πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-21669 β€Ό

PuddingBot is a group management bot. In version 0.0.6-b933652 and prior, the bot token is publicly exposed in main.py, making it accessible to malicious actors. The bot token has been revoked and new version is already running on the server. As of time of publication, the maintainers are planning to update code to reflect this change at a later date.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28102 β€Ό

cscms v4.1 allows for SQL injection via the "js_del" function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28103 β€Ό

cscms v4.1 allows for SQL injection via the "page_del" function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0170 β€Ό

peertube is vulnerable to Improper Access Control

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21671 β€Ό

@replit/crosis is a JavaScript client that speaks Replit's container protocol. A vulnerability that involves exposure of sensitive information exists in versions prior to 7.3.1. When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account). This was patched in version 7.3.1 by updating the address of the fallback WebSocket polling proxy to the new one. As a workaround, a user may specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`. More information about this workaround is available in the GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43566 β€Ό

All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Businesses Suffered 50% More Cyberattack Attempts per Week in 2021 πŸ•΄

The rise β€” partly due to Log4j β€” helped boost cyberattack attempts to an all-time high in Q4 2021, new data shows.

πŸ“– Read

via "Dark Reading".
❌ FIN7 Mailing Malicious USB Sticks to Drop Ransomware ❌

The FBI warned that attackers are impersonating Health & Human Services and/or Amazon to mail BadUSB-poisoned USB devices to targets in transportation, insurance & defense.

πŸ“– Read

via "Threat Post".
⚠ Home routers with NetUSB support could have critical kernel hole ⚠

Got a router that supports USB access across the network? You might need a kernel update...

πŸ“– Read

via "Naked Security".
πŸ•΄ Remotely Exploitable NetUSB Flaw Puts Millions of Devices at Risk πŸ•΄

A vulnerability in a third-party component used by many networking firms puts consumer and small business routers at risk for remote exploitation.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022 πŸ•΄

It's hard to have a crystal ball in the world of security, but if one were to make a safe prediction, it's this: Organizations will need to further integrate their cybersecurity and physical security functions throughout 2022 and beyond. So argues former chief psychologist for the US Secret Service, Dr. Marisa Randazzo, who now heads up Ontic's Center of Excellence.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-0129 β€Ό

Uncontrolled search path element vulnerability in McAfee TechCheck prior to 4.0.0.2 allows a local administrator to load their own Dynamic Link Library (DLL) gaining elevation of privileges to system user. This was achieved through placing the malicious DLL in the same directory that the process was run from.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0173 β€Ό

radare2 is vulnerable to Out-of-bounds Read

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38991 β€Ό

IBM AIX 7.0, 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the lscore command which could lead to code execution. IBM X-Force ID: 212953.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29701 β€Ό

IBM Engineering Workflow Management 7.0, 7.0.1, and 7.0.2 as well as IBM Rational Team Concert 6.0.6 and 6.0.6.1 could allow an authneticated attacker to obtain sensitive information from build definitions that could aid in further attacks against the system. IBM X-Force ID: 200657.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure πŸ•΄

Advisory explains how to detect, respond to, and mitigate cyberattacks from Russian state-sponsored hacking groups.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Details Released on SonicWall Flaws in SMA Devices πŸ•΄

The most serious of the five vulnerabilities disclosed today can lead to unauthenticated remote code execution on affected devices.

πŸ“– Read

via "Dark Reading".
❌ WordPress Bugs Exploded in 2021, Most Exploitable ❌

Record-number WordPress plugin vulnerabilities are wicked exploitable even with low CVSS scores, leaving security teams blind to their risk.

πŸ“– Read

via "Threat Post".
❌ MacOS Bug Could Let Creeps Snoop On You ❌

The flaw could allow attackers to bypass Privacy preferences, giving apps with no right to access files, microphones or cameras the ability to record you or grab screenshots.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-43973 β€Ό

An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43974 β€Ό

An issue was discovered in SysAid ITIL 20.4.74 b10. The /enduserreg endpoint is used to register end users anonymously, but does not respect the server-side setting that determines if anonymous users are allowed to register new accounts. Configuring the server-side setting to disable anonymous user registration only hides the client-side registration form. An attacker can still post registration data to create new accounts without prior authentication.

πŸ“– Read

via "National Vulnerability Database".