🛠 GNU Privacy Guard 2.2.27 🛠
📖 Read
via "Packet Storm Security".
GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.📖 Read
via "Packet Storm Security".
Packetstormsecurity
GNU Privacy Guard 2.2.27 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🦿 CES 2021: All of the business tech news you need to know 🦿
📖 Read
via "Tech Republic".
Don't miss TechRepublic's CES 2021 coverage, which includes product announcements from Lenovo, Samsung, LG, and Dell about PCs, laptops, software, robots, monitors, and TVs.📖 Read
via "Tech Republic".
TechRepublic
CES 2021: All of the business tech news you need to know
Don't miss TechRepublic's CES 2021 coverage, which includes product announcements from Lenovo, Samsung, LG, and Dell about PCs, laptops, software, robots, monitors, and TVs.
🦿 5 best languages for cloud engineers to learn 🦿
📖 Read
via "Tech Republic".
Whether you're trying to break into the role or are already a cloud engineer, these programming languages are a must for maintaining an edge over the competition.📖 Read
via "Tech Republic".
TechRepublic
5 programming languages cloud engineers should learn
Whether you're trying to break into the role or you're already a cloud engineer, these programming languages are a must for maintaining an edge over the competition.
❌ Adobe Fixes 7 Critical Flaws, Blocks Flash Player Content ❌
📖 Read
via "Threat Post".
Adobe issued patches for seven critical arbitrary-code-execution flaws plaguing Windows and MacOS users.📖 Read
via "Threat Post".
Threat Post
Adobe Fixes 7 Critical Flaws, Blocks Flash Player Content
Adobe issued patches for seven critical arbitrary-code-execution flaws plaguing Windows and MacOS users.
‼ CVE-2021-21445 ‼
📖 Read
via "National Vulnerability Database".
SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35458 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21457 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21464 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21451 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated SGI file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21459 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21471 ‼
📖 Read
via "National Vulnerability Database".
In CLA-Assistant, versions before 2.8.5, due to improper access control an authenticated user could access API endpoints which are not intended to be used by the user. This could impact the integrity of the application.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3129 ‼
📖 Read
via "National Vulnerability Database".
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21455 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-14341 ‼
📖 Read
via "National Vulnerability Database".
The "Test Connection" available in v7.x of the Red Hat Single Sign On application console can permit an authorized user to cause SMTP connections to be attempted to arbitrary hosts and ports of the user's choosing, and originating from the RHSSO installation. By observing differences in the timings of these scans, an attacker may glean information about hosts and ports which they do not have access to scan directly.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-4674 ‼
📖 Read
via "National Vulnerability Database".
IBM Workload Automation 9.5 stores the server path in URLs that could aid in further attacks against the system. IBM X-Force ID: 186287.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21450 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PSD file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21462 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21463 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21460 ‼
📖 Read
via "National Vulnerability Database".
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21468 ‼
📖 Read
via "National Vulnerability Database".
The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21469 ‼
📖 Read
via "National Vulnerability Database".
When security guidelines for SAP NetWeaver Master Data Management, versions 7.10, 710, and 710.750, running on windows have not been thoroughly reviewed, it might be possible for an external operator to try and set custom paths in the MDS server configuration. When no adequate protection has been enforced on any level (e.g., MDS Server password not set, network and OS configuration not properly secured, etc.), a malicious user might define UNC paths which could then be exploited to put the system at risk using a so-called SMB relay attack and obtain highly sensitive data, which leads to Information Disclosure.📖 Read
via "National Vulnerability Database".