β Apache patch proves patchy β now you need to patch the patch β
π Read
via "Naked Security".
Once more unto the breach, dear friends, once more, and close up the hole of encoding dread.π Read
via "Naked Security".
Naked Security
Apache patch proves patchy β now you need to patch the patch
Once more unto the breach, dear friends, once more, and close up the hole of encoding dread.
β S3 Ep53: Apple Pay, giftcards, cybermonth, and ransomware busts [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep53: Apple Pay, giftcards, cybermonth, and ransomware busts [Podcast]
Latest episode β listen now!
π nfstream 6.3.5 π
π Read
via "Packet Storm Security".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.π Read
via "Packet Storm Security".
Packetstormsecurity
nfstream 6.3.5 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Zed Attack Proxy 2.11.0 Cross Platform Package π
π Read
via "Packet Storm Security".
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.π Read
via "Packet Storm Security".
Packetstormsecurity
Zed Attack Proxy 2.11.0 Cross Platform Package β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2021-3312 βΌ
π Read
via "National Vulnerability Database".
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35979 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41133 βΌ
π Read
via "National Vulnerability Database".
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host-OS services into treating the Flatpak app as though it was an ordinary, non-sandboxed host-OS process. They can do this by manipulating the VFS using recent mount-related syscalls that are not blocked by Flatpak's denylist seccomp filter, in order to substitute a crafted `/.flatpak-info` or make that file disappear entirely. Flatpak apps that act as clients for AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can escalate the privileges that the corresponding services will believe the Flatpak app has. Note that protocols that operate entirely over the D-Bus session bus (user bus), system bus or accessibility bus are not affected by this. This is due to the use of a proxy process `xdg-dbus-proxy`, whose VFS cannot be manipulated by the Flatpak app, when interacting with these buses. Patches exist for versions 1.10.4 and 1.12.0, and as of time of publication, a patch for version 1.8.2 is being planned. There are no workarounds aside from upgrading to a patched version.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36767 βΌ
π Read
via "National Vulnerability Database".
In Digi RealPort through 4.8.488.0, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35977 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution.π Read
via "National Vulnerability Database".
π Friday Five 10/8 π
π Read
via "".
News on CISA's new system to attract cyber talent, an Apache zero day, and Microsoft on the lack of acceptance around MFA - catch up on the news of the week with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 10/8
News on CISA's new system to attract cyber talent, an Apache zero day, and Microsoft on the lack of acceptance around MFA - catch up on the news of the week with the Friday Five!
π΄ 'FontOnLake' Malware Family Targets Linux Systems π΄
π Read
via "Dark Reading".
Researchers report that the location of its C2 server, the countries where samples were uploaded, may indicate targets include Southeast Asia.π Read
via "Dark Reading".
Dark Reading
'FontOnLake' Malware Family Targets Linux Systems
Researchers report that the location of its C2 server and the countries where samples were uploaded may indicate targets include Southeast Asia.
π΄ 71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms π΄
π Read
via "Dark Reading".
Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.π Read
via "Dark Reading".
Dark Reading
71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms
Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.
π¦Ώ Motion Picture Academy employs cutting-edge tech to keep Oscar contenders secure π¦Ώ
π Read
via "Tech Republic".
With video use on the rise across the board, new technologies are being deployed to prevent it from being pirated or showing up in places it shouldn't.π Read
via "Tech Republic".
TechRepublic
Motion Picture Academy employs cutting-edge tech to keep Oscar contenders secure
With video use on the rise across the board, new technologies are being deployed to prevent it from being pirated or showing up in places it shouldn't.
βΌ CVE-2021-41564 βΌ
π Read
via "National Vulnerability Database".
Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41802 βΌ
π Read
via "National Vulnerability Database".
HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other userΓ’β¬β’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41975 βΌ
π Read
via "National Vulnerability Database".
TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41920 βΌ
π Read
via "National Vulnerability Database".
webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41916 βΌ
π Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41825 βΌ
π Read
via "National Vulnerability Database".
Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML injection via the /wfo/control/signin username parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41919 βΌ
π Read
via "National Vulnerability Database".
webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41917 βΌ
π Read
via "National Vulnerability Database".
webTareas version 2.4 and earlier allows an authenticated user to store arbitrary web script or HTML by creating or editing a client name in the clients section, due to incorrect sanitization of user-supplied data and achieve a Stored Cross-Site Scripting attack against the platform users and administrators. The affected endpoint is /clients/editclient.php, on the HTTP POST cn parameter.π Read
via "National Vulnerability Database".