9 November 2021
?
15:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ CISA gives civilian agencies two weeks to patch recent security exploits πŸ“’

A total of 291 vulnerabilities have been detailed in an attempt to improve federal agency cyber security

πŸ“– Read

via "ITPro".
15:04
πŸ“’ 161% surge in mobile phishing pushes energy industry to its limits πŸ“’

Following Colonial Pipeline, crooks get a taste for energy companies

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Labour Party unable to access data after suspected cyber attack on managed service provider πŸ“’

The incident is being investigated by both the National Crime Agency and the Information Commissioner's Office

πŸ“– Read

via "ITPro".
15:04
πŸ“’ Robinhood hack exposes data from millions of customers πŸ“’

An attacker socially engineered an employee at the stock-trading platform to gain access to customer support systems

πŸ“– Read

via "ITPro".
15:04
πŸ“’ A third of UK workers are surveilled by employers πŸ“’

The sharp rise in surveillance comes as it's revealed webcam monitoring has more than doubled

πŸ“– Read

via "ITPro".
15:04
πŸ“’ IT Pro News In Review: Microsoft pitches 'metaverse', Graff's celebrity data leak, Meta facial recognition πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
15:11
❌ 12 New Flaws Used in Ransomware Attacks in Q3 ❌

The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase in ransomware families compared with Q2 2021.

πŸ“– Read

via "Threat Post".
?
15:31
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Minimize Ransomware's Trail of Destruction and Its Associated Costs πŸ•΄

One of the biggest mistakes an organization can make is blindly throwing technology at the problem instead of properly investing in building a security team.

πŸ“– Read

via "Dark Reading".
15:31
πŸ•΄ Zoho ManageEngine Flaw Highlights Risks of Race to Patch πŸ•΄

Attackers used a pre-auth vulnerability in a component of the enterprise management software suite to compromise businesses, highlighting the dangers of Internet-facing software.

πŸ“– Read

via "Dark Reading".
?
15:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Ransomware attacks are increasingly exploiting security vulnerabilities 🦿

The number of security flaws associated with ransomware rose from 266 to 278 last quarter, according to security firm Ivanti.

πŸ“– Read

via "Tech Republic".
15:50
🦿 Digital driver's licenses: Are they secure enough for us to trust? 🦿

States should use a privacy by design approach instead of creating a new system to track purchases and other activities, according to security experts.

πŸ“– Read

via "Tech Republic".
?
16:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43172 β€Ό

NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run. In RPKI, a CA can choose the RRDP repository it wishes to publish its data in. By continuously generating a new child CA that only consists of another CA using a different RRDP repository, a malicious CA can create a chain of CAs of de-facto infinite length. Routinator prior to version 0.10.2 did not contain a limit on the length of such a chain and will therefore continue to process this chain forever. As a result, the validation run will never finish, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-43173 β€Ό

In NLnet Labs Routinator prior to 0.10.2, a validation run can be delayed significantly by an RRDP repository by not answering but slowly drip-feeding bytes to keep the connection alive. This can be used to effectively stall validation. While Routinator has a configurable time-out value for RRDP connections, this time-out was only applied to individual read or write operations rather than the complete request. Thus, if an RRDP repository sends a little bit of data before that time-out expired, it can continuously extend the time it takes for the request to finish. Since validation will only continue once the update of an RRDP repository has concluded, this delay will cause validation to stall, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2021-43174 β€Ό

NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.

πŸ“– Read

via "National Vulnerability Database".
?
16:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Kaspersky finds 31% increase in "smart" DDoS attacks 🦿

The security company expects these attacks to keep rising through the end of the year.

πŸ“– Read

via "Tech Republic".
?
17:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Self-Learning AI Is Changing the Paradigm of ICS Security πŸ•΄

By focusing on the organization rather than the threat, AI can identify subtle changes in your digital environment that point to a cyber threat.

πŸ“– Read

via "Dark Reading".
17:43
❌ Not Punny: Angling Direct Breach Cripples Retailer for Days   ❌

A U.K. fishing retailer’s site has been hijacked and redirected to Pornhub.

πŸ“– Read

via "Threat Post".
?
18:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Microsoft Patch Tuesday, November 2021 Edition β™ŸοΈ

Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches address vulnerabilities that are already being used in active attacks online, and four of the flaws were disclosed publicly before today -- potentially giving adversaries a head start in figuring out how to exploit them.

πŸ“– Read

via "Krebs on Security".
18:21
🦿 Security pros say federal government should do more to protect and secure private sector 🦿

A full 95% of professionals surveyed by Tripwire believe the government should play a bigger role in securing non-governmental companies.

πŸ“– Read

via "Tech Republic".
18:35
β€Ό CVE-2020-28419 β€Ό

During installation with certain driver software or application packages an arbitrary code execution could occur.

πŸ“– Read

via "National Vulnerability Database".
18:35
β€Ό CVE-2021-20119 β€Ό

The password change utility for the Arris SurfBoard SB8200 can have safety measures bypassed that allow any logged-in user to change the administrator password.

πŸ“– Read

via "National Vulnerability Database".
?
19:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Nov. Patch Tuesday Fixes Six Zero-Days, 55 Bugs ❌

Experts urged users to prioritize patches for Microsoft Exchange and Excel, those favorite platforms so frequently targeted by cybercriminals and nation-state actors.

πŸ“– Read

via "Threat Post".
19:20
🦿 It's time to dump Chrome as your default browser on Android 🦿

Jack Wallen makes his case for Android users to switch from Chrome as their default browsers. He also shows you how.

πŸ“– Read

via "Tech Republic".
?
20:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43569 β€Ό

The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2021-43570 β€Ό

The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2021-43572 β€Ό

The verify function in the Stark Bank Python ECDSA library (ecdsa-python) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2021-43568 β€Ό

The verify function in the Stark Bank Elixir ECDSA library (ecdsa-elixir) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2021-43571 β€Ό

The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.

πŸ“– Read

via "National Vulnerability Database".
20:38
πŸ•΄ Are You Planning for the Quantum, Transhumanist Threat? πŸ•΄

Breaking encryption in a day and hacking without visible devices are two threats that could become a reality in the next decade and beyond, experts say.

πŸ“– Read

via "Dark Reading".
20:38
πŸ•΄ Microsoft Fixes Exchange Server Zero-Day πŸ•΄

November security update contains patches for 55 bugs β€” including six zero-days across various products.

πŸ“– Read

via "Dark Reading".
?
22:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43575 β€Ό

** DISPUTED ** KNX ETS6 through 6.0.0 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information, a similar issue to CVE-2021-36799. NOTE: The vendor disputes this because it is not the responsibility of the ETS to securely store cryptographic key material when it is not being exported.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2021-35488 β€Ό

Thruk 2.40-2 allows /thruk/#cgi-bin/status.cgi?style=combined&title={TITLE] Reflected XSS via the host or title parameter. An attacker could inject arbitrary JavaScript into status.cgi. The payload would be triggered every time an authenticated user browses the page containing it.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2021-35489 β€Ό

Thruk 2.40-2 allows /thruk/#cgi-bin/extinfo.cgi?type=2&host={HOSTNAME]&service={SERVICENAME]&backend={BACKEND] Reflected XSS via the host or service parameter. An attacker could inject arbitrary JavaScript into extinfo.cgi. The malicious payload would be triggered every time an authenticated user browses the page containing it.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2021-37157 β€Ό

An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. $HOME/OGP/Cfg/Config.pm has the root password in cleartext.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2021-37158 β€Ό

An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. An authenticated attacker could inject OS commands by starting a Counter-Strike server and using the map field to enter a Bash command.

πŸ“– Read

via "National Vulnerability Database".
10 November 2021
?
03:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42292 β€Ό

Microsoft Excel Security Feature Bypass Vulnerability

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-41366 β€Ό

Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-42304 β€Ό

Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42303.

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-42288 β€Ό

Windows Hello Security Feature Bypass Vulnerability

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-42279 β€Ό

Chakra Scripting Engine Memory Corruption Vulnerability

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-41367 β€Ό

NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41370, CVE-2021-42283.

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-41373 β€Ό

FSLogix Information Disclosure Vulnerability

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-41356 β€Ό

Windows Denial of Service Vulnerability

πŸ“– Read

via "National Vulnerability Database".
03:41
β€Ό CVE-2021-42323 β€Ό

Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42301.

πŸ“– Read

via "National Vulnerability Database".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-31853 β€Ό

DLL Search Order Hijacking Vulnerability in McAfee Drive Encryption (MDE) prior to 7.3.0 HF2 (7.3.0.183) allows local users to execute arbitrary code and escalate privileges via execution from a compromised folder.

πŸ“– Read

via "National Vulnerability Database".
?
09:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Apache Storm maintainers patch two pre-auth RCE vulnerabilities πŸ—“οΈ

High-risk issues were discovered by GitHub’s in-house security team

πŸ“– Read

via "The Daily Swig".
?
10:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-34598 β€Ό

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active

πŸ“– Read

via "National Vulnerability Database".
10:36
β€Ό CVE-2021-39474 β€Ό

Vulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device.

πŸ“– Read

via "National Vulnerability Database".
10:36
β€Ό CVE-2021-43136 β€Ό

An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform.

πŸ“– Read

via "National Vulnerability Database".
10:36
β€Ό CVE-2021-34582 β€Ό

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.

πŸ“– Read

via "National Vulnerability Database".
10:36
β€Ό CVE-2021-25974 β€Ό

In Publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS. A user with a Ò€œpublisherҀ� role is able to inject and execute arbitrary JavaScript code while creating a page/article.

πŸ“– Read

via "National Vulnerability Database".
10:36
β€Ό CVE-2021-25975 β€Ό

In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with Ò€œpublisherҀ� role to inject malicious JavaScript via the uploaded html file.

πŸ“– Read

via "National Vulnerability Database".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dark Reading Video News Desk Comes to Black Hat Europe πŸ•΄

While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices around the world.

πŸ“– Read

via "Dark Reading".
11:11
πŸ—“οΈ Black Hat Europe: Laws and regulations need to change to secure world’s digital infrastructure πŸ—“οΈ

Better incentives to build secure products needed, former MEP tells conference

πŸ“– Read

via "The Daily Swig".
11:11
❌ New Android Spyware Poses Pegasus-Like Threat ❌

PhoneSpy already has stolen data and tracked the activity of targets in South Korea, disguising itself as legitimate lifestyle apps.

πŸ“– Read

via "Threat Post".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Researcher Details Vulnerabilities Found in AWS API Gateway πŸ•΄

AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.

πŸ“– Read

via "Dark Reading".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Tips to Secure the OT Cybersecurity Budget You Require πŸ•΄

OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.

πŸ“– Read

via "Dark Reading".
12:07
πŸ•΄ Securing the Public: Who Should Take Charge? πŸ•΄

International policy expert Marietke Schaake explores the intricacies of protecting the public as governments depend on private companies to build and secure digital infrastructure.

πŸ“– Read

via "Dark Reading".
?
12:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How healthcare organizations and patients are increasingly at risk from cyber threats 🦿

A majority of IT pros working at hospitals who were surveyed by Armis said they've seen a rise in cyber risk over the past 12 months.

πŸ“– Read

via "Tech Republic".
?
13:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA and State and Local Partners Test Emergency Response Plans at Chevron Salt Lake Refinery πŸ•΄

The exercise included several objectives related to response procedures at the refinery, including evacuation and shelter-in-place decision-making; roles and responsibilities during investigations; communication with first responders; and public messaging before and following an incident.

πŸ“– Read

via "Dark Reading".
13:40
πŸ—“οΈ Smuggling hidden backdoors into JavaScript with homoglyphs and invisible Unicode characters πŸ—“οΈ

Researchers urge developers to secure code by disallowing non-ASCII characters

πŸ“– Read

via "The Daily Swig".
?
14:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Massive Zero Day Hole Found in Palo Alto Security Appliances ❌

Researchers have a working exploit for the vulnerability (now patched), which allows for unauthenticated RCE and affects an estimated 70,000+ VPN/firewalls.

πŸ“– Read

via "Threat Post".
14:20
⚠ Sophos 2022 Threat Report: Malware, Mobile, Machine learning and more! ⚠

The crooks have shown that they're willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.

πŸ“– Read

via "Naked Security".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42062 β€Ό

SAP ERP HCM Portugal does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither modify any information nor cause availability impacts.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-41426 β€Ό

Beeline Smart box 2.0.38 is vulnerable to Cross Site Request Forgery (CSRF) via mgt_end_user.htm.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40503 β€Ό

An information disclosure vulnerability exists in SAP GUI for Windows - versions < 7.60 PL13, 7.70 PL4, which allows an attacker with sufficient privileges on the local client-side PC to obtain an equivalent of the userÒ€ℒs password. With this highly sensitive data leaked, the attacker would be able to logon to the backend system the SAP GUI for Windows was connected to and launch further attacks depending on the authorizations of the user.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40502 β€Ό

SAP Commerce - versions 2105.3, 2011.13, 2005.18, 1905.34, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. Authenticated attackers will be able to access and edit data from B2B units they do not belong to.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-41427 β€Ό

Beeline Smart Box 2.0.38 is vulnerable to Cross Site Scripting (XSS) via the choose_mac parameter to setup.cgi.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43561 β€Ό

An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-38887 β€Ό

IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information from application response requests that could be used in further attacks against the system. IBM X-Force ID: 209401.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43564 β€Ό

An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43563 β€Ό

An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The Access Control in the bundled media browser is broken, which allows an unauthenticated attacker to perform requests to the pixx.io API for the configured API user. This allows an attacker to download various media files from the DAM system.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43562 β€Ό

An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The extension fails to restrict the image download to the configured pixx.io DAM URL, resulting in SSRF. As a result, an attacker can download various content from a remote location and save it to a user-controlled filename, which may result in Remote Code Execution. A TYPO3 backend user account is required to exploit this.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2020-12488 β€Ό

The attacker can access the sensitive information stored within the jovi Smart Scene module by entering carefully constructed commands without requesting permission.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40501 β€Ό

SAP ABAP Platform Kernel - versions 7.77, 7.81, 7.85, 7.86, does not perform necessary authorization checks for an authenticated business user, resulting in escalation of privileges. That means this business user is able to read and modify data beyond the vulnerable system. However, the attacker can neither significantly reduce the performance of the system nor stop the system.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40504 β€Ό

A certain template role in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, contains transport authorizations, which exceed expected display only permissions.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40521 β€Ό

Airangel HSMX Gateway devices through 5.2.04 allow Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40519 β€Ό

Airangel HSMX Gateway devices through 5.2.04 have Hard-coded Database Credentials.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43523 β€Ό

In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-40518 β€Ό

Airangel HSMX Gateway devices through 5.2.04 allow CSRF.

πŸ“– Read

via "National Vulnerability Database".
14:50
⚠ Patch Tuesday updates the Win 7 updater… for at most 1 more year of updates ⚠

The clock stopped long ago on Windows 7, except for those who paid for overtime. But there won't be any double overtime!

πŸ“– Read

via "Naked Security".
14:57
πŸ›  GNUnet P2P Framework 0.15.3 πŸ› 

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

πŸ“– Read

via "Packet Storm Security".
15:07
πŸ•΄ Defining the Hierarchy of Value in Cyber Intelligence πŸ•΄

One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.

πŸ“– Read

via "Dark Reading".
?
15:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Critical Citrix Bug Shuts Down Network, Cloud App Access ❌

The distributed computing vendor patched the flaw, affecting Citrix ADC and Gateway, along with another flaw impacting availability for SD-WAN appliances.

πŸ“– Read

via "Threat Post".
15:50
🦿 These industries were the most affected by the past year of ransomware attacks 🦿

After what has been a year of averaging more than a thousand ransomware attacks per day, NordLocker said that data released by hackers shows an unexpected industry at the top.

πŸ“– Read

via "Tech Republic".
?
16:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SolarWinds Vulnerability Exploited in First Stage of Clop Ransomware Attacks πŸ•΄

Russian cybercrime group known as T505 is targeting SolarWinds Server-U systems that haven't been patched for a remote code execution vulnerability fixed this summer.

πŸ“– Read

via "Dark Reading".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3572 β€Ό

A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-40520 β€Ό

Airangel HSMX Gateway devices through 5.2.04 have Weak SSH Credentials.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3061 β€Ό

An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers that have Prisma Access 2.1 firewalls are impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-32021 β€Ό

A denial of service vulnerability in the message broker of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-41038 β€Ό

In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3056 β€Ό

A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-22048 β€Ό

The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism. A malicious actor with non-administrative access to vCenter Server may exploit this issue to elevate privileges to a higher privileged group.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3059 β€Ό

An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers that have Prisma Access 2.1 Preferred or Prisma Access 2.1 Innovation firewalls are impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3064 β€Ό

A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue. This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17. Prisma Access customers are not impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3380 β€Ό

Insecure direct object reference (IDOR) vulnerability in ICREM H8 SSRMS allows attackers to disclose sensitive information via the Print Invoice Functionality.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-32023 β€Ό

An elevation of privilege vulnerability in the message broker of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3062 β€Ό

An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS. Exploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls. Prisma Access customers are not impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-28137 β€Ό

Cross site request forgery (CSRF) in Genexis Platinum 4410 V2-1.28, allows attackers to cause a denial of service by continuously restarting the router.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-32022 β€Ό

A low privileged delete vulnerability using CEF RPC server of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system and gaining the ability to delete data from the local system.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3063 β€Ό

An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.21; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h4; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h3; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8-h4; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers are not impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3060 β€Ό

An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-3058 β€Ό

An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. This issue does not impact Prisma Access firewalls.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-40517 β€Ό

Airangel HSMX Gateway devices through 5.2.04 is vulnerable to stored Cross Site Scripting. XSS Payload is placed in the name column of the updates table using database access.

πŸ“– Read

via "National Vulnerability Database".
16:44
πŸ” DOJ Takes Action Against Two Charged with Ransomware Attacks πŸ”

The Justice Department announced this week that it arrested two involved with deploying ransomware and that it seized $6.1 million in ransom payments.

πŸ“– Read

via "".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SquirrelWaffle Leverages Malspam to Deliver Qakbot, Cobalt Strike πŸ•΄

Threat is spreading widely via spam campaigns, infecting systems with a new malware loader.

πŸ“– Read

via "Dark Reading".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42111 β€Ό

An issue was discovered in the RCDevs OpenOTP app 1.4.13 and 1.4.14 for iOS. If it is installed on a jailbroken device, it is possible to retrieve the PIN code used to access the application.

πŸ“– Read

via "National Vulnerability Database".
18:48
β™ŸοΈ SMS About Bank Fraud as a Pretext for Voice Phishing β™ŸοΈ

Most of us have probably heard the term "smishing" -- which is a portmanteau for traditional phishing scams sent through SMS text messages. Smishing messages usually include a link to a site that spoofs a popular bank and tries to siphon personal information. But increasingly, phishers are turning to a hybrid form of smishing -- blasting out linkless text messages about suspicious bank transfers as a pretext for immediately calling and scamming anyone who responds via text.

πŸ“– Read

via "Krebs on Security".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ ChaosDB: Researchers Share Technical Details of Azure Flaw πŸ•΄

Wiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.

