βΌ CVE-2021-38385 βΌ
π Read
via "National Vulnerability Database".
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39271 βΌ
π Read
via "National Vulnerability Database".
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.π Read
via "National Vulnerability Database".
π¦Ώ How to use phishing simulations and security mailboxes with Microsoft 365's new security model π¦Ώ
π Read
via "Tech Republic".
Microsoft 365's "secure by default" stance removes some tools used by security teams. Here's how to work around the new restrictions.π Read
via "Tech Republic".
TechRepublic
Microsoft 365's new security model: How to use phishing simulations and security mailboxes
Microsoft 365's "secure by default" stance removes some tools used by security teams. Here's how to work around the new restrictions.
β LockBit Gang to Publish 103GB of Bangkok Air Customer Data β
π Read
via "Threat Post".
The airline announced the breach on Thursday, and the ransomware gang started a countdown clock the next day.π Read
via "Threat Post".
Threat Post
LockBit Gang to Publish 103GB of Bangkok Air Customer Data
The airline announced the breach on Thursday, and the ransomware gang started a countdown clock the next day.
βΌ CVE-2021-24580 βΌ
π Read
via "National Vulnerability Database".
The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the admin dashboard before using it in SQL statement, leading to a SQL Injection issueπ Read
via "National Vulnerability Database".
βΌ CVE-2021-24437 βΌ
π Read
via "National Vulnerability Database".
The Favicon by RealFaviconGenerator WordPress plugin through 1.3.20 does not sanitise or escape one of its parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting (XSS) which is executed in the context of a logged administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24528 βΌ
π Read
via "National Vulnerability Database".
The FluentSMTP WordPress plugin before 2.0.1 does not sanitize parameters before storing the settings in the database, nor does the plugin escape the values before outputting them when viewing the SMTP settings set by this plugin, leading to a stored cross site scripting (XSS) vulnerability. Only users with roles capable of managing plugins can modify the plugin's settings.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24593 βΌ
π Read
via "National Vulnerability Database".
The Business Hours Indicator WordPress plugin before 2.3.5 does not sanitise or escape its 'Now closed message" setting when outputting it in the backend and frontend, leading to an Authenticated Stored Cross-Site Scripting issueπ Read
via "National Vulnerability Database".
βΌ CVE-2021-37911 βΌ
π Read
via "National Vulnerability Database".
The management interface of BenQ smart wireless conference projector does not properly control user's privilege. Attackers can access any system directory of this device through the interface and execute arbitrary commands if he enters the local subnetwork.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24581 βΌ
π Read
via "National Vulnerability Database".
The Blue Admin WordPress plugin through 21.06.01 does not sanitise or escape its "Logo Title" setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin does not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24592 βΌ
π Read
via "National Vulnerability Database".
The Sitewide Notice WP WordPress plugin before 2.3 does not sanitise some of its settings before outputting them in frontend pages, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowedπ Read
via "National Vulnerability Database".
βΌ CVE-2021-24667 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting vulnerability has been discovered in : Simply Gallery Blocks with Lightbox (Version Γ’β¬β 2.2.0 & below). The vulnerability exists in the Lightbox functionality where a user with low privileges is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of image parameters in meta data.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24438 βΌ
π Read
via "National Vulnerability Database".
The ShareThis Dashboard for Google Analytics WordPress plugin before 2.5.2 does not sanitise or escape the 'ga_action' parameter in the stats view before outputting it back in an attribute when the plugin is connected to a Google Analytics account, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administratorπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25958 βΌ
π Read
via "National Vulnerability Database".
In Apache Ofbiz, versions v17.12.01 to v17.12.07 implement a try catch exception to handle errors at multiple locations but leaks out sensitive table info which may aid the attacker for further recon. A user can register with a very long password, but when he tries to login with it an exception occurs.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24665 βΌ
π Read
via "National Vulnerability Database".
The WP Video Lightbox WordPress plugin before 1.9.3 does not escape the attributes of its shortcodes, allowing users with a role as low as contributor to perform Cross-Site Scripting attacksπ Read
via "National Vulnerability Database".
βΌ CVE-2021-24579 βΌ
π Read
via "National Vulnerability Database".
The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.π Read
via "National Vulnerability Database".
π¦Ώ Paying ransom should be your last resort, cybersecurity expert says π¦Ώ
π Read
via "Tech Republic".
Some organizations can get by without paying in a ransomware attack, but others really have no choice, he says.π Read
via "Tech Republic".
TechRepublic
Paying ransom should be your last resort, cybersecurity expert says
Some organizations can get by without paying in a ransomware attack, but others really have no choice, he says.
π¦Ώ Expert: Governments and businesses must come together to combat ransomware threat π¦Ώ
π Read
via "Tech Republic".
Nations have to stop sheltering bad actors in order to stop them, expert says.π Read
via "Tech Republic".
TechRepublic
Expert: Governments and businesses must come together to combat ransomware threat
Nations have to stop sheltering bad actors in order to stop them, expert says.
β Microsoft Exchange βProxyTokenβ Bug Allows Email Snooping β
π Read
via "Threat Post".
The bug (CVE-2021-33766) is an information-disclosure issue that could reveal victims' personal information, sensitive company data and more.π Read
via "Threat Post".
Threat Post
Microsoft Exchange βProxyTokenβ Bug Allows Email Snooping
The bug (CVE-2021-33766) is an information-disclosure issue that could reveal victims' personal information, sensitive company data and more.
β The Underground Economy: Recon, Weaponization & Delivery for Account Takeovers β
π Read
via "Threat Post".
In part one of a two-part series, Akamai's director of security technology and strategy, Tony Lauro, lays out what orgs need to know to defend against account takeover attacks.π Read
via "Threat Post".
Threat Post
The Underground Economy: Recon, Weaponization & Delivery for Account Takeovers
In part one of a two-part series, Akamai's director of security technology and strategy, Tony Lauro, lays out what orgs need to know to defend against account takeover attacks.
π New DOJ Fellowship Program to Bridge Gap in Cyber Law Knowledge π
π Read
via "".
The Justice Department announced a new Cyber Fellowship program for attorneys to develop skills to handle emerging national security threats like ransomware.π Read
via "".
Digital Guardian
New DOJ Fellowship Program to Bridge Gap in Cyber Law Knowledge
The Justice Department announced a new Cyber Fellowship program for attorneys to develop skills to handle emerging national security threats like ransomware.