15 December 2021
?
18:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-1003 β€Ό

In adjustStreamVolume of AudioService.java, there is a possible way for unprivileged app to change audio stream volume due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-189857506

πŸ“– Read

via "National Vulnerability Database".
18:46
β€Ό CVE-2021-0956 β€Ό

In NfcTag::discoverTechnologies (activation) of NfcTag.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additionalSystem execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-189942532

πŸ“– Read

via "National Vulnerability Database".
18:46
β€Ό CVE-2021-0918 β€Ό

In gatt_process_notification of gatt_cl.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-197536150

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-0955 β€Ό

In pf_write_buf of FuseDaemon.cpp, there is possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-192085766

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-1043 β€Ό

In TBD of TBD, there is a possible downgrade attack due to under utilized anti-rollback protections. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194697257References: N/A

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-0927 β€Ό

In requestChannelBrowsable of TvInputManagerService.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-8.1 Android-9Android ID: A-189824175

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-0986 β€Ό

In hasGrantedPolicy of DevicePolicyManagerService.java, there is a possible information disclosure about the device owner, profile owner, or device admin due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-192247339

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-39657 β€Ό

In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-1027 β€Ό

In setTransactionState of SurfaceFlinger, there is possible arbitrary code execution in a privileged process due to improper casting. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193033243

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-45078 β€Ό

stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-0926 β€Ό

In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user's consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-191053931

πŸ“– Read

via "National Vulnerability Database".
18:47
β€Ό CVE-2021-39655 β€Ό

Product: AndroidVersions: Android kernelAndroid ID: A-192641593References: N/A

πŸ“– Read

via "National Vulnerability Database".
18:48
β€Ό CVE-2021-1012 β€Ό

In onResume of NotificationAccessDetails.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-195412179

πŸ“– Read

via "National Vulnerability Database".
18:48
β€Ό CVE-2021-39648 β€Ό

In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
18:48
β€Ό CVE-2021-0976 β€Ό

In toBARK of floor0.c, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-199680600

πŸ“– Read

via "National Vulnerability Database".
18:49
β€Ό CVE-2021-1015 β€Ό

In getMeidForSlot of PhoneInterfaceManager.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-186530496

πŸ“– Read

via "National Vulnerability Database".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Relentless Log4j Attacks Include State Actors, Possible Worm ❌

More than 1.8 million attacks, against half of all corporate networks, have already launched to exploit Log4Shell.

πŸ“– Read

via "Threat Post".
?
21:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft πŸ•΄

Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say.

πŸ“– Read

via "Dark Reading".
21:04
πŸ•΄ Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft πŸ•΄

Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.

πŸ“– Read

via "Dark Reading".
16 December 2021
?
03:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45085 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45096 β€Ό

KNIME Analytics Platform before 4.5.0 is vulnerable to XXE (external XML entity injection) via a crafted workflow file (.knwf), aka AP-17730.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45095 β€Ό

pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45100 β€Ό

The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45087 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-44023 β€Ό

A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45086 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45102 β€Ό

An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45101 β€Ό

An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45099 β€Ό

** DISPUTED ** The addon.stdin service in addon-ssh (aka Home Assistant Community Add-on: SSH & Web Terminal) before 10.0.0 has an attack surface that requires social engineering. NOTE: the vendor does not agree that this is a vulnerability; however, addon.stdin was removed as a defense-in-depth measure against complex social engineering situations.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45088 β€Ό

XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45098 β€Ό

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45092 β€Ό

Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.

πŸ“– Read

via "National Vulnerability Database".
03:37
β€Ό CVE-2021-45097 β€Ό

KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content.

πŸ“– Read

via "National Vulnerability Database".
?
05:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rise in API-Based Attacks Underscore Investments in New Tools πŸ•΄

Noname Security's Series C fundraising tips the startup to over $1 billion in valuation, a sign that organizations are beginning to look for API security tools and investor are looking for innovation in the space.

πŸ“– Read

via "Dark Reading".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4121 β€Ό

yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
08:37
β€Ό CVE-2021-4123 β€Ό

livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
?
10:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ How expired web domains help criminal hackers unlock enterprise defenses πŸ—“οΈ

Allow domains to β€˜drop’ and you’re increasing the effectiveness of a variety of attacks

πŸ“– Read

via "The Daily Swig".
?
10:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40835 β€Ό

An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar.

πŸ“– Read

via "National Vulnerability Database".
?
11:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜DarkWatchman’ RAT Shows Evolution in Fileless Malware ❌

The new tool manipulates Windows Registry in unique ways to evade security detections and is likely being used by ransomware groups for initial network access.

πŸ“– Read

via "Threat Post".
?
11:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ UK government reveals plans to become β€˜global cyber power’ in 2022 πŸ—“οΈ

National Cyber Security Centre leads scheme to increase capabilities

πŸ“– Read

via "The Daily Swig".
?
12:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Dear Congress: It's Complicated. Please Consider This When Crafting New Cybersecurity Legislation πŸ•΄

As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this pending legislation?

πŸ“– Read

via "Dark Reading".
?
12:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4124 β€Ό

janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
?
13:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to install the ConfigServer and Security Firewall combo on Ubuntu Server 🦿

If you'd like a powerful firewall for your Ubuntu Server, but one that offers a fairly straightforward configuration, Jack Wallen thinks CSF might be the right tool for the job.

πŸ“– Read

via "Tech Republic".
13:05
πŸ—“οΈ SAP squashes SQL injection, XSS bugs in December patch round πŸ—“οΈ

CVSS severity scores range from 2.4 to 9.9

πŸ“– Read

via "The Daily Swig".
?
14:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3959 β€Ό

A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to proxy requests to the relay server. This issue affects: Bitdefender Bitdefender GravityZone versions prior to 3.3.8.272

πŸ“– Read

via "National Vulnerability Database".
14:36
β€Ό CVE-2021-3960 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects Bitdefender GravityZone versions prior to 3.3.8.272

πŸ“– Read

via "National Vulnerability Database".
14:39
⚠ Apple security updates are out – and not a Log4Shell mention in sight ⚠

Get 'em while they're hot!

πŸ“– Read

via "Naked Security".
?
15:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β™ŸοΈ NY Man Pleads Guilty in $20 Million SIM Swap Theft β™ŸοΈ

A 24-year-old New York man who bragged about helping to steal more than $20 million worth of cryptocurrency from a technology executive has pleaded guilty to conspiracy to commit wire fraud. Nicholas Truglia was part of a group alleged to have stolen more than $100 million from cryptocurrency investors using fraudulent "SIM swaps," scams in which identity thieves hijack a target’s mobile phone number and use that to wrest control over the victim’s online identities.

πŸ“– Read

via "Krebs on Security".
15:06
πŸ•΄ Log4Shell: The Big Picture πŸ•΄

A look at why this is such a tricky vulnerability and why the industry response has been good, but not great.

πŸ“– Read

via "Dark Reading".
15:08
⚠ S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript] ⚠

Latest episode - listen now! (Yes, there are plenty of critical things to go along with Log4Shell.)

πŸ“– Read

via "Naked Security".
?
16:02
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How organizations should prioritize security vulnerabilities 🦿

Organizations are not always linking the actual data on vulnerabilities with the specific risks to their business, says Cyber Vulcan.

πŸ“– Read

via "Tech Republic".
16:08
❌ β€˜PseudoManuscrypt’ Mass Spyware Campaign Targets 35K Systems ❌

It’s similar to Lazarus’s Manuscrypt malware, but the new spyware is splattering itself onto government organizations and ICS in a non-Lazarus-like, untargeted wave of attacks.

πŸ“– Read

via "Threat Post".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41260 β€Ό

Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 do not check for Cross Site Request Forgery attacks. All users are advised to upgrade to 0.9.6 as soon as possible. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-42912 β€Ό

FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command injection vulnerability. This vulnerability allows the attacker, once logged in, to send commands to the operating system as the root user via the ping diagnostic tool, bypassing the IP address field, and concatenating OS commands with a semicolon.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-41962 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Owner fullname parameter in a Send Service Request in vehicle_service.

πŸ“– Read

via "National Vulnerability Database".
16:36
❌ β€˜Tropic Trooper’ Reemerges to Target Transportation Outfits ❌

Analysts warn that the attack group, now known as 'Earth Centaur,' is honing its attacks to go after transportation and government agencies.

πŸ“– Read

via "Threat Post".
?
18:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Turn your basic networking and coding skills into in-demand cybersecurity qualifications 🦿

If you've just started climbing the IT professional career ladder or recently learned a little basic coding, you can quickly turn your experience into lucrative cybersecurity skills for a career upgrade.

πŸ“– Read

via "Tech Republic".
18:35
πŸ•΄ Phorpiex Botnet Variant Spread Across 96 Countries πŸ•΄

A new variant dubbed "Twizt" has hijacked 969 transactions and stolen the equivalent of nearly $500,000 USD.

πŸ“– Read

via "Dark Reading".
18:35
β€Ό CVE-2021-37262 β€Ό

JFinal_cms 5.1.0 is vulnerable to regex injection that may lead to Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
18:35
β€Ό CVE-2020-35210 β€Ό

A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.

πŸ“– Read

via "National Vulnerability Database".
18:35
β€Ό CVE-2020-35211 β€Ό

An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-38244 β€Ό

A regular expression denial of service (ReDoS) vulnerability exits in cbioportal 3.6.21 and older via a POST request to /ProteinArraySignificanceTest.json.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2020-35214 β€Ό

An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2020-35216 β€Ό

An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false member down event messages.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-43837 β€Ό

vault-cli is a configurable command-line interface tool (and python library) to interact with Hashicorp Vault. In versions before 3.0.0 vault-cli features the ability for rendering templated values. When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and is not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. Users are advised to upgrade as soon as possible. For users unable to upgrade a workaround does exist. Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-3179 β€Ό

GGLocker iOS application, contains an insecure data storage of the password hash value which results in an authentication bypass.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-44315 β€Ό

In Bus Pass Management System v1.0, Directory Listing/Browsing is enabled on the web server which allows an attacker to view the sensitive files of the application, for example: Any file which contains sensitive information of the user or server.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-44317 β€Ό

In Bus Pass Management System v1.0, parameters 'pagedes' and `About Us` are affected with a Stored Cross-site scripting vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2020-35213 β€Ό

An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2020-35215 β€Ό

An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-41028 β€Ό

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-42550 β€Ό

In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-26800 β€Ό

Cross Site Request Forgery (CSRF) vulnerability in Change-password.php in phpgurukul user management system in php using stored procedure V1.0, allows attackers to change the password to an arbitrary account.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-43812 β€Ό

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before 1.6.2 do not filter out certain returnTo parameter values from the login url, which expose the application to an open redirect vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-41261 β€Ό

Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to stored cross site scripting attacks via the preferences footer. The preference footer can only be altered by a site admin. This issue has been resolved in the 0.9.6 release and all users are advised to upgrade. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2021-41262 β€Ό

Galette is a membership management web application built for non profit organizations and released under GPLv3. Versions prior to 0.9.6 are subject to SQL injection attacks by users with "member" privilege. Users are advised to upgrade to version 0.9.6 as soon as possible. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
18:36
β€Ό CVE-2020-35209 β€Ό

An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.

πŸ“– Read

via "National Vulnerability Database".
17 December 2021
?
03:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44857 β€Ό

An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn't have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead.

πŸ“– Read

via "National Vulnerability Database".
03:47
β€Ό CVE-2021-41843 β€Ό

An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.

πŸ“– Read

via "National Vulnerability Database".
03:50
β€Ό CVE-2021-45038 β€Ό

An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents.

πŸ“– Read

via "National Vulnerability Database".
?
06:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mobile App Developers Keep Fraudulent Traffic at Bay with Anti-Fraud API πŸ•΄

The new API and SDK from Pixalate helps mobile developers avoid getting their apps delisted from app stores by detecting and blocking fraudulent traffic.

πŸ“– Read

via "Dark Reading".
?
09:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Desjardins data breach: Class action lawsuit agreement reaches $201 million πŸ—“οΈ

Final amount to be confirmed in 2022

πŸ“– Read

via "The Daily Swig".
?
11:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Respect in Security: Anti-harassment infosec industry group gains momentum with code of conduct campaign πŸ—“οΈ

Take the pledge, companies are urged

πŸ“– Read

via "The Daily Swig".
?
11:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Conti Gang Suspected of Ransomware Attack on McMenamins ❌

The incident occurred last weekend at the popular chain of restaurants, hotels and breweries, which is still facing disruptions.

πŸ“– Read

via "Threat Post".
11:33
πŸ›  Google OSS Fuzz πŸ› 

Google's OSS Fuzz tool aims to make common open source software more secure and stable by combining modern fuzzing techniques with scalable, distributed execution.

πŸ“– Read

via "Packet Storm Security".
11:34
πŸ›  TOR Virtual Network Tunneling Tool 0.4.6.9 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Is Data Security Worthless if the Data Life Cycle Lacks Clarity? πŸ•΄

If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.

πŸ“– Read

via "Dark Reading".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4132 β€Ό

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
12:37
β€Ό CVE-2021-43678 β€Ό

Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php.

πŸ“– Read

via "National Vulnerability Database".
12:37
β€Ό CVE-2021-45042 β€Ό

In HashiCorp Vault and Vault Enterprise before 1.7.7, 1.8.x before 1.8.6, and 1.9.x before 1.9.1, clusters using the Integrated Storage backend allowed an authenticated user (with write permissions to a kv secrets engine) to cause a panic and denial of service of the storage backend. The earliest affected version is 1.4.0.

πŸ“– Read

via "National Vulnerability Database".
12:37
β€Ό CVE-2021-42584 β€Ό

A Stored Cross Site Scripting (XSS) issue exists in Convos-Chat before 6.32.

πŸ“– Read

via "National Vulnerability Database".
?
13:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Ukraine hosts large-scale simulation of cyber-attack against energy grid πŸ—“οΈ

SANS Institute’s latest Grid NetWars competition involved 250 security pros from Ukraine

πŸ“– Read

via "The Daily Swig".
13:07
❌ Convergence Ahoy: Get Ready for Cloud-Based Ransomware ❌

Oliver Tavakoli, CTO at Vectra AI, takes us inside the coming nexus of ransomware, supply-chain attacks and cloud deployments.

πŸ“– Read

via "Threat Post".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ S3 Ep63: Log4Shell (what else?) and Apple kernel bugs [Podcast+Transcript] ⚠

Latest episode - listen now! (Yes, there are plenty of critical things to go along with Log4Shell.)

πŸ“– Read

via "Naked Security".
?
14:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How password troubles could cost your online business potential sales 🦿

One in four online shoppers surveyed by Beyond Identity said they'd abandon a shopping cart of $100 or more if they had to reset their password to check out.

πŸ“– Read

via "Tech Republic".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISA Issues Emergency Directive on Log4j πŸ•΄

The Cybersecurity Infrastructure and Security Agency orders federal agencies to take actions to mitigate vulnerabilities to the Apache Log4j flaw and attacks exploiting it.

πŸ“– Read

via "Dark Reading".
14:23
πŸ•΄ Time to Reset the Idea of Zero Trust πŸ•΄

CISOs are increasingly drawn to the zero trust security model, but implementing a frictionless experience is still a challenge.

πŸ“– Read

via "Dark Reading".
14:37
πŸ•΄ PseudoManuscrypt Malware Targeted Government & ICS Systems in 2021 πŸ•΄

The "PseudoManuscrypt" operation infected some 35,000 computers with cyber-espionage malware and targeted computers in both government and private industry.

πŸ“– Read

via "Dark Reading".
14:37
β€Ό CVE-2021-41451 β€Ό

An HTTP/1.1 misconfiguration in web interface of TP-Link AX10v1 before V1_211117 could allow an attacker to send a specially crafted HTTP/0.9 packet that could cause a cache poisoning attack.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2021-44035 β€Ό

Wolters Kluwer TeamMate AM 12.4 Update 1 mishandles attachment uploads, such that an authenticated user may download and execute malicious files.

πŸ“– Read

via "National Vulnerability Database".
?
15:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Timely Questions for Log4j Response Now β€” And for the Future πŸ•΄

EXPERT INSIGHT: How to assess your exposure to the vulnerability with a combination of asset inventory, testing, solid information sources, and software bills of materials (SBOMs).

πŸ“– Read

via "Dark Reading".
15:07
❌ Brand-New Log4Shell Attack Vector Threatens Local Hosts ❌

The discovery, which affects services running as localhost that aren't exposed to any network or the internet, vastly widens the scope of attack possibilities.

πŸ“– Read

via "Threat Post".
15:10
⚠ Serious Security: OpenSSL fixes β€œerror conflation” bugs – how mixing up mistakes can lead to trouble ⚠

Have you ever seen the message "An error occurred"? Even worse, the message "This error cannot occur"? Facts matter!

πŸ“– Read

via "Naked Security".
?
16:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Executive Partnerships Are Critical for Cybersecurity Success πŸ•΄

One leader alone can't protect an organization from cyber threats, C-suite leaders agree.

πŸ“– Read

via "Dark Reading".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37862 β€Ό

Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-32498 β€Ό

SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the pathname of the emulator and use path traversal to run an arbitrary executable located on the host system. When the user starts the emulator from SOPAS ET the corresponding executable will be started instead of the emulator

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-0673 β€Ό

In Audio Aurisys HAL, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05977326; Issue ID: ALPS05977326.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-40851 β€Ό

TCMAN GIM is vulnerable to a lack of authorization in all available webservice methods listed in /PC/WebService.asmx. The exploitation of this vulnerability might allow a remote attacker to obtain information.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-40852 β€Ό

TCMAN GIM is affected by an open redirect vulnerability. This vulnerability allows the redirection of user navigation to pages controlled by the attacker. The exploitation of this vulnerability might allow a remote attacker to obtain information.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-0893 β€Ό

In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05687474.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-0894 β€Ό

In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672038.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-20608 β€Ό

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior allows a remote unauthenticated attacker to cause a DoS condition in GX Works2 by getting GX Works2 to read a tampered program file from a Mitsubishi Electric PLC by sending malicious crafted packets to tamper with the program file.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-37863 β€Ό

Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2021-40853 β€Ό

TCMAN GIM does not perform an authorization check when trying to access determined resources. A remote attacker could exploit this vulnerability to access URL that require privileges without having them. The exploitation of this vulnerability might allow a remote attacker to obtain sensible information.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2020-18078 β€Ό

A vulnerability in /include/web_check.php of SEMCMS v3.8 allows attackers to reset the Administrator account's password.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2020-8968 β€Ό

Parallels Remote Application Server (RAS) allows a local attacker to retrieve certain profile password in clear text format by uploading a previously stored cyphered file by Parallels RAS. The confidentiality, availability and integrity of the information of the user could be compromised if an attacker is able to recover the profile password.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-0674 β€Ό

In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-38883 β€Ό

IBM Business Automation Workflow 18.0, 19.0, 20,0 and 21.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209165.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-32499 β€Ό

SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the command line arguments to pass in any value to the Emulator executable.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-4010 β€Ό

A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-0676 β€Ό

In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-4009 β€Ό

A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
16:37
β€Ό CVE-2021-40850 β€Ό

TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx.

