βΌ CVE-2021-41821 βΌ
π Read
via "National Vulnerability Database".
Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager.π Read
via "National Vulnerability Database".
βΌ CVE-2020-20129 βΌ
π Read
via "National Vulnerability Database".
LaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25963 βΌ
π Read
via "National Vulnerability Database".
In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41616 βΌ
π Read
via "National Vulnerability Database".
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.π Read
via "National Vulnerability Database".
β Thousands of University Wi-Fi Networks Expose Log-In Credentials β
π Read
via "Threat Post".
Certificate misconfigurations of the EAP protocol in Eduroam (and likely other networks globally) threaten Android and Windows users.π Read
via "Threat Post".
Threat Post
Thousands of University Wi-Fi Networks Expose Log-In Credentials
Certificate misconfigurations of the EAP protocol in Eduroam (and likely other networks globally) threaten Android and Windows users.
βΌ CVE-2021-41292 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41295 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41302 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain userΓ’β¬β’s privilege.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41298 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41300 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controllerΓ’β¬β’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41291 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41296 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41293 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41301 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41297 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41290 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41299 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administratorΓ’β¬β’s privilege without logging in.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41729 βΌ
π Read
via "National Vulnerability Database".
BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41294 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.π Read
via "National Vulnerability Database".
π¦Ώ You can install fail2ban on Rocky Linux and AlmaLinux: Here's how π¦Ώ
π Read
via "Tech Republic".
If you've yet to install fail2ban on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.π Read
via "Tech Republic".
TechRepublic
You can install fail2ban on Rocky Linux and AlmaLinux: Here's how
If you've yet to install fail2ban on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.
β The Top Ransomware Threats Arenβt Who You Think β
π Read
via "Threat Post".
Move over REvil, Ragnar Locker, BlackMatter, Conti et al: Three lesser-known gangs account for the vast majority of ransomware attacks in the U.S. and globally.π Read
via "Threat Post".