πŸ“– Read

via "Dark Reading".
?
20:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-23876 β€Ό

pdf2xml v2.0 was discovered to contain a memory leak in the function TextPage::testLinkedText.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23886 β€Ό

XnView MP v0.96.4 was discovered to contain a heap overflow which allows attackers to cause a denial of service (DoS) via a crafted pict file. Related to a User Mode Write AV starting at ntdll!RtlpLowFragHeapFree.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23903 β€Ό

A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23891 β€Ό

A User Mode Write AV in Editor+0x5cd7 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23884 β€Ό

A buffer overflow in Nomacs v3.15.0 allows attackers to cause a denial of service (DoS) via a crafted MNG file.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23873 β€Ό

pdf2xml v2.0 was discovered to contain a heap-buffer overflow in the function TextPage::dump.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23898 β€Ό

A User Mode Write AV in Editor+0x5ea2 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23896 β€Ό

A User Mode Write AV in Editor+0x576b of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23902 β€Ό

A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address may be used as a return value starting at Editor!TMethodImplementationIntercept+0x528a3.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-23887 β€Ό

XnView MP v0.96.4 was discovered to contain a heap overflow which allows attackers to cause a denial of service (DoS) via a crafted ico file. Related to a Read Access Violation starting at USER32!SmartStretchDIBits+0x33.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23900 β€Ό

A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address controls Code Flow starting at Editor!TMethodImplementationIntercept+0x57a3b.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23879 β€Ό

pdf2json v0.71 was discovered to contain a NULL pointer dereference in the component ObjectStream::getObject.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23888 β€Ό

A User Mode Write AV in Editor!TMethodImplementationIntercept+0x53f6c3 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted psd file.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23901 β€Ό

A User Mode Write AV in Editor+0x5d15 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23894 β€Ό

A User Mode Write AV in ntdll!RtlpCoalesceFreeBlocks+0x268 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23899 β€Ό

A User Mode Write AV in Editor+0x5f91 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23895 β€Ό

A User Mode Write AV in Editor+0x76af of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23889 β€Ό

A User Mode Write AV starting at Editor!TMethodImplementationIntercept+0x4189c6 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted ico file.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23872 β€Ό

A NULL pointer dereference in the function TextPage::restoreState of pdf2xml v2.0 allows attackers to cause a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2020-23890 β€Ό

A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted JPG file. Related to Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at JPGCodec+0x753648.

πŸ“– Read

via "National Vulnerability Database".
20:39
πŸ•΄ Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months πŸ•΄

Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.

πŸ“– Read

via "Dark Reading".
?
22:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Application Security Toolkit Uncovers Dependency Confusion Attacks πŸ•΄

The Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally been added to their projects.

πŸ“– Read

via "Dark Reading".
?
22:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40873 β€Ό

An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66, and uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a client or server. The server process may crash unexpectedly because of a double free, and must be restarted.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2021-40871 β€Ό

An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a OPC/UA client. The client process may crash unexpectedly because of a wrong type cast, and must be restarted.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2021-40872 β€Ό

An issue was discovered in Softing Industrial Automation uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) or login as an anonymous user (bypassing security checks) by sending crafted messages to a OPC/UA server. The server process may crash unexpectedly because of an invalid type cast, and must be restarted.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2021-33816 β€Ό

The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2021-33618 β€Ό

Dolibarr ERP and CRM 13.0.2 allows XSS via object details, as demonstrated by > and < characters in the onpointermove attribute of a BODY element to the user-management feature.

πŸ“– Read

via "National Vulnerability Database".
11 November 2021
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-26558 β€Ό

Deserialization of Untrusted Data vulnerability of Apache ShardingSphere-UI allows an attacker to inject outer link resources. This issue affects Apache ShardingSphere-UI Apache ShardingSphere-UI version 4.1.1 and later versions; Apache ShardingSphere-UI versions prior to 5.0.0.

πŸ“– Read

via "National Vulnerability Database".
08:37
β€Ό CVE-2021-25980 β€Ό

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the Ò€œforgot passwordҀ� functionality to reset the victimÒ€ℒs password and successfully take over their account.

πŸ“– Read

via "National Vulnerability Database".
?
11:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Should Our Security Controls Be More Like North Korea or Norway? πŸ•΄

When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.

πŸ“– Read

via "Dark Reading".
11:17
❌ Tiny Font Size Fools Email Filters in BEC Phishing ❌

The One Font BEC campaign targets Microsoft 365 users and uses sophisticated obfuscation tactics to slip past security protections to harvest credentials.

πŸ“– Read

via "Threat Post".
?
11:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Dependency Combobulator offers defense against namespace confusion attacks πŸ—“οΈ

Toolkit β€˜tackles common scenarios’ and can evolve to detect emerging attack variants

πŸ“– Read

via "The Daily Swig".
11:50
⚠ Patch Tuesday updates the Win 7 updater… for at most 1 more year of updates ⚠

The clock stopped long ago on Windows 7, except for those who paid for overtime. But there won't be any double overtime!

πŸ“– Read

via "Naked Security".
11:50
🦿 How cybercriminals use bait attacks to gather info about their intended victims 🦿

With a bait attack, criminals try to obtain the necessary details to plan future attacks against their targets, says Barracuda.

πŸ“– Read

via "Tech Republic".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Palo Alto GlobalProtect users urged to patch against critical vulnerability πŸ—“οΈ

Details withheld about dangerous threat as orgs given one-month patching window

πŸ“– Read

via "The Daily Swig".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43350 β€Ό

An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.

πŸ“– Read

via "National Vulnerability Database".
?
13:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Zero tolerance: How infosec’s online β€˜cancel culture’ is stunting industry growth πŸ—“οΈ

Fear of Twitter fallout is stopping vital information from being shared Social media backlash and online squabbling is stopping the information security industry from learning from its mistakes, Black

πŸ“– Read

via "The Daily Swig".
13:21
🦿 This pre-Black Friday sale lets you save an extra 15% off cybersecurity certification training courses 🦿

Receive over 100 hours of expert instruction on globally recognized cybersecurity skills that will help you become an in-demand IT professional.

πŸ“– Read

via "Tech Republic".
13:21
🦿 How to easily transfer files between computers with croc 🦿

If you're looking for an easy command-line tool to transfer files between systems on the same LAN, Jack Wallen believes croc is the tool for the job.

πŸ“– Read

via "Tech Republic".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ GoCD bug chain provides second springboard to supply chain attacks πŸ—“οΈ

Follow-up to recent GoCD disclosure provides additional path to infiltrating build environments

πŸ“– Read

via "The Daily Swig".
?
14:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast] ⚠

Latest epsiode - listen now!

πŸ“– Read

via "Naked Security".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Third-Party Software Risks Grow, but So Do Solutions πŸ•΄

Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.

πŸ“– Read

via "Dark Reading".
15:09
πŸ•΄ Insider IP Theft Is Surging β€” and Most Can't Stop It πŸ•΄

The Great Resignation is upon us, and insider IP theft is surging as a result. But it is a solvable problem.

πŸ“– Read

via "Dark Reading".
15:12
❌ Congress Mulls Ban on Big Ransom Payouts ❌

A bill introduced this week would regulate ransomware response by the country's critical financial sector.

πŸ“– Read

via "Threat Post".
15:21
🦿 Research: Supply chain and COVID-19 challenges forces companies to shift their security strategies 🦿

64% of survey respondents reported that their companies have concerns about security risks for supply chains.

πŸ“– Read

via "Tech Republic".
?
16:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ What Happens If Time Gets Hacked πŸ•΄

Renowned hardware security expert raises alarm on the risk and dangers of cyberattackers targeting the current time-synchronization infrastructure.

πŸ“– Read

via "Dark Reading".
16:09
πŸ•΄ Cloud Attack Analysis Unearths Lessons for Security Pros πŸ•΄

Researchers detail their investigation of a cryptomining campaign stealing AWS credentials and how attackers have evolved their techniques.

πŸ“– Read

via "Dark Reading".
16:12
❌ Cyber-Mercenary Group Void Balaur Attacks High-Profile Targets for Cash ❌

A Russian-language threat group is available for hire, to steal data on journalists, political leaders, activists and from organizations in every sector.

πŸ“– Read

via "Threat Post".
?
17:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Back-to-Back PlayStation 5 Hacks Hit on the Same Day ❌

Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices.

πŸ“– Read

via "Threat Post".
?
17:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Invest in These 3 Key Security Technologies to Fight Ransomware ❌

Ransomware volumes are up 1000%. Aamir Lakhani, cybersecurity researcher and practitioner at FortiGuard Labsβ€―, discusses secure email, network segmentation and sandboxing for defense.

πŸ“– Read

via "Threat Post".
?
18:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Learn how to become an ethical hacker for only $21 during this pre-Black Friday sale 🦿

You don't need to break the bank to get the training required for an exciting new career, especially when you've got the right coupon code.

πŸ“– Read

via "Tech Republic".
?
18:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2002-20001 β€Ό

The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.

πŸ“– Read

via "National Vulnerability Database".
?
19:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Do I Know It's Time to Consider a SASE Migration? πŸ•΄

The rapid shift to a hybrid workplace and accelerated adoption of new technologies means it's time to rethink networking security approaches.

πŸ“– Read

via "Dark Reading".
?
20:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3908 β€Ό

OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-3909 β€Ό

OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-3910 β€Ό

OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character).

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-3907 β€Ό

OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. rsync://example.org/repo/../../etc/cron.daily/evil.roa), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-3912 β€Ό

OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-3911 β€Ό

If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.

πŸ“– Read

via "National Vulnerability Database".
20:41
πŸ•΄ Google Open Sources ClusterFuzzLite πŸ•΄

ClusterFuzzLite is a stripped-down version of continuous fuzzing tool ClusterFuzz that integrates CI tools.

πŸ“– Read

via "Dark Reading".
?
21:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 'Lyceum' Threat Group Broadens Focus to ISPs πŸ•΄

New report suggests attacker is targeting trusted supply chain companies in order to compromise large numbers of downstream customers.

πŸ“– Read

via "Dark Reading".
?
22:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-34422 β€Ό

The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-34421 β€Ό

The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer's device.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-34419 β€Ό

In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-34420 β€Ό

The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer's computer.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-34418 β€Ό

The login routine of the web console in the Zoom On-Premise Meeting Connector before version 4.6.239.20200613, Zoom On-Premise Meeting Connector MMR before version 4.6.239.20200613, Zoom On-Premise Recording Connector before version 3.8.42.20200905, Zoom On-Premise Virtual Room Connector before version 4.4.6344.20200612, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5492.20200616 fails to validate that a NULL byte was sent while authenticating. This could lead to a crash of the login service.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2021-34417 β€Ό

The network proxy page on the web portal for the Zoom On-Premise Meeting Connector Controller before version 4.6.365.20210703, Zoom On-Premise Meeting Connector MMR before version 4.6.365.20210703, Zoom On-Premise Recording Connector before version 3.8.45.20210703, Zoom On-Premise Virtual Room Connector before version 4.4.6868.20210703, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5496.20210703 fails to validate input sent in requests to set the network proxy password. This could lead to remote command injection by a web portal administrator.

πŸ“– Read

via "National Vulnerability Database".
12 November 2021
?
08:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-1903 β€Ό

Possible denial of service scenario can occur due to lack of length check on Channel Switch Announcement IE in beacon or probe response frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30266 β€Ό

Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30263 β€Ό

Possible race condition can occur due to lack of synchronization mechanism when On-Device Logging node open twice concurrently in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30259 β€Ό

Possible out of bound access due to improper validation of function table entries in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1921 β€Ό

Possible memory corruption due to Improper handling of hypervisor unmap operations for concurrent memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1979 β€Ό

Possible buffer overflow due to improper validation of FTM command payload in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30255 β€Ό

Possible buffer overflow due to improper input validation in PDM DIAG command in FTM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30264 β€Ό

Possible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30254 β€Ό

Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1912 β€Ό

Possible integer overflow can occur due to improper length check while calculating count and grace period in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1975 β€Ό

Possible heap overflow due to improper length check of domain while parsing the DNS response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1924 β€Ό

Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1981 β€Ό

Possible buffer over read due to improper IE size check of Bearer capability IE in MT setup request from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30265 β€Ό

Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1982 β€Ό

Possible denial of service scenario due to improper input validation of received NAS OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30321 β€Ό

Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30284 β€Ό

Possible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1973 β€Ό

A FTM Diag command can allow an arbitrary write into modem OS space in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
?
09:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Driftwood debuts: New open source tool hunts for leaked public-private key pairs πŸ—“οΈ

The tool will help security professionals find compromised TLS keys and sensitive keys tied to GitHub accounts

πŸ“– Read

via "The Daily Swig".
09:40
πŸ•΄ In Appreciation: Alan Paller πŸ•΄

Alan Paller, founder of the famed SANS Institute, passed away on Nov. 9.

πŸ“– Read

via "Dark Reading".
?
10:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3934 β€Ό

ohmyzsh is vulnerable to Improper Neutralization of Special Elements used in an OS Command

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-43576 β€Ό

Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-43578 β€Ό

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-21699 β€Ό

Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-21701 β€Ό

Jenkins Performance Plugin 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-43577 β€Ό

Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

πŸ“– Read

via "National Vulnerability Database".
10:38
β€Ό CVE-2021-21700 β€Ό

Jenkins Scriptler Plugin 3.3 and earlier does not escape the name of scripts on the UI when asking to confirm their deletion, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by exploitable by attackers able to create Scriptler scripts.

πŸ“– Read

via "National Vulnerability Database".
10:41
πŸ—“οΈ Alan Paller: Infosec world pays homage after SANS founder and infosec luminary dies πŸ—“οΈ

β€˜His vision has changed the lives of hundreds of thousands of security practitioners’

πŸ“– Read

via "The Daily Swig".
10:44
❌ Millions of Routers, IoT Devices at Risk from New Open-Source Malware ❌

BotenaGo, written in Google’s Golang programming language, can exploit more than 30 different vulnerabilities.

πŸ“– Read

via "Threat Post".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ HTML smuggling: Fresh attack technique is being used to increasingly target banking sector πŸ—“οΈ

Evasive malware is being spread via email in campaigns similar to those of nation-state actors

πŸ“– Read

via "The Daily Swig".
12:10
πŸ•΄ How to Hire ο»Ώβ€” and Retain ο»Ώβ€”ο»Ώ Effective Threat Hunters πŸ•΄

Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.

πŸ“– Read

via "Dark Reading".
?
12:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43494 β€Ό

OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
12:39
β€Ό CVE-2021-43496 β€Ό

Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
?
14:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-38972 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2020-4140 β€Ό

IBM Security SiteProtector System 3.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174052.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-43493 β€Ό

ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2020-4146 β€Ό

IBM Security SiteProtector System 3.1.1 could allow a remote attacker to obtain sensitive information, caused by missing 'HttpOnly' flag. A remote attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 174129.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-38973 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-38985 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-43492 β€Ό

AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
14:51
⚠ S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust [Podcast] ⚠

Latest epsiode - listen now!

πŸ“– Read

via "Naked Security".
14:51
🦿 Score an extra 15% discount on this cyber analysis training on sale ahead of Black Friday 🦿

Eight courses and 51 hours of content on CompTIA CySA+, ethical hacking, social engineering and more. Everything you need to be a certified cybersecurity analyst.

πŸ“– Read

via "Tech Republic".
?
15:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Mac Zero Day Targets Apple Devices in Hong Kong ❌

Google researchers have detailed a widespread watering-hole attack that installed a backdoor on Apple devices that visited Hong Kong-based media and pro-democracy sites.

πŸ“– Read

via "Threat Post".
15:16
πŸ” Friday Five 11/12 πŸ”

Apple fixes a macOS zero day, Microsoft warns of HTML smuggling phishing attacks, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
15:21
⚠ Samba update patches plaintext passwork plundering problem ⚠

When Microsoft itself says STOP USING X, where X is one of its own protocols... we think you should listen.

πŸ“– Read

via "Naked Security".
15:21
🦿 The mobile VPNs of 2021 that you need to try 🦿

Privacy is essential, especially on a mobile device. These five options available for both Android and iOS can help keep your device secure and your traffic private, but not without cost.

πŸ“– Read

via "Tech Republic".
?
15:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How AI fights fraud in the telecom industry 🦿

Americans lost $29.8 billion in phone fraud over the past year. Can AI fraud detection change this?

πŸ“– Read

via "Tech Republic".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41264 β€Ό

OpenZeppelin Contracts is a library for smart contract development. In affected versions upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. For users unable to upgrade; initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-41259 β€Ό

Nim is a systems programming language with a focus on efficiency, expressiveness, and elegance. In affected versions the uri.parseUri function which may be used to validate URIs accepts null bytes in the input URI. This behavior could be used to bypass URI validation. For example: parseUri("http://localhost\0hello").hostname is set to "localhost\0hello". Additionally, httpclient.getContent accepts null bytes in the input URL and ignores any data after the first null byte. Example: getContent("http://localhost\0hello") makes a request to localhost:80. An attacker can use a null bytes to bypass the check and mount a SSRF attack.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-41254 β€Ό

kustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges. In affected versions multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue. This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image. To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used.

πŸ“– Read

via "National Vulnerability Database".
16:51
🦿 Pay-per-click fraud is costing top tech companies, and you, hundreds of millions of dollars 🦿

With an estimated 14% of PPC costs being lost to fraud, all it takes is a look at the advertising budgets of top tech firms to see how much money they're wasting, says PPC Shield.

πŸ“– Read

via "Tech Republic".
?
17:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Windows 10 Privilege-Escalation Zero-Day Gets an Unofficial Fix ❌

Researchers warn that CVE-2021-34484 can be exploited with a patch bypass for a bug originally addressed in August by Microsoft.

πŸ“– Read

via "Threat Post".
?
17:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Top 10 Cybersecurity Best Practices to Combat Ransomware ❌

Immutable storage and more: Sonya Duffin, data protection expert at Veritas Technologies, offers the Top 10 steps for building a multi-layer resilience profile.

πŸ“– Read

via "Threat Post".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Follow the Leaders: A Blueprint for Software Security Success πŸ•΄

Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.

πŸ“– Read

via "Dark Reading".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41972 β€Ό

Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way.

πŸ“– Read

via "National Vulnerability Database".
?
19:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Open Source Project Aims to Detect Living-Off-the-Land Attacks πŸ•΄

The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.

πŸ“– Read

via "Dark Reading".
19:21
🦿 Security researcher: Flaw in Apple Pay, Samsung Pay and Google Pay makes fraud easy for thieves 🦿

Positive Technologies expert describes vulnerability linked to apps used to pay for public transit tickets.

πŸ“– Read

via "Tech Republic".
?
19:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Save an extra 15% off training in ethical hacking with this pre-Black Friday sale deal 🦿

Develop the necessary skills and use the tools to be an ethical hacker through this 120-hour comprehensive course bundle.

πŸ“– Read

via "Tech Republic".
?
20:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks πŸ•΄

Using the spread of viruses in human populations as a model to inform its AI, Inflame is a key component in BT’s recently-announced Eagle-i platform.

πŸ“– Read

via "Dark Reading".
20:12
πŸ•΄ MSPAlliance Leadership Council Forms Vendor Council to Address Managed Services Supply Chain Risk πŸ•΄

MSP supply chain threats will be mitigated through transparency, education, business continuity planning, and managed services channel certification.

πŸ“– Read

via "Dark Reading".
20:12
πŸ•΄ Emerging Security Tools Tackle GraphQL Security πŸ•΄

New security tools are proactively protecting APIs built with GraphQL, before attacks against them become more commonplace.

πŸ“– Read

via "Dark Reading".
20:12
πŸ•΄ Ankura Launches Brooklyn Cyber Center πŸ•΄

New initiative addresses shortage of professionals and lack of diversity in cybersecurity by recruiting, training and retaining diverse talent from underrepresented backgrounds.

πŸ“– Read

via "Dark Reading".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3786 β€Ό

A potential vulnerability in the SMI callback function used in CSME configuration of some Lenovo Notebook and ThinkPad systems could be used to leak out data out of the SMRAM range.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43610 β€Ό

Belledonne Belle-sip before 5.0.20 can crash applications such as Linphone via an invalid From header (request URI without a parameter) in an unauthenticated SIP message, a different issue than CVE-2021-33056.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3789 β€Ό

An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-39303 β€Ό

The server in Jamf Pro before 10.32.0 has a vulnerability affecting integrity and availability, aka PI-006352. NOTE: Jamf Nation will also publish an article about this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3788 β€Ό

An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3720 β€Ό

An information disclosure vulnerability was reported in the Time Weather system widget on Legion Phone Pro (L79031) and Legion Phone2 Pro (L70081) that could allow other applications to access device GPS data.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-21141 β€Ό

iCMS v7.0.15 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admincp.php?app=members&do=add.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3718 β€Ό

A denial of service vulnerability was reported in some ThinkPad models that could cause a system to crash when the Enhanced Biometrics setting is enabled in BIOS.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3793 β€Ό

An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3791 β€Ό

An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3577 β€Ό

An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3843 β€Ό

A potential vulnerability in the SMI function to access EEPROM in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3790 β€Ό

A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3792 β€Ό

Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3599 β€Ό

A potential vulnerability in the SMI callback function used to access flash device in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43331 β€Ό

In GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3787 β€Ό

A vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-3719 β€Ό

A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-42563 β€Ό

There is an Unquoted Service Path in NI Service Locator (nisvcloc.exe) in versions prior to 18.0 on Windows. This may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-43611 β€Ό

Belledonne Belle-sip before 5.0.20 can crash applications such as Linphone via " \ " in the display name of a From header.

