โผ CVE-2021-34726 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-34712 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct cypher query language injection attacks on an affected system. This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-34723 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability in a specific CLI command that is run on Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the configuration database of an affected device. This vulnerability is due to insufficient validation of specific CLI command parameters. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of the configuration database and gain root-level access to an affected device.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-1623 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability in the Simple Network Management Protocol (SNMP) punt handling function of Cisco cBR-8 Converged Broadband Routers could allow an authenticated, remote attacker to overload a device punt path, resulting in a denial of service (DoS) condition. This vulnerability is due to the punt path being overwhelmed by large quantities of SNMP requests. An attacker could exploit this vulnerability by sending a large number of SNMP requests to an affected device. A successful exploit could allow the attacker to overload the device punt path, resulting in a DoS condition.๐ Read
via "National Vulnerability Database".
๐๏ธ Beego patches severe XSS vulnerability in open source web framework ๐๏ธ
๐ Read
via "The Daily Swig".
Security flaw allowed attackers to gain a foothold into a victimโs network๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Beego patches severe XSS vulnerability in open source web framework
Security flaw allowed attackers to gain a foothold into a victimโs network
โ Large-Scale Phishing-as-a-Service Operation Exposed โ
๐ Read
via "Threat Post".
Discovery of BulletProofLinkโwhich provides phishing kits, email templates, hosting and other toolsโsheds light on how wannabe cybercriminals can get into the business.๐ Read
via "Threat Post".
Threat Post
Large-Scale Phishing-as-a-Service Operation Exposed
Discovery of BulletProofLinkโwhich provides phishing kits, email templates, hosting and other toolsโsheds light on how wannabe cybercriminals can get into the business.
๐๏ธ Netgear fixes RCE flaw in routersโ parental controls feature ๐๏ธ
๐ Read
via "The Daily Swig".
Bug in third-party code offers salutary lessons around enterprise risk management, say researchers๐ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Netgear fixes RCE flaw in routersโ parental controls feature
Bug in third-party code offers salutary lessons around enterprise risk management, say researchers
โ Domain Brand Monitor: The First Brand Protection Layer by WhoisXML API โ
๐ Read
via "Threat Post".
Domain names are often brands' most valuable and impersonated assets. Learn how Brand Monitor by WhoisXML API supports brand protection.๐ Read
via "Threat Post".
Threat Post
Domain Brand Monitor: The First Brand Protection Layer by WhoisXML API
Domain names are often brands' most valuable and impersonated assets. Learn how Brand Monitor by WhoisXML API supports brand protection.
โ Google Report Spotlights Uptick in Controversial โGeofence Warrantsโ by Police โ
๐ Read
via "Threat Post".
Digital privacy rights defenders contend that geofencing warrants grab data on everyone near a crime, without cause.๐ Read
via "Threat Post".
Threat Post
Google Report Spotlights Uptick in Controversial โGeofence Warrantsโ by Police
Digital privacy rights defenders contend that geofencing warrants grab data on everyone near a crime, without cause.
โ Acronis Offers up to $5,000 to Users Who Spot Bugs in Its Cyber Protection Products โ
๐ Read
via "Threat Post".
Once available only to the cybersecurity community, Acronis has opened its bug-hunting program to the public and aims to double the total bounties paid.๐ Read
via "Threat Post".
Threat Post
Acronis Offers up to $5,000 to Users Who Spot Bugs in Its Cyber Protection Products
Once available only to the cybersecurity community, Acronis has opened its bug-hunting program to the public and aims to double the total bounties paid.
โ๏ธ Indictment, Lawsuits Revive Trump-Alfa Bank Story โ๏ธ
๐ Read
via "Krebs on Security".
In October 2016, media outlets reported that data collected by some of the world's most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank, one of Russia's largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as well as a series of lawsuits and investigations that culminated last week with the indictment of the same former federal cybercrime prosecutor who brought the data to the attention of the FBI five years ago.๐ Read
via "Krebs on Security".
Krebs on Security
Indictment, Lawsuits Revive Trump-Alfa Bank Story
In October 2016, media outlets reported that data collected by some of the world's most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank, one of Russia'sโฆ
โผ CVE-2021-22019 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 5480 on vCenter Server may exploit this issue by sending a specially crafted jsonrpc message to create a denial of service condition.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22007 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains a local information disclosure vulnerability in the Analytics service. An authenticated user with non-administrative privilege may exploit this issue to gain access to sensitive information.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22949 โผ
๐ Read
via "National Vulnerability Database".
A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to UI inconvenience, and exhaustion of disk space.Credit for discovery: "Solar Security CMS Research Team"๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22016 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker may exploit this issue to execute malicious scripts by tricking a victim into clicking a malicious link.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22017 โผ
๐ Read
via "National Vulnerability Database".
Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22013 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains a file path traversal vulnerability leading to information disclosure in the appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22010 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22015 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains multiple local privilege escalation vulnerabilities due to improper permissions of files and directories. An authenticated local user with non-administrative privilege may exploit these issues to elevate their privileges to root on vCenter Server Appliance.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22014 โผ
๐ Read
via "National Vulnerability Database".
The vCenter Server contains an authenticated code execution vulnerability in VAMI (Virtual Appliance Management Infrastructure). An authenticated VAMI user with network access to port 5480 on vCenter Server may exploit this issue to execute code on the underlying operating system that hosts vCenter Server.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22952 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability found in UniFi Talk application V1.12.3 and earlier permits a malicious actor who has already gained access to a network to subsequently control Talk device(s) assigned to said network if they are not yet adopted. This vulnerability is fixed in UniFi Talk application V1.12.5 and later.๐ Read
via "National Vulnerability Database".