πŸ“– Read

via "National Vulnerability Database".
16:37
❌ Malicious Joker App Scores Half-Million Downloads on Google Play ❌

Joker malware was found lurking in the Color Message app, ready to fleece unsuspecting users with premium SMS charges.

πŸ“– Read

via "Threat Post".
?
17:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spider-Man Movie Release Frenzy Bites Fans with Credit-Card Harvesting ❌

Attackers are using the excitement over the new Spider-Man movie to steal bank information and spread malware. Β 

πŸ“– Read

via "Threat Post".
?
17:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Facebook Bans Spy-for-Hire Firms for Targeting 50K People ❌

Meta, Facebook’s parent company, said that the seven banned actors run fake accounts on its platforms to deceive users and plant malware on targets’ phones.

πŸ“– Read

via "Threat Post".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Meta Acts Against 7 Entities Found Spying on 50,000 Users πŸ•΄

The parent company of Facebook and Instagram has warned some 50,000 account holders they are targets of surveillance.

πŸ“– Read

via "Dark Reading".
?
18:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23797 β€Ό

All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-23803 β€Ό

This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-23450 β€Ό

All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-41496 β€Ό

Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-41495 β€Ό

Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating and sort arrays.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-33430 β€Ό

A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-23814 β€Ό

This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-43840 β€Ό

message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-34141 β€Ό

Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects.

πŸ“– Read

via "National Vulnerability Database".
18:37
β€Ό CVE-2021-43838 β€Ό

jsx-slack is a library for building JSON objects for Slack Block Kit surfaces from JSX. In versions prior to 4.5.1 users are vulnerable to a regular expression denial-of-service (ReDoS) attack. If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. jsx-slack v4.5.1 has patched to a regex for escaping blockquote characters. Users are advised to upgrade as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
?
19:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ How Risky Is the Log4J Vulnerability? πŸ•΄

Security teams around the world are on high alert dealing with the Log4j vulnerability, but how risky is it, really?

πŸ“– Read

via "Dark Reading".
?
20:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-41498 β€Ό

Buffer overflow in ajaxsoundstudio.com Pyo &lt and 1.03 in the Server_jack_init function. which allows attackers to conduct Denial of Service attacks by arbitrary constructing a overlong server name.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-41499 β€Ό

Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-41500 β€Ό

Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.

πŸ“– Read

via "National Vulnerability Database".
20:37
β€Ό CVE-2021-41497 β€Ό

Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket.

πŸ“– Read

via "National Vulnerability Database".
18 December 2021
?
03:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4130 β€Ό

snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
?
08:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4131 β€Ό

livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45105 β€Ό

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3.

πŸ“– Read

via "National Vulnerability Database".
19 December 2021
?
01:03
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ Industry working group aims to standardize blockchain 'Identity of Things' πŸ“’

Universal standards for blockchain-based identities aims to help promote interoperability and communication between IoT devices

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Sennheiser exposed personal data of 28,000 customers with leaky S3 bucket πŸ“’

Server containing full names, email addresses, phone numbers, and supplier information was left open to the public for three years

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Kronos services knocked offline by ransomware attack πŸ“’

The popular human resources solutions provider has admitted that it may take "several weeks" to recover

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Gumtree site code made personal data of users and sellers publicly accessible πŸ“’

Anyone could scan the website's HTML code to reveal personal information belonging to users of the popular second-hand classified adverts website

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Ransomware groups will target smaller businesses in 2022 - report πŸ“’

Scrutiny from law enforcement is causing groups to change tack, says analyst

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Meta expands bug bounty programme to cover data scraping πŸ“’

The move comes two years after a massive scraping incident on Facebook that resulted in data leaking online

πŸ“– Read

via "ITPro".
01:03
πŸ“’ What is the Log4Shell vulnerability? πŸ“’

The critical flaw affecting products built using Java is set to cause headaches in the enterprise for months to come

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Australia and US sign CLOUD Act data-sharing deal to support criminal investigations πŸ“’

The legislation allows law enforcement to simplify the process of obtaining electronic data from another country

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Google to rollout AI-based security across three UK airports πŸ“’

Airports in Aberdeen, Glasgow, and Southampton will test a tool designed to make it easier to spot suspicious packages

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Lenovo ThinkPads vulnerable to privilege escalation exploit, researchers warn πŸ“’

A component running on the popular business computers is vulnerable to a chained exploit that grants full access to attackers

πŸ“– Read

via "ITPro".
01:03
πŸ“’ HMRC suffered 17 data breaches over 15 months πŸ“’

According to a recent report, the breaches affected more than 3,000 individuals

πŸ“– Read

via "ITPro".
01:03
πŸ“’ UK joint committee calls for tougher rules for tech giants πŸ“’

However, IT industry experts suggest Online Safety Bill proposals aren't clear enough for everyday users

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Egyptian exiles targeted with Predator spyware resembling NSO Group's Pegasus πŸ“’

A high-profile politician and journalist have been targeted with spyware likely spread using WhatsApp messages

πŸ“– Read

via "ITPro".
01:03
πŸ“’ How to turn on Windows Defender πŸ“’

Find out how to switch on Windows Defender in Windows 10 and older versions of the OS

πŸ“– Read

via "ITPro".
01:03
πŸ“’ How do hackers choose their targets? πŸ“’

We explore what goes on in the minds of cyber criminals

πŸ“– Read

via "ITPro".
01:03
πŸ“’ Skip the three words thing, go straight for the β€˜use a password manager, dammit’ jugular πŸ“’

Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC

πŸ“– Read

via "ITPro".
01:04
πŸ“’ Five things to consider before choosing an MFA solution πŸ“’

Because we all should move on from using β€œpassword” as a password!

πŸ“– Read

via "ITPro".
01:04
πŸ“’ UK unveils Β£2.6 billion National Cyber Strategy πŸ“’

The strategy prioritises investing in the UK's cyber skills, improving cyber security responses, and disrupting state-backed cyber attacks

πŸ“– Read

via "ITPro".
01:04
πŸ“’ The risks and strategies of using privacy as a business differentiator πŸ“’

With privacy increasingly driving customer decisions, here’s how to make it a differentiator for your business

πŸ“– Read

via "ITPro".
01:04
πŸ“’ Log4Shell: New numbers reveal the scale of the critical software exploit πŸ“’

Researchers detail how much the Log4J vulnerability is being exploited and who is being targeted the most

πŸ“– Read

via "ITPro".
?
16:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4136 β€Ό

vim is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
20 December 2021
?
03:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44159 β€Ό

4MOSAn GCB DoctorÒ€ℒs file upload function has improper user privilege control. A remote attacker can upload arbitrary files including webshell files without authentication and execute arbitrary code in order to perform arbitrary system operations or deny of service attack.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-44162 β€Ό

Chain Sea ai chatbot systemÒ€ℒs specific file download function has path traversal vulnerability. The function has improper filtering of special characters in URL parameters, which allows a remote attacker to download arbitrary system files without authentication.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-44163 β€Ό

Chain Sea ai chatbot backend has improper filtering of special characters in URL parameters, which allows a remote attacker to perform JavaScript injection for XSS (reflected Cross-site scripting) attack without authentication.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-44164 β€Ό

Chain Sea ai chatbot systemÒ€ℒs file upload function has insufficient filtering for special characters in URLs, which allows a remote attacker to by-pass file type validation, upload malicious script and execute arbitrary code without authentication, in order to take control of the system or terminate service.

πŸ“– Read

via "National Vulnerability Database".
?
10:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Log4Shell: The Movie… a short, safe visual tour for work and home ⚠

Be happy that your sysadmins are taking one (three, actually!) for the team right now... here's why!

πŸ“– Read

via "Naked Security".
10:39
β€Ό CVE-2021-41561 β€Ό

Improper Input Validation vulnerability in Parquet-MR of Apache Parquet allows an attacker to DoS by malicious Parquet files. This issue affects Apache Parquet-MR version 1.9.0 and later versions.

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2021-44916 β€Ό

Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim's browser.

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2021-44224 β€Ό

A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).

πŸ“– Read

via "National Vulnerability Database".
10:39
β€Ό CVE-2021-44790 β€Ό

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

πŸ“– Read

via "National Vulnerability Database".
?
12:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Healthcare provider Texas ENT alerts 535,000 patients to data breach πŸ—“οΈ

Unauthorized intruder exfiltrated personal data over a six-day period

πŸ“– Read

via "The Daily Swig".
12:11
πŸ•΄ Zero Trust Shouldn’t Mean Zero Trust in Employees πŸ•΄

Some think zero trust means you cannot or should not trust employees, an approach that misses the mark and sets up everyone for failure.

πŸ“– Read

via "Dark Reading".
?
12:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-8105 β€Ό

OS Command Injection vulnerability in the wirelessConnect handler of Abode iota All-In-One Security Kit allows an attacker to inject commands and gain root access. This issue affects: Abode iota All-In-One Security Kit versions prior to 1.0.2.23_6.9V_dev_t2_homekit_RF_2.0.19_s2_kvsABODE oz.

πŸ“– Read

via "National Vulnerability Database".
?
13:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Security researcher earns plaudits after discovering Yandex SSRF flaw πŸ—“οΈ

Russian language search engine has secured its backend infrastructure

πŸ“– Read

via "The Daily Swig".
13:09
❌ Third Log4J Bug Can Trigger DoS; Apache Issues Patch ❌

The new Log4j vulnerability is similar to Log4Shell in that it also affects the logging library, but this DoS flaw has to do with Context Map lookups, not JNDI.

πŸ“– Read

via "Threat Post".
?
13:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Four Out of Five Organizations Are Increasing Cybersecurity Budgets for 2022 πŸ•΄

Half of security decision makers also say the cyber skills gap will significantly impact their 2022 strategy, according to new research from Neustar.

πŸ“– Read

via "Dark Reading".
13:41
πŸ•΄ Reblaze Appoints New CEO πŸ•΄

Ziv Oren previously held the position of chief operations officer at the company.

πŸ“– Read

via "Dark Reading".
13:41
πŸ•΄ Trend Micro Crowns Champions of 2021 Capture the Flag Competition πŸ•΄

Challenges were designed to address critical areas of cybersecurity, including reversing, cloud, IoT, open source intelligence, forensics, and machine learning.

πŸ“– Read

via "Dark Reading".
?
14:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Surveillance-for-hire: Are you a target of the booming spy business? 🦿

Meta has exposed and acted against entities that have been spying on people and organizations around the globe. Find out how the threat actors operate and learn what you can do to protect yourself.

πŸ“– Read

via "Tech Republic".
14:07
πŸ›  Wapiti Web Application Vulnerability Scanner 3.0.9 πŸ› 

Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities.

πŸ“– Read

via "Packet Storm Security".
?
14:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ SecurityScorecard Research Reveals Cyber Vulnerabilities Pose a Threat to U.S. Maritime Security πŸ•΄

While the shipping industry's cyber posture was better than companies in the Forbes Global 2000, the industry performed lower in key risk group factors.

πŸ“– Read

via "Dark Reading".
14:23
πŸ•΄ BlackBerry Launches New Managed Extended Detection and Response (XDR) Service πŸ•΄

Company partners with Exabeam to launch update to its BlackBerry Guard managed detection and response (MDR) service.

πŸ“– Read

via "Dark Reading".
14:23
πŸ•΄ SAIC Launches Rugged Apps to Provide Secure Commercial Apps to Government Users πŸ•΄

Rugged Apps ensures mobile apps are NIAP-compliant.

πŸ“– Read

via "Dark Reading".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44675 β€Ό

Zoho ManageEngine ServiceDesk Plus MSP before 10.5 Build 10534 is vulnerable to unauthenticated remote code execution due to a filter bypass in which authentication is not required.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-44676 β€Ό

Zoho ManageEngine Access Manager Plus before 4203 allows anyone to view a few data elements (e.g., access control details) and modify a few aspects of the application state.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-44525 β€Ό

Zoho ManageEngine PAM360 before build 5303 allows attackers to modify a few aspects of application state because of a filter bypass in which authentication is not required.

πŸ“– Read

via "National Vulnerability Database".
?
15:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Synthetic identity fraud: What is it and why is it harmful? 🦿

Online consumers can do everything right and still become cyber victims. Learn about synthetic identity fraud and why "buyer beware" is not enough.

πŸ“– Read

via "Tech Republic".
?
16:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Banks Will Have 36 Hours to Disclose Cyber Incidents in 2022 πŸ”

Federal banking regulators recently issued a rule around reporting data incidents that’s scheduled to go into effect in April 2022.

πŸ“– Read

via "".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Robocalls More Than Doubled in 2021, Cost Victims $30B ❌

T-Mobile reported blocking 21 billion scam calls during a record-smashing year for robocalls.

πŸ“– Read

via "Threat Post".
?
18:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NetSPI Adds IoT Penetration Testing to its Suite of Offensive Security Services πŸ•΄

Led by IoT security expert Larry Trowell, the IoT pen-testing services focus on securing ATMs, automotive, medical devices, operational technology, and other embedded systems.

πŸ“– Read

via "Dark Reading".
18:11
πŸ•΄ Brillio Acquires Cedrus Digital to Strengthen Their Digital Transformation Service Capabilities πŸ•΄

The acquisition of Cedrus Digital, with its consulting-led model and over 150 cloud, data and product engineers, primarily in the United States, will further augment Brillio’s nearshore digital transformation capabilities offered for Fortune 500 clients.

πŸ“– Read

via "Dark Reading".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43438 β€Ό

Stored XSS in Signup Form in iResturant 1.0 Allows Remote Attacker to Inject Arbitrary code via NAME and ADDRESS field

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-43441 β€Ό

An HTML Injection Vulnerability in iOrder 1.0 allows the remote attacker to execute Malicious HTML codes via the signup form

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2020-19316 β€Ό

OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-43437 β€Ό

In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It's possible to send requests with arbitrary Host Headers to the first virtual host.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-43439 β€Ό

RCE in Add Review Function in iResturant 1.0 Allows remote attacker to execute commands remotely

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-43440 β€Ό

Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field.

πŸ“– Read

via "National Vulnerability Database".
?
19:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Restrict remote users to a chroot jail in Linux 🦿

Jack Wallen shows you how to restrict server users to a specific directory in Linux.

πŸ“– Read

via "Tech Republic".
?
19:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Conti Ransomware Gang Has Full Log4Shell Attack Chain ❌

Conti has become the first professional-grade, sophisticated ransomware group to weaponize Log4j2, now with a full attack chain.

πŸ“– Read

via "Threat Post".
?
20:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43844 β€Ό

MSEdgeRedirect is a tool to redirect news, search, widgets, weather, and more to a user's default browser. MSEdgeRedirect versions before 0.5.0.1 are vulnerable to Remote Code Execution via specifically crafted URLs. This vulnerability requires user interaction and the acceptance of a prompt. With how MSEdgeRedirect is coded, parameters are impossible to pass to any launched file. However, there are two possible scenarios in which an attacker can do more than a minor annoyance. In Scenario 1 (confirmed), a user visits an attacker controlled webpage; the user is prompted with, and downloads, an executable payload; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and RCE executes the payload the user previously downloaded, if the download path is successfully guessed. In Scenario 2 (not yet confirmed), a user visits an attacked controlled webpage; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and a payload on a remote, attacker controlled, SMB server is executed. The issue was found in the _DecodeAndRun() function, in which I incorrectly assumed _WinAPI_UrlIs() would only accept web resources. Unfortunately, file:/// passes the default _WinAPI_UrlIs check(). File paths are now directly checked for and must fail. There is no currently known exploitation of this vulnerability in the wild. A patched version, 0.5.0.1, has been released that checks for and denies these crafted URLs. There are no workarounds for this issue. Users are advised not to accept any unexpected prompts from web pages.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-35248 β€Ό

It has been reported that any Orion user, e.g. guest accounts can query the Orion.UserSettings entity and enumerate users and their basic settings.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43746 β€Ό

Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose sensitive information on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43030 β€Ό

Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose sensitive information on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-22057 β€Ό

VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 contain an authentication bypass vulnerability. A malicious actor, who has successfully provided first-factor authentication, may be able to obtain second-factor authentication provided by VMware Verify.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43025 β€Ό

Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43846 β€Ό

`solidus_frontend` is the cart and storefront for the Solidus e-commerce project. Versions of `solidus_frontend` prior to 3.1.5, 3.0.5, and 2.11.14 contain a cross-site request forgery (CSRF) vulnerability that allows a malicious site to add an item to the user's cart without their knowledge. Versions 3.1.5, 3.0.5, and 2.11.14 contain a patch for this issue. The patch adds CSRF token verification to the "Add to cart" action. Adding forgery protection to a form that missed it can have some side effects. Other CSRF protection strategies as well as a workaround involving modifcation to config/application.rb` are available. More details on these mitigations are available in the GitHub Security Advisory.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43847 β€Ό

HumHub is an open-source social network kit written in PHP. Prior to HumHub version 1.10.3 or 1.9.3, it could be possible for registered users to become unauthorized members of private Spaces. Versions 1.10.3 and 1.9.3 contain a patch for this issue.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43029 β€Ό

Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43748 β€Ό

Adobe Premiere Rush versions 1.5.16 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43021 β€Ό

Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EXR file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-42808 β€Ό

Improper Access Control in Thales Sentinel Protection Installer could allow a local user to escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43028 β€Ό

Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-38415 β€Ό

Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable a heap-based buffer overflow when parsing a specially crafted project file, which may allow an attacker to execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-22056 β€Ό

VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 and Identity Manager 3.3.5, 3.3.4, and 3.3.3 contain an SSRF vulnerability. A malicious actor with network access may be able to make HTTP requests to arbitrary origins and read the full response.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-44181 β€Ό

Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43023 β€Ό

Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EPS/TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-40784 β€Ό

Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-43750 β€Ό

Adobe Premiere Rush versions 1.5.16 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-44182 β€Ό

Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SVG file.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2021-44697 β€Ό

Adobe Audition versions 14.4 (and earlier), and 22.0 (and earlier)are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MOV file.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2021-44180 β€Ό

Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2021-42809 β€Ό

Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2021-44699 β€Ό

Adobe Audition versions 14.4 (and earlier), and 22.0 (and earlier)are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MP4 file.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2021-44179 β€Ό

Adobe Dimension versions 3.4.3 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
20:15
β€Ό CVE-2021-44183 β€Ό

Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.