πŸ“– Read

via "National Vulnerability Database".
20:45
❌ Costco Confirms: A Data Skimmer’s Been Ripping Off Customers ❌

Big-box behemoth retailer Costco is offering victims 12 months of credit monitoring, a $1 million insurance reimbursement policy and ID theft recovery services.

πŸ“– Read

via "Threat Post".
?
22:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Threat from Organized Cybercrime Syndicates Is Rising ❌

Europol reports that criminal groups are undermining the EU’s economy and its society, offering everything from murder-for-hire to kidnapping, torture and mutilation.

πŸ“– Read

via "Threat Post".
?
22:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36315 β€Ό

Dell EMC PowerScale Nodes contain a hardware design flaw. This may allow a local unauthenticated user to escalate privileges. This also affects Compliance mode and for Compliance mode clusters, is a critical vulnerability. Dell EMC recommends applying the workaround at your earliest opportunity.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2021-36323 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2021-21528 β€Ό

Dell EMC PowerScale OneFS versions 9.1.0, 9.2.0.x, 9.2.1.x contain an Exposure of Information through Directory Listing vulnerability. This vulnerability is triggered when upgrading from a previous versions.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2021-36325 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2021-36305 β€Ό

Dell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2021-36324 β€Ό

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2021-41229 β€Ό

BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash.

πŸ“– Read

via "National Vulnerability Database".
13 November 2021
?
08:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3938 β€Ό

snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3918 β€Ό

json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3775 β€Ό

showdoc is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3945 β€Ό

django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3921 β€Ό

firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3776 β€Ό

showdoc is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3932 β€Ό

twill is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3915 β€Ό

bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3683 β€Ό

showdoc is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
08:39
β€Ό CVE-2021-3931 β€Ό

snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41653 β€Ό

The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.

πŸ“– Read

via "National Vulnerability Database".
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43616 β€Ό

The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.

πŸ“– Read

via "National Vulnerability Database".
?
17:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ DHS warning about hackers in your network? Don’t panic! ⚠

Fake warnings and false accusations - it's a "call to distraction"

πŸ“– Read

via "Naked Security".
?
20:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Hoax Email Blast Abused Poor Coding in FBI Website β™ŸοΈ

The Federal Bureau of Investigation (FBI) confirmed today that its fbi.gov domain name and Internet address were used to blast out thousands of fake emails about a cybercrime investigation. According to an interview with the person who claimed responsibility for the hoax, the spam messages were sent by abusing insecure code in an FBI online portal designed to share information with state and local law enforcement authorities.

πŸ“– Read

via "Krebs on Security".
14 November 2021
?
18:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-14424 β€Ό

Cacti before 1.2.18 allows remote attackers to trigger XSS via template import for the midwinter theme.

πŸ“– Read

via "National Vulnerability Database".
?
20:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43272 β€Ό

An improper handling of exceptional conditions vulnerability exists in Open Design Alliance ODA Viewer sample before 2022.11. ODA Viewer continues to process invalid or malicious DWF files instead of stopping upon an exception. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43278 β€Ό

An Out-of-bounds Read vulnerability exists in the OBJ file reading procedure in Open Design Alliance Drawings SDK before 2022.11. The lack of validating the input length can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43391 β€Ό

An Out-of-Bounds Read vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid dash counter in line types) can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43279 β€Ό

An out-of-bounds write vulnerability exists in the U3D file reading procedure in Open Design Alliance PRC SDK before 2022.10. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43275 β€Ό

A Use After Free vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-26795 β€Ό

A SQL Injection vulnerability in /appliance/shiftmgn.php in TalariaX sendQuick Alert Plus Server Admin 4.3 before 8HF11 allows attackers to obtain sensitive information via a Roster Time to Roster Management.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43277 β€Ό

An out-of-bounds read vulnerability exists in the U3D file reading procedure in Open Design Alliance PRC SDK before 2022.10. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43276 β€Ό

An Out-of-bounds Read vulnerability exists in Open Design Alliance ODA Viewer before 2022.8. Crafted data in a DWF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43274 β€Ό

A Use After Free Vulnerability exists in the Open Design Alliance Drawings SDK before 2022.11. The specific flaw exists within the parsing of DWF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43273 β€Ό

An Out-of-bounds Read vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.11. Crafted data in a DGN file and lack of verification of input data can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43336 β€Ό

An Out-of-Bounds Write vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43390 β€Ό

An Out-of-Bounds Write vulnerability exists when reading a DGN file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DGN files. Crafted data in a DGN file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43280 β€Ό

A stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2020-16152 β€Ό

The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-41057 β€Ό

In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.

πŸ“– Read

via "National Vulnerability Database".
15 November 2021
?
03:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43618 β€Ό

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

πŸ“– Read

via "National Vulnerability Database".
03:11
β€Ό CVE-2021-43620 β€Ό

An issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\0' byte, which might not be the end of the string.

πŸ“– Read

via "National Vulnerability Database".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Removing need to unlock mobile wallets for contactless payments has eroded security protections, researchers warn πŸ—“οΈ

Mind the gap

πŸ“– Read

via "The Daily Swig".
12:16
πŸ•΄ How Visibility Became the Lifeblood of SecOps and Business Success πŸ•΄

The best way to succeed in the long-term cybersecurity is to invest in visibility because you can't protect or defend against what you can't see.

πŸ“– Read

via "Dark Reading".
12:22
🦿 Facebook and Google "listening" is more pervasive than you think 🦿

Yet another consumer is disturbed by the sketchy algorithms deployed by Facebook. Here's how the app knows what you're talking about and what to do about it.

πŸ“– Read

via "Tech Republic".
12:22
🦿 Malicious shopping websites surge in number in advance of Black Friday 🦿

More than 5,300 malicious websites have popped up each week, the highest since the start of 2021, says Check Point Research.

πŸ“– Read

via "Tech Republic".
?
12:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Vulnerability in FBI email infrastructure allowed malicious actor to send false cyber-attack warnings to thousands πŸ—“οΈ

Security issue saw fake emails sent from legitimate agency accounts

πŸ“– Read

via "The Daily Swig".
?
13:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Microsoft fixes reflected XSS in Exchange Server πŸ—“οΈ

Researchers’ bid to reproduce ProxyShell yields something entirely new

πŸ“– Read

via "The Daily Swig".
13:45
❌ FBI Says Its System Was Exploited to Email Fake Cyberattack Alert ❌

The alert was mumbo jumbo, but it was indeed sent from the bureau's email system, from the agency’s own internet address.

πŸ“– Read

via "Threat Post".
13:48
πŸ•΄ JupiterOne and Cisco Announce Launch of Secure Cloud Insights πŸ•΄

The partnership is designed to provide businesses with a range of cybersecurity services.

πŸ“– Read

via "Dark Reading".
13:52
🦿 Don't fall for LinkedIn phishing: How to watch for this credential-stealing attack 🦿

Cybercriminals are now using LinkedIn to find a way into your files. Learn how to detect phishing on LinkedIn and protect yourself from it.

πŸ“– Read

via "Tech Republic".
?
15:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How to Negotiate With Ransomware Attackers πŸ•΄

Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.

πŸ“– Read

via "Dark Reading".
15:22
🦿 How organizations are beefing up their cybersecurity to combat ransomware 🦿

Most organizations surveyed by Hitachi ID are moving partly to software-as-a-service. Less than half have adopted a Zero Trust strategy.

πŸ“– Read

via "Tech Republic".
?
17:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cybercriminals Target Alibaba Cloud for Cryptomining, Malware ❌

Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features to further their cryptomining goals. Alibaba offers a few unique options that make it a highly attractive target for attackers, researchers noted. According to research from Trend Micro, the Chinese giant’s cloud (also known as Aliyun) has a preinstalled security agent. While […]

πŸ“– Read

via "Threat Post".
?
17:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” FTC Updates Safeguards Rule for Consumer Financial Information πŸ”

The FTC recently made changes to the Gramm-Leach-Bliley Act’s Safeguards Rule that should pose further privacy obligations to covered financial institutions.

πŸ“– Read

via "".
?
18:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ High-Severity Intel Processor Bug Exposes Encryption Keys ❌

CVE-2021-0146, arising from a debugging functionality with excessive privileges, allows attackers to read encrypted files.

πŸ“– Read

via "Threat Post".
?
18:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Toon: Cubicle for Four πŸ•΄

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
?
19:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The Best Ransomware Response, According to the Data  ❌

An analysis of ransomware attack negotiation-data offers best practices.

πŸ“– Read

via "Threat Post".
19:18
πŸ•΄ FBI Attributes Abuse of Its Email Account to Software 'Misconfiguration' πŸ•΄

A wave of phony emails from an FBI mail server originated from an issue with the agency's Law Enforcement Enterprise Portal.

πŸ“– Read

via "Dark Reading".
?
19:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Norton Special Report Reveals Nearly 1 in 2 Gamers Have Experienced a Cyberattack πŸ•΄

Three in four say they were impacted financially as a result, losing more than $700 on average.

πŸ“– Read

via "Dark Reading".
19:53
🦿 Cybersecurity is a growing field that can benefit from hiring veterans 🦿

There is a real need for "boots-on-the-ground" cybersecurity professionals, so why not tap into a pool of trained and motivated veterans?

πŸ“– Read

via "Tech Republic".
19:57
πŸ•΄ Trend Micro: 90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals πŸ•΄

Trend Micro study reveals need for new way to discuss business risk.

πŸ“– Read

via "Dark Reading".
20:00
πŸ•΄ MacOS Zero-Day Used in Watering-Hole Attacks πŸ•΄

Attackers targeted Chinese pro-democracy groups using a vulnerability fixed in September along with a second vulnerability fixed early in the year, Google says.

πŸ“– Read

via "Dark Reading".
?
20:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Immersive Labs Acquires Snap Labs to Power Cyber Simulations With New Depth and Realism πŸ•΄

Integrated offering to deliver hyper-realistic team exercises specific to customer environments for more relevant cyber knowledge, skills, and judgment.

πŸ“– Read

via "Dark Reading".
?
20:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Troubling Rise of Internet Access Brokers πŸ•΄

Criminal groups are ramping up use of IABs to get access to networks without having to deal with the initial reconnaissance and intrusion phases.

πŸ“– Read

via "Dark Reading".
16 November 2021
?
09:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ HTTP header smuggling attack against AWS API Gateway exposes systems to cache poisoning πŸ—“οΈ

New hacking technique may pave the way for other serious attacks

πŸ“– Read

via "The Daily Swig".
?
10:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Fear and shame are making it harder to fight ransomware and accidental data loss, report finds 🦿

A third of employees admit lying to hide the fact that they accidentally deleted data, most doing so out of embarrassment or fear of punishment. Even more would lie about a ransomware infection.

πŸ“– Read

via "Tech Republic".
?
11:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Emotet Resurfaces on the Back of TrickBot After Nearly a Year ❌

Researchers observed what looks like the Emotet botnet – the "world’s most dangerous malware" – reborn and distributed by the trojan it used to deliver.

πŸ“– Read

via "Threat Post".
11:23
⚠ Emotet malware: β€œThe report of my death was an exaggeration” ⚠

"Old malware rarely dies." The best way to predict the future is to look at the past... if it worked before, it will probably work again.

πŸ“– Read

via "Naked Security".
11:23
πŸ—“οΈ Server-side vulnerabilities in Concrete CMS put thousands of websites under threat πŸ—“οΈ

Web admins urged to apply patches now

πŸ“– Read

via "The Daily Swig".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Navigating the Complexity of Today's Digital Supply Chain πŸ•΄

An efficient way to monitor security is to model user behavior using time series data and watching for anomalies.

πŸ“– Read

via "Dark Reading".
?
12:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Number of cyber-attacks infiltrating critical New Zealand networks soars πŸ—“οΈ

National cybersecurity agency also observes rise in automated probing for web security flaws

πŸ“– Read

via "The Daily Swig".
?
14:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The self-driving smart suitcase… that the person behind you can hijack! ⚠

Apparently, we need a self-driving IoT Bluetooth robot suitcase. Who knew?

πŸ“– Read

via "Naked Security".
14:26
πŸ—“οΈ Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities πŸ—“οΈ

New approach echoes the depressingly successful ransomware-as-a-service business model

πŸ“– Read

via "The Daily Swig".
?
15:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 4 Considerations for Improving Cloud Security Hygiene πŸ•΄

Mixing cloud security and maintenance practices with legacy enterprise approaches usually ends up shortchanging cloud hygiene. Here are some ways to remedy that.

πŸ“– Read

via "Dark Reading".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ MosesStaff Locks Up Targets, with No Ransom Demand, No Decryption ❌

A politically motivated group is paralyzing Israeli entities with no financial goal -- and no intention of handing over decryption keys.

πŸ“– Read

via "Threat Post".
?
17:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Old Ways Aren’t Working: Let’s Rethink OT Security πŸ•΄

Ransomware attacks against critical infrastructure go beyond locking up data. They can entirely shut down production in a facility. Here's how AI can help you fight back.

πŸ“– Read

via "Dark Reading".
?
17:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 200M Adult Cam Model, User Records Exposed in Stripchat Breach ❌

The leak included model information, chat messages and payment details.

πŸ“– Read

via "Threat Post".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 14 tactics to use during a ransomware negotiation 🦿

Security researchers analyzed 700 incidents to understand the economics of these threats as well as what bargaining tactics work.

πŸ“– Read

via "Tech Republic".
?
19:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Rooting Malware Is Back for Mobile. Here’s What to Look Out For. ❌

Hank Schless, senior manager of security solutions at Lookout, discusses AbstractEmu, mobile malware found on Google Play, Amazon Appstore and the Samsung Galaxy Store.

πŸ“– Read

via "Threat Post".
19:19
πŸ•΄ Emotet Makes a Comeback πŸ•΄

The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.

πŸ“– Read

via "Dark Reading".
19:19
πŸ•΄ Cybercriminals Increasingly Employ Crypto-Mixers to Launder Stolen Profits πŸ•΄

Crypto-mixer services are set to grow as ransomware and other cybercriminal enterprises increasingly lean into cryptocurrency, new research shows.

πŸ“– Read

via "Dark Reading".
?
19:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FBI Email Hoaxer ID’ed by the Guy He Allegedly Loves to Torment ❌

Vinny Troia, the cybersecurity researcher mentioned in a fake alert gushed out of the FBI’s email system, says it's just one of a string of jabs from a childish but cybercriminally talented tormentor.

πŸ“– Read

via "Threat Post".
19:49
πŸ•΄ New Global Rackspace Technology Survey Underscores Rapid Pace of Cloud Adoption πŸ•΄

More than half of respondents have 100% of their infrastructure in the cloud; IT playing an increasingly critical role in driving corporate strategy.

πŸ“– Read

via "Dark Reading".
17 November 2021
?
09:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Team Cymru Acquires Amplicy πŸ•΄

The combination of Team Cymru's threat intelligence and threat hunting capabilities and Amplicy's Internet asset discovery and vulnerability management will give enterprise defenders a comprehensive view of their organization's cyber risk.

πŸ“– Read

via "Dark Reading".
09:25
πŸ—“οΈ Belarusian hackers claim to have accessed full database of those crossing the country’s borders πŸ—“οΈ

β€˜Belarus Cyber-Partisans’ say they gained access to all entries in and out of the country over the past 15 years

πŸ“– Read

via "The Daily Swig".
?
10:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Phishing Scam Aims to Hijack TikTok β€˜Influencer’ Accounts ❌

Threat actors used malicious emails to target more than 125 people with high-profile TikTok accounts in an attempt to steal info and lock them out.

πŸ“– Read

via "Threat Post".
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Your weak passwords can be cracked in less than a second 🦿

Easy-to-crack phrases "123456," "123456789," "12345," "qwerty" and "password" are the five most common passwords, says NordPass.

πŸ“– Read

via "Tech Republic".
?
11:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Belarus Linked to Big European Disinformation Campaign πŸ•΄

EU officials and others previously had blamed Russia's intelligence operations for the so-called Ghostwriter campaign.

πŸ“– Read

via "Dark Reading".
11:55
πŸ—“οΈ Vulnerabilities in GitHub NPM packages could allow threat actors to publish malicious versions πŸ—“οΈ

Details of flaws were made public this week

πŸ“– Read

via "The Daily Swig".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-12951 β€Ό

Race condition in PSP FW could allow less privileged x86 code to perform PSP SMM operations.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-38984 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-26321 β€Ό

Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-41244 β€Ό

Grafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update usersÒ€ℒ roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users' roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-24856 β€Ό

The Shared Files WordPress plugin before 1.6.61 does not sanitise and escape the Download Counter Text settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2020-12904 β€Ό

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-43495 β€Ό

AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-41950 β€Ό

A directory traversal issue in ResourceSpace 9.6 before 9.6 rev 18277 allows remote unauthenticated attackers to delete arbitrary files on the ResourceSpace server via the provider and variant parameters in pages/ajax/tiles.php. Attackers can delete configuration or source code files, causing the application to become unavailable to all users.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-26330 β€Ό

AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-25984 β€Ό

In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the Ò€œpost replyҀ� section. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-39222 β€Ό

Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-24852 β€Ό

The MouseWheel Smooth Scroll WordPress plugin before 5.7 does not have CSRF check in place on its settings page, which could allow attackers to make a logged in admin change them via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-42955 β€Ό

Zoho Remote Access Plus Server Windows Desktop binary fixed in version 10.1.2132 is affected by an unauthorized password reset vulnerability. Because of the designed password reset mechanism, any non-admin Windows user can reset the password of the Remote Access Plus Server Admin account.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2020-12892 β€Ό

An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2020-12954 β€Ό

A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-38978 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-25965 β€Ό

In Calibre-web, versions 0.6.0 to 0.6.13 are vulnerable to Cross-Site Request Forgery (CSRF). By luring an authenticated user to click on a link, an attacker can create a new user role with admin privileges and attacker-controlled credentials, allowing them to take over the application.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-38983 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212792.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2021-42956 β€Ό

Zoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more.

