βΌ CVE-2021-42772 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43339 βΌ
π Read
via "National Vulnerability Database".
In Ericsson Network Location MPS GMPC21, it is possible to inject commands via file_name in the export functionality.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43032 βΌ
π Read
via "National Vulnerability Database".
In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33800 βΌ
π Read
via "National Vulnerability Database".
In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal.π Read
via "National Vulnerability Database".
βΌ CVE-2020-6931 βΌ
π Read
via "National Vulnerability Database".
HP Print and Scan Doctor may potentially be vulnerable to local elevation of privilege.π Read
via "National Vulnerability Database".
βΌ CVE-2021-35053 βΌ
π Read
via "National Vulnerability Database".
Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38418 βΌ
π Read
via "National Vulnerability Database".
Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38424 βΌ
π Read
via "National Vulnerability Database".
The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application.π Read
via "National Vulnerability Database".
π’ βTrojan Sourceβ hides flaws in source code from humans π’
π Read
via "ITPro".
Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacksπ Read
via "ITPro".
IT PRO
βTrojan Sourceβ hides flaws in source code from humans | IT PRO
Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
π’ Office 365 phishing campaign used stolen Kaspersky Amazon SES token to fool victims π’
π Read
via "ITPro".
Credentials stolen from users after legitimate-looking email arrives in inboxesπ Read
via "ITPro".
IT PRO
Office 365 phishing campaign used stolen Kaspersky Amazon SES token to fool victims | IT PRO
Credentials stolen from users after legitimate-looking email arrives in inboxes
π’ Microsoft unveils Defender for Business at Ignite 2021 π’
π Read
via "ITPro".
The new security suite is aimed at SMBs struggling to protect themselves in today's cyber security landscapeπ Read
via "ITPro".
ITPro
Microsoft unveils Defender for Business at Ignite 2021
The new security suite is aimed at SMBs struggling to protect themselves in today's cyber security landscape
π’ Mitre reveals 10 worst hardware security weaknesses in 2021 π’
π Read
via "ITPro".
The list aims to highlight common hardware flaws to help eliminate them from product development cyclesπ Read
via "ITPro".
IT PRO
Mitre reveals ten worst hardware security weaknesses in 2021 | IT PRO
The list aims to highlight common hardware flaws to help eliminate them from product development cycles
π’ Facebook is shutting down its controversial facial recognition system π’
π Read
via "ITPro".
The move will see more than a billion facial templates removed from Facebook's records amid a push for more private applications of the technologyπ Read
via "ITPro".
IT PRO
Facebook is shutting down its controversial facial recognition system | IT PRO
The move will see more than a billion facial templates removed from Facebook's records amid a push for more private applications of the technology
π’ BlackMatter ransomware gang claims to have ceased operation π’
π Read
via "ITPro".
Despite the announcement made via its client portal, experts believe the hacker group will soon be planning a returnπ Read
via "ITPro".
IT PRO
BlackMatter ransomware gang claims to have ceased operation | IT PRO
Despite the announcement made via its client portal, experts believe the hacker group will soon be planning a return
βΌ CVE-2020-25368 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the PrivateLogin field to Login.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25367 βΌ
π Read
via "National Vulnerability Database".
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34594 βΌ
π Read
via "National Vulnerability Database".
TwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34597 βΌ
π Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25366 βΌ
π Read
via "National Vulnerability Database".
An issue in the component /cgi-bin/upload_firmware.cgi of D-Link DIR-823G REVA1 1.02B05 allows attackers to cause a denial of service (DoS) via unspecified vectors.π Read
via "National Vulnerability Database".
βΌ CVE-2021-42624 βΌ
π Read
via "National Vulnerability Database".
A local buffer overflow vulnerability exists in the latest version of Miniftpd in ftpproto.c through the tmp variable, where a crafted payload can be sent to the affected function.π Read
via "National Vulnerability Database".
β Magecart Credit Card Skimmer Avoids VMs to Fly Under the Radar β
π Read
via "Threat Post".
The Magecart threat actor uses a browser script to evade detection by researchers and sandboxes so it targets only victimsβ machines to steal credentials and personal info.π Read
via "Threat Post".
Threat Post
Magecart Credit Card Skimmer Avoids VMs to Fly Under the Radar
The Magecart threat actor uses a browser script to evade detection by researchers and sandboxes so it targets only victimsβ machines to steal credentials and personal info.