πŸ“– Read

via "National Vulnerability Database".
?
20:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Russian National Extradited for Illegal Hacking & Trading πŸ•΄

Vladislav Klyushin was allegedly involved in a global operation to trade on nonpublic data stolen from US computer networks.

πŸ“– Read

via "Dark Reading".
20:55
πŸ•΄ New Log4j Attack Vector Discovered πŸ•΄

Meanwhile, Apache Foundation releases third update to logging tool in 10 days to address yet another flaw.

πŸ“– Read

via "Dark Reading".
?
22:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2019-2370 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2020-11374 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14152 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2020-11375 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2017-11071 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2020-16643 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2020-11373 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2020-11338 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14109 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14102 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14187 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14188 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-2351 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14084 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14166 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2020-11341 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-2384 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-2357 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2019-14142 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:11
β€Ό CVE-2018-13970 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-3682 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16652 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16738 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2019-2362 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-11388 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-11313 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16757 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16677 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16750 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16667 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16742 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16717 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:17
β€Ό CVE-2020-16718 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-16666 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-16798 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-11399 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-11402 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-3706 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-11405 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-11365 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16804 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-14150 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16639 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-2286 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16710 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-2383 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16786 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-2363 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16670 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16672 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16693 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-11395 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-2365 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16737 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-11370 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16769 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-16778 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2020-11403 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-13997 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:21
β€Ό CVE-2019-2344 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16645 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-11348 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16828 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16800 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2019-14158 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16835 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2018-13978 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2018. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16730 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-11349 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16815 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-11362 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2019-14141 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-16780 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2020-16810 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2020-16664 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2020-16706 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2019-14128 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2019-14140 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2020-16651 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
22:24
β€Ό CVE-2019-14143 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
21 December 2021
?
08:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-24846 β€Ό

The get_query() function of the Ni WooCommerce Custom Order Status WordPress plugin before 1.9.7, used by the niwoocos_ajax AJAX action, available to all authenticated users, does not properly sanitise the sort parameter before using it in a SQL statement, leading to an SQL injection, exploitable by any authenticated users, such as subscriber

πŸ“– Read

via "National Vulnerability Database".
08:22
β€Ό CVE-2021-24981 β€Ό

The Directorist WordPress plugin before 7.0.6.2 was vulnerable to Cross-Site Request Forgery to Remote File Upload leading to arbitrary PHP shell uploads in the wp-content/plugins directory.

πŸ“– Read

via "National Vulnerability Database".
08:22
β€Ό CVE-2021-45450 β€Ό

In Mbed TLS before 2.28.0 and 3.x before 3.1.0, psa_cipher_generate_iv and psa_cipher_encrypt allow policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.

πŸ“– Read

via "National Vulnerability Database".
08:22
β€Ό CVE-2021-24956 β€Ό

The Blog2Social: Social Media Auto Post & Scheduler WordPress plugin before 6.8.7 does not sanitise and escape the b2sShowByDate parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-24738 β€Ό

The Logo Carousel WordPress plugin before 3.4.2 does not validate and escape the "Logo Margin" carousel option, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-24907 β€Ό

The Contact Form, Drag and Drop Form Builder for WordPress plugin before 1.8.0 does not escape the status parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-24941 β€Ό

The Popups, Welcome Bar, Optins and Lead Generation Plugin WordPress plugin before 2.0.5 does not sanitise and escape the message_id parameter of the get_message_action_row AJAX action before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-45451 β€Ό

In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-24750 β€Ό

The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks

πŸ“– Read

via "National Vulnerability Database".
08:23
β€Ό CVE-2021-24578 β€Ό

The SportsPress WordPress plugin before 2.7.9 does not sanitise and escape its match_day parameter before outputting back in the Events backend page, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-24739 β€Ό

The Logo Carousel WordPress plugin before 3.4.2 allows users with a role as low as Contributor to duplicate and view arbitrary private posts made by other users via the Carousel Duplication feature

πŸ“– Read

via "National Vulnerability Database".
08:29
β€Ό CVE-2021-24849 β€Ό

The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections

πŸ“– Read

via "National Vulnerability Database".
08:42
πŸ•΄ How is Zero Trust Evolving to be More Continuous in Verifying Trust? πŸ•΄

For zero trust to be successful, organizations need to be able to check user identity, device posture, and overall behavior without adding friction to the experience.

πŸ“– Read

via "Dark Reading".
?
10:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45255 β€Ό

The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.

πŸ“– Read

via "National Vulnerability Database".
10:11
β€Ό CVE-2021-45253 β€Ό

The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed.

πŸ“– Read

via "National Vulnerability Database".
10:11
β€Ό CVE-2021-45252 β€Ό

Multiple SQL injection vulnerabilities are found on Simple Forum-Discussion System 1.0 For example on three applications which are manage_topic.php, manage_user.php, and ajax.php. The attacker can be retrieving all information from the database of this system by using this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Ubisoft confirms Just Dance video game data breach πŸ—“οΈ

Developer said no accounts had been improperly accessed

πŸ“– Read

via "The Daily Swig".
?
11:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 F-Secure uses flaw in at-home COVID-19 test to fake results 🦿

Security researchers used a Bluetooth vulnerability to change negative results to positive.

πŸ“– Read

via "Tech Republic".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FBI: Another Zoho ManageEngine Zero-Day Under Active Attack ❌

APT attackers are using a security vulnerability in ManageEngine Desktop Central to take over servers, deliver malware and establish network persistence.

πŸ“– Read

via "Threat Post".
12:13
β€Ό CVE-2021-4139 β€Ό

pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
12:13
πŸ•΄ The Future of Ransomware πŸ•΄

Focusing on basic security controls and executing them well is the best way to harden your systems against an attack.

πŸ“– Read

via "Dark Reading".
?
12:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Browser security: Google fixes Chrome Site Isolation bypass bug πŸ—“οΈ

Vulnerability in Chrome’s service worker feature created chink in browser’s armor

πŸ“– Read

via "The Daily Swig".
?
13:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ A Year in Microsoft Bugs: The Most Critical, Overlooked & Hard to Patch πŸ•΄

Severe flaws in Microsoft Exchange and Windows Print Spooler stood out amid a wide range of vulnerabilities security teams were forced to prioritize in 2021.

πŸ“– Read

via "Dark Reading".
?
13:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Survey scams rekindled using advertising industry tricks to deliver tailor-made assaults πŸ—“οΈ

More bad men than Mad Men

πŸ“– Read

via "The Daily Swig".
?
14:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Two Active Directory Bugs Lead to Easy Windows Domain Takeover ❌

Microsoft is urging customers to patch two Active Directory domain controller bugs after a PoC tool was publicly released on Dec. 12.

πŸ“– Read

via "Threat Post".
14:23
β€Ό CVE-2012-20001 β€Ό

PrestaShop before 1.5.2 allows XSS via the "<object data='data:text/html" substring in the message field.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-45090 β€Ό

Stormshield Endpoint Security before 2.1.2 allows remote code execution.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-45089 β€Ό

Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
14:23
β€Ό CVE-2021-45091 β€Ό

Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control.

πŸ“– Read

via "National Vulnerability Database".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apache’s other product: Critical bugs in β€˜httpd’ web server, patch now! ⚠

The Apache web server just got an update - this one is nothing to do with Log4j!

πŸ“– Read

via "Naked Security".
15:10
⚠ Log4Shell: The Movie… a short, safe visual tour for work and home ⚠

Be happy that your sysadmins are taking one (three, actually!) for the team right now... here's why!

πŸ“– Read

via "Naked Security".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43587 β€Ό

Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-36350 β€Ό

Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain an authentication bypass by primary weakness in one of the authentication factors. A remote unauthenticated attacker may potentially exploit this vulnerability and bypass one of the factors of authentication.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-36318 β€Ό

Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-45291 β€Ό

The gf_dump_setup function in GPAC 1.0.1 allows malicoius users to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-27451 β€Ό

Mesa Labs AmegaView Versions 3.0 and priorÒ€ℒs passcode is generated by an easily reversible algorithm, which may allow an attacker to gain access to the device.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-36317 β€Ό

Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-45289 β€Ό

A vulnerability exists in GPAC 1.0.1 due to an omission of security-relevant Information, which could cause a Denial of Service. The program terminates with signal SIGKILL.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44876 β€Ό

Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to User enumeration. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. This issue occurs during the identification of the correct tenant for a given user, where a difference in messages could allow an attacker to determine if the given user is valid or not, enabling a brute force attack with valid users.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-27447 β€Ό

Mesa Labs AmegaView version 3.0 is vulnerable to a command injection, which may allow an attacker to remotely execute arbitrary code.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44875 β€Ό

Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to User enumeration. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. This issue occurs during the password recovery procedure for a given user, where a difference in messages could allow an attacker to determine if the given user is valid or not, enabling a brute force attack with valid users.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44877 β€Ό

Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-45290 β€Ό

A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-45292 β€Ό

The gf_isom_hint_rtp_read function in GPAC 1.0.1 allows attackers to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2020-19770 β€Ό

A cross-site scripting (XSS) vulnerability in the system bulletin component of WUZHI CMS v4.1.0 allows attackers to steal the admin's cookie.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-27445 β€Ό

Mesa Labs AmegaView Versions 3.0 and prior has insecure file permissions that could be exploited to escalate privileges on the device.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-36341 β€Ό

Dell Wyse Device Agent version 14.5.4.1 and below contain a sensitive data exposure vulnerability. A local authenticated user with low privileges could potentially exploit this vulnerability in order to access sensitive information.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-45288 β€Ό

A Double Free vulnerability exists in filedump.c in GPAC 1.0.1, which could cause a Denail of Service via a crafted file in the MP4Box command.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-36316 β€Ό

Dell EMC Avamar Server versions 18.2, 19.1, 19.2, 19.3, and 19.4 contain an improper privilege management vulnerability in AUI. A malicious user with high privileges could potentially exploit this vulnerability, leading to the disclosure of the AUI info and performing some unauthorized operation on the AUI.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-45293 β€Ό

A Denial of Service vulnerability exists in Binaryen 103 due to an Invalid memory address dereference in wasm::WasmBinaryBuilder::visitLet.

πŸ“– Read

via "National Vulnerability Database".
16:12
β€Ό CVE-2021-44207 β€Ό

Acclaim USAHERDS through 7.4.0.1 uses hard-coded credentials.

πŸ“– Read

via "National Vulnerability Database".
?
17:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Half-Billion Compromised Credentials Lurking on Open Cloud Server ❌

A quarter-billion of those passwords were not seen in previous breaches that have been added to Have I Been Pwned.

πŸ“– Read

via "Threat Post".
?
18:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Java Code Repository Riddled with Hidden Log4j Bugs; Here’s Where to Look ❌

There are 17,000npatched Log4j packages in the Maven Central ecosystem, leaving massive supply-chain risk on the table from Log4Shell exploits.

πŸ“– Read

via "Threat Post".
18:13
β€Ό CVE-2021-45297 β€Ό

An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-44859 β€Ό

An out-of-bounds read vulnerability exists when reading a TGA file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TGA files. An unchecked input data from a crafted TGA file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-38893 β€Ό

IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209512.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-44422 β€Ό

An Improper Input Validation Vulnerability exists when reading a BMP file using Open Design Alliance Drawings SDK before 2022.12. Crafted data in a BMP file can trigger a write operation past the end of an allocated buffer, or lead to a heap-based buffer overflow. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-38900 β€Ό

IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 could allow a privileged user to obtain highly sensitive information due to improper access controls. IBM X-Force ID: 209607.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-44423 β€Ό

An out-of-bounds read vulnerability exists when reading a BMP file using Open Design Alliance (ODA) Drawings Explorer before 2022.12. The specific issue exists after loading BMP files. Unchecked input data from a crafted BMP file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-38966 β€Ό

IBM Cloud Pak for Automation 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212357.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-44860 β€Ό

An out-of-bounds read vulnerability exists when reading a TIF file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TIF files. An unchecked input data from a crafted TIF file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
18:13
β€Ό CVE-2021-44917 β€Ό

A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash.

πŸ“– Read

via "National Vulnerability Database".
?
20:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44925 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44922 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44920 β€Ό

An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44923 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44927 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44918 β€Ό

A Null Pointer Dereference vulnerability exists in gpac 1.1.0 in the gf_node_get_field function, which can cause a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44926 β€Ό

A null pointer dereference vulnerability exists in the gpac in the gf_node_get_tag function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44921 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44919 β€Ό

A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_alloc function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
20:17
β€Ό CVE-2021-44924 β€Ό

An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
?
21:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to check if your Linux servers are vulnerable to the Log4j flaw with a single command 🦿

Jack Wallen shows you a quick way to test if your Linux servers are vulnerable to the Log4j vulnerability.

πŸ“– Read

via "Tech Republic".
?
22:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43851 β€Ό

Anuko Time Tracker is an open source, web-based time tracking application written in PHP. SQL injection vulnerability exist in multiple files in Time Tracker version 1.19.33.5606 and prior due to not properly checking of the "group" and "status" parameters in POST requests. Group parameter is posted along when navigating between organizational subgroups (groups.php file). Status parameter is used in multiple files to change a status of an entity such as making a project, task, or user inactive. This issue has been patched in version 1.19.33.5607. An upgrade is highly recommended. If an upgrade is not practical, introduce ttValidStatus function as in the latest version and start using it user input check blocks wherever status field is used. For groups.php fix, introduce ttValidInteger function as in the latest version and use it in the access check block in the file.

πŸ“– Read

via "National Vulnerability Database".
22 December 2021
?
00:05
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ“’ NCA donates 225 million passwords to Have I Been Pwned πŸ“’

The move comes as both UK and US national crime-fighting agencies collaborate with the popular compromised credential checker

πŸ“– Read

via "ITPro".
00:05
πŸ“’ Google Cloud extends partnership with Minsait πŸ“’

New deal will help improve digital sovereignty in Spain’s public and private sector organizations

πŸ“– Read

via "ITPro".
00:05
πŸ“’ What is the Log4Shell vulnerability? πŸ“’

The critical flaw affecting products built using Java is set to cause headaches in the enterprise for months to come

πŸ“– Read

via "ITPro".
00:05
πŸ“’ T-Mobile: Scam calls hit an all-time high in 2021 πŸ“’

The carrier reported a 116% increase in fraudulent calls compared to 2020

πŸ“– Read

via "ITPro".
00:05
πŸ“’ Hackers bypass patched Microsoft Office flaw to inject Formbook malware πŸ“’

The attack is thought to be a dry run for a wider campaign in the future

πŸ“– Read

via "ITPro".
00:05
πŸ“’ Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp πŸ“’

The company is seeking $500,000 from the unnamed threat actors that ran phishing scam on its platforms

πŸ“– Read

via "ITPro".
00:05
πŸ“’ IT Pro 20/20: Does the UK stand a chance in the global AI race? πŸ“’

Lofty goals and a rich history in computer science may not be enough to stay relevant

πŸ“– Read

via "ITPro".
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-40836 β€Ό

A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine. Fixed in Capricorn update 2021-12-13_07.

πŸ“– Read

via "National Vulnerability Database".
?
10:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Multiple vulnerabilities in Microsoft Teams could spoof URLs, leak IP addresses πŸ—“οΈ

Only one of the issues has so far been patched

πŸ“– Read

via "The Daily Swig".
?
11:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Four Bugs in Microsoft Teams Left Platform Vulnerable Since March ❌

Attackers exploiting bugs in the β€œlink preview” feature in Microsoft Teams could abuse the flaws to spoof links, leak an Android user’s IP address and launch a DoS attack.

πŸ“– Read

via "Threat Post".
?
12:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36750 β€Ό

ENC DataVault 7.1.1W and VaultAPI v67, which is currently being used in various other applications, mishandles key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names).

πŸ“– Read

via "National Vulnerability Database".
12:18
β€Ό CVE-2021-40612 β€Ό

An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/application/controllers/util.php allows an attacker perform command execution without echoes.

πŸ“– Read

via "National Vulnerability Database".
?
12:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Anti-cheating browser extension fails web security examination πŸ—“οΈ

XSS flaw in Proctorio gets resolved

πŸ“– Read

via "The Daily Swig".
?
13:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Conti ransomware is exploiting the Log4Shell vulnerability to the tune of millions 🦿

Log4Shell is a dangerous security concern β€” and now Conti, a prominent ransomware group, is exploiting it to attack vulnerable servers to extort millions of dollars.

πŸ“– Read

via "Tech Republic".
13:36
πŸ—“οΈ Bug bounty platforms handling thousands of Log4j vulnerability reports πŸ—“οΈ

Leading platforms report back from the front line as vendors grapple with landmark bug Bug bounty hunters have already submitted thousands of vulnerability reports related to the Apache Log4j bug that

πŸ“– Read

via "The Daily Swig".
?
14:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45418 β€Ό

Certain Starcharge products are vulnerable to Directory Traversal via main.cgi. The affected products include: Nova 360 Cabinet <=1.3.0.0.6 - Fixed: 1.3.0.0.9 and Titan 180 Premium <=1.3.0.0.7b102 - Fixed: Beta1.3.0.1.0.

