β IP Surveillance Bugs in Axis Gear Allow RCE, Data Theft β
π Read
via "Threat Post".
Three security vulnerabilities in Axis video products could open up the door to a bevy of different cyberattacks on businesses.π Read
via "Threat Post".
Threat Post
IP Surveillance Bugs in Axis Gear Allow RCE, Data Theft
Three security vulnerabilities in Axis video products could open up the door to a bevy of different cyberattacks on businesses.
βΌ CVE-2021-3510 βΌ
π Read
via "National Vulnerability Database".
Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4π Read
via "National Vulnerability Database".
βΌ CVE-2021-41120 βΌ
π Read
via "National Vulnerability Database".
sylius/paypal-plugin is a paypal plugin for the Sylius development platform. In affected versions the URL to the payment page done after checkout was created with autoincremented payment id (/pay-with-paypal/{id}) and therefore it was easy to predict. The problem is that the Credit card form has prefilled "credit card holder" field with the Customer's first and last name and hence this can lead to personally identifiable information exposure. Additionally, the mentioned form did not require authentication. The problem has been patched in Sylius/PayPalPlugin 1.2.4 and 1.3.1. If users are unable to update they can override a sylius_paypal_plugin_pay_with_paypal_form route and change its URL parameters to (for example) {orderToken}/{paymentId}, then override the Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the @SyliusPayPalPlugin/payWithPaypal.html.twig template, to add contingencies: ['SCA_ALWAYS'] line in hostedFields.submit(...) function call (line 421). It would then have to be handled in the function callback.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3625 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363π Read
via "National Vulnerability Database".
βΌ CVE-2021-41124 βΌ
π Read
via "National Vulnerability Database".
Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).π Read
via "National Vulnerability Database".
βΌ CVE-2021-3319 βΌ
π Read
via "National Vulnerability Database".
DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364π Read
via "National Vulnerability Database".
βΌ CVE-2021-3581 βΌ
π Read
via "National Vulnerability Database".
Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5π Read
via "National Vulnerability Database".
βΌ CVE-2021-3436 βΌ
π Read
via "National Vulnerability Database".
BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63π Read
via "National Vulnerability Database".
π΄ Google to Enable Two-Factor Authentication for 150M More Users π΄
π Read
via "Dark Reading".
The company also provided guidance on how to protect information stored in inactive accounts.π Read
via "Dark Reading".
Dark Reading
Google to Enable Two-Factor Authentication for 150M More Users
The company also provided guidance on how to protect information stored in inactive accounts.
π΄ Mandiant Tackles Ransomware and Breaches With New Tools π΄
π Read
via "Dark Reading".
Mandiant's new software-as-a-service offerings tap into the company's extensive threat intelligence capabilities to help cybersecurity teams detect and respond to ransomware attacks and data breaches.π Read
via "Dark Reading".
Dark Reading
Mandiant Tackles Ransomware and Breaches With New Tools
Mandiant's new software-as-a-service offerings tap into the company's extensive threat intelligence capabilities to help cybersecurity teams detect and respond to ransomware attacks and data breaches.
π΄ Misconfigured Apache Airflow Platforms Threaten Organizations π΄
π Read
via "Dark Reading".
Security researchers found thousands of credentials for popular cloud-hosted services exposed on insecure instances of the popular workflow management technology.π Read
via "Dark Reading".
Dark Reading
Misconfigured Apache Airflow Platforms Threaten Organizations
Security researchers found thousands of credentials for popular cloud-hosted services exposed on insecure instances of the popular workflow management technology.
π΄ Mandia Alerted NSA on FireEye's SolarWinds Breach π΄
π Read
via "Dark Reading".
"National security" concerns led former CEO Kevin Mandia to call the NSA when FireEye discovered its breach in late 2020.π Read
via "Dark Reading".
Dark Reading
Mandia Alerted NSA on FireEye's SolarWinds Breach
"National security" concerns led former CEO Kevin Mandia to call the NSA when FireEye discovered its breach in late 2020.
βΌ CVE-2021-31987 βΌ
π Read
via "National Vulnerability Database".
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33849 βΌ
π Read
via "National Vulnerability Database".
A Cross-Site Scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a userΓ’β¬β’s browser while the browser is connected to a trusted website. The attack targets your application's users and not the application itself while using your application as the attack's vehicle. The XSS payload executes whenever the user changes the form values or deletes a created form in Zoho CRM Lead Magnet Version 1.7.2.4.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41122 βΌ
π Read
via "National Vulnerability Database".
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21506 βΌ
π Read
via "National Vulnerability Database".
waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?m=Config&a=add.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21503 βΌ
π Read
via "National Vulnerability Database".
waimai Super Cms 20150505 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture. By setting the index.php?m=gift&a=addsave credit parameter to -1, the product is sold for free.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21504 βΌ
π Read
via "National Vulnerability Database".
waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?&m=Public&a=login.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31986 βΌ
π Read
via "National Vulnerability Database".
User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21505 βΌ
π Read
via "National Vulnerability Database".
waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php/Link/addsave.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31988 βΌ
π Read
via "National Vulnerability Database".
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.π Read
via "National Vulnerability Database".