π΄ SaaS and Third-Party Risk: Is Your Organization Asking the Hard Questions? π΄
π Read
via "Dark Reading".
An investment in due diligence might prevent your organization from being part of next week's breach news cycle.π Read
via "Dark Reading".
Dark Reading
SaaS and Third-Party Risk: Is Your Organization Asking the Hard Questions?
An investment in due diligence might prevent your organization from being part of next week's breach news cycle.
β Android Patches Actively Exploited Zero-Day Kernel Bug β
π Read
via "Threat Post".
Googleβs Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.π Read
via "Threat Post".
Threat Post
Android Patches Actively Exploited Zero-Day Kernel Bug
Googleβs Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.
π΄ Phishing and Spam Lures Feature Sports, Aim to Steal Credentials π΄
π Read
via "Dark Reading".
Spam volume declined slightly in the third quarter, but attackers sent almost 36 million malicious e-mail attachments, up 5% from the previous quarter, one security firm says.π Read
via "Dark Reading".
Dark Reading
Phishing and Spam Lures Feature Sports, Aim to Steal Credentials
Spam volume declined slightly in the third quarter, but attackers sent almost 36 million malicious email attachments, up 5% from the previous quarter, one security firm says.
βΌ CVE-2021-29737 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Data Flow Designer Engine (IBM InfoSphere Information Server 11.7 ) component has improper validation of the REST API server certificate. IBM X-Force ID: 201301.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29888 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 207123.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38948 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 211402.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29771 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29875 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 could allow an attacker to obtain sensitive information due to a insecure third party domain access vulnerability. IBM X-Force ID: 206572.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29738 βΌ
π Read
via "National Vulnerability Database".
IBM InfoSphere Data Flow Designer (IBM InfoSphere Information Server 11.7 ) is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 201302.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21573 βΌ
π Read
via "National Vulnerability Database".
An issue was discoverered in in abhijitnathwani image-processing v0.1.0, allows local attackers to cause a denial of service via a crafted image file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32595 βΌ
π Read
via "National Vulnerability Database".
Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42754 βΌ
π Read
via "National Vulnerability Database".
An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file.π Read
via "National Vulnerability Database".
βΌ CVE-2020-18439 βΌ
π Read
via "National Vulnerability Database".
An issue was discoverered in in function edit_save_f in framework/admin/tpl_control.php in qinggan phpok 5.1, allows attackers to write arbitrary files or get a shell.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36172 βΌ
π Read
via "National Vulnerability Database".
An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36176 βΌ
π Read
via "National Vulnerability Database".
Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23754 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in infusions/member_poll_panel/poll_admin.php in PHP-Fusion 9.03.50, allows attackers to execute arbitrary code, via the polls feature.π Read
via "National Vulnerability Database".
βΌ CVE-2021-26107 βΌ
π Read
via "National Vulnerability Database".
An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36183 βΌ
π Read
via "National Vulnerability Database".
An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21574 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow vulnerability in YotsuyaNight c-http v0.1.0, allows attackers to cause a denial of service via a long url request which is passed to the delimitedread function.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21572 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow vulnerability in function src_parser_trans_stage_1_2_3 trgil gilcc before commit 803969389ca9c06237075a7f8eeb1a19e6651759, allows attackers to cause a denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41238 βΌ
π Read
via "National Vulnerability Database".
Hangfire is an open source system to perform background job processing in a .NET or .NET Core applications. No Windows Service or separate process required. Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted. If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted. Patched versions (1.7.26) are available both on Nuget.org and as a tagged release on the github repo. Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. For users who are unable to upgrade it is possible to mitigate the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI.π Read
via "National Vulnerability Database".