πŸ“– Read

via "National Vulnerability Database".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Apache’s other product: Critical bugs in β€˜httpd’ web server, patch now! ⚠

The Apache web server just got an update - this one is nothing to do with Log4j!

πŸ“– Read

via "Naked Security".
?
15:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Plundered bitcoins recovered by FBI – all 3,879-and-one-sixth of them! ⚠

Phew! An audacious crime... that didn't work out.

πŸ“– Read

via "Naked Security".
15:11
❌ Critical Apache HTTPD Server Bugs Could Lead to RCE, DoS ❌

Don't freak: It's got nothing to do with Log4Shell, except it may be just as far-reaching as Log4j, given HTTPD's tendency to tiptoe into software projects.

πŸ“– Read

via "Threat Post".
?
15:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ PYSA Emerges as Top Ransomware Actor in November ❌

Overtaking the Conti ransomware gang, PYSA finds success with government-sector attacks.

πŸ“– Read

via "Threat Post".
15:41
❌ All in One SEO Plugin Bug Threatens 3M Websites with Takeovers ❌

A critical privilege-escalation vulnerability could lead to backdoors for admin access nesting in web servers.

πŸ“– Read

via "Threat Post".
?
16:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Time to Ditch Big-Brother Accounts for Network Scanning ❌

Yaron Kassner, CTO and co-founder of Silverfort, discusses why using all-seeing privileged accounts for monitoring is bad practice.

πŸ“– Read

via "Threat Post".
16:18
β€Ό CVE-2021-39013 β€Ό

IBM Cloud Pak for Security (CP4S) 1.7.2.0, 1.7.1.0, and 1.7.0.0 could allow an authenticated user to obtain sensitive information in HTTP responses that could be used in further attacks against the system. IBM X-Force ID: 213651.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45260 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 in the lsr_read_id.part function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-44659 β€Ό

Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF)

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-4113 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45419 β€Ό

Certain Starcharge products are affected by Improper Input Validation. The affected products include: Nova 360 Cabinet <= 1.3.0.0.7b102 - Fixed: Beta1.3.0.1.0 and Titan 180 Premium <= 1.3.0.0.6 - Fixed: 1.3.0.0.9.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-44733 β€Ό

A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45258 β€Ό

A stack overflow vulnerability exists in gpac 1.1.0 via the gf_bifs_dec_proto_list function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-43630 β€Ό

Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-43156 β€Ό

In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-43158 β€Ό

In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45267 β€Ό

An invalid memory address dereference vulnerability exists in gpac 1.1.0 via the svg_node_start function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-4114 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-43155 β€Ό

Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45257 β€Ό

An infinite loop vulnerability exists in nasm 2.16rc0 via the gpaste_tokens function.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-43628 β€Ό

Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45266 β€Ό

A null pointer dereference vulnerability exists in gpac 1.1.0 via the lsr_read_anim_values_ex function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
16:18
β€Ό CVE-2021-45262 β€Ό

An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_command_del function, which causes a segmentation fault and application crash.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-43629 β€Ό

Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-43157 β€Ό

Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.

πŸ“– Read

via "National Vulnerability Database".
16:19
β€Ό CVE-2021-37706 β€Ό

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victimÒ€ℒs network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victimÒ€ℒs machine. Users are advised to upgrade as soon as possible. There are no known workarounds.

πŸ“– Read

via "National Vulnerability Database".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-21934 β€Ό

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at Γ’β‚¬Λœimei_filterÒ€ℒ parameter. This can be done as any authenticated user or through cross-site request forgery.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21878 β€Ό

A local file inclusion vulnerability exists in the Web Manager Applications and FsBrowse functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted series of HTTP requests can lead to local file inclusion. An attacker can make a series of authenticated HTTP requests to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21906 β€Ό

Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called Ò€œCMA ConnectҀ�, to interact with the iC Module on behalf of the user. Every time a user submits a password to the CLI password prompt, the buffer containing their input is passed as the password parameter to the checkPassword function.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21909 β€Ό

Specially-crafted command line arguments can lead to arbitrary file deletion in the del .cnt|.log file delete command. An attacker can provide malicious inputs to trigger this vulnerability

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21901 β€Ό

A stack-based buffer overflow vulnerability exists in the CMA check_udp_crc function of Garrett Metal DetectorsÒ€ℒ iC Module CMA Version 5.0. A specially-crafted packet can lead to a stack-based buffer overflow during a call to memcpy. An attacker can send a malicious packet to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21922 β€Ό

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at Γ’β‚¬Λœusername_filterÒ€ℒ parameter with the administrative account or through cross-site request forgery.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21892 β€Ό

A stack-based buffer overflow vulnerability exists in the Web Manager FsUnmount functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-40418 β€Ό

When parsing a file that is submitted to the DPDecoder service as a job, the R3D SDK will mistakenly skip over the assignment of a property containing an object referring to a UUID that was parsed from a frame within the video container. Upon destruction of the object that owns it, the uninitialized member will be dereferenced and then destroyed using the objectÒ€ℒs virtual destructor. Due to the object property being uninitialized, this can result in dereferencing an arbitrary pointer for the objectÒ€ℒs virtual method table, which can result in code execution under the context of the application.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21903 β€Ό

A stack-based buffer overflow vulnerability exists in the CMA check_udp_crc function of Garrett Metal DetectorsÒ€ℒ iC Module CMA Version 5.0. A specially-crafted packet can lead to a stack-based buffer overflow during a call to strcpy. An attacker can send a malicious packet to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21880 β€Ό

A directory traversal vulnerability exists in the Web Manager FsCopyFile functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to local file inclusion. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21916 β€Ό

An exploitable SQL injection vulnerability exist in the Γ’β‚¬Λœgroup_listÒ€ℒ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filterÒ€ℒ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21904 β€Ό

A directory traversal vulnerability exists in the CMA CLI setenv command of Garrett Metal DetectorsÒ€ℒ iC Module CMA Version 5.0. An attacker can provide malicious input to trigger this vulnerability

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21927 β€Ό

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at Γ’β‚¬Λœloc_filterÒ€ℒ parameter.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21883 β€Ό

An OS command injection vulnerability exists in the Web Manager Diagnostics: Ping functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-40393 β€Ό

An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21895 β€Ό

A directory traversal vulnerability exists in the Web Manager FsTFtp functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to FsTFtp file overwrite. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21912 β€Ό

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21879 β€Ό

A directory traversal vulnerability exists in the Web Manager File Upload functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary file overwrite. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21875 β€Ό

A specially-crafted HTTP request can lead to arbitrary command execution in EC keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21907 β€Ό

A directory traversal vulnerability exists in the CMA CLI getenv command functionality of Garrett Metal DetectorsÒ€ℒ iC Module CMA Version 5.0. A specially-crafted command line argument can lead to local file inclusion. An attacker can provide malicious input to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
?
20:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43853 β€Ό

Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details.

πŸ“– Read

via "National Vulnerability Database".
?
22:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-20601 β€Ό

An issue in ThinkCMF X2.2.2 and below allows attackers to execute arbitrary code via a crafted packet.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20425 β€Ό

S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in the search function.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20598 β€Ό

A cross-site scripting (XSS) vulnerability in the Editing component of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20593 β€Ό

A cross-site request forgery (CSRF) in Rockoa v1.9.8 allows an authenticated attacker to arbitrarily add an administrator account.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20605 β€Ό

Blog CMS v1.0 contains a cross-site scripting (XSS) vulnerability in the /controller/CommentAdminController.java component.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20426 β€Ό

S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in /function/booksave.php.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20600 β€Ό

MetInfo 7.0 beta contains a stored cross-site scripting (XSS) vulnerability in the $name parameter of admin/?n=column&c=index&a=doAddColumn.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20595 β€Ό

A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add.

πŸ“– Read

via "National Vulnerability Database".
22:18
β€Ό CVE-2020-20597 β€Ό

A cross-site scripting (XSS) vulnerability in the potrtalItemName parameter in \web\PortalController.java of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.

πŸ“– Read

via "National Vulnerability Database".
23 December 2021
?
08:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44548 β€Ό

An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.

πŸ“– Read

via "National Vulnerability Database".
08:19
β€Ό CVE-2021-45463 β€Ό

GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load.

πŸ“– Read

via "National Vulnerability Database".
08:19
β€Ό CVE-2021-4144 β€Ό

TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.

πŸ“– Read

via "National Vulnerability Database".
?
11:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ US clothing supplier Pro Wrestling Tees hit by data breach πŸ—“οΈ

Law enforcement alerted company to compromise of payment card info

πŸ“– Read

via "The Daily Swig".
11:41
⚠ Plundered bitcoins recovered by FBI – all 3,879-and-one-sixth of them! ⚠

Phew! An audacious crime... that didn't work out.

πŸ“– Read

via "Naked Security".
?
12:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ β€˜Spider-Man: No Way Home’ Download Installs Cryptominer ❌

The origin of the Monero cryptominer file has been traced to a Russian torrent website, researchers report.

πŸ“– Read

via "Threat Post".
12:19
β€Ό CVE-2021-44600 β€Ό

The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.

πŸ“– Read

via "National Vulnerability Database".
12:19
β€Ό CVE-2021-44599 β€Ό

The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system.

πŸ“– Read

via "National Vulnerability Database".
?
12:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Wireless coexistence – New attack technique exploits Bluetooth, WiFi performance features for β€˜inter-chip privilege escalation’ πŸ—“οΈ

Attackers can use connections between wireless chips to steal data or credentials, researchers find

πŸ“– Read

via "The Daily Swig".
?
13:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Telegram Abused to Steal Crypto-Wallet Credentials ❌

Attackers use the Telegram handle β€œSmokes Night” to spread the malicious Echelon infostealer, which steals credentials for cryptocurrency and other user accounts, researchers said.

πŸ“– Read

via "Threat Post".
?
13:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to deploy a Bitwarden server with Docker 🦿

Are you looking to deploy an in-house password manager server? Jack Wallen shows you how with Bitwarden and Docker.

πŸ“– Read

via "Tech Republic".
13:36
πŸ—“οΈ Popular WordPress platform Flywheel vulnerable to subdomain takeover πŸ—“οΈ

Malicious actors could wreak havoc by impersonating legitimate websites

πŸ“– Read

via "The Daily Swig".
?
14:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44526 β€Ό

Zoho ManageEngine ServiceDesk Plus before 12003 allows authentication bypass in certain admin configurations.

πŸ“– Read

via "National Vulnerability Database".
14:19
β€Ό CVE-2021-23175 β€Ό

NVIDIA GeForce Experience contains a vulnerability in user authorization, where GameStream does not correctly apply individual user access controls for users on the same device, which, with user intervention, may lead to escalation of privileges, information disclosure, data tampering, and denial of service, affecting other resources beyond the intended security authority of GameStream.

πŸ“– Read

via "National Vulnerability Database".
14:19
β€Ό CVE-2021-3892 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
?
15:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The cool retro phone with a REAL DIAL… plus plenty of IoT problems ⚠

You know you want one, because this retro phone is NOT A TOY... except when it comes to cybersecurity.

πŸ“– Read

via "Naked Security".
?
16:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 4-Year-Old Microsoft Azure Zero-Day Exposes Web App Source Code ❌

The security vulnerability could expose passwords and access tokens, along with blueprints for internal infrastructure and finding software vulnerabilities.

πŸ“– Read

via "Threat Post".
16:21
β€Ό CVE-2021-43854 β€Ό

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this class, or these two functions, are vulnerable to the ReDoS attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability. For users unable to upgrade the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit.

πŸ“– Read

via "National Vulnerability Database".
16:21
β€Ό CVE-2021-4118 β€Ό

pytorch-lightning is vulnerable to Deserialization of Untrusted Data

πŸ“– Read

via "National Vulnerability Database".
16:21
β€Ό CVE-2021-43849 β€Ό

cordova-plugin-fingerprint-aio is a plugin provides a single and simple interface for accessing fingerprint APIs on both Android 6+ and iOS. In versions prior to 5.0.1 The exported activity `de.niklasmerz.cordova.biometric.BiometricActivity` can cause the app to crash. This vulnerability occurred because the activity didn't handle the case where it is requested with invalid or empty data which results in a crash. Any third party app can constantly call this activity with no permission. A 3rd party app/attacker using event listener can continually stop the app from working and make the victim unable to open it. Version 5.0.1 of the cordova-plugin-fingerprint-aio doesn't export the activity anymore and is no longer vulnerable. If you want to fix older versions change the attribute android:exported in plugin.xml to false. Please upgrade to version 5.0.1 as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Grinch bots hijack all kinds of holiday shopping, from gift cards to hype drop sales 🦿

Kasada research finds that all-in-one bots are fooling cyberdefenses and automating the checkout process to snap up in-demand goods.

πŸ“– Read

via "Tech Republic".
?
18:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4024 β€Ό

A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44543 β€Ό

An XSS vulnerability was found in Privoxy which was fixed in cgi_error_no_template() by encode the template name when Privoxy is configured to servce the user-manual itself.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-40161 β€Ό

A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDF earlier than 9.0.7 version.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-43984 β€Ό

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2019-8702 β€Ό

This issue was addressed with a new entitlement. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra, iOS 12.4, tvOS 12.4. A local user may be able to read a persistent account identifier.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2020-3886 β€Ό

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. A malicious application may be able to execute arbitrary code with kernel privileges.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2017-13835 β€Ό

A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS High Sierra 10.13. An application may be able to execute arbitrary code with elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-20318 β€Ό

The HornetQ component of Artemis in EAP 7 was not updated with the fix for CVE-2016-4978. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2020-3896 β€Ό

This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. A malicious application may be able to overwrite arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2017-13905 β€Ό

A race condition was addressed with additional validation. This issue is fixed in tvOS 11.2, iOS 11.2, macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan, watchOS 4.2. An application may be able to gain elevated privileges.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-23198 β€Ό

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-27007 β€Ό

NetApp Virtual Desktop Service (VDS) when used with an HTML5 gateway is susceptible to a vulnerability which when successfully exploited could allow an unauthenticated attacker to takeover a Remote Desktop Session.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2018-4478 β€Ό

A validation issue was addressed with improved logic. This issue is fixed in macOS High Sierra 10.13.5, Security Update 2018-003 Sierra, Security Update 2018-003 El Capitan. An attacker with physical access to a device may be able to elevate privileges.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2018-4302 β€Ό

A null pointer dereference was addressed with improved validation. This issue is fixed in macOS High Sierra 10.13, iCloud for Windows 7.0, watchOS 4, iOS 11, iTunes 12.7 for Windows. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-3584 β€Ό

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-43989 β€Ό

mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44540 β€Ό

A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-44453 β€Ό

mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2017-13892 β€Ό

An issue existed in the handling of Contact sharing. This issue was addressed with improved handling of user information. This issue is fixed in macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan. Sharing contact information may lead to unexpected data sharing.

πŸ“– Read

via "National Vulnerability Database".
18:19
β€Ό CVE-2021-35243 β€Ό

The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.6 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity.

πŸ“– Read

via "National Vulnerability Database".
24 December 2021
?
08:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-20876 β€Ό

Path traversal vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows an attacker with an administrative privilege to obtain sensitive information stored in the hierarchy above the directory on the published site's server via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-20827 β€Ό

Plaintext storage of a password vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the attacker may access the PLC Web server and hijack the PLC, and manipulation of the PLC output and/or suspension of the PLC may be conducted.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-20874 β€Ό

Incorrect permission assignment for critical resource vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to access arbitrary files on the server and obtain sensitive information via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-20875 β€Ό

Open redirect vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks by having a user to access a specially crafted URL.

πŸ“– Read

via "National Vulnerability Database".
08:20
β€Ό CVE-2021-20826 β€Ό

Unprotected transport of credentials vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from the communication between the PLC and the software. As a result, the complete access privileges to the PLC Web server may be obtained, and manipulation of the PLC output and/or suspension of the PLC may be conducted.

πŸ“– Read

via "National Vulnerability Database".
?
10:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-23772 β€Ό

This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.

πŸ“– Read

via "National Vulnerability Database".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ #12DaysofSwigmas – Happy Holidays from The Daily Swig πŸ—“οΈ

On the 12th Day of Swigmas, The Daily Swig gave to me…

πŸ“– Read

via "The Daily Swig".
12:20
β€Ό CVE-2021-4072 β€Ό

elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
?
13:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ The cool retro phone with a REAL DIAL… plus plenty of IoT problems ⚠

You know you want one, because this retro phone is NOT A TOY... except when it comes to cybersecurity.

πŸ“– Read

via "Naked Security".
?
15:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Switch to a well-paid tech career in 2022: Check out these 200+ IT courses 🦿

Training for a lucrative tech career is easier and less expensive than you might think. Check out these online courses on programming, cybersecurity, project management and more.

πŸ“– Read

via "Tech Republic".
15:12
⚠ SFW! The Top N Cyber­security Stories of 2021 (for small positive integer values of N) ⚠

Happy Holidays! Our Top N stories, all totally SFW!

πŸ“– Read

via "Naked Security".
25 December 2021
?
22:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37567 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-32468 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37560 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-32469 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37565 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37562 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37583 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37584 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37571 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37570 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37561 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-35055 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37572 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37566 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37568 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37569 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37563 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-32467 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-41788 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-12-13 and other devices, mishandle attempts at Wi-Fi authentication flooding.

πŸ“– Read

via "National Vulnerability Database".
22:22
β€Ό CVE-2021-37564 β€Ό

MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols.

πŸ“– Read

via "National Vulnerability Database".
26 December 2021
?
03:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45655 β€Ό

NETGEAR R6400 devices before 1.0.1.70 are affected by server-side injection.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45631 β€Ό

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45528 β€Ό

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R6300v2 before 1.0.4.52, R6400 before 1.0.1.52, R6900 before 1.0.2.8, R7000 before 1.0.9.88, R7900 before 1.0.3.18, R8000 before 1.0.4.46, R7900P before 1.4.1.50, R8000P before 1.4.1.50, RAX75 before 1.0.3.88, RAX80 before 1.0.3.88, and WNR3500Lv2 before 1.2.0.62.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45571 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45654 β€Ό

NETGEAR XR1000 devices before 1.0.0.58 are affected by disclosure of sensitive information.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45632 β€Ό

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45611 β€Ό

Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects DC112A before 1.0.0.52, R6400 before 1.0.1.68, RAX200 before 1.0.3.106, WNDR3400v3 before 1.0.1.38, XR300 before 1.0.3.68, R8500 before 1.0.2.144, RAX75 before 1.0.3.106, R8300 before 1.0.2.144, and RAX80 before 1.0.3.106.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45523 β€Ό

NETGEAR R7000 devices before 1.0.9.42 are affected by a buffer overflow by an authenticated user.