πŸ“– Read

via "National Vulnerability Database".
12:14
β€Ό CVE-2020-12898 β€Ό

Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42380 (busybox) β€Ό

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42383 (busybox) β€Ό

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-41271 β€Ό

Discourse is a platform for community discussion. In affected versions a maliciously crafted request could cause an error response to be cached by intermediate proxies. This could cause a loss of confidentiality for some content. This issue is patched in the latest stable, beta and tests-passed versions of Discourse.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42384 (busybox) β€Ό

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42580 β€Ό

Sourcecodester Online Learning System 2.0 is vunlerable to sql injection authentication bypass in admin login file (/admin/login.php) and authenticated file upload in (Master.php) file , we can craft these two vunlerablities to get unauthenticated remote command execution.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42114 β€Ό

Modern DRAM devices (PC-DDR4, LPDDR4X) are affected by a vulnerability in their internal Target Row Refresh (TRR) mitigation against Rowhammer attacks. Novel non-uniform Rowhammer access patterns, consisting of aggressors with different frequencies, phases, and amplitudes allow triggering bit flips on affected memory modules using our Blacksmith fuzzer. The patterns generated by Blacksmith were able to trigger bitflips on all 40 PC-DDR4 DRAM devices in our test pool, which cover the three major DRAM manufacturers: Samsung, SK Hynix, and Micron. This means that, even when chips advertised as Rowhammer-free are used, attackers may still be able to exploit Rowhammer. For example, this enables privilege-escalation attacks against the kernel or binaries such as the sudo binary, and also triggering bit flips in RSA-2048 keys (e.g., SSH keys) to gain cross-tenant virtual-machine access. We can confirm that DRAM devices acquired in July 2020 with DRAM chips from all three major DRAM vendors (Samsung, SK Hynix, Micron) are affected by this vulnerability. For more details, please refer to our publication.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-38981 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42723 β€Ό

Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42731 β€Ό

Adobe InDesign versions 16.4 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-41263 β€Ό

rails_multisite provides multi-db support for Rails applications. In affected versions this vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42725 β€Ό

Adobe Experience Manager version 6.5.9.0 (and earlier) are affected by an improper access control vulnerability that leads to a security feature bypass. By manipulating referer headers, an unauthenticated attacker could gain access to arbitrary pages that they are not authorized to access.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2020-12961 β€Ό

A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-38979 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-30216 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in a customer-controlled product. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42954 β€Ό

Zoho Remote Access Plus Server Windows Desktop Binary fixed from 10.1.2121.1 is affected by incorrect access control. The installation directory is vulnerable to weak file permissions by allowing full control for Windows Everyone user group (non-admin or any guest users), thereby allowing privilege escalation, unauthorized password reset, stealing of sensitive data, access to credentials in plaintext, access to registry values, tampering with configuration files, etc.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-26338 β€Ό

Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-43048 β€Ό

The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2021-42706 β€Ό

This vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of WebAccess/MHI Designer

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2020-12920 β€Ό

A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.

πŸ“– Read

via "National Vulnerability Database".
12:20
β€Ό CVE-2020-12894 β€Ό

Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-38949 β€Ό

IBM MQ 7.5, 8.0, 9.0 LTS, 9.1 CD, and 9.1 LTS stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 211403.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-42375 β€Ό

An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-38977 (security_guardium_key_lifecycle_manager, security_key_lifecycle_manager) β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-24850 β€Ό

The Insert Pages WordPress plugin before 3.7.0 adds a shortcode that prints out other pages' content and custom fields. It can be used by users with a role as low as Contributor to perform Cross-Site Scripting attacks by storing the payload/s in another post's custom fields.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2020-21639 β€Ό

Ruijie RG-UAC 6000-E50 commit 9071227 was discovered to contain a cross-site scripting (XSS) vulnerability via the rule_name parameter. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2020-12960 β€Ό

AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-43011 β€Ό

Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2020-12899 β€Ό

Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-42726 β€Ό

Adobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-24787 β€Ό

The Client Invoicing by Sprout Invoices WordPress plugin before 19.9.7 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2020-21627 β€Ό

Ruijie RG-UAC commit 9071227 was discovered to contain a vulnerability in the component /current_action.php?action=reboot, which allows attackers to cause a denial of service (DoS) via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-24847 β€Ό

The importFromRedirection AJAX action of the SEO Redirection Plugin ΓƒΒ’Γ’β€šΒ¬Γ’β‚¬Ε“ 301 Redirect Manager WordPress plugin before 8.2, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-3939 β€Ό

Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-24772 β€Ό

The Stream WordPress plugin before 3.8.2 does not sanitise and validate the order GET parameter from the Stream Records admin dashboard before using it in a SQL statement, leading to an SQL injection issue.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-42378 (busybox) β€Ό

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-24853 β€Ό

The QR Redirector WordPress plugin before 1.6 does not have capability and CSRF checks when saving bulk QR Redirector settings via the qr_save_bulk AJAX action, which could allow any authenticated user, such as subscriber to change the redirect response status code of arbitrary QR Redirects

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-42379 (busybox) β€Ό

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2020-12905 β€Ό

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-25982 β€Ό

In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the Ò€œsearchҀ� parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.

πŸ“– Read

via "National Vulnerability Database".
12:26
β€Ό CVE-2021-42703 (webaccess_hmi_designer) β€Ό

This vulnerability could allow an attacker to send malicious Javascript code resulting in hijacking of the userÒ€ℒs cookie/session tokens, redirecting the user to a malicious webpage, and performing unintended browser action.

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2020-12903 β€Ό

Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2021-42385 (busybox) β€Ό

A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2021-25985 β€Ό

In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a userÒ€ℒs session even after the user logs out of the application. In addition, user sessions are stored in the browserÒ€ℒs local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2021-29861 β€Ό

IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in EFS to expose sensitive information. IBM X-Force ID: 206085.

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2021-26323 β€Ό

Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2021-24802 β€Ό

The Colorful Categories WordPress plugin before 2.0.15 does not enforce nonce checks which could allow attackers to make a logged in admin or editor change taxonomy colors via a CSRF attack

πŸ“– Read

via "National Vulnerability Database".
12:27
β€Ό CVE-2021-41266 β€Ό

Minio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token.

πŸ“– Read

via "National Vulnerability Database".
12:30
β€Ό CVE-2021-42373 β€Ό

A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given

πŸ“– Read

via "National Vulnerability Database".
12:30
β€Ό CVE-2021-42721 β€Ό

Adobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.

πŸ“– Read

via "National Vulnerability Database".
12:30
β€Ό CVE-2021-42374 β€Ό

An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that

πŸ“– Read

via "National Vulnerability Database".
12:30
β€Ό CVE-2020-12902 β€Ό

Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

πŸ“– Read

via "National Vulnerability Database".
12:30
β€Ό CVE-2021-42377 β€Ό

An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.

πŸ“– Read

via "National Vulnerability Database".
?
12:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Emotet malware: β€œThe report of my death was an exaggeration” ⚠

"Old malware rarely dies." The best way to predict the future is to look at the past... if it worked before, it will probably work again.

πŸ“– Read

via "Naked Security".
12:53
⚠ The self-driving smart suitcase… that the person behind you can hijack! ⚠

Apparently, we need a self-driving IoT Bluetooth robot suitcase. Who knew?

πŸ“– Read

via "Naked Security".
12:56
🦿 Your weak passwords can be cracked in less than a second 🦿

Easy-to-crack phrases "123456," "123456789," "12345," "qwerty" and "password" are the five most common passwords, says NordPass.

πŸ“– Read

via "Tech Republic".
12:56
🦿 How to protect your organization from ransomware attacks during the holiday season 🦿

A quarter of security pros polled by Cybereason said they lack a plan to deal with a ransomware attack during a weekend or holiday.

πŸ“– Read

via "Tech Republic".
?
14:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42250 β€Ό

Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs.

πŸ“– Read

via "National Vulnerability Database".
14:14
β€Ό CVE-2021-40745 β€Ό

Adobe Campaign version 21.2.1 (and earlier) is affected by a Path Traversal vulnerability that could lead to reading arbitrary server files. By leveraging an exposed XML file, an unauthenticated attacker can enumerate other files on the server.

πŸ“– Read

via "National Vulnerability Database".
14:19
πŸ•΄ Is XDR Overhyped? πŸ•΄

Security experts weigh in on the value and pitfalls of extended detection and response (XDR), offering consideration and advice on this growing new category.

πŸ“– Read

via "Dark Reading".
14:23
❌ Exchange, Fortinet Flaws Being Exploited by Iranian APT, CISA Warns ❌

Meanwhile, a Microsoft analysis that followed six Iranian threat actor groups for over a year found them increasingly sophisticated, adapting and thriving.

πŸ“– Read

via "Threat Post".
14:23
⚠ Apple’s Privacy Protection feature – watch out if you have a Watch! ⚠

Apple's "Protect Mail Activity" is a handy privacy enhancement for your messaging habits. As long as you know its limitations...

πŸ“– Read

via "Naked Security".
14:24
πŸ—“οΈ Secure development: New and improved Linux Random Number Generator ready for testing πŸ—“οΈ

Proposed replacement for /dev/random promises to double performance and add flexibility

πŸ“– Read

via "The Daily Swig".
14:24
🦿 How to beef up your multicloud security 🦿

A majority of IT leaders surveyed by Valtix said they realize their employees lack the necessary skills to manage multicloud security.

πŸ“– Read

via "Tech Republic".
?
15:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Things ML Teams Should Know About Privacy and the GDPR πŸ•΄

Machine learning delivers plenty of benefits. But as the emerging technology gets applied more broadly, be careful about how you handle all the data used in the process.

πŸ“– Read

via "Dark Reading".
?
15:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 5 predictions to help you focus your web app security resources in 2022 🦿

This is the year business leaders will learn just how innovative online criminals have become, and it'll take rethinking how we perceive account security to fight it, says PerimeterX CTO Ido Safruti.

πŸ“– Read

via "Tech Republic".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43976 β€Ό

In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-42362 β€Ό

The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-42360 β€Ό

On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-33480 β€Ό

An use-after-free vulnerability was discovered in gocr through 0.53-20200802 in context_correction() in pgm2asc.c.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-35528 β€Ό

Improper Access Control vulnerability in the application authentication and authorization of Hitachi Energy Retail Operations, Counterparty Settlement and Billing (CSB) allows an attacker to execute a modified signed Java Applet JAR file. A successful exploitation may lead to data extraction or modification of data inside the application. This issue affects: Hitachi Energy Retail Operations 5.7.3 and prior versions. Hitachi Energy Counterparty Settlement and Billing (CSB) 5.7.3 prior versions.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-33479 β€Ό

A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in measure_pitch() in pgm2asc.c.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-43977 β€Ό

SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-33481 β€Ό

A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in try_to_divide_boxes() in pgm2asc.c.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-32234 β€Ό

SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution.

πŸ“– Read

via "National Vulnerability Database".
16:14
β€Ό CVE-2021-43975 β€Ό

In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.

πŸ“– Read

via "National Vulnerability Database".
16:20
πŸ•΄ Cybercriminals Contemplate 'Exploit-as-a-Service' Model πŸ•΄

Researchers share their findings on the current zero-day market and how criminals' strategies may shift in the future.

πŸ“– Read

via "Dark Reading".
?
18:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-33092 β€Ό

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit HID Event Filter driver pack before version 2.2.1.383 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-0200 β€Ό

Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-41274 β€Ό

solidus_auth_devise provides authentication services for the Solidus webstore framework, using the Devise gem. In affected versions solidus_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: Executed whether as: A `before_action` callback (the default) or A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). Users should promptly update to `solidus_auth_devise` version `2.5.4`. Users unable to update should if possible, change their strategy to `:exception`. Please see the linked GHSA for more workaround details.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33062 β€Ό

Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-43553 β€Ό

PI Vision could disclose information to a user with insufficient privileges for an AF attribute that is the child of another attribute and is configured as a Limits property.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-0135 β€Ό

Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33087 β€Ό

Improper authentication in the installer for the Intel(R) NUC M15 Laptop Kit Management Engine driver pack before version 15.0.10.1508 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-0158 β€Ό

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-0075 β€Ό

Out-of-bounds write in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow a privileged user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33058 β€Ό

Improper access control in the installer Intel(R)Administrative Tools for Intel(R) Network Adaptersfor Windowsbefore version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33071 β€Ό

Incorrect default permissions in the installer for the Intel(R) oneAPI Rendering Toolkit before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-0148 β€Ό

Insertion of information into log file in firmware for some Intel(R) SSD DC may allow a privileged user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-0199 β€Ό

Improper input validation in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.6.0.6 may allow a privileged user to potentially enable a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:14
β€Ό CVE-2021-33063 β€Ό

Uncontrolled search path in the Intel(R) RealSense(TM) D400 Series UWP driver for Windows 10 before version 6.1.160.22 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-33094 β€Ό

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-33088 β€Ό

Incorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack before version 5.4.1.4449 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-41275 β€Ό

spree_auth_devise is an open source library which provides authentication and authorization services for use with the Spree storefront framework by using an underlying Devise authentication framework. In affected versions spree_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of spree_auth_devise are affected if protect_from_forgery method is both: Executed whether as: A before_action callback (the default). A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). Users are advised to update their spree_auth_devise gem. For users unable to update it may be possible to change your strategy to :exception. Please see the linked GHSA for more workaround details. ### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch ? ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-0146 β€Ό

Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-0157 β€Ό

Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-0151 β€Ό

Improper access control in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-0065 β€Ό

Incorrect default permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-0186 β€Ό

Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-0078 β€Ό

Improper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-33073 β€Ό

Uncontrolled resource consumption in the Intel(R) Distribution of OpenVINOÃ’Ò€žÂ’ Toolkit before version 2021.4 may allow an unauthenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-33089 β€Ό

Improper access control in the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC8i3BE, NUC8i5BE, NUC8i7BE before version 1.78.4.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-41190 β€Ό

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both ΓƒΒ’Γ’β€šΒ¬Γ…β€œmanifestsΓƒΒ’Γ’β€šΒ¬? and ΓƒΒ’Γ’β€šΒ¬Γ…β€œlayersΓƒΒ’Γ’β€šΒ¬? fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both ΓƒΒ’Γ’β€šΒ¬Γ…β€œmanifestsΓƒΒ’Γ’β€šΒ¬? and ΓƒΒ’Γ’β€šΒ¬Γ…β€œlayersΓƒΒ’Γ’β€šΒ¬? fields or ΓƒΒ’Γ’β€šΒ¬Γ…β€œmanifestsΓƒΒ’Γ’β€šΒ¬? and ΓƒΒ’Γ’β€šΒ¬Γ…β€œconfigΓƒΒ’Γ’β€šΒ¬? fields if they are unable to update to version 1.0.1 of the spec.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-41277 β€Ό

Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If youΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-33091 β€Ό

Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit audio driver pack before version 1.3 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-0096 β€Ό

Improper authentication in the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC7i3DN, NUC7i5DN, NUC7i7DN before version 1.78.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-0198 β€Ό

Improper access control in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.5.5.6 may allow a privileged user to potentially enable a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-0120 β€Ό

Improper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-43551 β€Ό

A remote attacker with write access to PI Vision could inject code into a display. Unauthorized information disclosure, modification, or deletion is possible if a victim views or interacts with the infected display using Microsoft Internet Explorer. The impact affects PI System data and other data accessible with victimÒ€ℒs user permissions.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-0082 β€Ό

Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2020-8741 β€Ό

Improper permissions in the installer for the Intel(R) Thunderbolt(TM) non-DCH driver, all versions, for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-0180 β€Ό

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable privilege escalation via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-41164 β€Ό

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-0121 β€Ό

Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-0069 β€Ό

Improper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-33086 β€Ό

Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-33059 β€Ό

Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
?
19:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Fake Ransomware Infection Hits WordPress Sites ❌

WordPress sites have been splashed with ransomware warnings that are as real as dime-store cobwebs made out of spun polyester.

πŸ“– Read

via "Threat Post".
19:16
❌ Netflix Bait: Phishers Target Streamers with Fake Service Signups ❌

Lures dressed up to look like movie and TV streaming offers are swiping payment data.

πŸ“– Read

via "Threat Post".
?
19:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Can I Have XDR Without EDR? πŸ•΄

Yes, extended detection and response is possible without endpoint detection and response, but here's why having both is helpful.

πŸ“– Read

via "Dark Reading".
?
20:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43997 β€Ό

Amazon FreeRTOS 10.2.0 through 10.4.5 on the ARMv7-M and ARMv8-M MPU platforms does not prevent non-kernel code from calling the xPortRaisePrivilege and vPortResetPrivilege internal functions. This is fixed in 10.4.6 and in 10.4.3-LTS Patch 2.

πŸ“– Read

via "National Vulnerability Database".
20:20
πŸ•΄ CISA Releases Incident and Vulnerability Response Playbooks to Strengthen Cybersecurity for Federal Civilian Agencies πŸ•΄

Effort part of President Biden’s executive order to improve the nation’s sybersecurity.

πŸ“– Read

via "Dark Reading".
20:20
πŸ•΄ Sift Acquires Passwordless Authentication Pioneer Keyless to Provide Secure, Frictionless Authentication πŸ•΄

Biometric authentication innovator eliminates password-based account takeover and enables PSD2 Strong Customer Authentication while preserving user privacy.

πŸ“– Read

via "Dark Reading".
20:20
πŸ•΄ Palo Alto Networks Delivers What's Next in Security at Ignite '21 πŸ•΄

Cybersecurity company introduces solutions aimed at network security, cloud security and security operations.

πŸ“– Read

via "Dark Reading".
?
22:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Intel CPU flaw could enable hackers to attack PCs, cars, and medical devices πŸ“’

Vulnerability found in Pentium, Celeron, and Atom processors

πŸ“– Read

via "ITPro".
22:38
πŸ“’ What are cookies πŸ“’

What do they do, how they work, and why does every website want you to accept them?

πŸ“– Read

via "ITPro".
22:38
πŸ“’ Identity-focussed security for your zero trust journey πŸ“’

Steps to protect your business from identity-driven threats

πŸ“– Read

via "ITPro".
22:38
πŸ“’ Iranian hacking groups are evolving, warns Microsoft πŸ“’

Cyber espionage groups are increasingly utilizing ransomware to either collect funds or disrupt their targets

πŸ“– Read

via "ITPro".
22:38
πŸ“’ NCSC: COVID-19 vaccines were prime target for hackers in 2021 πŸ“’

The GCHQ's cyber arm says 20% of cyber attacks this year targeted the health sector and key organisations involved in the vaccine rollout

πŸ“– Read

via "ITPro".
22:38
πŸ“’ Cryptomixers are helping hackers to launder ransomware payments πŸ“’

The services enable cyber criminals to anonymously clean proceeds from illicit activities

πŸ“– Read

via "ITPro".
22:38
πŸ“’ How do you become an ethical hacker? πŸ“’

We examine what certifications do you need, what jobs are available and how much you can expect to be paid

πŸ“– Read

via "ITPro".
22:38
πŸ“’ Emotet infrastructure has almost doubled since resurgence was confirmed πŸ“’

Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilientΒ operation

πŸ“– Read

via "ITPro".
22:38
πŸ“’ Over a third of applications have high-risk vulnerabilities πŸ“’

Synopsys report reveals that 97% exhibit some form of vulnerability

πŸ“– Read

via "ITPro".
18 November 2021
?
10:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Clubhouse launches bug bounty platform with $3,000 on offer for critical vulnerabilities πŸ—“οΈ

Audio-based social media platform prioritizes access control bypasses and information disclosure flaws

πŸ“– Read

via "The Daily Swig".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spear-Phishing Campaign Exploits Glitch Platform to Steal Credentials ❌

Threat actors are targeting Middle-East-based employees of major corporations in a scam that uses a specific β€˜ephemeral’ aspect of the project-management tool to link to SharePoint phishing pages.

πŸ“– Read

via "Threat Post".
11:24
❌ How to Choose the Right DDoS Protection Solution ❌

Pankaj Gupta, Senior Director at Citrix, outlines how distributed denial of service attacks have become increasingly sophisticated, bigger and economically motivated.

πŸ“– Read

via "Threat Post".
?
11:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apple’s Mail Privacy Protection feature – watch out if you have a Watch! ⚠

Apple's "Protect Mail Activity" is a handy privacy enhancement for your messaging habits. As long as you know its limitations...

πŸ“– Read

via "Naked Security".
11:57
πŸ—“οΈ β€˜Everyone is welcome’ – Microsoft security panel offers different perspectives on vulnerability disclosure process πŸ—“οΈ

BlueHat is back following pandemic-induced hiatus

πŸ“– Read

via "The Daily Swig".
?
12:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Swarm Intelligence May Be Just the Ticket for Improved Network & Device Security πŸ•΄

Based on the reaction of a single insect in a swarm, messages are passed along peer to peer, and an entire environment can respond without a central leader processing data and giving orders.

πŸ“– Read

via "Dark Reading".
12:23
⚠ S3 Ep59: Emotet, an FBI hoax, Samba bugs, and a hijackable suitcase [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
?
12:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Consumers like the benefits of online shopping despite the security risks 🦿

Only 25% of consumers surveyed by NTT Application Security said they'd take their online business elsewhere following a data breach.

πŸ“– Read

via "Tech Republic".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” VA Releases New Strategy to Protect Veteran Data πŸ”

A new cybersecurity strategy, recently unveiled by the Department of Veteran Affairs, is designed to better protect veterans' personal data.

