‼ CVE-2021-38299 ‼
📖 Read
via "National Vulnerability Database".
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.📖 Read
via "National Vulnerability Database".
🗓️ Opera browser patches My Flow remote code execution vulnerability 🗓️
📖 Read
via "The Daily Swig".
A bug bounty hunter was able to pivot from XSS to full-blown RCE📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Opera browser patches My Flow remote code execution vulnerability
A bug bounty hunter was able to pivot from XSS to full-blown RCE
‼ CVE-2021-20317 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in the Linux kernel. A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-23054 ‼
📖 Read
via "National Vulnerability Database".
On version 16.x before 16.1.0, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, a reflected cross-site scripting (XSS) vulnerability exists in the resource information page for authenticated users when a full webtop is configured on the BIG-IP APM system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.📖 Read
via "National Vulnerability Database".
🕴 Research Highlights Significant Evolution in Email Security 🕴
📖 Read
via "Dark Reading".
Email security is in transition, from on-premises to the cloud, from inline to API-based, and from stand-alone to integrated into XDR. New research from Omdia highlights where the market is today, and where it is heading.📖 Read
via "Dark Reading".
Dark Reading
Research Highlights Significant Evolution in Email Security
Email security is in transition, from on-premises to the cloud, from inline to API-based, and from stand-alone to integrated into XDR. New research from Omdia highlights where the market is today, and where it is heading.
🗓️ VMware vCenter deployments under attack as enterprises urged to update systems 🗓️
📖 Read
via "The Daily Swig".
Mass scanning detected after RCE exploits surface online📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
VMware vCenter deployments under attack as enterprises urged to update systems
Mass scanning detected after RCE exploits surface online
🕴 How to Get Started With Zero Trust in a SaaS Environment 🕴
📖 Read
via "Dark Reading".
Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero trust.📖 Read
via "Dark Reading".
Dark Reading
How to Get Started With Zero Trust in a SaaS Environment
Given current business conditions and the prevalence of SaaS technologies, now is the time to take steps toward zero trust.
🦿 New SMS malware targets Android users through fake COVID messages 🦿
📖 Read
via "Tech Republic".
Dubbed TangleBot, the malware can overlay financial apps with its own screens in an attempt to steal your account credentials, says Cloudmark.📖 Read
via "Tech Republic".
TechRepublic
New SMS malware targets Android users through fake COVID messages
Dubbed TangleBot, the malware can overlay financial apps with its own screens in an attempt to steal your account credentials, says Cloudmark.
‼ CVE-2021-0425 ‼
📖 Read
via "National Vulnerability Database".
In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40109 ‼
📖 Read
via "National Vulnerability Database".
A SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of the file from the redirected-to server. Files of disallowed types can be uploaded.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40098 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Concrete CMS through 8.5.5. Path Traversal leading to RCE via external form by adding a regular expression.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40105 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Concrete CMS through 8.5.5. There is XSS via Markdown Comments.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0611 ‼
📖 Read
via "National Vulnerability Database".
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0424 ‼
📖 Read
via "National Vulnerability Database".
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40097 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Concrete CMS through 8.5.5. Authenticated path traversal leads to to remote code execution via uploaded PHP code, related to the bFilename parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40108 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0612 ‼
📖 Read
via "National Vulnerability Database".
In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3820 ‼
📖 Read
via "National Vulnerability Database".
inflect is vulnerable to Inefficient Regular Expression Complexity📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0421 ‼
📖 Read
via "National Vulnerability Database".
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3822 ‼
📖 Read
via "National Vulnerability Database".
jsoneditor is vulnerable to Inefficient Regular Expression Complexity📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3828 ‼
📖 Read
via "National Vulnerability Database".
nltk is vulnerable to Inefficient Regular Expression Complexity📖 Read
via "National Vulnerability Database".