πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-22851 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-44692 β€Ό

BuddyBoss Platform through 1.8.0 allows remote attackers to obtain the email address of each user. When creating a new user, it generates a Unique ID for their profile. This UID is their private email address with symbols removed and periods replaced with hyphens. For example. JohnDoe@example.com would become /members/johndoeexample-com and Jo.test@example.com would become /members/jo-testexample-com. The members list is available to everyone and (in a default configuration) often without authentication. It is therefore trivial to collect a list of email addresses.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45975 β€Ό

In ListCheck.exe in Acer Care Center 4.x before 4.00.3038, a vulnerability in the loading mechanism of Windows DLLs could allow a local attacker to perform a DLL hijacking attack. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with local administrator privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46117 β€Ό

jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0378 β€Ό

Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43334 β€Ό

BuddyBoss Platform through 1.8.0 allows XSS via the Group Name or Group Description field.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0379 β€Ό

Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Fantasy Premier League account hack surge prompts plans to introduce extra login checks for football fans πŸ—“οΈ

FA (belatedly) says OK to 2FA

πŸ“– Read

via "The Daily Swig".
⚠ Tax scam emails are alive and well as US tax season starts ⚠

If in doubt, don't give it out! (And don't forget that no reply is often a good reply.)

πŸ“– Read

via "Naked Security".
❌ Linux Bug in All Major Distros: β€˜An Attacker’s Dream Come True’ ❌

The 12-year-old flaw in the sudo-like polkit’s pkexec tool, found in all major Linux distributions, is likely to be exploited in the wild within days.

πŸ“– Read

via "Threat Post".
πŸ•΄ Cybersecurity Is Broken: How We Got Here & How to Start Fixing It πŸ•΄

It's not just your imagination β€” malicious threats have exponentially increased organizational risk.

πŸ“– Read

via "Dark Reading".
⚠ β€œPwnKit” security bug gets you root on most Linux distros – what to do ⚠

An elevation of privilege bug that could let a "mostly harmless" user give themselves a instant root shell

πŸ“– Read

via "Naked Security".
πŸ•΄ Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit πŸ•΄

The memory corruption vulnerability in a policy component installed by default on most Linux distributions allows any user to become root. Researchers have already reproduced the exploit.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-29846 β€Ό

IBM Security Guardium Insights 3.0 could allow an authenticated user to obtain sensitive information due to insufficient session expiration. IBM X-Force ID: 205256.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46561 β€Ό

controller/org.controller/org.controller.js in the CVE Services API 1.1.1 before 5c50baf3bda28133a3bc90b854765a64fb538304 allows an organizational administrator to transfer a user account to an arbitrary new organization, and thereby achieve unintended access within the context of that new organization.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46116 β€Ό

jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46115 β€Ό

jpress 4.2.0 is vulnerable to RCE via io.jpress.web.admin._TemplateController#doUploadFile. The admin panel provides a function through which attackers can upload templates and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29838 β€Ό

IBM Security Guardium Insights 3.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29845 β€Ό

IBM Security Guardium Insights 3.0 could allow an authenticated user to perform unauthorized actions due to improper input validation. IBM X-Force ID: 205255.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46383 β€Ό

https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: SQL Injection. The impact is: obtain sensitive information (remote). The component is: net.mingsoft.mdiy.action.web.DictAction#list. The attack vector is: 0 or sleep(3). ¢¢ MCMS has a sql injection vulnerability through which attacker can get sensitive information from the database.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46386 β€Ό

https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: File Upload. The impact is: execute arbitrary code (remote). The component is: net.mingsoft.basic.action.web.FileAction#upload. The attack vector is: jspx webshell. ¢¢ MCMS has a file upload vulnerability through which attacker can upload a webshell. Successful attacks of this vulnerability can result in takeover of MCMS

πŸ“– Read

via "National Vulnerability Database".