πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-36737 β€Ό

The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36738 β€Ό

The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46145 β€Ό

The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking. This is related to a non-expiring rolling code and counter resynchronization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36739 β€Ό

The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Kazakhstan government shuts down internet following country-wide protests πŸ—“οΈ

This isn’t the first time the landlocked nation has restricted web access for citizens

πŸ“– Read

via "The Daily Swig".
⚠ FTC threatens β€œlegal action” over unpatched Log4j and other vulns ⚠

Remember the Equifax breach? Remember the $700m penalty? In case you'd forgotten, here's the FTC to refresh your memory!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-44564 β€Ό

A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44351 β€Ό

An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.

πŸ“– Read

via "National Vulnerability Database".
⚠ S3 Ep64: Log4Shell again, scammers keeping busy, and Apple Home bug [Podcast + Transcript] ⚠

We're back for 2022 - listen now!

πŸ“– Read

via "Naked Security".
❌ Attackers Exploit Flaw in Google Docs’ Comments Feature ❌

A wave of phishing attacks identified in December targeting mainly Outlook users are difficult for both email scanners and victims to flag, researchers said.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ New York Attorney General flags 1.1 million online accounts compromised by credential stuffing attacks πŸ—“οΈ

Bureau of Internet and Technology helped affected organizations secure accounts and bolster defenses

πŸ“– Read

via "The Daily Swig".
πŸ•΄ Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation πŸ•΄

Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-44590 β€Ό

In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27738 β€Ό

All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45457 β€Ό

In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45456 β€Ό

Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31522 β€Ό

Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45458 β€Ό

Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44878 β€Ό

Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44584 β€Ό

Cross-site scripting (XSS) vulnerability in index.php in emlog version <= pro-1.0.7 allows remote attackers to inject arbitrary web script or HTML via the s parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44591 β€Ό

In libming 0.4.8, the parseSWF_DEFINELOSSLESS2 function in util/parser.c lacks a boundary check that would lead to denial-of-service attacks via a crafted SWF file.

πŸ“– Read

via "National Vulnerability Database".