‼ CVE-2021-39845 ‼
📖 Read
via "National Vulnerability Database".
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40715 ‼
📖 Read
via "National Vulnerability Database".
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39856 ‼
📖 Read
via "National Vulnerability Database".
Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39835 ‼
📖 Read
via "National Vulnerability Database".
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed PDF file that could result in disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39841 ‼
📖 Read
via "National Vulnerability Database".
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Type Confusion vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40697 ‼
📖 Read
via "National Vulnerability Database".
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
🦿 Why organizations are slow to patch even high-profile vulnerabilities 🦿
📖 Read
via "Tech Republic".
Not all organizations have a team or even staffers who can focus solely on vulnerability management, says Trustwave.📖 Read
via "Tech Republic".
TechRepublic
Why organizations are slow to patch even high-profile vulnerabilities
Not all organizations have a team or even staffers who can focus solely on vulnerability management, says Trustwave.
🦿 Why organizations are slow to patch even high-profile vulnerabilities 🦿
📖 Read
via "Tech Republic".
Not all organizations have a team or even staffers who can focus solely on vulnerability management, says Trustwave.📖 Read
via "Tech Republic".
TechRepublic
Why organizations are slow to patch even high-profile vulnerabilities
Not all organizations have a team or even staffers who can focus solely on vulnerability management, says Trustwave.
🕴 Salt Security Finds Widespread Elastic Stack API Security Vulnerability that Exposes Customer and System Data 🕴
📖 Read
via "Dark Reading".
New threat research from the Salt Labs Security research team details Elastic Stack injection exploit that can result in DoS attacks and cascading API threats📖 Read
via "Dark Reading".
Dark Reading
Salt Security Finds Widespread Elastic Stack API Security Vulnerability that Exposes Customer and System Data
New threat research from the Salt Labs Security research team details Elastic Stack injection exploit that can result in DoS attacks and cascading API threats
🕴 1Password and Fastmail Partner to Boost Online Privacy 🕴
📖 Read
via "Dark Reading".
Allows users to securely generate unique email aliases, adding an extra layer of online privacy.📖 Read
via "Dark Reading".
Dark Reading
1Password and Fastmail Partner to Boost Online Privacy
Allows users to securely generate unique email aliases, adding an extra layer of online privacy.
🕴 Dell Technologies Addresses Modern Support and Security 🕴
📖 Read
via "Dark Reading".
Services and security updates deliver customized IT support and secure PC experiences for work-from-anywhere employees.📖 Read
via "Dark Reading".
Dark Reading
Dell Technologies Addresses Modern Support and Security
Services and security updates deliver customized IT support and secure PC experiences for work-from-anywhere employees.
‼ CVE-2021-41732 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that will invalidate any ZEEK HTTP based security analysis.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41573 ‼
📖 Read
via "National Vulnerability Database".
Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and later allows information disclosure. If authenticated user creates a link to a file or folder while the system was running version 4.3.x or earlier and then shares the link and then later deletes the file or folder without deleting the link and before the link expires. If the system has been upgraded to version 4.4.5 or 4.5.0 a malicious user with the link could browse and download all files of the authenticated user that created the link .📖 Read
via "National Vulnerability Database".
❌ Apple AirTag Zero-Day Weaponizes Trackers ❌
📖 Read
via "Threat Post".
Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS.📖 Read
via "Threat Post".
Threat Post
Apple AirTag Zero-Day Weaponizes Trackers
Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS.
🕴 50% of Servers Have Weak Security Long After Patches Are Released 🕴
📖 Read
via "Dark Reading".
Many servers remain vulnerable to high-severity flaws in Microsoft Exchange Server, VMware vCenter, Oracle WebLogic, and other popular products and services.📖 Read
via "Dark Reading".
Dark Reading
50% of Servers Have Weak Security Long After Patches Are Released
Many servers remain vulnerable to high-severity flaws in Microsoft Exchange Server, VMware vCenter, Oracle WebLogic, and other popular products and services.
🕴 Startup Beyond Identity Now Offers Passwordless Multifactor Authentication for Consumers 🕴
📖 Read
via "Dark Reading".
The announcement comes two weeks after Microsoft gave users the option to fully remove passwords from their accounts.📖 Read
via "Dark Reading".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
🕴 Shades of SolarWinds Attack Malware Found in New 'Tomiris' Backdoor 🕴
📖 Read
via "Dark Reading".
Malware contains similarities that suggest a possible link to malware that Russia's DarkHalo group used in its massive supply chain attack, researchers say.📖 Read
via "Dark Reading".
Dark Reading
Shades of SolarWinds Attack Malware Found in New 'Tomiris' Backdoor
Malware contains similarities that suggest a possible link to malware that Russia's DarkHalo group used in its massive supply chain attack, researchers say.
‼ CVE-2021-22946 ‼
📖 Read
via "National Vulnerability Database".
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41764 ‼
📖 Read
via "National Vulnerability Database".
A cross-site request forgery (CSRF) vulnerability exists in Streama up to and including v1.10.3. The application does not have CSRF checks in place when performing actions such as uploading local files. As a result, attackers could make a logged-in administrator upload arbitrary local files via a CSRF attack and send them to the attacker.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-35944 ‼
📖 Read
via "National Vulnerability Database".
Couchbase Server 6.5.x, 6.6.x through 6.6.2, and 7.0.0 has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-22947 ‼
📖 Read
via "National Vulnerability Database".
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.📖 Read
via "National Vulnerability Database".