‼ CVE-2021-26867 ‼
📖 Read
via "National Vulnerability Database".
Windows Hyper-V Remote Code Execution Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26862 ‼
📖 Read
via "National Vulnerability Database".
Windows Installer Elevation of Privilege Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5024 ‼
📖 Read
via "National Vulnerability Database".
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the SSL handshake response. IBM X-Force ID: 193660.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27061 ‼
📖 Read
via "National Vulnerability Database".
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27062.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24089 ‼
📖 Read
via "National Vulnerability Database".
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26898 ‼
📖 Read
via "National Vulnerability Database".
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27055 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Visio Security Feature Bypass Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-26880 ‼
📖 Read
via "National Vulnerability Database".
Storage Spaces Controller Elevation of Privilege Vulnerability📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27057 ‼
📖 Read
via "National Vulnerability Database".
Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059.📖 Read
via "National Vulnerability Database".
🕴 Actionable Tips for Engaging the Board on Cybersecurity 🕴
📖 Read
via "Dark Reading".
Up your game with your company's board of directors to help them understand your cybersecurity priorities.📖 Read
via "Dark Reading".
Dark Reading
Actionable Tips for Engaging the Board on Cybersecurity
Up your game with your company's board of directors to help them understand your cybersecurity priorities.
❌ Microsoft Exchange Servers Face APT Attack Tsunami ❌
📖 Read
via "Threat Post".
At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount.📖 Read
via "Threat Post".
Threat Post
Microsoft Exchange Servers Face APT Attack Tsunami
At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount.
🕴 Microsoft Exchange Server Exploit Code Posted to GitHub 🕴
📖 Read
via "Dark Reading".
The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.📖 Read
via "Dark Reading".
Darkreading
Microsoft Exchange Server Exploit Code Posted to GitHub
The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.
❌ NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic ❌
📖 Read
via "Threat Post".
A spam campaign hides a malicious executable behind file archive extensions.📖 Read
via "Threat Post".
Threat Post
NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic
A spam campaign hides a malicious executable behind file archive extensions.
‼ CVE-2021-28144 ‼
📖 Read
via "National Vulnerability Database".
prog.cgi on D-Link DIR-3060 devices before 1.11b04 HF2 allows remote authenticated users to inject arbitrary commands in an admin or root context because SetVirtualServerSettings calls CheckArpTables, which calls popen unsafely.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-28141 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27678 ‼
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Snippets in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27677 ‼
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Galleries in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-28088 ‼
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-21381 ‼
📖 Read
via "National Vulnerability Database".
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-14987 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Bloomreach Experience Manager (brXM) 4.1.0 through 14.2.2. It allows remote attackers to execute arbitrary code because there is a mishandling of the capability for administrators to write and run Groovy scripts within the updater editor. An attacker must use an AST transforming annotation such as @Grab.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-27679 ‼
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.📖 Read
via "National Vulnerability Database".