βΌ CVE-2020-18998 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component '/admin/custom/blog-plugin/add'.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19000 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component 'simiki/blob/master/simiki/generators.py'.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28698 βΌ
π Read
via "National Vulnerability Database".
long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of "cooperating" guests may, however, cause the effects to be more severe.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32758 βΌ
π Read
via "National Vulnerability Database".
OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23226 βΌ
π Read
via "National Vulnerability Database".
Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) datat.ph_inpup, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php.π Read
via "National Vulnerability Database".
β Winning the Cyber-Defense Race: Understand the Finish Line β
π Read
via "Threat Post".
Kerry Matre, Mandiant senior director, clears up misconceptions about the value to business for enterprise cyber-defense. Hint: It's not achieving visibility.π Read
via "Threat Post".
Threat Post
Winning the Cyber-Defense Race: Understand the Finish Line
Kerry Matre, Mandiant senior director, clears up misconceptions about the value to business for enterprise cyber-defense. Hint: It's not achieving visibility.
β Experts: WH Cybersecurity Summit Should Be Followed by Regulation, Enforcement β
π Read
via "Threat Post".
Amazon, Google, Microsoft etc. making major commitments to shore up nationβs cyber-defenses just won't be enough, researchers say.π Read
via "Threat Post".
Threat Post
Experts: WH Cybersecurity Summit Should Be Followed by Regulation, Enforcement
Amazon, Google, Microsoft etc. making major commitments to shore up nationβs cyber-defenses just won't be enough, researchers say.
π¦Ώ Security alert: The threat is coming from inside your Docker container images π¦Ώ
π Read
via "Tech Republic".
Five malicious Docker container images were recently detected on Docker Hub, totaling more than 120,000 pulls.π Read
via "Tech Republic".
TechRepublic
Security alert: The threat is coming from inside your Docker container images
Five malicious Docker container images were recently detected on Docker Hub, totaling more than 120,000 pulls.
β Parallels Offers βInconvenientβ Fix for High-Severity Bug β
π Read
via "Threat Post".
Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions.π Read
via "Threat Post".
Threat Post
Parallels Offers βInconvenientβ Fix for High-Severity Bug
Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions.
βΌ CVE-2020-18106 βΌ
π Read
via "National Vulnerability Database".
The GET parameter "id" in WMS v1.0 is passed without filtering, which allows attackers to perform SQL injection.π Read
via "National Vulnerability Database".
βΌ CVE-2020-18114 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the /uploads/dede component of DedeCMS V5.7SP2 allows attackers to upload a webshell in HTM format.π Read
via "National Vulnerability Database".
βΌ CVE-2020-18116 βΌ
π Read
via "National Vulnerability Database".
A lack of filtering for searched keywords in the search bar of YouDianCMS 8.0 allows attackers to perform SQL injection.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39174 βΌ
π Read
via "National Vulnerability Database".
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.π Read
via "National Vulnerability Database".
β T-Mobileβs Security Is βAwful,β Says Purported Thief β
π Read
via "Threat Post".
John Binns, claiming to be behind the massive T-Mobile theft of >50m customer records, dissed the security measures of the US's No. 2 wireless biggest carrier. T-Mobile is "humbled," it said, announcing new partnerships with security heavyweights on Friday.π Read
via "Threat Post".
Threat Post
T-Mobileβs Security Is βAwful,β Says Purported Thief
John Binns, claiming to be behind the massive T-Mobile theft of >50M customer records, dissed the security measures of the US's No. 2 wireless biggest carrier. T-Mobile is "humbled," it said.
βΌ CVE-2021-40176 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Log360 before Build 5225 allows stored XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40172 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40175 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40177 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40173 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40178 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40174 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings.π Read
via "National Vulnerability Database".