πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-24974 β€Ό

The Product Feed PRO for WooCommerce WordPress plugin before 11.0.7 does not have authorisation and CSRF check in some of its AJAX actions, allowing any authenticated users to call then, which could lead to Stored Cross-Site Scripting issue (which will be triggered in the admin dashboard) due to the lack of escaping.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24865 β€Ό

The Advanced Custom Fields: Extended WordPress plugin before 0.8.8.7 does not validate the order and orderby parameters before using them in a SQL statement, leading to a SQL Injection issue

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25062 β€Ό

The Orders Tracking for WooCommerce WordPress plugin before 1.1.10 does not sanitise and escape the file_url before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24965 β€Ό

The Five Star Restaurant Reservations WordPress plugin before 2.4.8 does not have capability and CSRF checks in the rtb_welcome_set_schedule AJAX action, allowing any authenticated users to call it. Due to the lack of sanitisation and escaping, users with a role as low as subscriber could perform Cross-Site Scripting attacks against logged in admins

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-24733 β€Ό

The WP Post Page Clone WordPress plugin before 1.2 allows users with a role as low as Contributor to clone and view other users' draft and password-protected posts which they cannot view normally.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25031 β€Ό

The Image Hover Effects Ultimate (Image Gallery, Effects, Lightbox, Comparison or Magnifier) WordPress plugin before 9.7.1 does not escape the effects parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Chain of vulnerabilities led to RCE on Cisco Prime servers πŸ—“οΈ

Full chain exploit ready for Prime time

πŸ“– Read

via "The Daily Swig".
⚠ Alleged carder gang mastermind and three acolytes under arrest in Russia ⚠

The motto of the gang was "In Fraud We Trust", and they went by a dizzying range of online nicknames.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ OpenSubtitles data breach: Users asked to re-secure accounts after plaintext password snafu πŸ—“οΈ

Movie translation site asked victims to reset passwords… then sent them in clear text

πŸ“– Read

via "The Daily Swig".
πŸ›  Logwatch 7.6 πŸ› 

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-44981 β€Ό

In QuickBox Pro v2.5.8 and below, the config.php file has a variable which takes a GET parameter value and parses it into a shell_exec(''); function without properly sanitizing any shell arguments, therefore remote code execution is possible. Additionally, as the media server is running as root by default attackers can use the sudo command within this shell_exec(''); function, which allows for privilege escalation by means of RCE.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ A Level-Set on Russia-Borne Cyber Threats πŸ•΄

As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Are You Prepared to Defend Against a USB Attack? πŸ•΄

Recent "BadUSB" attacks serve as a reminder of the big damage that small devices can cause.

πŸ“– Read

via "Dark Reading".
πŸ‘Ž1
β€Ό CVE-2022-22296 β€Ό

Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to Insecure Permissions via the id parameter in manage_user endpoint. Simply change the value and data of other users can be displayed.

πŸ“– Read

via "National Vulnerability Database".
πŸ‘1
πŸ›  Lynis Auditing Tool 3.0.7 πŸ› 

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

πŸ“– Read

via "Packet Storm Security".
πŸ—“οΈ RCE bug chain patched in CentOS Web Panel πŸ—“οΈ

Shell injected on servers via bypass of local file inclusion defenses

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-41472 β€Ό

SQL injection vulnerability in Sourcecodester Simple Membership System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username and password parameters.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23437 β€Ό

There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-4088 β€Ό

SQL injection vulnerability in Data Loss Protection (DLP) ePO extension 11.8.x prior to 11.8.100, 11.7.x prior to 11.7.101, and 11.6.401 allows a remote authenticated attacker to inject unfiltered SQL into the DLP part of the ePO database. This could lead to remote code execution on the ePO server with privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40596 β€Ό

SQL injection vulnerability in Login.php in sourcecodester Online Learning System v2 by oretnom23, allows attackers to execute arbitrary SQL commands via the faculty_id parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40909 β€Ό

Cross site scripting (XSS) vulnerability in sourcecodester PHP CRUD without Refresh/Reload using Ajax and DataTables Tutorial v1 by oretnom23, allows remote attackers to execute arbitrary code via the first_name, last_name, and email parameters to /ajax_crud.

πŸ“– Read

via "National Vulnerability Database".