πŸ“– Read

via "National Vulnerability Database".
03:32
β€Ό CVE-2021-45567 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45590 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45630 β€Ό

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45669 β€Ό

Certain NETGEAR devices are affected by stored XSS. This affects RAX200 before 1.0.3.106, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45570 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45597 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45542 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45511 β€Ό

Certain NETGEAR devices are affected by authentication bypass. This affects AC2100 before 2021-08-27, AC2400 before 2021-08-27, AC2600 before 2021-08-27, D7000 before 2021-08-27, R6220 before 2021-08-27, R6230 before 2021-08-27, R6260 before 2021-08-27, R6330 before 2021-08-27, R6350 before 2021-08-27, R6700v2 before 2021-08-27, R6800 before 2021-08-27, R6850 before 2021-08-27, R6900v2 before 2021-08-27, R7200 before 2021-08-27, R7350 before 2021-08-27, R7400 before 2021-08-27, and R7450 before 2021-08-27.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45587 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45659 β€Ό

Certain NETGEAR devices are affected by server-side injection. This affects RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45596 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45546 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, and RBS850 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45652 β€Ό

Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45537 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user . This affects RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45524 β€Ό

NETGEAR R8000 devices before 1.0.4.62 are affected by a buffer overflow by an authenticated user.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45585 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45610 β€Ό

Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D6220 before 1.0.0.66, D6400 before 1.0.0.100, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.52, DGN2200v4 before 1.0.0.118, EAX80 before 1.0.1.64, R6250 before 1.0.4.48, R7000 before 1.0.11.110, R7100LG before 1.0.0.72, R7900 before 1.0.4.30, R7960P before 1.4.1.64, R8000 before 1.0.4.62, RAX200 before 1.0.3.106, RS400 before 1.5.1.80, XR300 before 1.0.3.68, R6400v2 before 1.0.4.106, R7000P before 1.3.2.132, R8000P before 1.4.1.64, RAX20 before 1.0.2.82, RAX45 before 1.0.2.82, RAX80 before 1.0.3.106, R6700v3 before 1.0.4.106, R6900P before 1.3.2.132, R7900P before 1.4.1.64, RAX15 before 1.0.2.82, RAX50 before 1.0.2.82, and RAX75 before 1.0.3.106.

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45535 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.3.106, RAX80 before 1.0.3.106, RAX75 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-45527 β€Ό

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.68, D6400 before 1.0.0.102, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.54, EX7000 before 1.0.1.94, EX7500 before 1.0.0.72, R6250 before 1.0.4.48, R6300v2 before 1.0.4.52, R6400 before 1.0.1.70, R6400v2 before 1.0.4.102, R6700v3 before 1.0.4.102, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7850 before 1.0.5.68, R7900 before 1.0.4.30, R7960P before 1.4.1.68, R8000 before 1.0.4.52, RAX200 before 1.0.2.88, RBS40V before 2.6.2.4, RS400 before 1.5.1.80, XR300 before 1.0.3.56, R7000P before 1.3.2.124, R8000P before 1.4.1.68, R8500 before 1.0.2.144, RAX80 before 1.0.3.102, R6900P before 1.3.2.124, R7900P before 1.4.1.68, R8300 before 1.0.2.144, RAX75 before 1.0.3.102, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-45529 β€Ό

Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects CBR40 before 2.3.5.12, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, R6400 before 1.0.1.70, R7000 before 1.0.11.126, R6900P before 1.3.2.124, R7000P before 1.3.2.124, R7900 before 1.0.4.30, R8000 before 1.0.4.52, and WNR3500Lv2 before 1.2.0.62.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-45622 β€Ό

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, EX7500 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6400 before 1.0.1.70, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-45534 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects AC2100 before 1.2.0.88, AC2400 before 1.2.0.88, AC2600 before 1.2.0.88, D7000 before 1.0.1.82, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.84, R6330 before 1.1.0.84, R6350 before 1.1.0.84, R6700v2 before 1.2.0.88, R6800 before 1.2.0.88, R6850 before 1.1.0.84, R6900v2 before 1.2.0.88, R7200 before 1.2.0.88, R7350 before 1.2.0.88, R7400 before 1.2.0.88, and R7450 before 1.2.0.88.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-45560 β€Ό

Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.

πŸ“– Read

via "National Vulnerability Database".
?
20:22
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45717 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
20:22
β€Ό CVE-2021-45716 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_collation has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
20:22
β€Ό CVE-2021-45720 β€Ό

An issue was discovered in the lru crate before 0.7.1 for Rust. The iterators have a use-after-free, as demonstrated by an access after a pop operation.

πŸ“– Read

via "National Vulnerability Database".
20:22
β€Ό CVE-2021-45718 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
20:22
β€Ό CVE-2021-45712 β€Ό

An issue was discovered in the rust-embed crate before 6.3.0 for Rust. A ../ directory traversal can sometimes occur in debug mode.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-45714 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_aggregate_function has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-45719 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. update_hook has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-45715 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
20:23
β€Ό CVE-2021-45713 β€Ό

An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free.

πŸ“– Read

via "National Vulnerability Database".
27 December 2021
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45336 β€Ό

Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-4173 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-45337 β€Ό

Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by "hollowing" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-45335 β€Ό

Sandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-45339 β€Ό

Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by "hollowing" trusted process which could lead to the bypassing of Avast self-defense.

πŸ“– Read

via "National Vulnerability Database".
12:23
β€Ό CVE-2021-45338 β€Ό

Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security.

πŸ“– Read

via "National Vulnerability Database".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Tips for providing digital security benefits to employees 🦿

Many employers are now offering digital security benefits to help protect their employees. Learn about such arrangements and see how you can get started implementing them.

πŸ“– Read

via "Tech Republic".
?
15:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 The 10 worst tech stories of 2021 🦿

Have fond memories of 2021? They probably don't include these 10 stories or the products and services surrounding them.

πŸ“– Read

via "Tech Republic".
15:38
🦿 The dangers of dark data: How to manage it and mitigate the risks 🦿

Dark data is a major challenge in enterprises, and it's not going away soon. Fortunately, there are ways to reduce dark data and the risks that come with it.

πŸ“– Read

via "Tech Republic".
?
16:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ The 5 Most-Wanted Threatpost Stories of 2021 ❌

A look back at what was hot with readers in this second year of the pandemic.

πŸ“– Read

via "Threat Post".
16:23
β€Ό CVE-2021-38961 β€Ό

IBM OPENBMC OP910 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212049.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-43855 β€Ό

Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the SVG is viewed directly by other users. Scripts do not execute when loaded inside a page via normal `<img>` tags. The malicious SVG can only be uploaded by crafting a custom request to the server with a fake MIME type. A patch in version 2.5.264 fixes this vulnerability by adding an additional file extension verification check to the optional (enabled by default) SVG sanitization step to all file uploads that match the SVG mime type. As a workaround, disable file upload for all non-trusted users.

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-43856 β€Ό

Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS when viewed in the browser (e.g. XML files), a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the file is viewed directly by other users. The file must be opened directly by the user and will not trigger directly in a normal Wiki.js page. A patch in version 2.5.264 fixes this vulnerability by adding an optional (enabled by default) force download flag to all non-image file types, preventing the file from being viewed inline in the browser. As a workaround, disable file upload for all non-trusted users. --- Thanks to @Haxatron for reporting this vulnerability. Initially reported via https://huntr.dev/bounties/266bff09-00d9-43ca-a4bb-bb540642811f/

πŸ“– Read

via "National Vulnerability Database".
16:23
β€Ό CVE-2021-43845 β€Ό

PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size.

πŸ“– Read

via "National Vulnerability Database".
?
16:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Global Cyberattacks from Nation-State Actors Posing Greater Threats ❌

Casey Ellis, CTO at Bugcrowd, outlines how international relations have deteriorated into a new sort of Cold War, with espionage playing out in the cyber-domain.Β 

πŸ“– Read

via "Threat Post".
?
18:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-21751 β€Ό

ZTE BigVideo analysis product has an input verification vulnerability. Due to the inconsistency between the front and back verifications when configuring the large screen page, an attacker with high privileges could exploit this vulnerability to tamper with the URL and cause service exception.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-43857 β€Ό

Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-21750 β€Ό

ZTE BigVideo Analysis product has a privilege escalation vulnerability. Due to improper management of the timed task modification privilege, an attacker with ordinary user permissions could exploit this vulnerability to gain unauthorized access.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-45890 β€Ό

basic/BasicAuthProvider.java in AuthGuard before 0.9.0 allows authentication via an inactive identifier.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-32993 β€Ό

IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded credentials, such as a password or a cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-33017 β€Ό

The standard access path of the IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) requires authentication, but the product has an alternate path or channel that does not require authentication.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-43548 β€Ό

Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-43552 β€Ό

The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from the Patient Information Center iX (PIC iX) Versions B.02, C.02, and C.03.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-4161 β€Ό

The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-43550 β€Ό

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-23244 β€Ό

ColorOS pregrant dangerous permissions to apps which are listed in a whitelist xml named default-grant-permissions.But some apps in whitelist is not installed, attacker can disguise app with the same package name to obtain dangerous permission.

πŸ“– Read

via "National Vulnerability Database".
18:23
β€Ό CVE-2021-35232 β€Ό

Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database.

πŸ“– Read

via "National Vulnerability Database".
?
22:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45904 β€Ό

OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-45906 β€Ό

OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2021-45905 β€Ό

OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-21237 β€Ό

An issue in the user login box of LJCMS v1.11 allows attackers to hijack user accounts via brute force attacks.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-21238 β€Ό

An issue in the user login box of CSCMS v4.0 allows attackers to hijack user accounts via brute force attacks.

πŸ“– Read

via "National Vulnerability Database".
22:23
β€Ό CVE-2020-21236 β€Ό

A vulnerability in /damicms-master/admin.php?s=/Article/doedit of DamiCMS v6.0 allows attackers to compromise and impersonate user accounts via obtaining a user's session cookie.

πŸ“– Read

via "National Vulnerability Database".
28 December 2021
?
08:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 2021 Wants Another Chance (A Lighter-Side Year in Review) ❌

The year wasn't ALL bad news. These sometimes cringe-worthy/sometimes laughable cybersecurity and other technology stories offer schadenfreude and WTF opportunities, and some giggles.

πŸ“– Read

via "Threat Post".
08:24
β€Ό CVE-2021-4179 β€Ό

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
08:24
β€Ό CVE-2021-4177 β€Ό

livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information

πŸ“– Read

via "National Vulnerability Database".
?
12:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37400 β€Ό

An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-45425 β€Ό

Reflected Cross Site Scripting (XSS) in SAFARI Montage versions 8.3 and 8.5 allows remote attackers to execute JavaScript codes.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-37401 β€Ό

An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2018-17875 β€Ό

A remote code execution issue in the ping command on Poly Trio 8800 5.7.1.4145 devices allows remote authenticated users to execute commands via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2019-20082 β€Ό

ASUS RT-N53 3.0.0.4.376.3754 devices have a buffer overflow via a long lan_dns1_x or lan_dns2_x parameter to Advanced_LAN_Content.asp.

πŸ“– Read

via "National Vulnerability Database".
12:24
β€Ό CVE-2021-45903 β€Ό

A persistent cross-site scripting (XSS) issue in the web interface of SuiteCRM before 7.10.35, and 7.11.x and 7.12.x before 7.12.2, allows a remote attacker to introduce arbitrary JavaScript via attachments upload, a different vulnerability than CVE-2021-39267 and CVE-2021-39268.

πŸ“– Read

via "National Vulnerability Database".
12:29
πŸ•΄ An Adaptive Security Strategy Is Critical for Stopping Advanced Attacks πŸ•΄

Ransomware demands a new approach to incident response.

πŸ“– Read

via "Dark Reading".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Insider Threat: Definition & Examples πŸ”

A recent report said that almost half of data breaches involve an insider element. In this blog we define what constitutes an insider threat and give you nearly 50 examples to help illustrate the threat further.

πŸ“– Read

via "".
?
13:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ That Toy You Got for Christmas Could Be Spying on You ❌

Security flaws in the recently released Fisher-Price Chatter Bluetooth telephone can allow nearby attackers to spy on calls or communicate with children using the device.

πŸ“– Read

via "Threat Post".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Check for Log4j vulnerabilities with this simple-to-use script 🦿

If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.

πŸ“– Read

via "Tech Republic".
14:24
β€Ό CVE-2021-45814 β€Ό

Nettmp NNT 5.1 is affected by a SQL injection vulnerability. An attacker can bypass authentication and access the panel with an administrative account.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-45812 β€Ό

NUUO Network Video Recorder NVRsolo 3.9.1 is affected by a Cross Site Scripting (XSS) vulnerability. An attacker can steal the user's session by injecting malicious JavaScript codes which leads to session hijacking.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2021-45813 β€Ό

SLICAN WebCTI 1.01 2015 is affected by a Cross Site Scripting (XSS) vulnerability. The attacker can steal the user's session by injecting malicious JavaScript codes which leads to Session Hijacking and cause user's credentials theft.

πŸ“– Read

via "National Vulnerability Database".
?
15:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions πŸ•΄

The Business Security Test is a comprehensive investigation of corporate endpoint security solutions on the market.

πŸ“– Read

via "Dark Reading".
15:27
πŸ•΄ After Google's Landmark Settlement, How Ad Networks Should Tackle Child Privacy πŸ•΄

To comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.

πŸ“– Read

via "Dark Reading".
29 December 2021
?
03:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Log4j Flaw Will Take Years to be Fully Addressed πŸ•΄

Over 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google's Open Source Insights Team.

πŸ“– Read

via "Dark Reading".
?
08:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-25990 β€Ό

In Ò€œifmeҀ�, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe.

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-44161 β€Ό

Changing MOTP (Mobile One Time Password) systemÒ€ℒs specific function parameter has insufficient validation for user input. A attacker in local area network can perform SQL injection attack to read, modify or delete backend database without authentication.

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-25989 β€Ό

In Ò€œifmeҀ�, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them.

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-44160 β€Ό

Carinal Tien Hospital Health Report SystemÒ€ℒs login page has improper authentication, a remote attacker can acquire another general userÒ€ℒs privilege by modifying the cookie parameter without authentication. The attacker can then perform limited operations on the system or modify data, making the service partially unavailable to the user.

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-25991 β€Ό

In Ifme, versions v5.0.0 to v7.32 are vulnerable against an improper access control, which makes it possible for admins to self-ban themself leading to their deactivation from Ifme account and complete loss of admin access in Ifme.

πŸ“– Read

via "National Vulnerability Database".
08:25
β€Ό CVE-2021-25988 β€Ό

In Ò€œifmeҀ�, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability (notifications section) which can be directly triggered by sending an ally request to the admin.

πŸ“– Read

via "National Vulnerability Database".
?
09:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Indian authorities set to tighten data breach laws in 2022 πŸ—“οΈ

Credit card storage rules and 72-hour breach notification deadline due to come into play next year

πŸ“– Read

via "The Daily Swig".
?
11:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cryptomining Attack Exploits Docker API Misconfiguration Since 2019 ❌

Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.

πŸ“– Read

via "Threat Post".
11:46
❌ 5 Cybersecurity Trends to Watch in 2022 ❌

Here’s what cybersecurity watchers want infosec pros to know heading into 2022. Β 

πŸ“– Read

via "Threat Post".
?
12:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ LastPass quells cyber-attack fears, blames email notification surge on β€˜glitch’ πŸ—“οΈ

Password vault investigation reveals no evidence of credential stuffing activity

πŸ“– Read

via "The Daily Swig".
12:13
⚠ SFW! The Top N Cyber­security Stories of 2021 (for small positive integer values of N) ⚠

Happy Holidays! Our Top N stories, all totally SFW!

πŸ“– Read

via "Naked Security".
12:25
β€Ό CVE-2021-38680 β€Ό

A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Kazoo Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.20 and later

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-38687 β€Ό

A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-35035 β€Ό

A cleartext storage of sensitive information vulnerability in the Zyxel NBG6604 firmware could allow a remote, authenticated attacker to obtain sensitive information from the configuration file.

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-35034 β€Ό

An insufficient session expiration vulnerability in the CGI program of the Zyxel NBG6604 firmware could allow a remote attacker to access the device if the correct token can be intercepted.

πŸ“– Read

via "National Vulnerability Database".
12:25
β€Ό CVE-2021-38688 β€Ό

An improper authentication vulnerability has been reported to affect Android App Qfile. If exploited, this vulnerability allows attackers to compromise app and access information We have already fixed this vulnerability in the following versions of Qfile: Qfile 3.0.0.1105 and later

πŸ“– Read

via "National Vulnerability Database".
12:28
πŸ•΄ Why Cyber Due Diligence Is Essential to the M&A Process πŸ•΄

That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.

πŸ“– Read

via "Dark Reading".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Log4Shell vulnerability Number Four: β€œMuch ado about something” ⚠

It's a Log4j bug, and you ought to patch it. But we don't think it's a critical crisis like the last one.

πŸ“– Read

via "Naked Security".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Swig Security Review 2021 – Part I πŸ—“οΈ

Key thinkers on the biggest security stories and trends in 2021

πŸ“– Read

via "The Daily Swig".
?
14:32
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36723 β€Ό

Emuse - eServices / eNvoice Exposure Of Private Personal Information due to lack of identification mechanisms and predictable IDs an attacker can scrape all the files on the service.

πŸ“– Read

via "National Vulnerability Database".
14:32
β€Ό CVE-2021-4176 β€Ό

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
14:32
β€Ό CVE-2021-36722 β€Ό

Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.