πŸ“– Read

via "".
13:25
πŸ—“οΈ Tor Project unveils plans to route device traffic through Tor anonymity network πŸ—“οΈ

VPN+ tech detailed during annual State of the Onion update

πŸ“– Read

via "The Daily Swig".
13:25
🦿 How midsize companies are vulnerable to data breaches and other cyberattacks 🦿

Midsize companies often lack the staff, expertise and expensive tools needed to defend themselves against attack, says security provider Coro.

πŸ“– Read

via "Tech Republic".
?
13:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FBI: FatPipe VPN Zero-Day Exploited by APT for 6 Months ❌

The bureau's flash alert said an APT has been exploiting the flaw to compromise FatPipe router clustering and load balancer products to breach targets' networks.

πŸ“– Read

via "Threat Post".
?
14:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-0658 β€Ό

In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672107.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-43667 β€Ό

A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-35535 β€Ό

Insecure Boot Image vulnerability in Hitachi Energy Relion Relion 670/650/SAM600-IO series allows an attacker who manages to get access to the front network port and to cause a reboot sequences of the device may exploit the vulnerability, where there is a tiny time gap during the booting process where an older version of VxWorks is loaded prior to application firmware booting, could exploit the vulnerability in the older version of VxWorks and cause a denial-of-service on the product. This issue affects: Hitachi Energy Relion 670 Series 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.3. Hitachi Energy Relion 670/650 Series 2.2.0 all revisions; 2.2.4 all revisions. Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-43549 β€Ό

A remote authenticated attacker with write access to a PI Server could trick a user into interacting with a PI Web API endpoint and redirect them to a malicious website. As a result, a victim may disclose sensitive information to the attacker or be provided with false information.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0671 β€Ό

In apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05664273; Issue ID: ALPS05664273.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0620 β€Ό

In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0622 β€Ό

In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0657 β€Ό

In apusys, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672103; Issue ID: ALPS05672103.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-37939 β€Ό

It was discovered that KibanaÒ€ℒs JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP response data on hosts accessible to the cluster.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0669 β€Ό

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05681550; Issue ID: ALPS05681550.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0655 β€Ό

In mdlactl driver, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05673424; Issue ID: ALPS05673424.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0659 β€Ό

In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05687559; Issue ID: ALPS05687559.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0656 β€Ό

In edma driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05709376; Issue ID: ALPS05709376.

πŸ“– Read

via "National Vulnerability Database".
14:15
β€Ό CVE-2021-0666 β€Ό

In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672086; Issue ID: ALPS05672086.

πŸ“– Read

via "National Vulnerability Database".
14:16
β€Ό CVE-2021-27024 β€Ό

A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD4PE) that results in a user with lower privileges being able to access a Puppet Enterprise API token. This issue is resolved in CD4PE 4.10.0

πŸ“– Read

via "National Vulnerability Database".
14:16
β€Ό CVE-2021-0623 β€Ό

In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.

πŸ“– Read

via "National Vulnerability Database".
14:16
β€Ό CVE-2021-27023 β€Ό

A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007

πŸ“– Read

via "National Vulnerability Database".
14:16
β€Ό CVE-2021-0667 β€Ό

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05670581; Issue ID: ALPS05670581.

πŸ“– Read

via "National Vulnerability Database".
14:16
β€Ό CVE-2021-0672 β€Ό

In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05969704; Issue ID: ALPS05969704.

πŸ“– Read

via "National Vulnerability Database".
14:16
β€Ό CVE-2021-0665 β€Ό

In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672113; Issue ID: ALPS05672113.

πŸ“– Read

via "National Vulnerability Database".
?
14:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.5.11 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
14:46
πŸ›  Suricata IDPE 6.0.4 πŸ› 

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

πŸ“– Read

via "Packet Storm Security".
14:46
πŸ›  Wireshark Analyzer 3.4.10 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
?
16:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-35534 β€Ό

Insufficient security control vulnerability in internal database access mechanism of Hitachi Energy Relion 670/650/SAM600-IO, Relion 650, GMS600, PWC600 allows attacker who successfully exploited this vulnerability, of which the product does not sufficiently restrict access to an internal database tables, could allow anybody with user credentials to bypass security controls that is enforced by the product. Consequently, exploitation may lead to unauthorized modifications on data/firmware, and/or to permanently disabling the product. This issue affects: Hitachi Energy Relion 670 Series 2.0 all revisions; 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.5. Hitachi Energy Relion 670/650 Series 2.1 all revisions. 2.2.0 all revisions; 2.2.4 all revisions; Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions; 2.2.5 versions prior to 2.2.5.2. Hitachi Energy Relion 650 1.0 all revisions. 1.1 all revisions; 1.2 all revisions; 1.3 versions prior to 1.3.0.8; Hitachi Energy GMS600 1.3.0; 1.3.0.1; 1.2.0. Hitachi Energy PWC600 1.0.1 version 1.0.1.4 and prior versions; 1.1.0 version 1.1.0.1 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-23167 β€Ό

Improper certificate validation vulnerability in SMTP Client allows man-in-the-middle attack to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3); 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; version 8.20 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-40758 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-42524 β€Ό

Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-40761 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:15
β€Ό CVE-2021-40754 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40752 β€Ό

Adobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40751 β€Ό

Adobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-42266 β€Ό

Adobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious FLA file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40757 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-42271 β€Ό

Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-42272 β€Ό

Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40733 β€Ό

Adobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40759 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40760 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-42525 β€Ό

Acrobat Animate versions 21.0.9 (and earlier)is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-42269 β€Ό

Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40755 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SGI file in the DoReadContinue function, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-23146 β€Ό

An Incomplete Comparison with Missing Factors vulnerability in the Gallagher Controller allows an attacker to bypass PIV verification. This issue affects: Gallagher Command Centre 8.40 versions prior to 8.40.1888 (MR3); 8.30 versions prior to 8.30.1454 (MR3); 8.20 versions prior to 8.20.1291 (MR5); 8.10 versions prior to 8.10.1284 (MR7); version 8.00 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-40753 β€Ό

Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:18
❌ 3 Top Tools for Defending Against Phishing Attacks ❌

Phishing emails are now skating past traditional defenses. Justin Jett, director of audit and compliance at Plixer, discusses what to do about it.

πŸ“– Read

via "Threat Post".
16:26
🦿 Windows 11 SE: Why it's both more and less locked down than Windows 10 S 🦿

Managing computers for education is complicated, but Microsoft thinks it has a solution.

πŸ“– Read

via "Tech Republic".
?
17:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to install the OpenSSH server on Windows with PowerShell 🦿

If you've ever had a need to SSH into a Windows machine, Jack Wallen shows you how to make that possible with the help of PowerShell.

πŸ“– Read

via "Tech Republic".
?
17:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ California Pizza Kitchen Suffers Data Breach πŸ•΄

Personal data, including Social Security numbers, of more than 100K employees exposed.

πŸ“– Read

via "Dark Reading".
?
18:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43017 β€Ό

Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-39920 β€Ό

NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-23193 β€Ό

Improper privilege validation vulnerability in COM Interface of Gallagher Command Centre Server allows authenticated unprivileged operators to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3) ; 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; 8.20 versions prior to 8.20.1291 (MR6); version 8.10 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-39928 β€Ό

NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
18:15
β€Ό CVE-2021-23197 β€Ό

Unquoted service path vulnerability in the Gallagher Controller Service allows an unprivileged user to execute arbitrary code as the account that runs the Controller Service. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3) ;

πŸ“– Read

via "National Vulnerability Database".
?
18:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ransomware Phishing Emails Sneak Through SEGs ❌

The MICROP ransomware spreads via Google Drive and locally stored passwords.

πŸ“– Read

via "Threat Post".
?
19:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Github cookie leakage – thousands of Firefox cookie files uploaded by mistake ⚠

Be aware before you share! That's a good rule for developers and techies, just as much as it is for social media addicts.

πŸ“– Read

via "Naked Security".
?
19:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Two Iranian Nationals Charged for Cyber-Enabled Disinformation and Threat Campaign Designed to Influence the 2020 US Presidential Election πŸ•΄

An indictment was unsealed charging two Iranian nationals for their involvement in a cyber-enabled campaign to intimidate and influence American voters, and otherwise undermine voter confidence and sow discord, in connection with the 2020 US presidential election.

πŸ“– Read

via "Dark Reading".
19:53
πŸ•΄ North Korean Hacking Group Targets Diplomats, Forgoes Malware πŸ•΄

The TA406 group uses credential harvesting to target diplomats and policy experts in the United States, Russia, China, and South Korea, rarely resorting to malware.

πŸ“– Read

via "Dark Reading".
?
20:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37322 β€Ό

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

πŸ“– Read

via "National Vulnerability Database".
?
20:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Exchange Server Flaws Now Exploited for BEC Attacks πŸ•΄

Attackers also are deploying ProxyShell and abusing the vulnerabilities in stealthier manner, researchers say.

πŸ“– Read

via "Dark Reading".
?
22:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40129 β€Ό

A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to submit a SQL query through the CSPC configuration dashboard. This vulnerability is due to insufficient input validation of uploaded files. An attacker could exploit this vulnerability by uploading a file containing a SQL query to the configuration dashboard. A successful exploit could allow the attacker to read restricted information from the CSPC SQL database.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2021-40130 β€Ό

A vulnerability in the web application of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to specify non-log files as sources for syslog reporting. This vulnerability is due to improper restriction of the syslog configuration. An attacker could exploit this vulnerability by configuring non-log files as sources for syslog reporting through the web application. A successful exploit could allow the attacker to read non-log files on the CSPC.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2021-41278 β€Ό

Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform. In affected versions broken encryption in app-functions-sdk Ò€œAESҀ� transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. The app-functions-sdk exports an Ò€œaesҀ� transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation. Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the Ò€œaesҀ� transform and provides an improved Ò€œaes256Ҁ� transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2021-40131 β€Ό

A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by adding malicious code to the configuration by using the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information.

πŸ“– Read

via "National Vulnerability Database".
19 November 2021
?
01:53
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Search CT Logs for Misconfigured SSL Certificates πŸ•΄

Security defenders can run these queries against Certificate Transparency logs to identify misconfigured SSL certificates before they can be used by adversaries to map out attacks.

πŸ“– Read

via "Dark Reading".
?
03:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44033 β€Ό

In Ionic Identity Vault before 5.0.5, the protection mechanism for invalid unlock attempts can be bypassed.

πŸ“– Read

via "National Vulnerability Database".
03:16
β€Ό CVE-2021-44025 β€Ό

Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message.

πŸ“– Read

via "National Vulnerability Database".
03:16
β€Ό CVE-2021-44026 β€Ό

Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.

πŸ“– Read

via "National Vulnerability Database".
?
08:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-39233 β€Ό

In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-39232 β€Ό

In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-39236 β€Ό

In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-36372 β€Ό

In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-41532 β€Ό

In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-39235 β€Ό

In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-39231 β€Ό

In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-42338 β€Ό

4MOSAn GCB DoctorÒ€ℒs login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
08:16
β€Ό CVE-2021-39234 β€Ό

In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.

πŸ“– Read

via "National Vulnerability Database".
?
10:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Iranian hackers charged with cybercrimes in connection with attempts to influence 2020 US Presidential Election πŸ—“οΈ

Pair were affiliated with group that tried to secure a win for Donald Trump

πŸ“– Read

via "The Daily Swig".
10:26
β€Ό CVE-2021-41436 β€Ό

An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet.

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2021-3950 β€Ό

django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
10:29
β€Ό CVE-2021-3974 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
10:32
β€Ό CVE-2021-3968 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
?
10:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ California Pizza Kitchen Serves Up Employee SSNs in Data Breach ❌

A hefty slice of data – that of 100K+ current and former employees – was spilled in an β€œexternal system breach,” the pizza chain said.Β 

πŸ“– Read

via "Threat Post".
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Friday Five 11/18 πŸ”

The U.K shares some new ransomware statistics, the FBI warns about a new VPN zero day, and more - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
?
11:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ CKEditor vulnerabilities pose XSS threat to Drupal and other downstream applications πŸ—“οΈ

Attackers could bypass content sanitization with malformed HTML

πŸ“– Read

via "The Daily Swig".
11:59
πŸ•΄ Zero Trust: An Answer to the Ransomware Menace? πŸ•΄

Zero trust isn't a silver bullet, but if implemented well it can help create a much more robust security defense.

πŸ“– Read

via "Dark Reading".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3920 β€Ό

grav-plugin-admin is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
12:26
🦿 Policymakers want to regulate AI but lack consensus on how 🦿

Commentary: AI is considered "world changing" by policymakers, but it's unclear how to ensure positive outcomes.

πŸ“– Read

via "Tech Republic".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ To Beat Ransomware, Apply Zero Trust to Servers Too πŸ•΄

The path out of the ransomware crisis is full inspection and protection of all traffic flows. That means zero trust everywhere β€” even between servers.

πŸ“– Read

via "Dark Reading".
13:02
πŸ—“οΈ Researcher finds SSRF bug in internal Google Cloud project, nabs $10,000 bug bounty πŸ—“οΈ

Now-patched API vulnerability allowed attacker to access sensitive resources

πŸ“– Read

via "The Daily Swig".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36003 β€Ό

Adobe Audition version 14.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-39353 β€Ό

The Easy Registration Forms WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the ajax_add_form function found in the ~/includes/class-form.php file which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 2.1.1.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-42363 β€Ό

The Preview E-Mails for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the search_order parameter found in the ~/views/form.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.6.8.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-33850 β€Ό

There is a Cross-Site Scripting vulnerability in Microsoft Clarity version 0.3. The XSS payload executes whenever the user changes the clarity configuration in Microsoft Clarity version 0.3. The payload is stored on the configuring project Id page.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-22053 β€Ό

Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-37592 β€Ό

Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43408 β€Ό

The Duplicate Post WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43409 β€Ό

The "WPO365 | LOGIN" WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.

πŸ“– Read

via "National Vulnerability Database".
14:23
πŸ›  Packet Fence 11.1.0 πŸ› 

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

πŸ“– Read

via "Packet Storm Security".
?
14:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 6M Sky Routers Left Exposed to Attack for Nearly 1.5 Years ❌

Pen Test Partners didn't disclose the vulnerability after 90 days because it knew ISPs were struggling with a pandemic-increased network load as work from home became the new norm.

πŸ“– Read

via "Threat Post".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-29326 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fxIDToString function at /moddable/xs/sources/xsSymbol.c.

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-39926 β€Ό

Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-39924 β€Ό

Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:16
β€Ό CVE-2021-29328 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain buffer over-read in the fxDebugThrow function at /moddable/xs/sources/xsDebug.c.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-29329 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain a stack overflow in the fxBinaryExpressionNodeDistribute function at /moddable/xs/sources/xsTree.c.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-39921 β€Ό

NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-3962 β€Ό

A flaw was found in ImageMagick 7.1.0-14 where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-39925 β€Ό

Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-39929 β€Ό

Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-29325 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_String_prototype_repeat function at /moddable/xs/sources/xsString.c.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-22030 β€Ό

In versions of Greenplum database prior to 5.28.14 and 6.17.0, certain statements execution led to the storage of sensitive(credential) information in the logs of the database. A malicious user with access to logs can read sensitive(credentials) information about users

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-41569 β€Ό

SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-29324 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain a stack overflow via the component /moddable/xs/sources/xsScript.c.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-29327 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_ArrayBuffer function at /moddable/xs/sources/xsDataView.c.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-29323 β€Ό

OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow via the component /modules/network/wifi/esp/modwifi.c.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-44036 β€Ό

Team Password Manager (aka TeamPasswordManager) before 10.135.236 has a CSRF vulnerability during import.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-22028 β€Ό

In versions of Greenplum database prior to 5.28.6 and 6.14.0, greenplum database contains a file path traversal vulnerability leading to information disclosure from the file system. A malicious user can read/write information from the file system using this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-39922 β€Ό

Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-39923 β€Ό

NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
16:17
β€Ό CVE-2021-44037 β€Ό

Team Password Manager (aka TeamPasswordManager) before 10.135.236 allows password-reset poisoning.

πŸ“– Read

via "National Vulnerability Database".
?
17:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Iranians Charged in Cyberattacks Against U.S. 2020 Election ❌

The State Department has offered a $10M reward for tips on the two Iran-based threat actors accused of voter intimidation and disinformation.

πŸ“– Read

via "Threat Post".
?
18:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23433 β€Ό

The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-21898 β€Ό

A code execution vulnerability exists in the dwgCompressor::decompress18() functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dwg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-41280 β€Ό

Sharetribe Go is a source available marketplace software. In affected versions operating system command injection is possible on installations of Sharetribe Go, that do not have a secret AWS Simple Notification Service (SNS) notification token configured via the `sns_notification_token` configuration parameter. This configuration parameter is unset by default. The vulnerability has been patched in version 10.2.1. Users who are unable to upgrade should set the`sns_notification_token` configuration parameter to a secret value.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-26262 β€Ό

Philips MRI 1.5T and MRI 3T Version 5.x.x does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-40391 β€Ό

An out-of-bounds write vulnerability exists in the drill format T-code tool number functionality of Gerbv 2.7.0, dev (commit b5f1eacd), and the forked version of Gerbv (commit 71493260). A specially-crafted drill file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-21899 β€Ό

A code execution vulnerability exists in the dwgCompressor::copyCompBytes21 functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dwg file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22969 β€Ό

Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer: Adrian Tiron from FORTBRIDGE ( https://www.fortbridge.co.uk/ )The Concrete CMS team gave this a CVSS 3.1 score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N . Please note that Cloud IAAS provider mis-configurations are not Concrete CMS vulnerabilities. A mitigation for this vulnerability is to make sure that the IMDS configurations are according to a cloud provider's best practices.This fix is also in Concrete version 9.0.0

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-21900 β€Ό

A code execution vulnerability exists in the dxfRW::processLType() functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dxf file can lead to a use-after-free vulnerability. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22968 β€Ό

A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below.The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration.To fix this, a check for allowed file extensions was added before downloading files to a tmp directory.Concrete CMS Security Team gave this a CVSS v3.1 score of 5.4 AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:NThis fix is also in Concrete version 9.0.0

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-42744 β€Ό

Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22965 β€Ό

A vulnerability in Pulse Connect Secure before 9.1R12.1 could allow an unauthenticated administrator to causes a denial of service when a malformed request is sent to the device.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22951 β€Ό

Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.Credit for discovery: "Solar Security Research Team"Concrete CMS security team CVSS scoring is 5.3: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NThis fix is also in Concrete version 9.0.0

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-42254 β€Ό

BeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22967 β€Ό

In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in "add / edit messageҀ�.Concrete CMS security team gave this a CVSS v3.1 score of 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NCredit for discovery Adrian H

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-36884 β€Ό

Authenticated Persistent Cross-Site Scripting (XSS) vulnerability discovered in WordPress Backup Migration plugin <= 1.1.5 versions.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-44038 β€Ό

An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22970 β€Ό

Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable toa. SSRF attacks on the private LAN servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb. SSRF Mitigation Bypass through DNS RebindingConcrete CMS security team gave this a CVSS score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:NConcrete CMS is maintaining Concrete version 8.5.x until 1 May 2022 for security fixes.This CVE is shared with HackerOne Reports https://hackerone.com/reports/1364797 and https://hackerone.com/reports/1360016Reporters: Adrian Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) and Bipul Jaiswal

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-26248 β€Ό

Philips MRI 1.5T and MRI 3T Version 5.x.x assigns an owner who is outside the intended control sphere to a resource.

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-22966 β€Ό

Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved. Concrete CMS Security team CVSS scoring: 7.1 AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HCredit for discovery: "Adrian Tiron from FORTBRIDGE ( https://www.fortbridge.co.uk/ )"This fix is also in Concrete version 9.0.0

πŸ“– Read

via "National Vulnerability Database".
18:17
β€Ό CVE-2021-43555 β€Ό

mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
18:29
πŸ•΄ 3 Takeaways from the Gartner Risk Management Summit πŸ•΄

Security leaders can be treated as partners supporting the business and share accountability by establishing relationships with business stakeholders.

