βΌ CVE-2021-27004 βΌ
π Read
via "National Vulnerability Database".
System Manager 9.x versions 9.7 and higher prior to 9.7P16, 9.8P7 and 9.9.1P2 are susceptible to a vulnerability which could allow a local attacker to discover plaintext iSCSI CHAP credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25876 βΌ
π Read
via "National Vulnerability Database".
AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the u parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25877 βΌ
π Read
via "National Vulnerability Database".
AVideo/YouPHPTube 10.0 and prior is affected by Insecure file write. An administrator privileged user is able to write files on filesystem using flag and code variables in file save.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25875 βΌ
π Read
via "National Vulnerability Database".
AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the searchPhrase parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2021-25878 βΌ
π Read
via "National Vulnerability Database".
AVideo/YouPHPTube 10.0 and prior is affected by multiple reflected Cross Script Scripting vulnerabilities via the videoName parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42557 βΌ
π Read
via "National Vulnerability Database".
In Jeedom through 4.1.19, a bug allows a remote attacker to bypass API access and retrieve users credentials.π Read
via "National Vulnerability Database".
ποΈ Ransomware cybercriminals linked to Norsk Hydro attack fall prey to Europol swoop ποΈ
π Read
via "The Daily Swig".
Two-year investigation results in interrogation of βhigh-valueβ targets and seizure of cash and computersπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Ransomware cybercriminals linked to Norsk Hydro attack fall prey to Europol swoop
Two-year investigation results in raids targeting βhigh-valueβ suspects and seizure of cash and computers
ποΈ Bug Bounty Radar // The latest bug bounty programs for November 2021 ποΈ
π Read
via "The Daily Swig".
New web targets for the discerning hackerπ Read
via "The Daily Swig".
portswigger.net
Web Application Security, Testing, & Scanning - PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
π¦Ώ 10 ways ransomware attackers pressure you to pay the ransom π¦Ώ
π Read
via "Tech Republic".
Attackers will vow to publicly release the stolen data, try to delete any backups and even deploy DDoS attacks to convince victims to give in to the ransom demands, says Sophos.π Read
via "Tech Republic".
TechRepublic
10 ways ransomware attackers pressure you to pay the ransom
Attackers will vow to publicly release the stolen data, try to delete any backups and even deploy DDoS attacks to convince victims to give in to the ransom demands, says Sophos.
βΌ CVE-2021-3704 βΌ
π Read
via "National Vulnerability Database".
Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow a Denial of Service on the device.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38847 βΌ
π Read
via "National Vulnerability Database".
S-Cart v6.4.1 and below was discovered to contain an arbitrary file upload vulnerability in the Editor module on the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted IMG file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3440 βΌ
π Read
via "National Vulnerability Database".
HP Print and Scan Doctor, an application within the HP Smart App for Windows, is potentially vulnerable to local elevation of privilege.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27005 βΌ
π Read
via "National Vulnerability Database".
Clustered Data ONTAP versions 9.6 and higher prior to 9.6P16, 9.7P16, 9.8P7 and 9.9.1P3 are susceptible to a vulnerability which could allow a remote attacker to cause a crash of the httpd server.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29212 βΌ
π Read
via "National Vulnerability Database".
A remote unauthenticated directory traversal security vulnerability has been identified in HPE iLO Amplifier Pack versions 1.80, 1.81, 1.90 and 1.95. The vulnerability could be remotely exploited to allow an unauthenticated user to run arbitrary code leading complete impact to confidentiality, integrity, and availability of the iLO Amplifier Pack appliance.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3705 βΌ
π Read
via "National Vulnerability Database".
Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow an unauthorized user to reconfigure, reset the device.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29213 βΌ
π Read
via "National Vulnerability Database".
A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server's system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28702 βΌ
π Read
via "National Vulnerability Database".
A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information.π Read
via "National Vulnerability Database".
β βTrojan Sourceβ Hides Invisible Bugs in Source Code β
π Read
via "Threat Post".
The old RLO trick of exploiting how Unicode handles script ordering and a related homoglyph attack can imperceptibly switch the real name of malware.π Read
via "Threat Post".
Threat Post
βTrojan Sourceβ Hides Invisible Bugs in Source Code
The old RLO trick of exploiting how Unicode handles script ordering and a related homoglyph attack can imperceptibly switch the real name of malware.
ποΈ Multiple flaws in telecoms stack software FreeSwitch uncovered ποΈ
π Read
via "The Daily Swig".
Authentication and denial of service risks for DIY PBX tech patchedπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Multiple flaws in telecoms stack software FreeSwitch uncovered
Authentication and denial of service risks for DIY PBX tech patched
π΄ Name That Edge Toon: Parting Thoughts π΄
π Read
via "Dark Reading".
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.π Read
via "Dark Reading".
Dark Reading
Name That Edge Toon: Parting Thoughts
Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
βΌ CVE-2021-26740 βΌ
π Read
via "National Vulnerability Database".
Arbitrary file upload vulnerability sysupload.php in millken doyocms 2.3 allows attackers to execute arbitrary code.π Read
via "National Vulnerability Database".