‼ CVE-2021-26901 ‼
📖 Read
via "National Vulnerability Database".
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27054 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27053.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26893 ‼
📖 Read
via "National Vulnerability Database".
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26411 ‼
📖 Read
via "National Vulnerability Database".
Internet Explorer Memory Corruption Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26900 ‼
📖 Read
via "National Vulnerability Database".
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-27077.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26864 ‼
📖 Read
via "National Vulnerability Database".
Windows Virtual Registry Provider Elevation of Privilege Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26867 ‼
📖 Read
via "National Vulnerability Database".
Windows Hyper-V Remote Code Execution Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26862 ‼
📖 Read
via "National Vulnerability Database".
Windows Installer Elevation of Privilege Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5024 ‼
📖 Read
via "National Vulnerability Database".
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the SSL handshake response. IBM X-Force ID: 193660.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27061 ‼
📖 Read
via "National Vulnerability Database".
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27062.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24089 ‼
📖 Read
via "National Vulnerability Database".
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26898 ‼
📖 Read
via "National Vulnerability Database".
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27055 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Visio Security Feature Bypass Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26880 ‼
📖 Read
via "National Vulnerability Database".
Storage Spaces Controller Elevation of Privilege Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27057 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059.📖 Read
via "National Vulnerability Database".
🕴 Actionable Tips for Engaging the Board on Cybersecurity 🕴
📖 Read
via "Dark Reading".
Up your game with your company's board of directors to help them understand your cybersecurity priorities.📖 Read
via "Dark Reading".
Dark Reading
Actionable Tips for Engaging the Board on Cybersecurity
Up your game with your company's board of directors to help them understand your cybersecurity priorities.
❌ Microsoft Exchange Servers Face APT Attack Tsunami ❌
📖 Read
via "Threat Post".
At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount.📖 Read
via "Threat Post".
Threat Post
Microsoft Exchange Servers Face APT Attack Tsunami
At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount.
🕴 Microsoft Exchange Server Exploit Code Posted to GitHub 🕴
📖 Read
via "Dark Reading".
The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.📖 Read
via "Dark Reading".
Darkreading
Microsoft Exchange Server Exploit Code Posted to GitHub
The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.
❌ NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic ❌
📖 Read
via "Threat Post".
A spam campaign hides a malicious executable behind file archive extensions.📖 Read
via "Threat Post".
Threat Post
NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic
A spam campaign hides a malicious executable behind file archive extensions.
‼ CVE-2021-28144 ‼
📖 Read
via "National Vulnerability Database".
prog.cgi on D-Link DIR-3060 devices before 1.11b04 HF2 allows remote authenticated users to inject arbitrary commands in an admin or root context because SetVirtualServerSettings calls CheckArpTables, which calls popen unsafely.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-28141 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI.📖 Read
via "National Vulnerability Database".