πŸ“– Read

via "Dark Reading".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ The β€˜Zelle Fraud’ Scam: How it Works, How to Fight Back β™ŸοΈ

One of the more common ways cybercriminals cash out access to bank accounts involves draining the victim's funds via Zelle, a "peer-to-peer" (P2P) payment service used by many financial institutions that allows customers to quickly send cash to friends and family. Naturally, a great deal of phishing schemes that precede these bank account takeovers begin with a spoofed text message from the target's bank warning about a suspicious Zelle transfer. What follows is a deep dive into how this increasingly clever Zelle fraud scam typically works, and what victims can do about it.

πŸ“– Read

via "Krebs on Security".
?
19:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US Banks Will Be Required to Report Cyberattacks Within 36 Hours πŸ•΄

There is currently no specific time frame during which banks must report to federal regulators that a security incident had occurred. A new notification rules changes that to 36 hours.

πŸ“– Read

via "Dark Reading".
?
20:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-39198 β€Ό

OroCRM is an open source Client Relationship Management (CRM) application. Affected versions we found to suffer from a vulnerability which could an attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack. There are no workarounds that address this vulnerability and all users are advised to update their package.

πŸ“– Read

via "National Vulnerability Database".
20:26
🦿 8 advanced threats Kaspersky predicts for 2022 🦿

Advanced threats constantly evolve. This year saw multiple examples of advanced persistent threats under the spotlight, allowing us to predict what threats might lead the future.

πŸ“– Read

via "Tech Republic".
20:26
🦿 Cisco partners with JupiterOne to enhance its SecureX product portfolio 🦿

The new product, Cisco Secure Cloud Insights, offers cloud inventory tracking and relationship mapping to navigate public clouds as well as access rights management and security compliance reporting.

πŸ“– Read

via "Tech Republic".
20 November 2021
?
03:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36321 β€Ό

Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an improper input validation vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by sending specially crafted data to trigger a denial of service.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36310 β€Ό

Dell Networking OS10, versions 10.4.3.x, 10.5.0.x, 10.5.1.x & 10.5.2.x, contain an uncontrolled resource consumption flaw in its API service. A high-privileged API user may potentially exploit this vulnerability, leading to a denial of service.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36307 β€Ό

Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains a privilege escalation vulnerability. A malicious low privileged user with specific access to the API could potentially exploit this vulnerability to gain admin privileges on the affected system.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36308 β€Ό

Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36322 β€Ό

Dell Networking X-Series firmware versions prior to 3.0.1.8 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary host header values to poison the web-cache or trigger redirections.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36320 β€Ό

Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially hijack a session and access the webserver by forging the session ID.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36319 β€Ό

Dell Networking OS10 versions 10.4.3.x, 10.5.0.x and 10.5.1.x contain an information exposure vulnerability. A low privileged authenticated malicious user can gain access to SNMP authentication failure messages.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36340 β€Ό

Dell EMC SCG 5.00.00.10 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-38681 β€Ό

A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-36306 β€Ό

Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.

πŸ“– Read

via "National Vulnerability Database".
03:17
β€Ό CVE-2021-34358 β€Ό

We have already fixed this vulnerability in the following versions of QmailAgent: QmailAgent 3.0.2 ( 2021/08/25 ) and later

πŸ“– Read

via "National Vulnerability Database".
?
23:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Protecting every edge to make hackers’ jobs harder, not yours πŸ“’

How to support and secure hybrid architectures

πŸ“– Read

via "ITPro".
23:09
πŸ“’ CISA unveils government cyber security response playbooks πŸ“’

Playbook follows President Biden's April executive order

πŸ“– Read

via "ITPro".
23:09
πŸ“’ UK and US pledge to punish cyber criminals at annual meeting πŸ“’

Intelligence and defence officials met at the annual forum to discuss approaches to cyber security for the years ahead

πŸ“– Read

via "ITPro".
23:09
πŸ“’ US gov initiative aims to attract 'world-class' cyber security talent πŸ“’

The DHS wants to make it easier to recruit, develop, and retain top cyber security professionals

πŸ“– Read

via "ITPro".
23:09
πŸ“’ What is HTTP error 503 and how do you fix it? πŸ“’

It may not always be obvious what's causing the issue, but there are steps you can take to get back online

πŸ“– Read

via "ITPro".
23:09
πŸ“’ IT Pro News in Review: FBI hacked, Nvidia-ARM probe, IBM's 'most powerful' quantum chip πŸ“’

Catch up on the biggest headlines of the week in just two minutes

πŸ“– Read

via "ITPro".
23:09
πŸ“’ Best free malware removal tools 2021 πŸ“’

Worried your device is infected? Here are the tools you need to get rid of malicious software

πŸ“– Read

via "ITPro".
23:09
πŸ“’ Out-of-hours ransomware attacks have a greater impact on revenue πŸ“’

Seven in ten security pros called in to handle attacks were intoxicated, report finds

πŸ“– Read

via "ITPro".
23:09
πŸ“’ US, UK agencies warn Iran-backed hackers are targeting critical sectors πŸ“’

The state-sponsored APT groups exploited Fortinet and Microsoft Exchange flaws to gain access to systems

πŸ“– Read

via "ITPro".
23:09
πŸ“’ CISOs are missing holidays due to excessive overtime πŸ“’

Tessian research shows an alarming number of security leaders are sacrificing important areas of their life for the job

πŸ“– Read

via "ITPro".
23:09
πŸ“’ Ubiquiti Networks UniFi Dream Machine Pro review: All the security you need in one handy box πŸ“’

An affordable security gateway that can take care of a wide range of security needs

πŸ“– Read

via "ITPro".
23:09
πŸ“’ TikTok phishing campaign tried to scam over 125 influencer accounts πŸ“’

Hackers threatened to delete accounts over copyright violations

πŸ“– Read

via "ITPro".
23:09
πŸ“’ What is e-safety? πŸ“’

We explain what e-safety is and how it can be managed in schools and beyond

πŸ“– Read

via "ITPro".
21 November 2021
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-28710 β€Ό

certain VT-d IOMMUs may not work in shared page table mode For efficiency reasons, address translation control structures (page tables) may (and, on suitable hardware, by default will) be shared between CPUs, for second-level translation (EPT), and IOMMUs. These page tables are presently set up to always be 4 levels deep. However, an IOMMU may require the use of just 3 page table levels. In such a configuration the lop level table needs to be stripped before inserting the root table's address into the hardware pagetable base register. When sharing page tables, Xen erroneously skipped this stripping. Consequently, the guest is able to write to leaf page table entries.

πŸ“– Read

via "National Vulnerability Database".
22 November 2021
?
09:55
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Black Friday and Cyber Monday – here’s what you REALLY need to do! ⚠

The world fills up with cybersecurity tips every year when Black Friday comes round. But what about the rest of they year?

πŸ“– Read

via "Naked Security".
?
10:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Wind turbine giant Vestas confirms data breach following β€˜cybersecurity incident’ πŸ—“οΈ

Danish company has also β€˜initiated a gradual and controlled reopening of all IT systems’

πŸ“– Read

via "The Daily Swig".
?
12:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why the 'Basement Hacker' Stereotype Is Wrong β€” and Dangerous πŸ•΄

It engenders a false sense of superiority that spurs complacency among risk managers and executives, who in turn may underinvest in security teams, rely too much on automation, or both.

πŸ“– Read

via "Dark Reading".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42737 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-40772 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-42733 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by an improper input validation vulnerability in the XDCAMSAM directory. An unauthenticated attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43015 β€Ό

Adobe InCopy version 16.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43016 β€Ό

Adobe InCopy version 16.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-40773 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43559 β€Ό

A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. The "delete related badge" functionality did not include the necessary token check to prevent a CSRF risk.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-26614 β€Ό

ius_get.cgi in IpTime C200 camera allows remote code execution. A remote attacker may send a crafted parameters to the exposed vulnerable web service interface which invokes the arbitrary shell command.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2020-7882 β€Ό

Using the parameter of getPFXFolderList function, attackers can see the information of authorization certification and delete the files. It occurs because the parameter contains path traversal characters(ie. '../../../')

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-42727 β€Ό

Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can upload arbitrary files outside of the intended directory to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-3935 β€Ό

When PgBouncer is configured to use "cert" authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of TLS certificate verification and encryption. This flaw affects PgBouncer versions prior to 1.16.1.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43558 β€Ό

A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-40771 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-43560 β€Ό

A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. Insufficient capability checks made it possible to fetch other users' calendar action events.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-40775 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-40770 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-42738 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-3943 β€Ό

A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A remote code execution risk when restoring backup files was identified.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-40774 β€Ό

Adobe Prelude version 10.1 (and earlier) is affected by a null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
?
14:49
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenStego Free Steganography Solution 0.8.1 πŸ› 

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

πŸ“– Read

via "Packet Storm Security".
14:49
πŸ›  Hashcat Advanced Password Recovery 6.2.5 Binary Release πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.

πŸ“– Read

via "Packet Storm Security".
14:49
πŸ›  Hashcat Advanced Password Recovery 6.2.5 Source Code πŸ› 

Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
?
15:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Mozilla has released a new platform for privacy-focused email communications 🦿

When you don't want to give out your personal or work email address, but still need to sign up for an account, Mozilla might have an answer for you with Firefox Relay.

πŸ“– Read

via "Tech Republic".
?
16:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23673 β€Ό

This affects all versions of package pekeupload. If an attacker induces a user to upload a file whose name contains javascript code, the javascript code will be executed.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2021-23732 β€Ό

This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2021-23718 β€Ό

The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.

πŸ“– Read

via "National Vulnerability Database".
16:20
β€Ό CVE-2019-5640 β€Ό

Rapid7 Nexpose versions prior to 6.6.114 suffer from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the inspect element browser feature to remove the login panel and view the details available in the last webpage visited by previous user

πŸ“– Read

via "National Vulnerability Database".
16:20
❌ Imunify360 Bug Leaves Linux Web Servers Open to Code Execution, Takeover ❌

CloudLinux' security platform for Linux-based websites and web servers contains a high-severity PHP deserialization bug.

πŸ“– Read

via "Threat Post".
?
16:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Attackers Hijack Email Threads Using ProxyLogon/ProxyShell Flaws ❌

Exploiting Microsoft Exchange ProxyLogon & ProxyShell vulnerabilities, attackers are malspamming replies in existing threads and slipping past malicious-email filters.

πŸ“– Read

via "Threat Post".
16:58
🦿 Leaders agree that cybersecurity is a business risk, but are they acting on that belief? 🦿

Despite nearly unanimous agreement, there's still a lack of clarity on who is accountable for security incidents and whether previous security investments have paid off, a Gartner survey finds.

πŸ“– Read

via "Tech Republic".
?
17:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Online Merchants: Prevent Fraudsters from Becoming Holiday Grinches ❌

Black Friday and Cyber Monday approach! Saryu Nayyar, CEO at Gurucul, discusses concerning statistics about skyrocketing online fraud during the festive season.

πŸ“– Read

via "Threat Post".
17:35
πŸ•΄ 10 Stocking Stuffers for Security Geeks πŸ•΄

Check out our list of gifts with a big impact for hackers and other techie security professionals.

πŸ“– Read

via "Dark Reading".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” What's the Biggest Healthcare Security Threat for 2021 And Beyond? πŸ”

We asked 21 cybersecurity experts and healthcare executives what the biggest security threat they're facing in 2021 and beyond is.

πŸ“– Read

via "".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-42707 β€Ό

PLC Editor Versions 1.3.8 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-42705 β€Ό

PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-38448 β€Ό

The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-44143 β€Ό

A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.

πŸ“– Read

via "National Vulnerability Database".
18:28
🦿 GoDaddy security breach impacts more than 1 million WordPress users 🦿

The hosting company has revealed a security incident that exposed the email addresses and customer numbers of 1.2 million Managed WordPress customers.

πŸ“– Read

via "Tech Republic".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ Arrest in β€˜Ransom Your Employer’ Email Scheme β™ŸοΈ

In August, KrebsOnSecurity warned that scammers were contacting people and asking them to unleash ransomware inside their employer's network, in exchange for a percentage of any ransom amount paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme -- a young man who said he was trying to save up money to help fund a new social network.

πŸ“– Read

via "Krebs on Security".
19:20
❌ GoDaddy’s Latest Breach Affects 1.2M Customers ❌

The kingpin domain registrar has logged its fifth cyber-incident since 2018, after an attacker with a compromised password stole email addresses, SSH keys and database logins.

πŸ“– Read

via "Threat Post".
19:28
🦿 How to install and use InVID, a plugin to debunk fake news and verify videos and images 🦿

You can make sure you aren't seeing fake news, edited photos or deepfakes with this software. Here's how to install and use it.

πŸ“– Read

via "Tech Republic".
19:35
πŸ•΄ Bug Bounties Surge as Firms Compete for Talent πŸ•΄

Companies such as GItLab, which today increased its payment for critical bugs by 75%, are raising bounties and bonuses to attract top-notch researchers.

πŸ“– Read

via "Dark Reading".
19:35
πŸ•΄ CISA Urges Critical Infrastructure to Be Alert for Holiday Threats πŸ•΄

CISA and the FBI share steps organizations should take to better protect against security threats during holidays and weekends.

πŸ“– Read

via "Dark Reading".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44147 β€Ό

An XML External Entity issue in Claris FileMaker Pro and Server (including WebDirect) before 19.4.1 allows a remote attacker to disclose local files via a crafted XML/Excel document and perform server-side request forgery attacks.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-44144 β€Ό

Croatia Control Asterix 2.8.1 has a heap-based buffer over-read, with additional details to be disclosed at a later date.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-44150 β€Ό

The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content.

πŸ“– Read

via "National Vulnerability Database".
20:20
β€Ό CVE-2021-32004 β€Ό

This issue affects: Secomea GateManager All versions prior to 9.6. Improper Check of host header in web server of Secomea GateManager allows attacker to cause browser cache poisoning.

πŸ“– Read

via "National Vulnerability Database".
?
21:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ GoDaddy Breach Exposes SSL Keys of Managed WordPress Hosting Customers πŸ•΄

The incident, which affected 1.2 million users, raises concerns about domain impersonation attacks and other malicious activities.

πŸ“– Read

via "Dark Reading".
?
21:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ GoDaddy admits to password breach: check your Managed WordPress site! ⚠

GoDaddy found crooks in its network, and kicked them out - but not before they'd been in there for six weeks.

πŸ“– Read

via "Naked Security".
21:56
⚠ Black Friday and Cyber Monday – here’s what you REALLY need to do! ⚠

The world fills up with cybersecurity tips every year when Black Friday comes round. But what about the rest of the year?

πŸ“– Read

via "Naked Security".
?
22:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40830 β€Ό

The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the systemÒ€ℒs default trust-store. Attackers with access to a hostÒ€ℒs trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2021-40828 β€Ό

Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2020-22719 β€Ό

Shimo Document v2.0.1 contains a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the table content text field.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2021-40829 β€Ό

Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.

πŸ“– Read

via "National Vulnerability Database".
22:20
β€Ό CVE-2021-40831 β€Ό

The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been Ò€œoverriddenҀ�. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the systemÒ€ℒs default trust-store. Attackers with access to a hostÒ€ℒs trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.

πŸ“– Read

via "National Vulnerability Database".
23 November 2021
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ GoDaddy managed WordPress hosting service breach exposed 1.2m user profiles πŸ—“οΈ

External investigation finds breach dates back more than two months

πŸ“– Read

via "The Daily Swig".
?
11:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Check your patches – public exploit now out for critical Exchange bug ⚠

It was a zero-day bug until Patch Tuesday, now there's an anyone-can-use-it exploit. Don't be the one who hasn't patched.

πŸ“– Read

via "Naked Security".
11:59
🦿 US government warns of increased ransomware threats during Thanksgiving 🦿

Though the feds haven't identified any specific known threats, criminals are prone to strike when key employees are traveling or spending time with family and friends.

πŸ“– Read

via "Tech Republic".
11:59
🦿 If you're serious about privacy, it's time to use DuckDuckGo as your default Android browser 🦿

Third-party app trackers have become a real problem on Android, and DuckDuckGo is doing something about it. Find out why Jack Wallen believes this is the browser you need to use.

πŸ“– Read

via "Tech Republic".
12:06
πŸ•΄ How Sun Tzu's Wisdom Can Rewrite the Rules of Cybersecurity πŸ•΄

The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.

πŸ“– Read

via "Dark Reading".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Research has come a long way, but gaps remain – security researcher Artur Janc on the state of XS-Leaks πŸ—“οΈ

β€˜By focusing on XS-Leaks as a fundamental vulnerability class, we help raise their profile and make it easier for developers to understand their impact’

πŸ“– Read

via "The Daily Swig".
?
13:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Dump Chrome as your default browser on Android 🦿

Jack Wallen tells us why Android users should switch from Chrome as their default browsers.

πŸ“– Read

via "Tech Republic".
?
14:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37004 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-37012 β€Ό

There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-37034 β€Ό

There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-22410 β€Ό

There is a XSS injection vulnerability in iMaster NCE-Fabric V100R019C10. A module of the client does not verify the input sufficiently. Attackers can exploit this vulnerability by modifying input after logging onto the client. This may compromise the normal service of the client.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-37019 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-39976 β€Ό

There is a privilege escalation vulnerability in CloudEngine 5800 V200R020C00SPC600. Due to lack of privilege restrictions, an authenticated local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-37003 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-37025 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:20
β€Ό CVE-2021-37024 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37006 β€Ό

There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37017 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37007 β€Ό

There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37026 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37031 β€Ό

There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-20601 β€Ό

Improper input validation vulnerability in GOT2000 series GT27 model all versions, GOT2000 series GT25 model all versions, GOT2000 series GT23 model all versions, GOT2000 series GT21 model all versions, GOT SIMPLE series GS21 model all versions, and GT SoftGOT2000 all versions allows an remote unauthenticated attacker to write a value that exceeds the configured input range limit by sending a malicious packet to rewrite the device value. As a result, the system operation may be affected, such as malfunction.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37029 β€Ό

There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37102 β€Ό

There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37005 β€Ό

There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-35052 β€Ό

A component in Kaspersky Password Manager could allow an attacker to elevate a process Integrity level from Medium to High.

πŸ“– Read

via "National Vulnerability Database".
14:21
β€Ό CVE-2021-37022 β€Ό

There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated.

πŸ“– Read

via "National Vulnerability Database".
14:34
πŸ—“οΈ Microsoft unveils β€˜Super Duper Secure Mode’ in latest version of Edge πŸ—“οΈ

Browser goes further to protect against bugs by disabling JIT

πŸ“– Read

via "The Daily Swig".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Holiday Scams Drive SMS Phishing Attacks πŸ•΄

Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.

πŸ“– Read

via "Dark Reading".
?
18:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36333 β€Ό

Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-24812 β€Ό

The BetterLinks WordPress plugin before 1.2.6 does not sanitise and escape some of imported link fields, which could lead to Stored Cross-Site Scripting issues when an admin import a malicious CSV.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-21561 β€Ό

Dell PowerScale OneFS version 8.1.2 contains a sensitive information exposure vulnerability. This would allow a malicious user with ISI_PRIV_LOGIN_SSH and/or ISI_PRIV_LOGIN_CONSOLE privileges to gain access to sensitive information in the log files.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-36313 β€Ό

Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-24892 β€Ό

Insecure Direct Object Reference in edit function of Advanced Forms (Free & Pro) before 1.6.9 allows authenticated remote attacker to change arbitrary user's email address and request for reset password, which could lead to take over of WordPress's administrator account. To exploit this vulnerability, an attacker must register to obtain a valid WordPress's user and use such user to authenticate with WordPress in order to exploit the vulnerable edit function.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-36314 β€Ό

Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system.

