‼ CVE-2020-20486 ‼
📖 Read
via "National Vulnerability Database".
IEC104 v1.0 contains a stack-buffer overflow in the parameter Iec10x_Sta_Addr.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-37415 ‼
📖 Read
via "National Vulnerability Database".
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39109 ‼
📖 Read
via "National Vulnerability Database".
The renderWidgetResource resource in Atlasian Atlasboard before version 1.1.9 allows remote attackers to read arbitrary files via a path traversal vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33582 ‼
📖 Read
via "National Vulnerability Database".
Cyrus IMAP before 3.4.2 allows remote attackers to cause a denial of service (multiple-minute daemon hang) via input that is mishandled during hash-table interaction. Because there are many insertions into a single bucket, strcmp becomes slow. This is fixed in 3.4.2, 3.2.8, and 3.0.16.📖 Read
via "National Vulnerability Database".
❌ Feds Warn of Ransomware Attacks Ahead of Labor Day ❌
📖 Read
via "Threat Post".
Threat actors recently have used long holiday weekends -- when many staff are taking time off -- as a prime opportunity to ambush organizations.📖 Read
via "Threat Post".
Threat Post
Feds Warn of Ransomware Attacks Ahead of Labor Day
Threat actors recently have used long holiday weekends — when many staff are taking time off — as a prime opportunity to ambush organizations.
‼ CVE-2020-9000 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in iPortalis iCS 7.1.13.0. Attackers can send a sequence of requests to rapidly cause .NET Input Validation errors. This increases the size of the log file on the remote server until memory is exhausted, therefore consuming the maximum amount of resources (triggering a denial of service condition).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-9002 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in iPortalis iCS 7.1.13.0. An attacker can gain privileges by intercepting a request and changing UserRoleKey=COMPANY_ADMIN to UserRoleKey=DOMAIN_ADMIN (to achieve Domain Administrator access).📖 Read
via "National Vulnerability Database".
❌ BEC Scammers Seek Native English Speakers on Underground ❌
📖 Read
via "Threat Post".
Cybercrooks are posting help-wanted ads on dark web forums, promising to do the technical work of compromising email accounts but looking for native English speakers to carry out the social-engineering part of these lucrative scams.📖 Read
via "Threat Post".
Threat Post
BEC Scammers Seek Native English Speakers on Underground
Cybercrooks are posting help-wanted ads on dark web forums, promising to do the technical work of compromising email accounts but looking for native English speakers to carry out the social-engineering part of these lucrative scams.
❌ LockBit Jumps Its Own Countdown, Publishes Bangkok Air Files ❌
📖 Read
via "Threat Post".
The ransomware gang claims to have pulled off successful attacks against two airlines and one airport with help from its Accenture attack.📖 Read
via "Threat Post".
Threat Post
LockBit Jumps Its Own Countdown, Publishes Bangkok Air Files
The ransomware gang claims to have pulled off successful attacks against two airlines and one airport with help from its Accenture attack.
‼ CVE-2021-36042 ‼
📖 Read
via "National Vulnerability Database".
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability in the API File Option Upload Extension. An attacker with Admin privileges can achieve unrestricted file upload which can result in remote code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36032 ‼
📖 Read
via "National Vulnerability Database".
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. An authenticated attacker can trigger an insecure direct object reference in the `V1/customers/me` endpoint to achieve information exposure and privilege escalation.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36053 ‼
📖 Read
via "National Vulnerability Database".
XMP Toolkit SDK versions 2020.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36054 ‼
📖 Read
via "National Vulnerability Database".
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in local application denial of service in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36066 ‼
📖 Read
via "National Vulnerability Database".
Adobe Photoshop versions 21.2.10 (and earlier) and 22.4.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36058 ‼
📖 Read
via "National Vulnerability Database".
XMP Toolkit SDK version 2020.1 (and earlier) is affected by an Integer Overflow vulnerability potentially resulting in application-level denial of service in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36068 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36069 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39170 ‼
📖 Read
via "National Vulnerability Database".
Pimcore is an open source data & experience management platform. Prior to version 10.1.2, an authenticated user could add XSS code as a value of custom metadata on assets. There is a patch for this issue in Pimcore version 10.1.2. As a workaround, users may apply the patch manually.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36072 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge versions 11.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36077 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in local application denial of service in the context of the current user. User interaction is required to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36075 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 11.1 (and earlier) is affected by a Buffer Overflow vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.📖 Read
via "National Vulnerability Database".