πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-23514 β€Ό

This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45806 β€Ό

jpress v4.2.0 admin panel provides a function through which attackers can modify the template and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
❌ New GootLoader Campaign Targets Accounting, Law Firms ❌

GootLoader hijacks WordPress sites to lure professionals to download malicious sample contract templates.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript] ⚠

Latest episode -listen to it or read it now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Redefining the CISO-CIO Relationship πŸ•΄

While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ GitLab shifts left to patch high-impact vulnerabilities πŸ—“οΈ

HackerOne bug bounty reports triaged

πŸ“– Read

via "The Daily Swig".
πŸ›  Clam AntiVirus Toolkit 0.104.2 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-23824 β€Ό

This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23131 β€Ό

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23132 β€Ό

During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23133 β€Ό

An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40327 β€Ό

Trusted Firmware-M (TF-M) 1.4.0, when Profile Small is used, has incorrect access control. NSPE can access a secure key (held by the Crypto service) based solely on knowledge of its key ID. For example, there is no authorization check associated with the relationship between a caller and a key owner.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23134 β€Ό

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

πŸ“– Read

via "National Vulnerability Database".
🦿 New study reveals phishing simulations might not be effective in training users 🦿

A new study at unprecedented scale revealed that embedded phishing training in simulations run by organizations doesn't work well. Yet crowd-sourcing phishing detection is.

πŸ“– Read

via "Tech Republic".
❌ US Military Ties Prolific MuddyWater Cyberespionage APT to Iran ❌

US Cyber Command linked the group to Iranian intelligence and detailed its multi-pronged, increasingly sophisticated suite of malware tools.

πŸ“– Read

via "Threat Post".
πŸ•΄ How Cybercriminals Are Cashing in on the Culture of 'Yes' πŸ•΄

The reward is always front of mind, while the potential harm of giving out a phone number doesn't immediately reveal itself.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New Vulnerabilities Highlight Risks of Trust in Public Cloud πŸ•΄

Major cloud providers are vulnerable to exploitation because a single flaw can be turned into a global attack using trusted core services.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2022-22123 β€Ό

In Halo, versions v1.0.0 to v1.4.17 (latest) are vulnerable to Stored Cross-Site Scripting (XSS) in the article title. An authenticated attacker can inject arbitrary javascript code that will execute on a victimÒ€ℒs server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40567 β€Ό

Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40570 β€Ό

The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40568 β€Ό

A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".