πŸ“– Read

via "National Vulnerability Database".
18:20
β€Ό CVE-2021-38875 β€Ό

IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-25986 β€Ό

In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-24641 β€Ό

The Images to WebP WordPress plugin before 1.9 does not have CSRF checks in place when performing some administrative actions, which could result in modification of plugin settings, Denial-of-Service, as well as arbitrary image conversion

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-43019 β€Ό

Adobe Creative Cloud version 5.5 (and earlier) are affected by a privilege escalation vulnerability in the resources leveraged by the Setup.exe service. An unauthenticated attacker could leverage this vulnerability to remove files and escalate privileges under the context of SYSTEM . An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability on the product installer. User interaction is required before product installation to abuse this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-24891 β€Ό

The Elementor Website Builder WordPress plugin before 3.1.4 does not sanitise or escape user input appended to the DOM via a malicious hash, resulting in a DOM Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-3672 β€Ό

A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-24830 β€Ό

The Advanced Access Manager WordPress plugin before 6.8.0 does not escape some of its settings when outputting them, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-24700 β€Ό

The Forminator WordPress plugin before 1.15.4 does not sanitize and escape the email field label, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-36301 β€Ό

Dell iDRAC 9 prior to version 4.40.40.00 and iDRAC 8 prior to version 2.80.80.80 contain a Stack Buffer Overflow in Racadm. An authenticated remote attacker may potentially exploit this vulnerability to control process execution and gain access to the underlying operating system.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-38891 β€Ό

IBM Sterling Connect:Direct Web Services 1.0 and 6.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 209508.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-38980 β€Ό

IBM Tivoli Key Lifecycle Manager (IBM Security Guardium Key Lifecycle Manager) 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212786.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-24875 β€Ό

The eCommerce Product Catalog Plugin for WordPress plugin before 3.0.39 does not escape the ic-settings-search parameter before outputting it back in the page in an attribute, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-31852 β€Ό

A Reflected Cross-Site Scripting vulnerability in McAfee Policy Auditor prior to 6.5.2 allows a remote unauthenticated attacker to inject arbitrary web script or HTML via the UID request parameter. The malicious script is reflected unmodified into the Policy Auditor web-based interface which could lead to the extract of end user session token or login credentials. These may be used to access additional security-critical applications or conduct arbitrary cross-domain requests.

πŸ“– Read

via "National Vulnerability Database".
18:21
β€Ό CVE-2021-36332 β€Ό

Dell EMC CloudLink 7.1 and all prior versions contain a HTML and Javascript Injection Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, directing end user to arbitrary and potentially malicious websites.

πŸ“– Read

via "National Vulnerability Database".
18:28
🦿 How to identify social media misinformation and protect your business 🦿

Social media has become an integral part of modern communications, providing valuable information to businesses and individuals. Unfortunately, some of that information is just plain wrong or misleading.

πŸ“– Read

via "Tech Republic".
?
19:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Apple Sues NSO Group for Spyware Use πŸ•΄

The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and services.

πŸ“– Read

via "Dark Reading".
?
19:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Android Spyware Variants Linked to Middle Eastern APT πŸ•΄

The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.

πŸ“– Read

via "Dark Reading".
?
20:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2018-13951 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-13933 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-13880 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9086 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9080 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-13890 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-11992 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9082 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9117 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9079 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-11848 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2021-38004 β€Ό

Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-11839 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-11997 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2021-37998 β€Ό

Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-13931 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9076 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2021-38002 β€Ό

Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2018-11896 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:21
β€Ό CVE-2015-9155 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2015-9078 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13921 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-11957 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13883 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2017-8232 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13950 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13957 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13881 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13956 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2021-42784 β€Ό

OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command injection via a crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13922 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13949 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13953 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2015-9121 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13965 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-11885 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-13964 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-12008 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2018-11900 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:29
β€Ό CVE-2015-9092 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2015. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
20:37
πŸ•΄ Baffle's Data Privacy Cloud Protects Data for Amazon Redshift Customers πŸ•΄

Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.

πŸ“– Read

via "Dark Reading".
24 November 2021
?
10:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44140 β€Ό

Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.

πŸ“– Read

via "National Vulnerability Database".
10:26
β€Ό CVE-2021-40369 β€Ό

A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.

πŸ“– Read

via "National Vulnerability Database".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ VMware addresses SSRF, arbitrary file read flaws in vCenter Server πŸ—“οΈ

β€˜Important’ severity flaws both reside in the vSphere Web Client

πŸ“– Read

via "The Daily Swig".
11:21
❌ Attackers Actively Target Windows Installer Zero-Day ❌

Researcher discovered a β€œmore powerful” variant of an elevation-of-privilege flaw for which Microsoft released a botched patch earlier this month.

πŸ“– Read

via "Threat Post".
11:34
πŸ—“οΈ Cyberstalking study: UK residents most accepting of spyware to track partners’ movements πŸ—“οΈ

Report from cybersecurity firm Kaspersky reveals worrying attitudes towards spyware usage

πŸ“– Read

via "The Daily Swig".
?
12:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ When Will Security Frameworks Catch Up With the New Cybersecurity Normal? πŸ•΄

Standards need to reflect that most endpoints will be remote and/or wireless.

πŸ“– Read

via "Dark Reading".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” DG Insights to Help Leaders Assess DLP Effectiveness πŸ”

Digital Guardian's Managed Security Program customers can now receive a weekly email that gives further insight into their organization's data movement.

πŸ“– Read

via "".
12:59
🦿 Apple needs to un-Mac-ify security and privacy in Safari 🦿

Safari is a good browser, but it could be better. Unfortunately, one area that requires improvement is the un-Mac-ifying of the privacy settings. Find out what Jack Wallen means by this.

πŸ“– Read

via "Tech Republic".
13:05
πŸ—“οΈ Decrypting diversity: One in five UK infosec professionals say they’ve experienced discrimination at work πŸ—“οΈ

Report states diversity and inclusion within the industry is lagging behind

πŸ“– Read

via "The Daily Swig".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker ❌

Just weeks after a judge ruled that NSO Group did not have immunity in a suit brought by Facebook subsidiary WhatsApp, Apple is adding significant weight to the company's woes.

πŸ“– Read

via "Threat Post".
13:22
❌ GoDaddy Breach Widens to Include Reseller Subsidiaries ❌

Customers of several brands that resell GoDaddy Managed WordPress have also been caught up in the big breach, in which millions of emails, passwords and more were stolen.

πŸ“– Read

via "Threat Post".
?
13:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  GNU Privacy Guard 2.2.33 πŸ› 

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.

πŸ“– Read

via "Packet Storm Security".
13:57
⚠ GoDaddy admits to password breach: check your Managed WordPress site! ⚠

GoDaddy found crooks in its network, and kicked them out - but not before they'd been in there for six weeks.

πŸ“– Read

via "Naked Security".
13:57
⚠ Check your patches – public exploit now out for critical Exchange bug ⚠

It was a zero-day bug until Patch Tuesday, now there's an anyone-can-use-it exploit. Don't be the one who hasn't patched.

πŸ“– Read

via "Naked Security".
?
14:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-20840 β€Ό

Cross-site scripting vulnerability in Booking Package - Appointment Booking Calendar System versions prior to 1.5.11 allows a remote attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-20843 β€Ό

Cross-site script inclusion vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to alter the settings of the product via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
14:26
β€Ό CVE-2021-3554 β€Ό

Improper Access Control vulnerability in the patchesUpdate API as implemented in Bitdefender Endpoint Security Tools for Linux as a relay role allows an attacker to manipulate the remote address used for pulling patches. This issue affects: Bitdefender Endpoint Security Tools for Linux versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender Unified Endpoint versions prior to 6.2.21.160. Bitdefender GravityZone versions prior to 6.24.1-1.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20845 β€Ό

Cross-site request forgery (CSRF) vulnerability in Unlimited Sitemap Generator versions prior to v8.2 allows a remote attacker to hijack the authentication of an administrator and conduct arbitrary operation via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-43780 β€Ό

Redash is a package for data visualization and sharing. In versions 10.0 and priorm the implementation of URL-loading data sources like JSON, CSV, or Excel is vulnerable to advanced methods of Server Side Request Forgery (SSRF). These vulnerabilities are only exploitable on installations where a URL-loading data source is enabled. As of time of publication, the `master` and `release/10.x.x` branches address this by applying the Advocate library for making http requests instead of the requests library directly. Users should upgrade to version 10.0.1 to receive this patch. There are a few workarounds for mitigating the vulnerability without upgrading. One can disable the vulnerable data sources entirely, by adding the following env variable to one's configuration, making them unavailable inside the webapp. One can switch any data source of certain types (viewable in the GitHub Security Advisory) to be `View Only` for all groups on the Settings > Groups > Data Sources screen. For users unable to update an admin may modify Redash's configuration through environment variables to mitigate this issue. Depending on the version of Redash, an admin may also need to run a CLI command to re-encrypt some fields in the database. The `master` and `release/10.x.x` branches as of time of publication have removed the default value for `REDASH_COOKIE_SECRET`. All future releases will also require this to be set explicitly. For existing installations, one will need to ensure that explicit values are set for the `REDASH_COOKIE_SECRET` and `REDASH_SECRET_KEY `variables.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-32037 β€Ό

An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20848 β€Ό

Cross-site scripting vulnerability in rwtxt versions prior to v1.8.6 allows a remote attacker to inject an arbitrary script via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20844 β€Ό

Improper neutralization of HTTP request headers for scripting syntax vulnerability in the Web GUI of RTX830 Rev.15.02.17 and earlier, NVR510 Rev.15.01.18 and earlier, NVR700W Rev.15.00.19 and earlier, and RTX1210 Rev.14.01.38 and earlier allows a remote authenticated attacker to obtain sensitive information via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20841 β€Ό

Improper access control in Management screen of EC-CUBE 2 series 2.11.2 to 2.17.1 allows a remote authenticated attacker to bypass access restriction and to alter System settings via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20846 β€Ό

Cross-site request forgery (CSRF) vulnerability in Push Notifications for WordPress (Lite) versions prior to 6.0.1 allows a remote attacker to hijack the authentication of an administrator and conduct an arbitrary operation via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20835 β€Ό

Improper authorization in handler for custom URL scheme vulnerability in Android App 'Mercari (Merpay) - Marketplace and Mobile Payments App' (Japan version) versions prior to 4.49.1 allows a remote attacker to lead a user to access an arbitrary website and the website launches an arbitrary Activity of the app via the vulnerable App, which may result in Mercari account's access token being obtained.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-31822 β€Ό

When Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-41192 β€Ό

Redash is a package for data visualization and sharing. If an admin sets up Redash versions 10.0.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value. This issue only affects installations where the `REDASH_COOKIE_SECRET or REDASH_SECRET_KEY` environment variables have not been explicitly set. This issue does not affect users of the official Redash cloud images, Redash's Digital Ocean marketplace droplets, or the scripts in the `getredash/setup` repository. These instances automatically generate unique secret keys during installation. One can verify whether one's instance is affected by checking the value of the `REDASH_COOKIE_SECRET` environment variable. If it is `c292a0a3aa32397cdb050e233733900f`, should follow the steps to secure the instance, outlined in the GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-3553 β€Ό

A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService of Bitdefender Endpoint Security Tools allows an attacker to use the Endpoint Protection relay as a proxy for any remote host. This issue affects: Bitdefender Endpoint Security Tools versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender Unified Endpoint for Linux versions prior to 6.2.21.160. Bitdefender GravityZone versions prior to 6.24.1-1.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-3552 β€Ό

A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to proxy requests to the relay server. This issue affects: Bitdefender Endpoint Security Tools versions prior to 6.6.27.390; versions prior to 7.1.2.33. Bitdefender GravityZone 6.24.1-1.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20850 β€Ό

PowerCMS XMLRPC API of PowerCMS 5.19 and earlier, PowerCMS 4.49 and earlier, PowerCMS 3.295 and earlier, and PowerCMS 2 Series (End-of-Life, EOL) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-43777 β€Ό

Redash is a package for data visualization and sharing. In Redash version 10.0 and prior, the implementation of Google Login (via OAuth) incorrectly uses the `state` parameter to pass the next URL to redirect the user to after login. The `state` parameter should be used for a Cross-Site Request Forgery (CSRF) token, not a static and easily predicted value. This vulnerability does not affect users who do not use Google Login for their instance of Redash. A patch in the `master` and `release/10.x.x` branches addresses this by replacing `Flask-Oauthlib` with `Authlib` which automatically provides and validates a CSRF token for the state variable. The new implementation stores the next URL on the user session object. As a workaround, one may disable Google Login to mitigate the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:27
β€Ό CVE-2021-20842 β€Ό

Cross-site request forgery (CSRF) vulnerability in EC-CUBE 2 series 2.11.0 to 2.17.1 allows a remote attacker to hijack the authentication of Administrator and delete Administrator via a specially crafted web page.

πŸ“– Read

via "National Vulnerability Database".
?
14:51
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 9.3M+ Androids Running β€˜Malicious’ Games from Huawei AppGallery ❌

A new trojan called Android.Cynos.7.origin, designed to collect Android users’ device data and phone numbers, was found in 190 games installed on over 9M Android devices.

πŸ“– Read

via "Threat Post".
?
15:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ US government securities watchdog spoofed by investment scammers – don’t fall for it! ⚠

Those numbers that show up on your phone to tell you who's calling? Treat them as SUGGESTIONS, never as PROOF.

πŸ“– Read

via "Naked Security".
15:38
πŸ•΄ In Appreciation: Dark Reading's Tim Wilson πŸ•΄

Dark Reading co-founder and editor-in-chief Tim Wilson passed away on Nov. 23.

πŸ“– Read

via "Dark Reading".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43268 β€Ό

An issue was discovered in VxWorks 6.9 through 7. In the IKE component, a specifically crafted packet may lead to reading beyond the end of a buffer, or a double free.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-34424 β€Ό

A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI before version 5.8.4, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product's memory.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-22049 β€Ό

The vSphere Web Client (FLEX/Flash) contains an SSRF (Server Side Request Forgery) vulnerability in the vSAN Web Client (vSAN UI) plug-in. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-21980 β€Ό

The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-34423 β€Ό

A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI before version 5.8.4, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-36917 β€Ό

WordPress Hide My WP plugin (versions <= 6.2.3) can be deactivated by any unauthenticated user. It is possible to retrieve a reset token which can then be used to deactivate the plugin.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-36916 β€Ό

The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function "hmwp_get_user_ip" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as "X-Forwarded-For." As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.

πŸ“– Read

via "National Vulnerability Database".
16:27
β€Ό CVE-2021-38873 β€Ό

IBM Planning Analytics 2.0 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 208396.

πŸ“– Read

via "National Vulnerability Database".
?
18:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Threat Actors Get into OT Systems πŸ•΄

The convergence and integration of OT and IT has resulted in a growing number of cyber risks for critical infrastructure. Here are some of the ways attackers are targeting operational technology systems.

πŸ“– Read

via "Dark Reading".
?
18:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41267 β€Ό

Symfony/Http-Kernel is the HTTP kernel component for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Headers that are not part of the "trusted_headers" allowed list are ignored and protect users from "Cache poisoning" attacks. In Symfony 5.2, maintainers added support for the `X-Forwarded-Prefix` headers, but this header was accessible in SubRequest, even if it was not part of the "trusted_headers" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` header, leading to a web cache poisoning issue. Versions 5.3.12 and later have a patch to ensure that the `X-Forwarded-Prefix` header is not forwarded to subrequests when it is not trusted.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-41270 β€Ό

Symfony/Serializer handles serializing and deserializing data structures for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Symfony versions 4.1.0 before 4.4.35 and versions 5.0.0 before 5.3.12 are vulnerable to CSV injection, also known as formula injection. In Symfony 4.1, maintainers added the opt-in `csv_escape_formulas` option in the `CsvEncoder`, to prefix all cells starting with `=`, `+`, `-` or `@` with a tab `\t`. Since then, OWASP added 2 chars in that list: Tab (0x09) and Carriage return (0x0D). This makes the previous prefix char (Tab `\t`) part of the vulnerable characters, and OWASP suggests using the single quote `'` for prefixing the value. Starting with versions 4.4.34 and 5.3.12, Symfony now follows the OWASP recommendations and uses the single quote `'` to prefix formulas and add the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-41268 β€Ό

Symfony/SecurityBundle is the security system for Symfony, a PHP framework for web and console applications and a set of reusable PHP components. Since the rework of the Remember me cookie in version 5.3.0, the cookie is not invalidated when the user changes their password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Starting with version 5.3.12, Symfony makes the password part of the signature by default. In that way, when the password changes, then the cookie is not valid anymore.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-43778 β€Ό

Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.

πŸ“– Read

via "National Vulnerability Database".
18:27
β€Ό CVE-2021-22957 β€Ό

A Cross-Origin Resource Sharing (CORS) vulnerability found in UniFi Protect application Version 1.19.2 and earlier allows a malicious actor who has convinced a privileged user to access a URL with malicious code to take over said userÒ€ℒs account.This vulnerability is fixed in UniFi Protect application Version 1.20.0 and later.

πŸ“– Read

via "National Vulnerability Database".
?
22:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44219 β€Ό

Gin-Vue-Admin before 2.4.6 mishandles a SQL database.

πŸ“– Read

via "National Vulnerability Database".
25 November 2021
?
03:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Get 1,000 hours of cybersecurity training for $21 this Black Friday 🦿

Stay up to date for a lifetime with this cybersecurity training bundle with more than 1,000 hours of instruction.

πŸ“– Read

via "Tech Republic".
?
09:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Data breach at New Mexico healthcare business impacts 62,000 state residents πŸ—“οΈ

True Health New Mexico was hit by a cyber-attack in October

πŸ“– Read

via "The Daily Swig".
?
09:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep60: Exchange exploit, GoDaddy breach and cookies made public [Podcast] ⚠

Latest episode - listen now! Solid cybersecurity advice in plain English.

πŸ“– Read

via "Naked Security".
?
11:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ WordPress security plugin Hide My WP addresses SQL injection, deactivation flaws πŸ—“οΈ

Bugs deemed β€˜very easy to exploit as they require no prerequisites’

πŸ“– Read

via "The Daily Swig".
?
13:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ New Twists on Gift-Card Scams Flourish on Black Friday ❌

Fake merchandise and crypto jacking are among the new ways cybercriminals will try to defraud people flocking online for Black Friday and Cyber Monday.

πŸ“– Read

via "Threat Post".
?
14:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ New differential fuzzing tool reveals novel HTTP request smuggling techniques πŸ—“οΈ

White paper systematically examines the attack while showcasing a β€˜laundry list’ of new flaws

πŸ“– Read

via "The Daily Swig".
?
14:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44223 β€Ό

WordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory.

πŸ“– Read

via "National Vulnerability Database".
?
22:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44225 β€Ό

In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property

πŸ“– Read

via "National Vulnerability Database".
26 November 2021
?
08:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Maritime giant Swire Pacific Offshore suffers data breach following cyber-attack πŸ—“οΈ

Organization said it suffered β€˜unauthorized access’ to systems

πŸ“– Read

via "The Daily Swig".
?
11:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Microsoft pushes ahead with controversial β€˜buy now, pay later’ feature for Edge browser πŸ—“οΈ

β€˜It’s like you’re recapitulating the worst IE browser extensions and installing them by default’, grumbles one user

πŸ“– Read

via "The Daily Swig".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-38686 β€Ό

An improper authentication vulnerability has been reported to affect QNAP device, VioStor. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of QVR: QVR FW 5.1.6 build 20211109 and later

πŸ“– Read

via "National Vulnerability Database".
12:29
β€Ό CVE-2021-38685 β€Ό

A command injection vulnerability has been reported to affect QNAP device, VioStor. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR FW 5.1.6 build 20211109 and later

πŸ“– Read

via "National Vulnerability Database".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Ukrainian police expose international phone-hacking gang πŸ—“οΈ

β€˜Phoenix’ group laid low following seizure of computing equipment and stolen devices

πŸ“– Read

via "The Daily Swig".
?
13:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep60: Exchange exploit, GoDaddy breach and cookies made public [Podcast] ⚠

Latest episode - listen now! Solid cybersecurity advice in plain English.

