biggest security stories and trends in 2021

πŸ“– Read

via "The Daily Swig".
❌ APT β€˜Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools ❌

Researchers from CrowdStrike disrupted an attempt by the threat group to steal industrial intelligence and military secrets from an academic institution.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ HCL DX vendor β€˜could not reproduce’ allegedly critical vulnerabilities πŸ—“οΈ

Disclosure process for bugs in HCL DX – formerly WebSphere Portal – seemingly went awry

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-43862 β€Ό

jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Getting Started With Threat-Informed Security Programs πŸ•΄

Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.

πŸ“– Read

via "Dark Reading".
❌ What the Rise in Cyber-Recon Means for Your Security Strategy ❌

Expect many more zero-day exploits in 2022, and cyberattacks using them being launched at a significantly higher rate, warns Aamir Lakhani, researcher at FortiGuard Labs.

πŸ“– Read

via "Threat Post".
🦿 How to install the Pritunl VPN server on AlmaLinux 🦿

If you're looking for a VPN server to host in-house, look no further than the AlmaLinux/Pritunl combination. See how easy it is to get this service up and running.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-29292 β€Ό

iBall WRD12EN 1.0.0 devices allow cross-site request forgery (CSRF) attacks as demonstrated by enabling DNS settings or modifying the range for IP addresses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45379 β€Ό

Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38876 β€Ό

IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208404.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20151 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20168 β€Ό

Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4182 β€Ό

Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4186 β€Ό

Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".