‼ CVE-2021-38925 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29764 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39350 ‼
📖 Read
via "National Vulnerability Database".
The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29758 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to perform actions that they should not be able to access due to improper access controls. IBM X-Force ID: 202169.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29836 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0. through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204912.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29837 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204913.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29903 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39351 ‼
📖 Read
via "National Vulnerability Database".
The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2.📖 Read
via "National Vulnerability Database".
🦿 Over 1.5 billion Facebook users' personal data found for sale on hacker forum 🦿
📖 Read
via "Tech Republic".
Unrelated to other recent problems Facebook has had, this particular batch of data was scraped from profiles, meaning it's publicly available knowledge. That doesn't stop it from being dangerous.📖 Read
via "Tech Republic".
TechRepublic
Over 1.5 billion Facebook users' personal data found for sale on hacker forum
Unrelated to other recent problems Facebook has had, this particular batch of data was scraped from profiles, meaning it's publicly available knowledge. That doesn't stop it from being dangerous.
🔏 New Ransomware Bill Would Require Organizations Report Ransom Costs 🔏
📖 Read
via "".
A bill introduced this week would require companies to disclose ransomware attacks and how much they cost victims within 48 hours.📖 Read
via "".
Digital Guardian
New Ransomware Bill Would Require Organizations Report Ransom Costs
A bill introduced this week would require companies to disclose ransomware attacks and how much they cost victims within 48 hours.
🕴 How to Determine the Best Managed Cybersecurity Model for You 🕴
📖 Read
via "Dark Reading".
Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine the best managed cybersecurity model?📖 Read
via "Dark Reading".
Dark Reading
How to Determine the Best Managed Cybersecurity Model for You
Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine the best managed cybersecurity model?
‼ CVE-2021-25497 ‼
📖 Read
via "National Vulnerability Database".
A possible buffer overflow vulnerability in maetd_cpy_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25496 ‼
📖 Read
via "National Vulnerability Database".
A possible buffer overflow vulnerability in maetd_dec_slice of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25485 ‼
📖 Read
via "National Vulnerability Database".
Path traversal vulnerability in FactoryAirCommnadManger prior to SMR Oct-2021 Release 1 allows attackers to write file as system UID via BT remote socket.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-38923 ‼
📖 Read
via "National Vulnerability Database".
IBM PowerVM Hypervisor FW1010 could allow a privileged user to gain access to another VM due to assigning duplicate WWPNs. IBM X-Force ID: 210162.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25495 ‼
📖 Read
via "National Vulnerability Database".
A possible heap buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25482 ‼
📖 Read
via "National Vulnerability Database".
SQL injection vulnerabilities in CMFA framework prior to SMR Oct-2021 Release 1 allow untrusted application to overwrite some CMFA framework information.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25486 ‼
📖 Read
via "National Vulnerability Database".
Exposure of information vulnerability in ipcdump prior to SMR Oct-2021 Release 1 allows an attacker detect device information via analyzing packet in log.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25492 ‼
📖 Read
via "National Vulnerability Database".
Lack of boundary checking of a buffer in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows OOB read.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25498 ‼
📖 Read
via "National Vulnerability Database".
A possible buffer overflow vulnerability in maetd_eco_cb_mode of libSPenBase library of Samsung Notes prior to Samsung Notes version 4.3.02.61 allows arbitrary code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25475 ‼
📖 Read
via "National Vulnerability Database".
A possible heap-based buffer overflow vulnerability in DSP kernel driver prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution.📖 Read
via "National Vulnerability Database".