πŸ“– Read

via "National Vulnerability Database".
14:32
β€Ό CVE-2021-4175 β€Ό

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Threat Advisory: E-commerce Bots Use Domain Registration Services for Mass (Fake) Account Creation ❌

Jason Kent is Hacker-in-Residence at Cequence Security.

πŸ“– Read

via "Threat Post".
16:31
β€Ό CVE-2021-45885 β€Ό

An issue was discovered in Stormshield Network Security (SNS) 4.2.2 through 4.2.7 (fixed in 4.2.8). Under a specific update-migration scenario, the first SSH password change does not properly clear the old password.

πŸ“– Read

via "National Vulnerability Database".
16:31
β€Ό CVE-2021-25993 β€Ό

In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attackerÒ€ℒs server and will lead to account takeover when accessed by the victim.

πŸ“– Read

via "National Vulnerability Database".
16:31
β€Ό CVE-2021-23727 β€Ό

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

πŸ“– Read

via "National Vulnerability Database".
16:31
β€Ό CVE-2021-4187 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
16:31
β€Ό CVE-2021-36724 β€Ό

ForeScout - SecureConnector Local Service DoS - A low privilaged user which doesn't have permissions to shutdown the secure connector service writes a large amount of characters in the installationPath. This will cause the buffer to overflow and override the stack cookie causing the service to crash.

πŸ“– Read

via "National Vulnerability Database".
?
22:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43876 β€Ό

Microsoft SharePoint Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
30 December 2021
?
08:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4188 β€Ό

mruby is vulnerable to NULL Pointer Dereference

πŸ“– Read

via "National Vulnerability Database".
?
09:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Learn highly marketable ethical hacking skills for less than $45 🦿

Even if you have no tech experience, you can develop valuable skills with the online training offered by The Super-Sized Ethical Hacking Bundle.

πŸ“– Read

via "Tech Republic".
?
10:33
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45427 β€Ό

Emerson XWEB 300D EVO 3.0.7--3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal.

πŸ“– Read

via "National Vulnerability Database".
?
11:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ In the Fight Against Cybercrime, Takedowns Are Only Temporary πŸ•΄

Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.

πŸ“– Read

via "Dark Reading".
11:44
⚠ Instagram copyright infringment scams – don’t get sucked in! ⚠

We deconstructed a copyright phish so you don't have to. Be warned: the crooks are getting better at these scams...

πŸ“– Read

via "Naked Security".
?
12:30
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Zero Trust and Access: Protecting the Keys to the Kingdom πŸ•΄

Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.

πŸ“– Read

via "Dark Reading".
12:33
β€Ό CVE-2021-45818 β€Ό

SAFARI Montage 8.7.32 is affected by a CRLF injection vulnerability which can lead to can lead to HTTP response splitting.

πŸ“– Read

via "National Vulnerability Database".
12:33
β€Ό CVE-2021-43861 β€Ό

Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. Prior to version 8.13.8, malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to version 8.13.8 to receive a patch. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
12:33
β€Ό CVE-2021-45815 β€Ό

Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
12:40
πŸ—“οΈ Swig Security Review 2021 – Part II πŸ—“οΈ

Key thinkers on the biggest security stories and trends in 2021

πŸ“– Read

via "The Daily Swig".
?
13:48
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ APT β€˜Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools ❌

Researchers from CrowdStrike disrupted an attempt by the threat group to steal industrial intelligence and military secrets from an academic institution.

πŸ“– Read

via "Threat Post".
?
14:10
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ HCL DX vendor β€˜could not reproduce’ allegedly critical vulnerabilities πŸ—“οΈ

Disclosure process for bugs in HCL DX – formerly WebSphere Portal – seemingly went awry

πŸ“– Read

via "The Daily Swig".
?
14:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-43862 β€Ό

jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).

πŸ“– Read

via "National Vulnerability Database".
?
15:00
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Getting Started With Threat-Informed Security Programs πŸ•΄

Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.

πŸ“– Read

via "Dark Reading".
?
15:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ What the Rise in Cyber-Recon Means for Your Security Strategy ❌

Expect many more zero-day exploits in 2022, and cyberattacks using them being launched at a significantly higher rate, warns Aamir Lakhani, researcher at FortiGuard Labs.

πŸ“– Read

via "Threat Post".
?
15:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to install the Pritunl VPN server on AlmaLinux 🦿

If you're looking for a VPN server to host in-house, look no further than the AlmaLinux/Pritunl combination. See how easy it is to get this service up and running.

πŸ“– Read

via "Tech Republic".
?
16:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-29292 β€Ό

iBall WRD12EN 1.0.0 devices allow cross-site request forgery (CSRF) attacks as demonstrated by enabling DNS settings or modifying the range for IP addresses.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-45379 β€Ό

Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password.

πŸ“– Read

via "National Vulnerability Database".
16:34
β€Ό CVE-2021-38876 β€Ό

IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208404.

πŸ“– Read

via "National Vulnerability Database".
?
20:34
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-20151 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20168 β€Ό

Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-4182 β€Ό

Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-4186 β€Ό

Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20160 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a command injection vulnerability in the smb functionality of the device. The username parameter used when configuring smb functionality for the device is vulnerable to command injection as root.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-4181 β€Ό

Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20152 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 lacks proper authentication to the bittorrent functionality. If enabled, anyone is able to visit and modify settings and files via the Bittorent web client by visiting: http://192.168.10.1:9091/transmission/web/

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20167 β€Ό

Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20161 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-45732 β€Ό

Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20165 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible).

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-4190 β€Ό

Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20170 β€Ό

Netgear RAX43 version 1.0.3.96 makes use of hardcoded credentials. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted. This encryption is accomplished via a password-protected zip file with a hardcoded password (RAX50w!a4udk). By unzipping the configuration using this password, a user can reconfigure settings not intended to be manipulated, re-zip the configuration, and restore a backup causing these settings to be changed.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20164 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20153 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a symlink vulnerability in the bittorrent functionality. If enabled, the bittorrent functionality is vulnerable to a symlink attack that could lead to remote code execution on the device. If an end user inserts a flash drive with a malicious symlink on it that the bittorrent client can write downloads to, then a user is able to download arbitrary files to any desired location on the devices filesystem, which could lead to remote code execution. Example directories vulnerable to this include "config", "downloads", and "torrents", though it should be noted that "downloads" is the only vector that allows for arbitrary files to be downloaded to arbitrary locations.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20132 β€Ό

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the router (i.e., as the "admin" user, UID 0).

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-4184 β€Ό

Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20156 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be malicious in nature as there does not appear to be any signature validation done to determine if it is from a known and trusted source. This includes firmware updates that are done via the automated "check for updates" in the admin interface. If an attacker is able to masquerade as the update server, the device will not verify that the firmware updates downloaded are legitimate.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20158 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicous actor to force the change of the admin password due to a hidden administrative command.

πŸ“– Read

via "National Vulnerability Database".
20:34
β€Ό CVE-2021-20155 β€Ό

Trendnet AC2600 TEW-827DRU version 2.08B01 makes use of hardcoded credentials. It is possible to backup and restore device configurations via the management web interface. These devices are encrypted using a hardcoded password of "12345678".

πŸ“– Read

via "National Vulnerability Database".
31 December 2021
?
11:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Bug Bounty Radar // The latest bug bounty programs for January 2022 πŸ—“οΈ

New web targets for the discerning hacker

πŸ“– Read

via "The Daily Swig".
?
12:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ The Matrix Resurrections review: Latest film instalment offers nostalgia but no denouement πŸ—“οΈ

DΓ©jΓ  vu isn't what it used to be

πŸ“– Read

via "The Daily Swig".
?
13:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Security done right: Celebrating infosec wins in 2021 πŸ—“οΈ

Kudos to Tonga’s ccTLD, the US Supreme Court, and others…

πŸ“– Read

via "The Daily Swig".
?
14:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-4193 β€Ό

vim is vulnerable to Out-of-bounds Read

πŸ“– Read

via "National Vulnerability Database".
14:35
β€Ό CVE-2021-4192 β€Ό

vim is vulnerable to Use After Free

πŸ“– Read

via "National Vulnerability Database".
1 January 2022
?
03:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45933 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45926 β€Ό

MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd0c689be0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45940 β€Ό

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45928 β€Ό

libjxl before 0.6, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45934 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_HandlePacket and MqttClient_WaitType).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45930 β€Ό

Qt SVG in Qt 5.0.0 through 6.2.1 has an out-of-bounds write in QtPrivate::QCommonArrayOps<QPainterPath::Element>::growAppend (called from QPainterPath::addPath and QPathClipper::intersect).

πŸ“– Read

via "National Vulnerability Database".
03:35
β€Ό CVE-2021-45943 β€Ό

GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-44716 β€Ό

net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45935 β€Ό

Grok 9.5.0 has a heap-based buffer overflow in openhtj2k::T1OpenHTJ2K::decompress (called from std::__1::__packaged_task_func<std::__1::__bind<grk::T1DecompressScheduler::deco and std::__1::packaged_task<int).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45938 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Unsubscribe).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45939 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Subscribe).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45942 β€Ό

OpenEXR 3.1.0 through 3.1.3 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45931 β€Ό

HarfBuzz 2.9.0 has an out-of-bounds write in hb_bit_set_invertible_t::set (called from hb_sparseset_t<hb_bit_set_invertible_t>::set and hb_set_copy).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45941 β€Ό

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-44717 β€Ό

Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-41817 β€Ό

Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45932 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (4 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45936 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttDecode_Disconnect (called from MqttClient_DecodePacket and MqttClient_WaitType).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45927 β€Ό

MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd6e029ee0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).

πŸ“– Read

via "National Vulnerability Database".
03:36
β€Ό CVE-2021-45937 β€Ό

wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Connect).

πŸ“– Read

via "National Vulnerability Database".
?
08:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44852 β€Ό

An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.

πŸ“– Read

via "National Vulnerability Database".
08:36
β€Ό CVE-2021-41819 β€Ό

CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.

πŸ“– Read

via "National Vulnerability Database".
08:36
β€Ό CVE-2021-43333 β€Ό

The Datalogic DXU service on (for example) DL-Axist devices does not require authentication for configuration changes or disclosure of configuration settings.

πŸ“– Read

via "National Vulnerability Database".
?
18:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45960 β€Ό

In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).

πŸ“– Read

via "National Vulnerability Database".
?
20:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45972 β€Ό

The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to 250 bytes outside of the allocated buffer with arbitrary data.

πŸ“– Read

via "National Vulnerability Database".
?
22:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44896 β€Ό

DMP Roadmap before 3.0.4 allows XSS.

πŸ“– Read

via "National Vulnerability Database".
22:41
β€Ό CVE-2022-22293 β€Ό

admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter.

πŸ“– Read

via "National Vulnerability Database".
2 January 2022
?
10:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0080 β€Ό

mruby is vulnerable to Heap-based Buffer Overflow

πŸ“– Read

via "National Vulnerability Database".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-36751 β€Ό

ENC DataVault 7.1.1W uses an inappropriate encryption algorithm, such that an attacker (who does not know the secret key) can make ciphertext modifications that are reflected in modified plaintext. There is no data integrity mechanism. (This behavior occurs across USB drives sold under multiple brand names.)

πŸ“– Read

via "National Vulnerability Database".
3 January 2022
?
03:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-0079 β€Ό

showdoc is vulnerable to Generation of Error Message Containing Sensitive Information

πŸ“– Read

via "National Vulnerability Database".
?
08:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-30276 β€Ό

Improper access control while doing XPU re-configuration dynamically can lead to unauthorized access to a secure resource in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:37
β€Ό CVE-2021-30289 β€Ό

Possible buffer overflow due to lack of range check while processing a DIAG command for COEX management in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:37
β€Ό CVE-2021-1894 β€Ό

Improper access control in TrustZone due to improper error handling while handling the signing key in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:37
β€Ό CVE-2021-30282 β€Ό

Possible out of bound write in RAM partition table due to improper validation on number of partitions provided in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:37
β€Ό CVE-2021-30270 β€Ό

Possible null pointer dereference in thread profile trap handler due to lack of thread ID validation before dereferencing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30274 β€Ό

Possible integer overflow in access control initialization interface due to lack and size and address validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30336 β€Ό

Possible out of bound read due to lack of domain input validation while processing APK close session request in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30267 β€Ό

Possible integer overflow to buffer overflow due to improper input validation in FTM ARA commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30269 β€Ό

Possible null pointer dereference due to lack of TLB validation for user provided address in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-45917 β€Ό

The server-request receiver function of Shockwall system has an improper authentication vulnerability. An authenticated attacker of an agent computer within the local area network can use the local registry information to launch server-side request forgery (SSRF) attack on another agent computer, resulting in arbitrary code execution for controlling the system or disrupting service.

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-44158 β€Ό

ASUS RT-AX56U Wi-Fi Router is vulnerable to stack-based buffer overflow due to improper validation for httpd parameter length. An authenticated local area network attacker can launch arbitrary code execution to control the system or disrupt service.

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-35093 β€Ό

Possible memory corruption in BT controller when it receives an oversized LMP packet over 2-DH1 link and leads to denial of service in BlueCore

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30303 β€Ό

Possible buffer overflow due to lack of buffer length check when segmented WMI command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30279 β€Ό

Possible access control violation while setting current permission for VMIDs due to improper permission masking in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30273 β€Ό

Possible assertion due to improper handling of IPV6 packet with invalid length in destination options header in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30293 β€Ό

Possible assertion due to lack of input validation in PUSCH configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-1918 β€Ό

Improper handling of resource allocation in virtual machines can lead to information exposure in Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30268 β€Ό

Possible heap Memory Corruption Issue due to lack of input validation when sending HWTC IQ Capture command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-30351 β€Ό

An out of bound memory access can occur due to improper validation of number of frames being passed during music playback in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2021-25981 β€Ό

In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the adminÒ€ℒs still-valid session token even when logged-out, to gain admin privileges, given the attacker is able to obtain that token (via other, hypothetical attacks)

πŸ“– Read

via "National Vulnerability Database".
?
10:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Adding Resiliency to BGP Avoids Network Outages, Data Loss πŸ•΄

Cisco Umbrella has mechanisms in place to ensure that end users don't lose connectivity even if ISPs and service providers experience outages.

πŸ“– Read

via "Dark Reading".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Creating the Next Generation of Secure Developers πŸ•΄

Helping management prioritize developer education is a tall order, but it's one the industry must figure out.

πŸ“– Read

via "Dark Reading".
?
12:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-25021 β€Ό

The OMGF | Host Google Fonts Locally WordPress plugin before 4.5.12 does not validate the cache directory setting, allowing high privilege users to use a path traversal vector and delete arbitrary folders when uninstalling the plugin

πŸ“– Read

via "National Vulnerability Database".
12:43
β€Ό CVE-2021-25022 β€Ό

The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.16.66 does not sanitise and escape the backup_timestamp and job_id parameter before outputting then back in admin pages, leading to Reflected Cross-Site Scripting issues

πŸ“– Read

via "National Vulnerability Database".
12:43
β€Ό CVE-2021-25027 β€Ό

The PowerPack Addons for Elementor WordPress plugin before 2.6.2 does not escape the tab parameter before outputting it back in an attribute in the admin dashboard, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
12:43
β€Ό CVE-2021-24964 β€Ό

The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24786 β€Ό

The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24973 β€Ό

The Site Reviews WordPress plugin before 5.17.3 does not sanitise and escape the site-reviews parameter of the glsr_action AJAX action (available to unauthenticated and any authenticated users), allowing them to perform Cross-Site Scripting attacks against logged in admins viewing the Tool dashboard of the plugin

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24999 β€Ό

The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_notice parameter before outputting it back in the admin dashboard when the Pdf Invoicing module is enabled, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-44674 β€Ό

An information exposure issue has been discovered in Opmantek Open-AudIT 4.2.0. The vulnerability allows an authenticated attacker to read file outside of the restricted directory.

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-25040 β€Ό

The Booking Calendar WordPress plugin before 8.9.2 does not sanitise and escape the booking_type parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24893 β€Ό

The Stars Rating WordPress plugin before 3.5.1 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service in the comments section, or pending comment dashboard depending if the user sent it as unauthenticated or authenticated.

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24831 β€Ό

All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs.

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-25030 β€Ό

The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24991 β€Ό

The WooCommerce PDF Invoices & Packing Slips WordPress plugin before 2.10.5 does not escape the tab and section parameters before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting in the admin dashboard

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-45428 β€Ό

TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-25023 β€Ό

The Speed Booster Pack Òő‘ PageSpeed Optimization Suite WordPress plugin before 4.3.3.1 does not escape the sbp_convert_table_name parameter before using it in a SQL statement to convert the related table, leading to an SQL injection

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24828 β€Ό

The Mortgage Calculator / Loan Calculator WordPress plugin before 1.5.17 does not escape the some of the attributes of its mlcalc shortcode before outputting them, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24963 β€Ό

The LiteSpeed Cache WordPress plugin before 4.4.4 does not escape the qc_res parameter before outputting it back in the JS code of an admin page, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-25001 β€Ό

The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_create_products_xml_result parameter before outputting back in the admin dashboard when the Product XML Feeds module is enabled, leading to a Reflected Cross-Site Scripting issue

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-25016 β€Ό

The Chaty WordPress plugin before 2.8.3 and Chaty Pro WordPress plugin before 2.8.2 do not sanitise and escape the search parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting

πŸ“– Read

via "National Vulnerability Database".
12:44
β€Ό CVE-2021-24680 β€Ό

The WP Travel Engine WordPress plugin before 5.3.1 does not escape the Description field in the Trip Destination/Activities/Trip Type and Pricing Category pages, allowing users with a role as low as editor to perform Stored Cross-Site Scripting attacks, even when the unfiltered_html capability is disallowed

πŸ“– Read

via "National Vulnerability Database".
?
13:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Name That Edge Toon: In Your Face! πŸ•΄

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

πŸ“– Read

via "Dark Reading".
?
14:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45817 β€Ό

Web Viewer for Hanwha DVR version 2.17 is affected by a Cross Site Scripting (XSS) vulnerability that allows an attacker to inject malicious JavaScript codes.

πŸ“– Read

via "National Vulnerability Database".
14:44
β€Ό CVE-2021-46109 β€Ό

Invalid input sanitizing leads to reflected Cross Site Scripting (XSS) in ASUS RT-AC52U_B1 3.0.0.4.380.10931 can lead to a user session hijack.

