‼ CVE-2021-36356 ‼
📖 Read
via "National Vulnerability Database".
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.📖 Read
via "National Vulnerability Database".
❌ LockFile Ransomware Uses Never-Before Seen Encryption to Avoid Detection ❌
📖 Read
via "Threat Post".
Researchers from Sophos discovered the emerging threat in July, which exploits the ProxyShell vulnerabilities in Microsoft Exchange servers to attack systems.📖 Read
via "Threat Post".
Threat Post
LockFile Ransomware Uses Never-Before Seen Encryption to Avoid Detection
Researchers from Sophos discovered the emerging threat in July, which exploits the ProxyShell vulnerabilities in Microsoft Exchange servers to attack systems.
🦿 Cybercriminals are holding schools ransom for billions and some are paying up 🦿
📖 Read
via "Tech Republic".
A new report highlights the financial costs of school ransomware, days lost to downtime and the number of students impacted, as these incidents become a steady source of criminal income.📖 Read
via "Tech Republic".
TechRepublic
Cybercriminals are holding schools ransom for billions and some are paying up
A new report highlights the financial costs of school ransomware, days lost to downtime and the number of students impacted, as these incidents become a steady source of criminal income.
‼ CVE-2021-34578 ‼
📖 Read
via "National Vulnerability Database".
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34559 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33555 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34565 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34560 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34562 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3749 ‼
📖 Read
via "National Vulnerability Database".
axios is vulnerable to Inefficient Regular Expression Complexity📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34564 ‼
📖 Read
via "National Vulnerability Database".
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34563 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34561 ‼
📖 Read
via "National Vulnerability Database".
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34581 ‼
📖 Read
via "National Vulnerability Database".
Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.📖 Read
via "National Vulnerability Database".
🦿 Cybercriminals buy up admin credentials to sharpen attacks on cloud deployments 🦿
📖 Read
via "Tech Republic".
Lacework analysis finds that SSH, SQL, Docker and Redis were the most common targets over the last three months.📖 Read
via "Tech Republic".
TechRepublic
Cybercriminals buy up admin credentials to sharpen attacks on cloud deployments
Lacework analysis finds that SSH, SQL, Docker and Redis were the most common targets over the last three months.
❌ Top 3 APIs Vulnerabilities: Why Apps are Owned by Cyberattackers ❌
📖 Read
via "Threat Post".
Jason Kent, hacker-in-residence at Cequence, talks about how cybercriminals target apps and how to thwart them.📖 Read
via "Threat Post".
Threat Post
Top 3 API Vulnerabilities: Why Apps are Pwned by Cyberattackers
Jason Kent, hacker-in-residence at Cequence, talks about how cybercriminals target apps and how to thwart them.
🦿 Delta variant: Is your IT department ready to go fully remote again due to COVID-19? 🦿
📖 Read
via "Tech Republic".
The delta variant is delaying office reentry plans. For companies going fully remote again, team cohesion, cloud investments and reducing IT burden could be key, according to tech experts.📖 Read
via "Tech Republic".
TechRepublic
Delta variant: Is your IT department ready to go fully remote again due to COVID-19?
The delta variant is delaying office reentry plans. For companies going fully remote again, team cohesion, cloud investments and reducing IT burden could be key, according to tech experts.
‼ CVE-2021-35219 ‼
📖 Read
via "National Vulnerability Database".
ExportToPdfCmd Arbitrary File Read Information Disclosure Vulnerability using ImportAlert function within the Alerts Settings page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35220 ‼
📖 Read
via "National Vulnerability Database".
Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35222 ‼
📖 Read
via "National Vulnerability Database".
This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35221 ‼
📖 Read
via "National Vulnerability Database".
Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.📖 Read
via "National Vulnerability Database".