βΌ CVE-2021-25456 βΌ
π Read
via "National Vulnerability Database".
OOB read vulnerability in libswmfextractor.so library prior to SMR Sep-2021 Release 1 allows attackers to execute memcpy at arbitrary address via forged wmf file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28913 βΌ
π Read
via "National Vulnerability Database".
BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /webif/SecurityModule to validate the so called and hard coded unique 'eibPort String' which acts as the root SSH key passphrase. This is usable and part of an attack chain to gain SSH root access.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25464 βΌ
π Read
via "National Vulnerability Database".
An improper file management vulnerability in SamsungCapture prior to version 4.8.02 allows sensitive information leak.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25453 βΌ
π Read
via "National Vulnerability Database".
Some improper access control in Bluetooth APIs prior to SMR Sep-2021 Release 1 allows untrusted application to get Bluetooth information.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25451 βΌ
π Read
via "National Vulnerability Database".
A PendingIntent hijacking in NetworkPolicyManagerService prior to SMR Sep-2021 Release 1 allows attackers to get IMSI data.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38318 βΌ
π Read
via "National Vulnerability Database".
The 3D Cover Carousel WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/cover-carousel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38317 βΌ
π Read
via "National Vulnerability Database".
The Konnichiwa! Membership WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the plan_id parameter in the ~/views/subscriptions.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.8.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25455 βΌ
π Read
via "National Vulnerability Database".
OOB read vulnerability in libsaviextractor.so library prior to SMR Sep-2021 Release 1 allows attackers to access arbitrary address through pointer via forged avi file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28909 βΌ
π Read
via "National Vulnerability Database".
BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers to access uncontrolled the login service at /webif/SecurityModule in a brute force attack. The password could be weak and default username is known as 'admin'. This is usable and part of an attack chain to gain SSH root access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19266 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the index.php/Dswjcms/Site/articleList component of Dswjcms 1.6.4 allows attackers to execute arbitrary web scripts or HTML.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19265 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the index.php/Dswjcms/Basis/links component of Dswjcms 1.6.4 allows attackers to execute arbitrary web scripts or HTML.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25463 βΌ
π Read
via "National Vulnerability Database".
Improper access control vulnerability in PENUP prior to version 3.8.00.18 allows arbitrary webpage loading in webview.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25457 βΌ
π Read
via "National Vulnerability Database".
An improper input validation vulnerability in DSP driver prior to SMR Sep-2021 Release 1 allows local attackers to get a limited kernel memory information.π Read
via "National Vulnerability Database".
β McDonaldβs Email Blast Includes Password to Monopoly Game Database β
π Read
via "Threat Post".
Usernames, passwords for database sent in prize redemption emails.π Read
via "Threat Post".
Threat Post
McDonaldβs Email Blast Includes Password to Monopoly Game Database
Usernames, passwords for database sent in prize redemption emails.
βΌ CVE-2021-32724 βΌ
π Read
via "National Vulnerability Database".
check-spelling is a github action which provides CI spell checking. In affected versions and for a repository with the [check-spelling action](https://github.com/marketplace/actions/check-spelling) enabled that triggers on `pull_request_target` (or `schedule`), an attacker can send a crafted Pull Request that causes a `GITHUB_TOKEN` to be exposed. With the `GITHUB_TOKEN`, it's possible to push commits to the repository bypassing standard approval processes. Commits to the repository could then steal any/all secrets available to the repository. As a workaround users may can either: [Disable the workflow](https://docs.github.com/en/actions/managing-workflow-runs/disabling-and-enabling-a-workflow) until you've fixed all branches or Set repository to [Allow specific actions](https://docs.github.com/en/github/administering-a-repository/managing-repository-settings/disabling-or-limiting-github-actions-for-a-repository#allowing-specific-actions-to-run). check-spelling isn't a verified creator and it certainly won't be anytime soon. You could then explicitly add other actions that your repository uses. Set repository [Workflow permissions](https://docs.github.com/en/github/administering-a-repository/managing-repository-settings/disabling-or-limiting-github-actions-for-a-repository#setting-the-permissions-of-the-github_token-for-your-repository) to `Read repository contents permission`. Workflows using `check-spelling/check-spelling@main` will get the fix automatically. Workflows using a pinned sha or tagged version will need to change the affected workflows for all repository branches to the latest version. Users can verify who and which Pull Requests have been running the action by looking up the spelling.yml action in the Actions tab of their repositories, e.g., https://github.com/check-spelling/check-spelling/actions/workflows/spelling.yml - you can filter PRs by adding ?query=event%3Apull_request_target, e.g., https://github.com/check-spelling/check-spelling/actions/workflows/spelling.yml?query=event%3Apull_request_target.π Read
via "National Vulnerability Database".
β Thousands of Fortinet VPN Account Credentials Leaked β
π Read
via "Threat Post".
They were posted for free by former Babuk gang members whoβve bickered, squabbled and huffed off to start their own darn ransomware businesses, dagnabbit.π Read
via "Threat Post".
Threat Post
Thousands of Fortinet VPN Account Credentials Leaked
They were posted for free by former Babuk gang members whoβve bickered, squabbled and huffed off to start their own darn ransomware businesses, dagnabbit.
βΌ CVE-2020-19283 βΌ
π Read
via "National Vulnerability Database".
A reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19295 βΌ
π Read
via "National Vulnerability Database".
A reflected cross-site scripting (XSS) vulnerability in the /weibo/topic component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19286 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the /question/detail component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the source field of the editor.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39206 βΌ
π Read
via "National Vulnerability Database".
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19294 βΌ
π Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the /article/comment component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the article comments section.π Read
via "National Vulnerability Database".