πŸ“– Read

via "National Vulnerability Database".
14:44
β€Ό CVE-2021-3837 β€Ό

openwhyd is vulnerable to Improper Authorization

πŸ“– Read

via "National Vulnerability Database".
?
15:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Log4j Highlights Need for Better Handle on Software Dependencies πŸ•΄

Security pros say the Log4j vulnerability is another warning call for enterprises to get more disciplined when keeping track of software bills of materials.

πŸ“– Read

via "Dark Reading".
?
16:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Wireshark Analyzer 3.6.1 πŸ› 

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
16:18
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.6 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
16:18
πŸ›  Haveged 1.9.16 πŸ› 

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

πŸ“– Read

via "Packet Storm Security".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Pathr.ai Reaffirms Position as Privacy-Centric Solution for Retailers with Spatial Intelligence Platform πŸ•΄

Pathr.ai’s Spatial Intelligence technology is used to improve business outcomes in a variety of retail use cases.

πŸ“– Read

via "Dark Reading".
?
18:12
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to install the CSF firewall on Ubuntu Server 🦿

If you'd like a powerful firewall for your Ubuntu Server, but one that offers a fairly straightforward configuration, Jack Wallen thinks CSF might be the right tool for the job.

πŸ“– Read

via "Tech Republic".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-23026 β€Ό

A NULL pointer dereference in the main() function dhry_1.c of dhrystone 2.1 causes a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
?
19:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Florida's Broward Health Confirms October 2021 Breach πŸ•΄

The Oct. 15 breach compromised personal medical information, including history, condition, diagnosis, and medical record number.

πŸ“– Read

via "Dark Reading".
?
19:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CISOs Plan What to Buy With Funds From the Infrastructure Bill πŸ•΄

CISOs welcome the cybersecurity funding allocated under the Infrastructure Investment and Jobs Act, but say it’s not perfect because it doesn't address a key issue: people.

πŸ“– Read

via "Dark Reading".
?
20:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-37111 β€Ό

There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39967 β€Ό

There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39988 β€Ό

The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39979 β€Ό

HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39971 β€Ό

Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39975 β€Ό

Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-37098 β€Ό

Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-37132 β€Ό

PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39974 β€Ό

There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-20147 β€Ό

ManageEngine ADSelfService Plus below build 6116 contains an observable response discrepancy in the UMCP operation of the ChangePasswordAPI. This allows an unauthenticated remote attacker to determine whether a Windows domain user exists.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-37116 β€Ό

PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39983 β€Ό

The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39966 β€Ό

There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-37120 β€Ό

There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39978 β€Ό

Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39970 β€Ό

HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-37121 β€Ό

There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39981 β€Ό

Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39973 β€Ό

There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down.

πŸ“– Read

via "National Vulnerability Database".
20:38
β€Ό CVE-2021-39969 β€Ό

There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
20:44
β€Ό CVE-2021-39990 β€Ό

The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience.

πŸ“– Read

via "National Vulnerability Database".
20:44
β€Ό CVE-2021-39984 β€Ό

Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
20:44
β€Ό CVE-2021-39980 β€Ό

Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure.

πŸ“– Read

via "National Vulnerability Database".
20:44
β€Ό CVE-2021-37126 β€Ό

Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed.

πŸ“– Read

via "National Vulnerability Database".
20:44
β€Ό CVE-2021-39989 β€Ό

The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart.

πŸ“– Read

via "National Vulnerability Database".
4 January 2022
?
03:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-20868 β€Ό

Incorrect authorization vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, and bizhub 4752/4052 GC9-X4 and earlier) allows an attacker on the adjacent network to obtain user credentials if external server authentication is enabled via a specific SOAP message sent by an administrative user.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-20871 β€Ό

Exposure of sensitive information to an unauthorized actor vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, and bizhub 4752/4052 GC9-X4 and earlier) allows an attacker on the adjacent network to obtain the credentials if the destination information including credentials are registered in the address book via a specific SOAP message.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-43942 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (XSS) vulnerability in the /rest/collectors/1.0/template/custom endpoint. To exploit this issue, the attacker must trick a user into visiting a malicious website. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-20872 β€Ό

Protection mechanism failure vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, bizhub 4752/4052 GC9-X4 and earlier) allows a physical attacker to bypass the firmware integrity verification and to install malicious firmware.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-20870 β€Ό

Improper handling of exceptional conditions vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, bizhub 4752/4052 GC9-X4 and earlier, bizhub C3850/C3350/3850FS, bizhub 4750/4050, bizhub C3110, bizhub C3100P) allows a physical attacker to obtain unsent scanned image data when scanned data transmission is stopped due to the network error by ejecting a HDD before the scan job times out.

πŸ“– Read

via "National Vulnerability Database".
03:38
β€Ό CVE-2021-20869 β€Ό

Exposure of sensitive information to an unauthorized actor vulnerability in KONICA MINOLTA bizhub series (bizhub C750i G00-35 and earlier, bizhub C650i/C550i/C450i G00-B6 and earlier, bizhub C360i/C300i/C250i G00-B6 and earlier, bizhub 750i/650i/550i/450i G00-37 and earlier, bizhub 360i/300i G00-33 and earlier, bizhub C287i/C257i/C227i G00-19 and earlier, bizhub 306i/266i/246i/226i G00-B6 and earlier, bizhub C759/C659 GC7-X8 and earlier, bizhub C658/C558/C458 GC7-X8 and earlier, bizhub 958/808/758 GC7-X8 and earlier, bizhub 658e/558e/458e GC7-X8 and earlier, bizhub C287/C227 GC7-X8 and earlier, bizhub 287/227 GC7-X8 and earlier, bizhub 368e/308e GC7-X8 and earlier, bizhub C368/C308/C258 GC9-X4 and earlier, bizhub 558/458/368/308 GC9-X4 and earlier, bizhub C754e/C654e GDQ-M0 and earlier, bizhub 754e/654e GDQ-M0 and earlier, bizhub C554e/C454e GDQ-M1 and earlier, bizhub C364e/C284e/C224e GDQ-M1 and earlier, bizhub 554e/454e/364e/284e/224e GDQ-M1 and earlier, bizhub C754/C654 C554/C454 GR1-M0 and earlier, bizhub C364/C284/C224 GR1-M0 and earlier, bizhub 754/654 GR1-M0 and earlier, bizhub C4050i/C3350i/C4000i/C3300i G00-B6 and earlier, bizhub C3320i G00-B6 and earlier, bizhub 4750i/4050i G00-22 and earlier, bizhub 4700i G00-22 and earlier, bizhub C3851FS/C3851/C3351 GC9-X4 and earlier, and bizhub 4752/4052 GC9-X4 and earlier) allows an attacker on the adjacent network to obtain some of user credentials if LDAP server authentication is enabled via a specific SOAP message.

πŸ“– Read

via "National Vulnerability Database".
?
09:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Researcher discovers 70 web cache poisoning vulnerabilities, nets $40k in bug bounty rewards πŸ—“οΈ

Targets included GitHub, GitLab, HackerOne, and Cloudflare

πŸ“– Read

via "The Daily Swig".
?
10:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Portuguese Media Giant Impresa Crippled by Ransomware Attack ❌

The websites of the company and the Expresso newspaper, as well as all of its SIC TV channels remained offline Tuesday after the New Year’s weekend attack.

πŸ“– Read

via "Threat Post".
?
12:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Online privacy: DuckDuckGo just finished a banner year and looks for an even better 2022 🦿

Commentary: The privacy-oriented search engine keeps winning fans. Will it spur Google to improve its own privacy?

πŸ“– Read

via "Tech Republic".
12:07
πŸ•΄ Log4j Remediation Rules Now Available for WhiteSource Renovate and Enterprise πŸ•΄

The Software Composition Analysis leader now offers a remediation preset for WhiteSource Renovate and Enterprise, enabling users to identify and fix the Log4j vulnerability from hundreds of downstream dependent packages of Log4j.

πŸ“– Read

via "Dark Reading".
12:07
πŸ•΄ Palo Alto Networks Appoints Helmut Reisinger to Leadership Team πŸ•΄

Reisinger joins as CEO, EMEA and Latin America, to accelerate global growth strategy.

πŸ“– Read

via "Dark Reading".
12:07
πŸ•΄ Why CIOs Should Report to CISOs πŸ•΄

If the CISO is responsible for the security of the organization, then that same person also should be responsible for both security and IT infrastructure.

πŸ“– Read

via "Dark Reading".
12:13
πŸ—“οΈ Latest web hacking tools – Q1 2022 πŸ—“οΈ

We take a look at the latest additions to security researchers’ armory

πŸ“– Read

via "The Daily Swig".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44168 β€Ό

A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3 may allow a local authenticated attacker to download arbitrary files on the device via specially crafted update packages.

πŸ“– Read

via "National Vulnerability Database".
12:39
β€Ό CVE-2021-43711 β€Ό

The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.

πŸ“– Read

via "National Vulnerability Database".
?
13:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Vinnie Liu Has a Mission: Keeping People Safe Online and Offline πŸ•΄

Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.

πŸ“– Read

via "Dark Reading".
?
13:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ US retailer PulseTV warns of apparent credit card data breach πŸ—“οΈ

Payment system updated amidst fears 200,000 records may have been exposed

πŸ“– Read

via "The Daily Swig".
13:50
❌ McMenamins Data Breach Affects 12 Years of Employee Info ❌

The Pacific Northwest hospitality stalwart is also still operationally crippled by a Dec. 12 ransomware attack.

πŸ“– Read

via "Threat Post".
?
14:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Purple Fox Rootkit Dropped by Malicious Telegram Installers ❌

Multiple malicious installers were delivering the same Purple Fox rootkit version using the same attack chain, possibly distributed via email or phishing sites.

πŸ“– Read

via "Threat Post".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45912 β€Ό

An unauthenticated Named Pipe channel in Controlup Real-Time Agent (cuAgent.exe) before 8.5 potentially allows an attacker to run OS commands via the ProcessActionRequest WCF method.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20012 β€Ό

In mdp driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05836478; Issue ID: ALPS05836478.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20013 β€Ό

In vow driver, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05837742; Issue ID: ALPS05837742.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20016 β€Ό

In vow driver, there is a possible memory corruption due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862986; Issue ID: ALPS05862986.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-45389 β€Ό

StarWind SAN & NAS build 1578 and StarWind Command Center Build 6864 Update Manager allows authentication with JTW token which is signed with any key. An attacker could use self-signed JTW token to bypass authentication resulting in escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-41789 β€Ό

In wifi driver, there is a possible system crash due to a missing validation check. This could lead to remote denial of service from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20190426015; Issue ID: GN20190426015.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20020 β€Ό

In libvcodecdrv, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05943906; Issue ID: ALPS05943906.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20018 β€Ό

In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20019 β€Ό

In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20021 β€Ό

In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-45913 β€Ό

A hardcoded key in ControlUp Real-Time Agent (cuAgent.exe) before 8.2.5 may allow a potential attacker to run OS commands via a WCF channel.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20023 β€Ό

In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-45979 β€Ό

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via app.launchURL in the JavaScript API.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20022 β€Ό

In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-45980 β€Ό

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via getURL in the JavaScript API.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-45978 β€Ό

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via xfa.host.gotoURL in the XFA API.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-3842 β€Ό

nltk is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20014 β€Ό

In vow driver, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05857308; Issue ID: ALPS05857308.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2022-20015 β€Ό

In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2021-40148 β€Ό

In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.

πŸ“– Read

via "National Vulnerability Database".
14:46
⚠ Apple Home software bug could lock you out of your iPhone ⚠

The finder of this bug insists it "poses a serious risk". We're not so sure, but we recommend you take steps to avoid it anyway.

πŸ“– Read

via "Naked Security".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Mobile Application Security: 2021's Breaches πŸ•΄

Many of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.

πŸ“– Read

via "Dark Reading".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-3845 β€Ό

ws-scrcpy is vulnerable to External Control of File Name or Path

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2022-0086 β€Ό

uppy is vulnerable to Server-Side Request Forgery (SSRF)

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-39143 β€Ό

Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.

πŸ“– Read

via "National Vulnerability Database".
?
17:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Data Skimmer Hits 100+ Sotheby’s Real-Estate Websites ❌

The campaign was an opportunistic supply-chain attack abusing a weaponized cloud video player.

πŸ“– Read

via "Threat Post".
?
18:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ SEGA’s Sloppy Security Confession: Exposed AWS S3 Bucket Offers Up Steam API Access & More ❌

SEGA's disclosure underscores a common, potentially catastrophic, flub β€” misconfigured Amazon Web Services (AWS) S3 buckets.

πŸ“– Read

via "Threat Post".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Google Buys Siemplify to Get Ahead in Cloud Security πŸ•΄

Google says the deal will bring security orchestration, automation, and response to its Google Cloud security portfolio and expand its Chronicle platform.

πŸ“– Read

via "Dark Reading".
18:38
β€Ό CVE-2021-41236 β€Ό

OroPlatform is a PHP Business Application Platform. In affected versions the email template preview is vulnerable to XSS payload added to email template content. An attacker must have permission to create or edit an email template. For successful payload, execution the attacked user must preview a vulnerable email template. There are no workarounds that address this vulnerability. Users are advised to upgrade as soon as is possible.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-43832 β€Ό

Spinnaker is an open source, multi-cloud continuous delivery platform. Spinnaker has improper permissions allowing pipeline creation & execution. This lets an arbitrary user with access to the gate endpoint to create a pipeline and execute it without authentication. If users haven't setup Role-based access control (RBAC) with-in spinnaker, this enables remote execution and access to deploy almost any resources on any account. Patches are available on the latest releases of the supported branches and users are advised to upgrade as soon as possible. Users unable to upgrade should enable RBAC on ALL accounts and applications. This mitigates the ability of a pipeline to affect any accounts. Block application access unless permission are enabled. Users should make sure ALL application creation is restricted via appropriate wildcards.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-43850 β€Ό

Discourse is an open source platform for community discussion. In affected versions admins users can trigger a Denial of Service attack via the `/message-bus/_diagnostics` path. The impact of this vulnerability is greater on multisite Discourse instances (where multiple forums are served from a single application server) where any admin user on any of the forums are able to visit the `/message-bus/_diagnostics` path. The problem has been patched. Please upgrade to 2.8.0.beta10 or 2.7.12. No workarounds for this issue exist.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-43677 β€Ό

Fluxbb v1.4.12 is affected by a Cross Site Scripting (XSS) vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2022-21648 β€Ό

Latte is an open source template engine for PHP. Versions since 2.8.0 Latte has included a template sandbox and in affected versions it has been found that a sandbox escape exists allowing for injection into web pages generated from Latte. This may lead to XSS attacks. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. Users unable to upgrade should not accept template input from untrusted sources.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2022-21647 β€Ό

CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `old()` function and form_helper nor `RedirectResponse::withInput()` and `redirect()->withInput()`.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-43852 β€Ό

OroPlatform is a PHP Business Application Platform. In affected versions by sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. This issue has been patched in version 4.2.8. Users unable to upgrade may configure a firewall to drop requests containing next strings: `__proto__` , `constructor[prototype]`, and `constructor.prototype` to mitigate this issue.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2022-21643 β€Ό

USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via register.php. In particular usernames, email addresses, and passwords provided by the user were not sanitized and were used directly to construct a sql statement. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-24042 β€Ό

The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2022-21644 β€Ό

USOC is an open source CMS with a focus on simplicity. In affected versions USOC allows for SQL injection via usersearch.php. In search terms provided by the user were not sanitized and were used directly to construct a sql statement. The only users permitted to search are site admins. Users are advised to upgrade as soon as possible. There are not workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-41141 β€Ό

PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2021-41610 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-27339. Reason: This candidate is a reservation duplicate of CVE-2020-27339. Notes: All CVE users should reference CVE-2020-27339 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

πŸ“– Read

via "National Vulnerability Database".
?
19:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ McMenamins Breach Affected 23 Years of Employee Data πŸ•΄

The Oregon-based hospitality and dining business reports the data was compromised in a Dec. 12 ransomware attack.

πŸ“– Read

via "Dark Reading".
19:38
πŸ•΄ Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells πŸ•΄

Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.

πŸ“– Read

via "Dark Reading".
19:42
🦿 Google makes the perfect case for why you shouldn't use Chrome 🦿

Google says Manifest V3 is focused on security, privacy and performance, but it could also break Chrome browser extensions used by millions of people.

πŸ“– Read

via "Tech Republic".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Microsoft Sees Rampant Log4j Exploit Attempts, Testing ❌

Microsoft says it's only going to get worse: It's seen state-sponsored and cyber-criminal attackers probing systems for the Log4Shell flaw through the end of December.

πŸ“– Read

via "Threat Post".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21649 β€Ό

Convos is an open source multi-user chat that runs in a web browser. Characters starting with "https://" in the chat window create an <a> tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for "<" or ">" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-41388 β€Ό

Netskope client prior to 89.x on macOS is impacted by a local privilege escalation vulnerability. The XPC implementation of nsAuxiliarySvc process does not perform validation on new connections before accepting the connection. Thus any low privileged user can connect and call external methods defined in XPC service as root, elevating their privilege to the highest level.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2022-21650 β€Ό

Convos is an open source multi-user chat that runs in a web browser. You can't use SVG extension in Convos' chat window, but you can upload a file with an .html extension. By uploading an SVG file with an html extension the upload filter can be bypassed. This causes Stored XSS. Also, after uploading a file the XSS attack is triggered upon a user viewing the file. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2021-22045 β€Ό

VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.

πŸ“– Read

via "National Vulnerability Database".
5 January 2022
?
03:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CrowdStrike Incorporates Intel CPU Telemetry into Falcon Sensor πŸ•΄

The Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.

πŸ“– Read

via "Dark Reading".
03:38
β€Ό CVE-2021-43946 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /secure/EditSubscription.jspa endpoint. The affected versions are before version 8.21.0.

πŸ“– Read

via "National Vulnerability Database".
?
10:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-22567 β€Ό

Bidirectional Unicode text can be interpreted and compiled differently than how it appears in editors which can be exploited to get nefarious code passed a code review by appearing benign. An attacker could embed a source that is invisible to a code reviewer that modifies the behavior of a program in unexpected ways.

