βΌ CVE-2021-41301 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41297 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41290 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41299 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administratorΓ’β¬β’s privilege without logging in.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41729 βΌ
π Read
via "National Vulnerability Database".
BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41294 βΌ
π Read
via "National Vulnerability Database".
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.π Read
via "National Vulnerability Database".
π¦Ώ You can install fail2ban on Rocky Linux and AlmaLinux: Here's how π¦Ώ
π Read
via "Tech Republic".
If you've yet to install fail2ban on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.π Read
via "Tech Republic".
TechRepublic
You can install fail2ban on Rocky Linux and AlmaLinux: Here's how
If you've yet to install fail2ban on either Rocky Linux or AlmaLinux, Jack Wallen is here to help you out with that.
β The Top Ransomware Threats Arenβt Who You Think β
π Read
via "Threat Post".
Move over REvil, Ragnar Locker, BlackMatter, Conti et al: Three lesser-known gangs account for the vast majority of ransomware attacks in the U.S. and globally.π Read
via "Threat Post".
π΄ 5 Ways to Become a Better Cyber-Threat Exterminator π΄
π Read
via "Dark Reading".
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.π Read
via "Dark Reading".
Dark Reading
5 Ways to Become a Better Cyber-Threat Exterminator
Tactical threat intelligence feeds directly into security operations and helps tighten existing security controls and improve incident response times.
β How to steal money via Apple Pay using the βExpress Transitβ feature β
π Read
via "Naked Security".
Could a rogue vendor with a dodgy payment terminal rip you off via Apple Pay? Maybe. Here's what to do about it.π Read
via "Naked Security".
Naked Security
How to steal money via Apple Pay using the βExpress Transitβ feature
Could a rogue vendor with a dodgy payment terminal rip you off via Apple Pay? Maybe. Hereβs what to do about it.
ποΈ Latest web hacking tools β Q4 2021 ποΈ
π Read
via "The Daily Swig".
We take a look at the latest additions to security researchersβ armouryπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Latest web hacking tools β Q4 2021
We take a look at the latest additions to security researchersβ armoury
β Apple Pay with Visa Hacked to Make Payments via Unlocked iPhones β
π Read
via "Threat Post".
Researchers have demonstrated that someone could use a stolen, unlocked iPhone to pay for thousands of dollars of goods or services, no authentication needed.π Read
via "Threat Post".
βΌ CVE-2021-41720 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability in Lodash in 4.17.21 allows attackers to arbitrary code execution via the template function. NOTE: this is a different parameter, method, and version than CVE-2021-23337.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41109 βΌ
π Read
via "National Vulnerability Database".
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.4, for regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. A patch in version 4.10.4 removes session tokens from the LiveQuery payload. As a workaround, set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21089 βΌ
π Read
via "National Vulnerability Database".
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally escalate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.π Read
via "National Vulnerability Database".
ποΈ Bug Bounty Radar // The latest bug bounty programs for October 2021 ποΈ
π Read
via "The Daily Swig".
New web targets for the discerning hackerπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Bug Bounty Radar // The latest bug bounty programs for October 2021
New web targets for the discerning hacker
π΄ The New Security Basics: 10 Most Common Defensive Actions π΄
π Read
via "Dark Reading".
Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as part of a basic security strategy.π Read
via "Dark Reading".
Dark Reading
The New Security Basics: 10 Most Common Defensive Actions
Companies now commonly collect security metrics from their software development life cycle, implement basic security measures, and define their obligations to protect user data as part of a basic security strategy.
β How to steal money via Apple Pay using the βExpress Transitβ feature β
π Read
via "Naked Security".
Could a rogue vendor with a dodgy payment terminal rip you off via Apple Pay? Maybe. Here's what to do about it.π Read
via "Naked Security".
Naked Security
How to steal money via Apple Pay using the βExpress Transitβ feature
Could a rogue vendor with a dodgy payment terminal rip you off via Apple Pay? Maybe. Hereβs what to do about it.
β S3 Ep52: Letβs Encrypt, Outlook leak, and VMware exploit [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep52: Letβs Encrypt, Outlook leak, and VMware exploit [Podcast]
Latest episode β listen now!
π Haveged 1.9.15 π
π Read
via "Packet Storm Security".
haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.π Read
via "Packet Storm Security".
Packetstormsecurity
Haveged 1.9.15 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Innovative Proxy Phantom ATO Fraud Ring Haunts eCommerce Accounts β
π Read
via "Threat Post".
The group uses millions of password combos at the rate of nearly 2,700 login attempts per minute with new techniques that push the ATO envelope.π Read
via "Threat Post".
Threat Post
Innovative Proxy Phantom ATO Fraud Ring Haunts eCommerce Accounts
The group uses millions of password combos at the rate of 2,700 login attempts per minute with new techniques that push the ATO envelope.