βΌ CVE-2021-36878 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to update settings.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34413 βΌ
π Read
via "National Vulnerability Database".
All versions of the Zoom Plugin for Microsoft Outlook for MacOS before 5.3.52553.0918 contain a Time-of-check Time-of-use (TOC/TOU) vulnerability during the plugin installation process. This could allow a standard user to write their own malicious application to the plugin directory, allowing the malicious application to execute in a privileged context.π Read
via "National Vulnerability Database".
βΌ CVE-2021-26587 βΌ
π Read
via "National Vulnerability Database".
A potential DOM-based Cross Site Scripting security vulnerability has been identified in HPE StoreOnce. The vulnerability could be remotely exploited to cause an elevation of privilege leading to partial impact to confidentiality, availability, and integrity. HPE has made the following software update - HPE StoreOnce 4.3.0, to resolve the vulnerability in HPE StoreOnce.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34408 βΌ
π Read
via "National Vulnerability Database".
The Zoom Client for Meetings for Windows in all versions before version 5.3.2 writes log files to a user writable directory as a privileged user during the installation or update of the client. This could allow for potential privilege escalation if a link was created between the user writable directory used and a non-user writable directory.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37786 βΌ
π Read
via "National Vulnerability Database".
Certain Federal Office of Information Technology Systems and Telecommunication FOITT products are affected by improper handling of exceptional conditions. This affects COVID Certificate App IOS 2.2.0 and below affected, patch in progress and COVID Certificate Check App IOS 2.2.0 and below affected, patch in progress. A denial of service (physically proximate) could be caused by scanning a crafted QR code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34415 βΌ
π Read
via "National Vulnerability Database".
The Zone Controller service in the Zoom On-Premise Meeting Connector Controller before version 4.6.358.20210205 does not verify the cnt field sent in incoming network packets, which leads to exhaustion of resources and system crash.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34412 βΌ
π Read
via "National Vulnerability Database".
During the installation process for all versions of the Zoom Client for Meetings for Windows before 5.4.0, it is possible to launch Internet Explorer. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37539 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine ADManager Plus before 7111 is vulnerable to unrestricted file which leads to Remote code execution.π Read
via "National Vulnerability Database".
π΄ Telos, Splunk, stackArmor, AWS Announce FASTTR Initiative to Accelerate Compliance π΄
π Read
via "Dark Reading".
FASTTR initiative enhances stackArmor's ThreatAlert by building on market-leading Telos' Xacta for security compliance documentation and Splunk for security information and event management.π Read
via "Dark Reading".
Dark Reading
Telos, Splunk, stackArmor, AWS Announce FASTTR Initiative to Accelerate Compliance
FASTTR initiative enhances stackArmor's ThreatAlert by building on market-leading Telos' Xacta for security compliance documentation and Splunk for security information and event management.
π΄ Zero Trust Comes to Industry's Broadest Cybersecurity Platform π΄
π Read
via "Dark Reading".
Trend Micro Zero Trust Risk Insights continuously reveals and prioritizes risks for better decision making.π Read
via "Dark Reading".
Dark Reading
Zero Trust Comes to Industry's Broadest Cybersecurity Platform
Trend Micro Zero Trust Risk Insights continuously reveals and prioritizes risks for better decision making.
π΄ BloodyStealer: Advanced New Trojan Targets Accounts of Popular Online Gaming Platforms π΄
π Read
via "Dark Reading".
Kaspersky researchers have discovered an advanced Trojan, dubbed BloodyStealer, sold on darknet forums and used to steal gamersβ accounts on popular gaming platforms, including Steam, Epic Games Store, and EA Origin.π Read
via "Dark Reading".
Dark Reading
BloodyStealer: Advanced New Trojan Targets Accounts of Popular Online Gaming Platforms
Kaspersky researchers have discovered an advanced Trojan, dubbed BloodyStealer, sold on darknet forums and used to steal gamersβ accounts on popular gaming platforms, including Steam, Epic Games Store, and EA Origin.
π΄ Cloudflare Ventures into Simplifying Email Security π΄
π Read
via "Dark Reading".
The company adds complex email security technologies β including the alphabet soup of SPF, DKIM, and DMARC β as part of its service.π Read
via "Dark Reading".
Dark Reading
Cloud Security recent news | Dark Reading
Explore the latest news and expert commentary on Cloud Security, brought to you by the editors of Dark Reading
π¦Ώ Compromising a government network is so simple, an out-of-the-box, dark web RAT can do it π¦Ώ
π Read
via "Tech Republic".
Commercially-available malware, with minimal modification, is behind attacks against the Indian government, says Cisco's Talos security research group.π Read
via "Tech Republic".
TechRepublic
Compromising a government network is so simple, an out-of-the-box, dark web RAT can do it
Commercially-available malware, with minimal modification, is behind attacks against the Indian government, says Cisco's Talos security research group.
βΌ CVE-2021-24633 βΌ
π Read
via "National Vulnerability Database".
The Countdown Block WordPress plugin before 1.1.2 does not have authorisation in the eb_write_block_css AJAX action, which allows any authenticated user, such as Subscriber, to modify post contents displayed to users.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40709 βΌ
π Read
via "National Vulnerability Database".
Adobe Photoshop versions 21.2.11 (and earlier) and 22.5 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted SVG file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40700 βΌ
π Read
via "National Vulnerability Database".
Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24666 βΌ
π Read
via "National Vulnerability Database".
The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36877 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to modify user roles.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24659 βΌ
π Read
via "National Vulnerability Database".
The PostX ΓΒ’Γ’β¬Òβ¬Ε Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10 allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the plugin's block.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39818 βΌ
π Read
via "National Vulnerability Database".
Adobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24610 βΌ
π Read
via "National Vulnerability Database".
The TranslatePress WordPress plugin before 2.0.9 does not implement a proper sanitisation on the translated strings. The 'trp_sanitize_string' function only removes script tag with a regex, still allowing other HTML tags and attributes to execute javascript, which could lead to authenticated Stored Cross-Site Scripting issues.π Read
via "National Vulnerability Database".