โผ CVE-2021-36283 โผ
๐ Read
via "National Vulnerability Database".
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-21569 โผ
๐ Read
via "National Vulnerability Database".
Dell NetWorker, versions 18.x and 19.x contain a Path traversal vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-36285 โผ
๐ Read
via "National Vulnerability Database".
Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-36286 โผ
๐ Read
via "National Vulnerability Database".
Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-36297 โผ
๐ Read
via "National Vulnerability Database".
SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,๐ Read
via "National Vulnerability Database".
โผ CVE-2021-41106 โผ
๐ Read
via "National Vulnerability Database".
JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Versions 3.4.6, 4.0.4, and 4.1.5 have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative. As a workaround, use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of one's keys.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-21522 โผ
๐ Read
via "National Vulnerability Database".
Dell BIOS contains a Credentials Management issue. A local authenticated malicious user may potentially exploit this vulnerability to gain access to sensitive information on an NVMe storage by resetting the BIOS password on the system via the Manageability Interface.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-21570 โผ
๐ Read
via "National Vulnerability Database".
Dell NetWorker, versions 18.x and 19.x contain an Information disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-36284 โผ
๐ Read
via "National Vulnerability Database".
Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a brute force attack.๐ Read
via "National Vulnerability Database".
๐ด Outsourced Software Pose Greater Risks to Enterprise Application Security ๐ด
๐ Read
via "Dark Reading".
In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to the organization's application security, according to Dark Reading's recent "How Enterprises Are Developing Secure Applications" report.๐ Read
via "Dark Reading".
Dark Reading
Outsourced Software Poses Greater Risks to Enterprise Application Security
In the wake of SolarWinds and other third-party attacks, security teams worry that outsourced applications pose risks to an organization's application security, according to Dark Reading's recent "How Enterprises Are Developing Secure Applications" report.
๐ด 75K Email Inboxes Hit in New Credential Phishing Campaign ๐ด
๐ Read
via "Dark Reading".
Attacker used a legitimate โ but likely deprecated โ domain to sneak malicious emails past security filters, vendor says.๐ Read
via "Dark Reading".
Dark Reading
75K Email Inboxes Hit in New Credential Phishing Campaign
Attacker used a legitimate โ but likely deprecated โ domain to sneak malicious emails past security filters, vendor says.
โผ CVE-2020-20122 โผ
๐ Read
via "National Vulnerability Database".
Wuzhi CMS v4.1 contains a SQL injection vulnerability in the checktitle() function in /coreframe/app/content/admin/content.php.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-20124 โผ
๐ Read
via "National Vulnerability Database".
Wuzhi CMS v4.1.0 contains a remote code execution (RCE) vulnerability in \attachment\admin\index.php.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-20120 โผ
๐ Read
via "National Vulnerability Database".
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-20125 โผ
๐ Read
via "National Vulnerability Database".
EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.๐ Read
via "National Vulnerability Database".
๐ข What makes a password secure? ๐ข
๐ Read
via "ITPro".
IT security is constantly evolving to counter threats, but the password remains a key part of our security arsenal๐ Read
via "ITPro".
IT PRO
What makes a password secure? | IT PRO
IT security is constantly evolving to counter threats, but the password remains a key part of our security arsenal
๐ข Amazon to offer cyber insurance to UK SMBs ๐ข
๐ Read
via "ITPro".
The insurance will cover risks such as accidental privacy breaches, extortion and ransomware๐ Read
via "ITPro".
IT PRO
Amazon to offer cyber insurance to UK SMBs | IT PRO
The insurance will cover risks such as accidental privacy breaches, extortion and ransomware
๐ข Women and BAME individuals are hardest hit by cyber crime ๐ข
๐ Read
via "ITPro".
Malwarebytes calls on the technology industry to do more to provide secure internet access to everyone๐ Read
via "ITPro".
IT PRO
Women and BAME individuals are hardest hit by cyber crime | IT PRO
Malwarebytes calls on the technology industry to do more to provide secure internet access to everyone
๐ข UKโs next National Cyber Strategy to reflect need for security industrial base ๐ข
๐ Read
via "ITPro".
The countryโs upcoming National Cyber Security Strategy will 'hopefully' be released later this year๐ Read
via "ITPro".
IT PRO
UKโs next National Cyber Strategy to reflect need for security industrial base | IT PRO
The countryโs upcoming National Cyber Security Strategy will 'hopefully' be released later this year
๐ข Hackers spoof Zix in credential phishing attack ๐ข
๐ Read
via "ITPro".
The attack has impacted around 75,000 Office 365, Google Workspace and Exchange users๐ Read
via "ITPro".
IT PRO
Hackers spoof Zix in credential phishing attack | IT PRO
The attack has impacted around 75,000 Office 365, Google Workspace and Exchange users
๐ข Large companies fall short on domain security ๐ข
๐ Read
via "ITPro".
Most large businesses still need to implement enterprise-level controls๐ Read
via "ITPro".
IT PRO
Large companies fall short on domain security | IT PRO
Most large businesses still need to implement enterprise-level controls