πŸ“– Read

via "Naked Security".
?
14:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36807 β€Ό

An authenticated user could potentially execute code via an SQLi vulnerability in the user portal of SG UTM before version 9.708 MR8.

πŸ“– Read

via "National Vulnerability Database".
14:29
β€Ό CVE-2021-25269 β€Ό

A local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3.

πŸ“– Read

via "National Vulnerability Database".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cloud Security: Don’t wait until your next bill to find out about an attack! ⚠

Cloud security is the best sort of altruism: you need to do it to protect yourself, but you help to protect everyone else at the same time.

πŸ“– Read

via "Naked Security".
?
16:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ The Internet is Held Together With Spit & Baling Wire β™ŸοΈ

Imagine being able to disconnect or redirect Internet traffic destined for some of the world's largest companies -- just by spoofing an email. This is the nature of a threat vector recently removed by a Fortune 500 firm that operates one of the world's largest Internet backbones.

πŸ“– Read

via "Krebs on Security".
16:29
β€Ό CVE-2021-36843 β€Ό

Authenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Floating Social Media Icon plugin (versions <= 4.3.5) Social Media Configuration form. Requires high role user like admin.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-41279 β€Ό

BaserCMS is an open source content management system with a focus on Japanese language support. In affected versions users with upload privilege may upload crafted zip files capable of path traversal on the host operating system. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-35533 β€Ό

Improper Input Validation vulnerability in the APDU parser in the Bidirectional Communication Interface (BCI) IEC 60870-5-104 function of Hitachi Energy RTU500 series allows an attacker to cause the receiving RTU500 CMU of which the BCI is enabled to reboot when receiving a specially crafted message. By default, BCI IEC 60870-5-104 function is disabled (not configured). This issue affects: Hitachi Energy RTU500 series CMU Firmware version 12.0.* (all versions); CMU Firmware version 12.2.* (all versions); CMU Firmware version 12.4.* (all versions).

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-40833 β€Ό

A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2020-7881 β€Ό

The vulnerability function is enabled when the streamer service related to the AfreecaTV communicated through web socket using 21201 port. A stack-based buffer overflow leading to remote code execution was discovered in strcpy() operate by "FanTicket" field. It is because of stored data without validation of length.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-26615 β€Ό

ARK library allows attackers to execute remote code via the parameter(path value) of Ark_NormalizeAndDupPAthNameW function because of an integer overflow.

πŸ“– Read

via "National Vulnerability Database".
16:29
β€Ό CVE-2021-41243 β€Ό

There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-26611 β€Ό

HejHome GKW-IC052 IP Camera contained a hard-coded credentials vulnerability. This issue allows remote attackers to operate the IP Camera.(reboot, factory reset, snapshot etc..)

πŸ“– Read

via "National Vulnerability Database".
16:30
β€Ό CVE-2021-36919 β€Ό

Multiple Authenticated Reflected Cross-Site Scripting (XSS) vulnerabilities in WordPress Awesome Support plugin (versions <= 6.0.6), vulnerable parameters (&id, &assignee).

πŸ“– Read

via "National Vulnerability Database".
27 November 2021
?
03:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Learn in-demand ethical hacking skills in your own time for $11 during this Black Friday sale 🦿

Even if you have no prior tech experience at all and are working full-time, you can qualify for a well-paid career in the tech industry by developing the skills found in these 10 self-paced courses.

πŸ“– Read

via "Tech Republic".
?
05:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Get lifetime VPN security and privacy for just $20 during this Black Friday sale 🦿

You will never again need to worry about your anonymity or sensitive personal data online when the best VPN service offers a lifetime of powerful protection.

πŸ“– Read

via "Tech Republic".
28 November 2021
?
03:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Become a cybersecurity analyst for just $9 🦿

You'll never get a better deal on self-paced courses that can teach you the skills necessary to become a cybersecurity analyst, so start training now and switch to a new career in 2022.

πŸ“– Read

via "Tech Republic".
29 November 2021
?
08:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2017-20008 β€Ό

The myCred WordPress plugin before 1.7.8 does not sanitise and escape the user parameter before outputting it back in the Points Log admin dashboard, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2019-8921 β€Ό

An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2019-8922 β€Ό

A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24915 β€Ό

The Contest Gallery WordPress plugin before 13.1.0.6 does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24883 β€Ό

The Popup Anything WordPress plugin before 2.0.4 does not escape the Link Text and Button Text fields of Popup, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24768 β€Ό

The WP RSS Aggregator WordPress plugin before 4.19.2 does not properly sanitise and escape the URL to Blacklist field, allowing malicious HTML to be inserted by high privilege users even when the unfiltered_html capability is disallowed, which could lead to Cross-Site Scripting issues.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24918 β€Ό

The Smash Balloon Social Post Feed WordPress plugin before 4.0.1 did not have any privilege or nonce validation before saving the plugin's setting. As a result, any logged-in user on a vulnerable site could update the settings and store rogue JavaScript on each of its posts and pages.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24908 β€Ό

The Check & Log Email WordPress plugin before 1.0.4 does not escape the d parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24927 β€Ό

The My Calendar WordPress plugin before 3.2.18 does not sanitise and escape the callback parameter of the mc_post_lookup AJAX action (available to any authenticated user) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24749 β€Ό

The URL Shortify WordPress plugin before 1.5.1 does not have CSRF check in place when bulk-deleting links or groups, which could allow attackers to make a logged in admin delete arbitrary link and group via a CSRF attack.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24755 β€Ό

The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24889 β€Ό

The Ninja Forms Contact Form WordPress plugin before 3.6.4 does not escape keys of the fields POST parameter, which could allow high privilege users to perform SQL injections attacks

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-38147 β€Ό

Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to download arbitrary files, such as reports containing sensitive information, because authentication is not required for API access to processexecution/DownloadExcelFile/Domain_Credential_Report_Excel, processexecution/DownloadExcelFile/User_Report_Excel, processexecution/DownloadExcelFile/Process_Report_Excel, processexecution/DownloadExcelFile/Infrastructure_Report_Excel, or processexecution/DownloadExcelFile/Resolver_Report_Excel.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24860 β€Ό

The BSK PDF Manager WordPress plugin before 3.1.2 does not validate and escape the orderby and order parameters before using them in a SQL statement, leading to a SQL injection issue

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-21707 β€Ό

In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24751 β€Ό

The GenerateBlocks WordPress plugin before 1.4.0 does not validate the generateblocks/container block's tagName attribute, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24842 β€Ό

The Bulk Datetime Change WordPress plugin before 1.12 does not enforce capability checks which allows users with Contributor roles to 1) list private post titles of other users and 2) change the posted date of other users' posts.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24811 β€Ό

The Shop Page WP WordPress plugin before 1.2.8 does not sanitise and escape some of the Product fields, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24876 β€Ό

The Registrations for the Events Calendar WordPress plugin before 2.7.5 does not escape the v parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
08:33
β€Ό CVE-2021-24745 β€Ό

The About Author Box WordPress plugin before 1.0.2 does not sanitise and escape the Social Profiles field values before outputting them in attributes, which could allow user with a role as low as contributor to perform Cross-Site Scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
?
09:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ UK Department for Transport caught inadvertently serving pornographic content to site visitors πŸ—“οΈ

β€˜The page has since been permanently deleted’, a government spokesperson told The Daily Swig

πŸ“– Read

via "The Daily Swig".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43698 β€Ό

An unspecified version of phpWhois is affected by a Cross Site Scripting (XSS) vulnerability. In file example.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is a XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
12:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Interpol arrests 1,000 suspects, seizes $27m in crackdown on cybercrime πŸ—“οΈ

Worldwide law enforcement operation targets online crime surge

πŸ“– Read

via "The Daily Swig".
12:14
πŸ•΄ Paving the Road to Zero Trust With Adaptive Authentication πŸ•΄

A gradual transition to a world beyond passwords predisposes zero-trust projects to success.

πŸ“– Read

via "Dark Reading".
12:14
πŸ•΄ NanoLock Security and Waterfall Security Partner to Deliver OT Security for Industrial and Energy Applications πŸ•΄

The solution combines NanoLock’s device-level, zero-trust protection with Waterfall’s hardware-enforced IT/OT perimeter protection to provide a powerful OT security solution that mitigates cyber events from both IT and OT networks.

πŸ“– Read

via "Dark Reading".
?
12:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43696 β€Ό

An unspecified version of twmap is affected by a Cross Site Scripting (XSS) vulnerability. In file list.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST then there is a XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
12:33
β€Ό CVE-2021-43695 β€Ό

An unspecified version of issabelPBX is affected by a Cross Site Scripting (XSS) vulnerability. In file page.backup_restore.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST without sanitization, then there is a XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
12:33
β€Ό CVE-2021-43697 β€Ό

An unspecified version of Workerman-ThinkPHP-Redis is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
13:01
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 WFH security: How to protect your remote endpoints from vulnerabilities 🦿

Many organizations lack an effective patch management program, especially when it comes to patching remote systems, says Action1.

πŸ“– Read

via "Tech Republic".
?
13:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Cloud Security: Don’t wait until your next bill to find out about an attack! ⚠

Cloud security is the best sort of altruism: you need to do it to protect yourself, but you help to protect everyone else at the same time.

πŸ“– Read

via "Naked Security".
?
13:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Shape-Shifting β€˜Tardigrade’ Malware Hits Vaccine Makers ❌

Some security researchers say it’s actually Cobalt Strike and not a SmokeLoader variant, but BioBright says in-depth testing shows it’s for real a scary morphic malware that changes its parts and recompiles itself.

πŸ“– Read

via "Threat Post".
14:07
πŸ—“οΈ Italian police crack down on fake Covid-19 vaccination passes πŸ—“οΈ

Underground trade conducted over Telegram

πŸ“– Read

via "The Daily Swig".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3802 β€Ό

A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43691 β€Ό

An unspecified version of tripexpress is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-39995 β€Ό

Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43692 β€Ό

An unspecified version of youtube-php-mirroring is affected by a Cross Site Scripting (XSS) vulnerability in file ytproxy/index.php.

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-43693 β€Ό

vesta 0.9.8-24 is affected by a file inclusion vulnerability in file web/add/user/index.php.

πŸ“– Read

via "National Vulnerability Database".
?
14:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Unpatched Windows Zero-Day Allows Privileged File Access ❌

A temporary fix has been issued for CVE-2021-24084, which can be exploited using the LPE exploitation approach for the HiveNightmare/SeriousSAM bug.

πŸ“– Read

via "Threat Post".
?
15:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  OpenStego Free Steganography Solution 0.8.2 πŸ› 

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images).

πŸ“– Read

via "Packet Storm Security".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ ScarCruft APT Mounts Desktop/Mobile Double-Pronged Spy Attacks ❌

The North Korea-linked group is deploying the Chinotto spyware backdoor against dissidents, journalists and other politically relevant individuals in South Korea.

πŸ“– Read

via "Threat Post".
?
17:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” U.S. Issues Guidance to Protect Critical, Emerging Tech from Hacks πŸ”

The guidance applies to companies who work in semiconductors, quantum computing, the bioeconomy, and AI.

πŸ“– Read

via "".
?
18:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ IKEA Hit by Email Reply-Chain Cyberattack ❌

IKEA, king of furniture-in-a-flat-box, warned employees on Friday that an ongoing cyberattack was using internal emails to malspam malicious links in active email threads.

πŸ“– Read

via "Threat Post".
18:24
❌ Researchers Flag 300K Banking Trojan Infections from Google Play in 4 Months ❌

Attackers are honing Google Play dropper campaigns, overcoming app store restrictions.

πŸ“– Read

via "Threat Post".
18:33
β€Ό CVE-2021-43783 β€Ό

@backstage/plugin-scaffolder-backend is the backend for the default Backstage software templates. In affected versions a malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance. This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents. This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`. This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-43787 β€Ό

Nodebb is an open source Node.js based forum software. In affected versions a prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-42358 β€Ό

The Contact Form With Captcha WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation in the ~/cfwc-form.php file during contact form submission, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.6.2.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-43788 β€Ό

Nodebb is an open source Node.js based forum software. Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. The vulnerability has been patched as of v1.18.5. Users are advised to upgrade as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-44198 β€Ό

DLL hijacking could lead to local privilege escalation. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-44199 β€Ό

DLL hijacking could lead to denial of service. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27305, Acronis Cyber Protect Home Office (Windows) before build 39612

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-34800 β€Ό

Sensitive information could be logged. The following products are affected: Acronis Agent (Windows, Linux, macOS) before build 27147

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-44201 β€Ό

Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-42365 β€Ό

The Asgaros Forums WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.13. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-44203 β€Ό

Stored cross-site scripting (XSS) was possible in protection plan details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-44200 β€Ό

Self cross-site scripting (XSS) was possible on devices page. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-43786 β€Ό

Nodebb is an open source Node.js based forum software. In affected versions incorrect logic present in the token verification step unintentionally allowed master token access to the API. The vulnerability has been patch as of v1.18.5. Users are advised to upgrade as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-42364 β€Ό

The Stetic WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the stats_page function found in the ~/stetic.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.0.6.

πŸ“– Read

via "National Vulnerability Database".
18:33
β€Ό CVE-2021-44202 β€Ό

Stored cross-site scripting (XSS) was possible in activity details. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035

πŸ“– Read

via "National Vulnerability Database".
18:44
πŸ•΄ Panasonic Hit in Data Breach πŸ•΄

Tech firm reveals that data on one of its file servers was accessed by attackers.

πŸ“– Read

via "Dark Reading".
?
19:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation πŸ•΄

HAECHI-II initiative represents Interpol's stepped-up efforts to tackle the operators of financially motivated online scams and other cyberattacks.

πŸ“– Read

via "Dark Reading".
?
19:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Analyzes Methods Behind GCP Workload Attacks πŸ•΄

The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows.

πŸ“– Read

via "Dark Reading".
19:44
πŸ•΄ IKEA Email Systems Targeted in Cyberattack πŸ•΄

Attackers are reportedly targeting IKEA employees in a phishing campaign that leverages stolen reply-chain emails.

πŸ“– Read

via "Dark Reading".
19:44
πŸ•΄ Phishing Remains the Most Common Cause of Data Breaches, Survey Says πŸ•΄

Despite heightened concerns over ransomware, fewer organizations in a Dark Reading survey reported being an actual victim of a ransomware attack over the past year.

πŸ“– Read

via "Dark Reading".
?
20:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 9 out of 10 Healthcare Organizations Provide Telehealth Services, Yet Almost Half Face Patients' Mistrust Toward Privacy πŸ•΄

Kaspersky surveyed healthcare decision-makers to learn how the digital transformation of the industry is going and which problems they believe should be solved to create a world in which everyone can gain access to quality care.

πŸ“– Read

via "Dark Reading".
?
20:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44427 β€Ό

An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.

πŸ“– Read

via "National Vulnerability Database".
20:45
πŸ•΄ Armis Now Valued at $3.4B πŸ•΄

One Equity Partners led the $300 million round, increasing the valuation of Armis from the $2 billion valuation it achieved less than 8 months ago.

πŸ“– Read

via "Dark Reading".
20:45
πŸ•΄ Stellar Cyber Raises $38M Series B to Address Need to Provide 360-Degree Visibility Across Entire Attack Surface πŸ•΄

Oversubscribed round, including Samsung, rewards technical innovations and rapid market adoption, positions company for continued leadership.

πŸ“– Read

via "Dark Reading".
30 November 2021
?
08:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3727 β€Ό

# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).

πŸ“– Read

via "National Vulnerability Database".
08:34
β€Ό CVE-2021-3769 β€Ό

# Vulnerability in `pygmalion`, `pygmalion-virtualenv` and `refined` themes **Description**: these themes use `print -P` on user-supplied strings to print them to the terminal. All of them do that on git information, particularly the branch name, so if the branch has a specially-crafted name the vulnerability can be exploited. **Fixed in**: [b3ba9978](https://github.com/ohmyzsh/ohmyzsh/commit/b3ba9978). **Impacted areas**: - `pygmalion` theme. - `pygmalion-virtualenv` theme. - `refined` theme.

πŸ“– Read

via "National Vulnerability Database".
08:34
β€Ό CVE-2021-3725 β€Ό

Vulnerability in dirhistory plugin Description: the widgets that go back and forward in the directory history, triggered by pressing Alt-Left and Alt-Right, use functions that unsafely execute eval on directory names. If you cd into a directory with a carefully-crafted name, then press Alt-Left, the system is subject to command injection. Impacted areas: - Functions pop_past and pop_future in dirhistory plugin.

πŸ“– Read

via "National Vulnerability Database".
08:34
β€Ό CVE-2021-3726 β€Ό

# Vulnerability in `title` function **Description**: the `title` function defined in `lib/termsupport.zsh` uses `print` to set the terminal title to a user-supplied string. In Oh My Zsh, this function is always used securely, but custom user code could use the `title` function in a way that is unsafe. **Fixed in**: [a263cdac](https://github.com/ohmyzsh/ohmyzsh/commit/a263cdac). **Impacted areas**: - `title` function in `lib/termsupport.zsh`. - Custom user code using the `title` function.

πŸ“– Read

via "National Vulnerability Database".
?
10:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ HP printer vulnerabilities left enterprise networks open to abuse via β€˜cross-site printing’ attack πŸ—“οΈ

Hardware hacking technique gets points for innovation, although some degree of social engineering is required

πŸ“– Read

via "The Daily Swig".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cisco releases Shared Signals and Events reference document to solve "head on a swivel" problem 🦿

Security standard could improve interoperability among security vendors and expand support for zero trust approach to security.

πŸ“– Read

via "Tech Republic".
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Yanluowang Ransomware Tied to Thieflock Threat Actor ❌

Links between the tactics and tools demonstrated in attacks suggest a former affiliate has switched loyalties, according to new research.

πŸ“– Read

via "Threat Post".
11:37
πŸ—“οΈ Panasonic admits data breach after attackers gain access to file server πŸ—“οΈ

Reports suggest that intrusion may have persisted for months

πŸ“– Read

via "The Daily Swig".
?
12:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Stegano 0.10.1 πŸ› 

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

πŸ“– Read

via "Packet Storm Security".
12:03
πŸ›  Wapiti Web Application Vulnerability Scanner 3.0.8 πŸ› 

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

πŸ“– Read

via "Packet Storm Security".
12:16
πŸ•΄ Finding Your Niche in Cybersecurity πŸ•΄

With a little patience and research, you can discover a role you love that also protects those around you.

πŸ“– Read

via "Dark Reading".
12:29
⚠ Controversial face matchers Clearview set to be fined over $20m ⚠

Scraping data for a facial recognition service? "That's unlawful", concluded both the British and the Australians.

πŸ“– Read

via "Naked Security".
12:34
β€Ό CVE-2021-41679 β€Ό

A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2021-41677 β€Ό

A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2021-25987 β€Ό

Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post Ò€œbodyҀ� and Ò€œtagsҀ� donÒ€ℒt sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
12:34
β€Ό CVE-2021-41678 β€Ό

A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff{TITLE] parameter.

πŸ“– Read

via "National Vulnerability Database".
?
13:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Ransomware vs. Cities: A Cyber War πŸ•΄

As smart cities become the new normal for urban living, they must be resilient against the speed and sophistication of modern cyber threats.

πŸ“– Read

via "Dark Reading".
?
14:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Become an ethical hacker for just $13 during this Cyber Week sale 🦿

Now you can learn everything you need to become a master ethical hacker without having to take time away from your current job.

πŸ“– Read

via "Tech Republic".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43202 β€Ό

In JetBrains TeamCity before 2021.1.3, the X-Frame-Options header is missing in some cases.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2021-43998 β€Ό

HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.

πŸ“– Read

via "National Vulnerability Database".
14:37
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for December 2021 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
14:43
πŸ“’ Practicality of UK government’s cyber bill criticised by industry experts πŸ“’

TheΒ Product Security and Telecommunications Infrastructure (PSTI) Bill falls short in several key areas

πŸ“– Read

via "ITPro".