πŸ“– Read

via "National Vulnerability Database".
10:40
β€Ό CVE-2021-41043 β€Ό

Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.

πŸ“– Read

via "National Vulnerability Database".
10:40
β€Ό CVE-2021-31589 β€Ό

BeyondTrust Secure Remote Access Base Software through 6.0.1 allows an attacker to achieve full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint. This cross-site-scripting (XSS) vulnerability occurs when it does not properly sanitize an unauthenticated crafted web request to the server

πŸ“– Read

via "National Vulnerability Database".
10:40
β€Ό CVE-2020-15933 β€Ό

A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.

πŸ“– Read

via "National Vulnerability Database".
?
11:13
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Indian academic bookseller Oswaal Books fixes alleged RCE and other serious vulnerabilities with Shopify relaunch πŸ—“οΈ

Researcher claims he found RCE, authentication bypass, CSRF flaws

πŸ“– Read

via "The Daily Swig".
11:20
❌ β€˜Malsmoke’ Exploits Microsoft’s E-Signature Verification ❌

The info-stealing campaign using ZLoader malware – previously used to deliver Ryuk and Conti ransomware – already has claimed more than 2,000 victims across 111 countries.

πŸ“– Read

via "Threat Post".
?
12:23
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Web skimming attacks on hundreds of real estate websites deployed via cloud video hosting service πŸ—“οΈ

Attackers leverage software supply chain to compromise high-traffic sites

πŸ“– Read

via "The Daily Swig".
?
12:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Putting Ransomware Gangs Out of Business With AI πŸ•΄

Organizations need to take matters into their own hands with a new approach.

πŸ“– Read

via "Dark Reading".
12:46
⚠ Apple Home software bug could lock you out of your iPhone ⚠

The finder of this bug insists it "poses a serious risk". We're not so sure, but we recommend you take steps to avoid it anyway.

πŸ“– Read

via "Naked Security".
?
13:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ FTC threatens β€œlegal action” over unpatched Log4j and other vulns ⚠

Remember the Equifax breach? Remember the $700m penalty? In case you'd forgotten, here's the FTC to refresh your memory!

πŸ“– Read

via "Naked Security".
?
14:15
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Prosecutors file additional charges against former Uber security chief over 2016 data breach β€˜cover up’ πŸ—“οΈ

Alleged misuse of bug bounty and failure to disclose breach leads to criminal charges

πŸ“– Read

via "The Daily Swig".
?
14:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22110 β€Ό

In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force usersÒ€ℒ passwords with minimal to no computational effort.

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2022-22108 β€Ό

In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2022-22111 β€Ό

In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administratorÒ€ℒs. This allows the attacker to gain access to the highest privileged user in the application.

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2022-22109 β€Ό

In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victimÒ€ℒs browser when they open the Ò€œ/tasksҀ� page to view all the tasks.

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2022-22107 β€Ό

In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.

πŸ“– Read

via "National Vulnerability Database".
?
15:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why We Need To Reframe the False-Positive Problem πŸ•΄

Efforts to tune or build behavior- or signature-based threat identification requires time and effort most organizations don't have.

πŸ“– Read

via "Dark Reading".
15:12
🦿 Behind the scenes: A day in the life of a cybersecurity curriculum director 🦿

The Kennedy Space Center kick-started Andee Harston's career in cybersecurity. Here's how she worked her way up to overseeing the cybersecurity curriculum for Infosec.

πŸ“– Read

via "Tech Republic".
15:12
🦿 MalSmoke attack: Zloader malware exploits Microsoft's signature verification to steal sensitive data 🦿

Already impacting more than 2,000 victims, the malware is able to modify a DLL file digitally signed by Microsoft, says Check Point Research.

πŸ“– Read

via "Tech Republic".
?
16:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ FTC to Go After Companies that Ignore Log4j ❌

Companies that fail to protect secure consumer data from Log4J attacks are at risk of facing Equifax-esque legal action and fines, the FTC warned.

πŸ“– Read

via "Threat Post".
?
16:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Which Cloud Strategy Is Right For My Organization's Security Needs? πŸ•΄

The massive Amazon Web Services outage in December had many security leaders asking whether they should be going multicloud or multiregion for their cloud environments.

πŸ“– Read

via "Dark Reading".
16:39
πŸ•΄ FTC: Companies Could Face Legal Action for Failing to Patch Log4j πŸ•΄

The FTC will pursue companies that fail to take steps to protect consumer data from exposure due to Log4j, officials report.

πŸ“– Read

via "Dark Reading".
16:39
β€Ό CVE-2021-28712 β€Ό

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-38918 β€Ό

IBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a specific sequence of VM management operations could lead to a violation of the isolation between peer VMs. IBM X-Force ID: 210019.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-28711 β€Ό

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2021-28713 β€Ό

Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713

πŸ“– Read

via "National Vulnerability Database".
?
17:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Top Tips for Preventing BEC Scams πŸ”

Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam? We asked a panel of experts.

πŸ“– Read

via "".
?
17:50
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Uber Bug, Ignored for Years, Casts Doubt on Official Uber Emails ❌

A simple-to-exploit bug that allows bad actors to send emails from Uber's official system -- skating past email security -- went unaddressed despite multiple flagging by researchers.

πŸ“– Read

via "Threat Post".
?
18:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ NY AG: 1.1M Online Consumer Accounts Found Compromised in Credential-Stuffing Attacks πŸ•΄

Stolen credentials tied to cyberattack incidents at 17 "well-known" online retailers, restaurant chains, food delivery services.

πŸ“– Read

via "Dark Reading".
18:20
❌ Broward Breach Highlights Healthcare Supply-Chain Problems ❌

More than 1.3 million patient records were stolen in the just-disclosed breach, which occurred back in October.

πŸ“– Read

via "Threat Post".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-21652 β€Ό

Shopware is an open source e-commerce software platform. In affected versions shopware would not invalidate a user session in the event of a password change. With version 5.7.7 the session validation was adjusted, so that sessions created prior to the latest password change of a customer account can't be used to login with said account. This also means, that upon a password change, all existing sessions for a given customer account are automatically considered invalid. There is no workaround for this issue.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-21642 β€Ό

Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-45831 β€Ό

A Null Pointer Dereference vulnerability exitgs in GPAC 1.0.1 in MP4Box via __strlen_avx2, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-45830 β€Ό

A heap-based buffer overflow vulnerability exists in HDF5 1.13.1-1 via H5F_addr_decode_len in /hdf5/src/H5Fint.c, which could cause a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-43816 β€Ό

containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2021-43779 β€Ό

GLPI is an open source IT Asset Management, issue tracking system and service desk system. The GLPI addressing plugin in versions < 2.9.1 suffers from authenticated Remote Code Execution vulnerability, allowing access to the server's underlying operating system using command injection abuse of functionality. There is no workaround for this issue and users are advised to upgrade or to disable the addressing plugin.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2022-21651 β€Ό

Shopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.

πŸ“– Read

via "National Vulnerability Database".
?
19:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Attack Campaign Exploits Microsoft Signature Verification πŸ•΄

The Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.

πŸ“– Read

via "Dark Reading".
19:22
❌ β€˜Elephant Beetle’ Lurks for Months in Networks ❌

The group blends into an environment before loading up trivial, thickly stacked, fraudulent financial transactions too tiny to be noticed but adding up to millions of dollars.

πŸ“– Read

via "Threat Post".
?
20:20
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 1.1M Compromised Accounts Found at 17 Major Companies ❌

The accounts fell victim to credential-stuffing attacks, according to the New York State AG.

πŸ“– Read

via "Threat Post".
?
20:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-45832 β€Ό

A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 at at hdf5/src/H5Eint.c, which causes a Denial of Service (context-dependent).

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2022-21653 β€Ό

Jawn is an open source JSON parser. Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack which may result in a denial of service. Most applications do not implement these traits directly, but inherit from a library. `jawn-parser-1.3.1` fixes this issue and users are advised to upgrade. For users unable to upgrade override `objectContext()` to use a collision-safe collection.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2021-45833 β€Ό

A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 via the H5D__create_chunk_file_map_hyper function in /hdf5/src/H5Dchunk.c, which causes a Denial of Service (context-dependent).

πŸ“– Read

via "National Vulnerability Database".
6 January 2022
?
03:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46144 β€Ό

Roundcube before 1.4.13 and 1.5.x before 1.5.2 allows XSS via an HTML e-mail message with crafted Cascading Style Sheets (CSS) token sequences.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-43947 β€Ό

Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in the Email Templates feature. This issue bypasses the fix of https://jira.atlassian.com/browse/JSDSERVER-8665. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2022-0121 β€Ό

hoppscotch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2022-22704 β€Ό

The zabbix-agent2 package before 5.4.9-r1 for Alpine Linux sometimes allows privilege escalation to root because the design incorrectly expected that systemd would (in effect) determine part of the configuration.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-46141 β€Ό

An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-46143 β€Ό

In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2022-0122 β€Ό

forge is vulnerable to URL Redirection to Untrusted Site

πŸ“– Read

via "National Vulnerability Database".
03:40
β€Ό CVE-2021-46142 β€Ό

An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.

πŸ“– Read

via "National Vulnerability Database".
?
08:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Insecure Amazon S3 bucket exposed personal data on 500,000 Ghanaian graduates πŸ—“οΈ

Cloud storage misconfiguration left sensitive data openly accessible

πŸ“– Read

via "The Daily Swig".
?
08:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2022-22707 β€Ό

In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes), as demonstrated by remote denial of service (daemon crash).

πŸ“– Read

via "National Vulnerability Database".
08:40
β€Ό CVE-2021-36737 β€Ό

The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact

πŸ“– Read

via "National Vulnerability Database".
08:40
β€Ό CVE-2021-36738 β€Ό

The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact

πŸ“– Read

via "National Vulnerability Database".
08:40
β€Ό CVE-2021-46145 β€Ό

The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking. This is related to a non-expiring rolling code and counter resynchronization.

πŸ“– Read

via "National Vulnerability Database".
08:40
β€Ό CVE-2021-36739 β€Ό

The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.

πŸ“– Read

via "National Vulnerability Database".
?
10:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Kazakhstan government shuts down internet following country-wide protests πŸ—“οΈ

This isn’t the first time the landlocked nation has restricted web access for citizens

πŸ“– Read

via "The Daily Swig".
10:17
⚠ FTC threatens β€œlegal action” over unpatched Log4j and other vulns ⚠

Remember the Equifax breach? Remember the $700m penalty? In case you'd forgotten, here's the FTC to refresh your memory!

πŸ“– Read

via "Naked Security".
?
10:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44564 β€Ό

A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).

πŸ“– Read

via "National Vulnerability Database".
10:40
β€Ό CVE-2021-44351 β€Ό

An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.

πŸ“– Read

via "National Vulnerability Database".
10:47
⚠ S3 Ep64: Log4Shell again, scammers keeping busy, and Apple Home bug [Podcast + Transcript] ⚠

We're back for 2022 - listen now!

πŸ“– Read

via "Naked Security".
?
11:21
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Attackers Exploit Flaw in Google Docs’ Comments Feature ❌

A wave of phishing attacks identified in December targeting mainly Outlook users are difficult for both email scanners and victims to flag, researchers said.

πŸ“– Read

via "Threat Post".
?
12:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ New York Attorney General flags 1.1 million online accounts compromised by credential stuffing attacks πŸ—“οΈ

Bureau of Internet and Technology helped affected organizations secure accounts and bolster defenses

πŸ“– Read

via "The Daily Swig".
12:16
πŸ•΄ Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation πŸ•΄

Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.

πŸ“– Read

via "Dark Reading".
?
12:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-44590 β€Ό

In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-27738 β€Ό

All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-45457 β€Ό

In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-45456 β€Ό

Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-31522 β€Ό

Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-45458 β€Ό

Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-44878 β€Ό

Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-44584 β€Ό

Cross-site scripting (XSS) vulnerability in index.php in emlog version <= pro-1.0.7 allows remote attackers to inject arbitrary web script or HTML via the s parameter.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-44591 β€Ό

In libming 0.4.8, the parseSWF_DEFINELOSSLESS2 function in util/parser.c lacks a boundary check that would lead to denial-of-service attacks via a crafted SWF file.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2021-36774 β€Ό

Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
12:51
❌ Apple iPhone Malware Tactic Causes Fake Shutdowns to Enable Spying ❌

The 'NoReboot' technique is the ultimate in persistence for iPhone malware, preventing reboots and enabling remote attackers to do anything on the device while remaining completely unseen.

πŸ“– Read

via "Threat Post".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Java RMI services often vulnerable to SSRF attacks πŸ—“οΈ

Trust boundaries breached by security shortcomings

πŸ“– Read

via "The Daily Swig".
?
13:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Hackers exploit Google Docs in new phishing campaign 🦿

Attackers are taking advantage of the comment feature in Google Docs to send people emails with malicious links, says Avanan.

πŸ“– Read

via "Tech Republic".
13:51
❌ Partially Unpatched VMware Bug Opens Door to Hypervisor Takeover ❌

ESXi version 7 users are still waiting for a full fix for a high-severity heap-overflow security vulnerability, but Cloud Foundation, Fusion and Workstation users can go ahead and patch.

πŸ“– Read

via "Threat Post".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46076 β€Ό

Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46070 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-45744 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46079 β€Ό

An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46067 β€Ό

In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46068 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46069 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46075 β€Ό

A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46080 β€Ό

A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46074 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46071 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46073 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46078 β€Ό

An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-46072 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2021-45745 β€Ό

A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel.

πŸ“– Read

via "National Vulnerability Database".
14:47
πŸ•΄ New Mac Malware Samples Underscore Growing Threat πŸ•΄

A handful of malicious tools that emerged last year showed threat actors may be getting more serious about attacking Apple macOS and iOS environments.

πŸ“– Read

via "Dark Reading".
14:51
❌ Google Voice Authentication Scam Leaves Victims on the Hook ❌

The FBI is seeing so much activity around malicious Google Voice activity, where victims are associated with fraudulent virtual phone numbers, that it sent out an alert this week.

πŸ“– Read

via "Threat Post".
?
15:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession πŸ•΄

The prevailing mindset is that security practitioners are professionals, and thus, require a college degree. But there are some flaws in that logic.

πŸ“– Read

via "Dark Reading".
?
16:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps πŸ•΄

A Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.

πŸ“– Read

via "Dark Reading".
?
16:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-28714 β€Ό

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2022-0128 β€Ό

vim is vulnerable to Out-of-bounds Read

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2021-43045 β€Ό

A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2021-28715 β€Ό

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2021-4194 β€Ό

bookstack is vulnerable to Improper Access Control

πŸ“– Read

via "National Vulnerability Database".
16:46
πŸ•΄ Convergence Zone: CNAPP Aids in Integrated Cloud-Native Security πŸ•΄

Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.

πŸ“– Read

via "Dark Reading".
16:51
❌ Activision Files Unusual Lawsuit over Call of Duty Cheat Codes ❌

Activision is suing to shut down the EngineOwning cheat-code site and hold individual developers and coders liable for damages.

πŸ“– Read

via "Threat Post".
?
17:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New Mexico's Bernalillo County Investigates Ransomware Attack πŸ•΄

A suspected ransomware attack has led Bernalillo County officials to take systems offline and sever network connections.

πŸ“– Read

via "Dark Reading".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46042 β€Ό

A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the _fseeko function, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46041 β€Ό

A Segmentation Fault Vulnerability exists in GPAC 1.0.1 via the co64_box_new function, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46040 β€Ό

A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the finplace_shift_moov_meta_offsets function, which causes a Denial of Servie (context-dependent).

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2021-46039 β€Ό

A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the shift_chunk_offsets.part function, which causes a Denial of Service (context-dependent).

πŸ“– Read

via "National Vulnerability Database".
?
20:11
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-46044 β€Ό

A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOffset.isra, which causes a Denial of Service (context-dependent).

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-42841 β€Ό

Insta HMS before 12.4.10 is vulnerable to XSS because of improper validation of user-supplied input by multiple scripts. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

πŸ“– Read

via "National Vulnerability Database".
20:11
β€Ό CVE-2021-46043 β€Ό

A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the gf_list_count function, which causes a Denial of Service.

πŸ“– Read

via "National Vulnerability Database".
20:16
πŸ•΄ Google Docs Comments Weaponized in New Phishing Campaign πŸ•΄

Attackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.

πŸ“– Read

via "Dark Reading".
?
22:16
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2021-25743 β€Ό

kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2022-21664 β€Ό

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to lack of proper sanitization in one of the classes, there's potential for unintended SQL queries to be executed. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 4.1.34. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2022-21661 β€Ό

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2022-21663 β€Ό

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
22:16
β€Ό CVE-2022-21662 β€Ό

WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Low-privileged authenticated users (like author) in WordPress core are able to execute JavaScript/perform stored XSS attack, which can affect high-privileged users. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
7 January 2022
?
10:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Enterprises Worry About Increased Data Risk in Cloud πŸ•΄

The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.

πŸ“– Read

via "Dark Reading".
?
12:17
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Internet Bug Bounty: High severity vulnerability in Apache HTTP Server could lead to RCE πŸ—“οΈ

Buffer overflow flaw should be patched immediately

πŸ“– Read

via "The Daily Swig".
12:17
πŸ•΄ 7 Predictions for Global Energy Cybersecurity in 2022 πŸ•΄

Increased digitization makes strong cybersecurity more important than ever.

πŸ“– Read

via "Dark Reading".
12:22
❌ Log4J-Related RCE Flaw in H2 Database Earns Critical Rating ❌

Critical flaw in the H2 open-source Java SQL database are similar to the Log4J vulnerability, but do not pose a widespread threat.

πŸ“– Read

via "Threat Post".
?
12:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Latest WordPress security release fixes XSS, SQL injection bugs πŸ—“οΈ

Quartet of software flaws addressed ahead of next major release of popular CMS

πŸ“– Read

via "The Daily Swig".
?
13:14
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ—“οΈ Researchers discover Log4j-like flaw in H2 database console πŸ—“οΈ

Impact of JNDI bug mitigated by vulnerable behavior being disabled by default

πŸ“– Read

via "The Daily Swig".