πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-4875 β€Ό

IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190838.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46308 β€Ό

An SQL Injection vulnerability exists in Sourcecodester Online Railway Reservation Sysytem 1.0 via the sid parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4016 β€Ό

Rapid7 Insight Agent, versions prior to 3.1.3, suffer from an improper access control vulnerability whereby, the user has access to the snapshot directory. An attacker can access, read and copy any of the files in this directory e.g. asset_info.json or file_info.json, leading to a loss of confidentiality. This issue was fixed in Rapid7 Insight Agent 3.1.3.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4876 β€Ό

IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190839.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0323 β€Ό

Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.

πŸ“– Read

via "National Vulnerability Database".
πŸ” Friday Five 1/21 πŸ”

News on the Ukrainian wiper attack, MIcrosoft disables macros in Excel by default, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
❌ Merck Awarded $1.4B Insurance Payout over NotPetya Attack ❌

Court rules β€˜War or Hostile Acts’ exclusion doesn’t apply to the pharma giant's 2017 cyberattack.

πŸ“– Read

via "Threat Post".
πŸ•΄ REvil Ransomware Gang Arrests Trigger Uncertainty, Concern in Cybercrime Forums πŸ•΄

Threat actors from Eastern Europe seen expressing some concern about Russia being a safe place for them to continue operating, researchers say.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-40595 β€Ό

SQL injection vulnerability in Sourcecodester Online Leave Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /leave_system/classes/Login.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33966 β€Ό

Cross site scripting (XSS) vulnerability in spotweb 1.4.9, allows authenticated attackers to execute arbitrary code via crafted GET request to the login page.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31562 β€Ό

The SSL/TLS configuration of Fresenius Kabi Agilia Link + version 3.0 has serious deficiencies that may allow an attacker to compromise SSL/TLS sessions in different ways. An attacker may be able to eavesdrop on transferred data, manipulate data allegedly secured by SSL/TLS, and impersonate an entity to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40247 β€Ό

SQL injection vulnerability in Sourcecodester Budget and Expense Tracker System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44464 β€Ό

Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 contains service credentials likely to be common across all instances. An attacker in possession of the password may gain privileges on all installations of this software.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23128 β€Ό

Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41835 β€Ό

Fresenius Kabi Agilia Link + version 3.0 does not enforce transport layer encryption. Therefore, transmitted data may be sent in cleartext. Transport layer encryption is offered on Port TCP/443, but the affected service does not perform an automated redirect from the unencrypted service on Port TCP/80 to the encrypted service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23728 β€Ό

Attacker can reset the device with AT Command in the process of rebooting the device. The LG ID is LVE-SMP-210011.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4001 β€Ό

A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23130 β€Ό

Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33843 β€Ό

Fresenius Kabi Agilia Link + version 3.0 has a default configuration page accessible without authentication. An attacker may use this functionality to change the exposed configuration values such as network settings.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23196 β€Ό

The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33846 β€Ό

Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 issues authentication tokens to authenticated users that are signed with a symmetric encryption key. An attacker in possession of the key can issue valid JWTs and impersonate arbitrary users.

πŸ“– Read

via "National Vulnerability Database".