βΌ CVE-2021-40500 βΌ
π Read
via "National Vulnerability Database".
SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38460 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37726 βΌ
π Read
via "National Vulnerability Database".
A remote buffer overflow vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 8.7.x.x: 8.7.0.0 through 8.7.1.2. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40495 βΌ
π Read
via "National Vulnerability Database".
There are multiple Denial-of Service vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755. An unauthorized attacker can use the public SICF service /sap/public/bc/abap to reduce the performance of SAP NetWeaver Application Server ABAP and ABAP Platform.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38180 βΌ
π Read
via "National Vulnerability Database".
SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Excel allow for command execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38178 βΌ
π Read
via "National Vulnerability Database".
The software logistics system of SAP NetWeaver AS ABAP and ABAP Platform versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, enables a malicious user to transfer ABAP code artifacts or content, by-passing the established quality gates. By this vulnerability malicious code can reach quality and production, and can compromise the confidentiality, integrity, and availability of the system and its data.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38183 βΌ
π Read
via "National Vulnerability Database".
SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40497 βΌ
π Read
via "National Vulnerability Database".
SAP BusinessObjects Analysis (edition for OLAP) - versions 420, 430, allows an attacker to exploit certain application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation could lead to exposure of some system specific data like its version.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21940 βΌ
π Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability exists in the pushMuxer processRtspInfo functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted network packet can lead to a heap buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37727 βΌ
π Read
via "National Vulnerability Database".
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40499 βΌ
π Read
via "National Vulnerability Database".
Client-side printing services SAP Cloud Print Manager and SAPSprint for SAP NetWeaver Application Server for ABAP - versions 7.70, 7.70 PI, 7.70 BYD, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2021-37730 βΌ
π Read
via "National Vulnerability Database".
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21941 βΌ
π Read
via "National Vulnerability Database".
A use-after-free vulnerability exists in the pushMuxer CreatePushThread functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38458 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40496 βΌ
π Read
via "National Vulnerability Database".
SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details.π Read
via "National Vulnerability Database".
ποΈ Google distributing 10,000 security keys to journalists, elected officials, human rights activists ποΈ
π Read
via "The Daily Swig".
Global initiative βwill definitely prevent some cyber-attacksβ, says expertπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Google distributing 10,000 security keys to journalists, elected officials, human rights activists
Global initiative βwill definitely prevent some cyber-attacksβ, says expert
π¦Ώ The different types of sudo and su in Linux π¦Ώ
π Read
via "Tech Republic".
Jack Wallen demystifies these two Linux admin tools because knowing which sudo or su command to run is important.π Read
via "Tech Republic".
TechRepublic
The different types of sudo and su in Linux
Jack Wallen demystifies these two Linux admin tools because knowing which sudo or su command to run is important.
π¦Ώ What it costs to hire a hacker on the Dark Web π¦Ώ
π Read
via "Tech Republic".
Though the final price for a cybercriminal's services is usually negotiated, personal attacks are the most expensive, says Comparitech.π Read
via "Tech Republic".
TechRepublic
What It Costs to Hire a Hacker on the Dark Web
The cost to hire a hacker can be incredibly cheap. Use this cybersecurity guide to learn about the major activities of hackers.
π΄ Why Choke-Point Analysis Is Essential in Active Directory Security π΄
π Read
via "Dark Reading".
Defense should focus on high-value choke points first to ensure that their most critical assets are protected, before moving on to deal with other attack paths.π Read
via "Dark Reading".
Dark Reading
Why Choke-Point Analysis Is Essential in Active Directory Security
Defense should focus on high-value choke points first to ensure that their most critical assets are protected, before moving on to deal with other attack paths.
β Office 365 Spy Campaign Targets US Military Defense β
π Read
via "Threat Post".
An Iran-linked group is taking aim at makers of drones and satellites, Persian Gulf ports and maritime shipping companies, among others.π Read
via "Threat Post".
Threat Post
Office 365 Spy Campaign Targets US Military Defense
An Iran-linked group is taking aim at makers of drones and satellites, Persian Gulf ports and maritime shipping companies, among others.
βΌ CVE-2021-37732 βΌ
π Read
via "National Vulnerability Database".
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.π Read
via "National Vulnerability Database".