βΌ CVE-2021-40498 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, which can lead to denial of service. The vulnerability is related to Android implementation methods that are widely used across Android mobile applications, and such methods are embedded into the SAP SuccessFactors mobile application. These Android methods begin executing once the user accesses their profile on the mobile application. While executing, it can also pick up the activities from other Android applications that are running in the background of the users device and are using the same types of methods in the application. Such vulnerability can also lead to phishing attacks that can be used for staging other types of attacks.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38454 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25634 βΌ
π Read
via "National Vulnerability Database".
LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to modify a digitally signed ODF document to insert an additional signing time timestamp which LibreOffice would incorrectly present as a valid signature signed at the bogus signing time. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38456 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40500 βΌ
π Read
via "National Vulnerability Database".
SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38460 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37726 βΌ
π Read
via "National Vulnerability Database".
A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40495 βΌ
π Read
via "National Vulnerability Database".
There are multiple Denial-of Service vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755. An unauthorized attacker can use the public SICF service /sap/public/bc/abap to reduce the performance of SAP NetWeaver Application Server ABAP and ABAP Platform.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38180 βΌ
π Read
via "National Vulnerability Database".
SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Excel allow for command execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38178 βΌ
π Read
via "National Vulnerability Database".
The software logistics system of SAP NetWeaver AS ABAP and ABAP Platform versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, enables a malicious user to transfer ABAP code artifacts or content, by-passing the established quality gates. By this vulnerability malicious code can reach quality and production, and can compromise the confidentiality, integrity, and availability of the system and its data.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38183 βΌ
π Read
via "National Vulnerability Database".
SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40497 βΌ
π Read
via "National Vulnerability Database".
SAP BusinessObjects Analysis (edition for OLAP) - versions 420, 430, allows an attacker to exploit certain application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation could lead to exposure of some system specific data like its version.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21940 βΌ
π Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability exists in the pushMuxer processRtspInfo functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted network packet can lead to a heap buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37727 βΌ
π Read
via "National Vulnerability Database".
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40499 βΌ
π Read
via "National Vulnerability Database".
Client-side printing services SAP Cloud Print Manager and SAPSprint for SAP NetWeaver Application Server for ABAP - versions 7.70, 7.70 PI, 7.70 BYD, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37730 βΌ
π Read
via "National Vulnerability Database".
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21941 βΌ
π Read
via "National Vulnerability Database".
A use-after-free vulnerability exists in the pushMuxer CreatePushThread functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38458 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40496 βΌ
π Read
via "National Vulnerability Database".
SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details.π Read
via "National Vulnerability Database".
ποΈ Google distributing 10,000 security keys to journalists, elected officials, human rights activists ποΈ
π Read
via "The Daily Swig".
Global initiative βwill definitely prevent some cyber-attacksβ, says expertπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Google distributing 10,000 security keys to journalists, elected officials, human rights activists
Global initiative βwill definitely prevent some cyber-attacksβ, says expert
π¦Ώ The different types of sudo and su in Linux π¦Ώ
π Read
via "Tech Republic".
Jack Wallen demystifies these two Linux admin tools because knowing which sudo or su command to run is important.π Read
via "Tech Republic".
TechRepublic
The different types of sudo and su in Linux
Jack Wallen demystifies these two Linux admin tools because knowing which sudo or su command to run is important.