βΌ CVE-2021-40101 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43283 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4026 βΌ
π Read
via "National Vulnerability Database".
bookstack is vulnerable to Improper Access Controlπ Read
via "National Vulnerability Database".
βΌ CVE-2021-26612 βΌ
π Read
via "National Vulnerability Database".
An improper input validation leading to arbitrary file creation was discovered in copy method of Nexacro platform. Remote attackers use copy method to execute arbitrary command after the file creation included malicious code.π Read
via "National Vulnerability Database".
βΌ CVE-2020-7880 βΌ
π Read
via "National Vulnerability Database".
The vulnerabilty was discovered in ActiveX module related to NeoRS remote support program. This issue allows an remote attacker to download and execute remote file. It is because of improper parameter validation of StartNeoRS function in ActiveX.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43320 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-41244. Reason: This candidate is a reservation duplicate of CVE-2021-41244. Notes: All CVE users should reference CVE-2021-41244 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43319 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine Network Configuration Manager before 125488 is vulnerable to command injection due to improper validation in the Ping functionality.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43284 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).π Read
via "National Vulnerability Database".
βΌ CVE-2021-22095 βΌ
π Read
via "National Vulnerability Database".
In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large messageπ Read
via "National Vulnerability Database".
βΌ CVE-2021-43282 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43295 βΌ
π Read
via "National Vulnerability Database".
Zoho ManageEngine SupportCenter Plus before 11016 is vulnerable to Reflected XSS in the Accounts module.π Read
via "National Vulnerability Database".
π΄ Whatβs the Difference Between SASE and SD-WAN? π΄
π Read
via "Dark Reading".
While SD-WAN is a key part of a hybrid workplace and multicloud operation, it should be treated as a stepping stone to SASE, not an alternative.π Read
via "Dark Reading".
Dark Reading
Whatβs the Difference Between SASE and SD-WAN?
While SD-WAN is a key part of a hybrid workplace and multicloud operation, it should be treated as a stepping stone to SASE, not an alternative.
π΄ HP Issues Firmware Updates for Printer Product Vulnerabilities π΄
π Read
via "Dark Reading".
More than 150 HP printer models have bugs that could enable attackers to steal data and gain an initial foothold on enterprise networks.π Read
via "Dark Reading".
Dark Reading
HP Issues Firmware Updates for Printer Product Vulnerabilities
More than 150 HP printer models have bugs that could enable attackers to steal data and gain an initial foothold on enterprise networks.
π΄ Legal Cases and Privacy Rulings Aim to Curtail Facial Biometrics π΄
π Read
via "Dark Reading".
Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models.π Read
via "Dark Reading".
Dark Reading
Legal Cases and Privacy Rulings Aim to Curtail Facial Biometrics
Decisions in the UK and Australia, and lawsuits in the United States, could force facial-recognition providers to remove data from their machine-learning models.
βΌ CVE-2021-36330 βΌ
π Read
via "National Vulnerability Database".
Dell EMC Streaming Data Platform versions before 1.3 contain an Insufficient Session Expiration Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to reuse old session artifacts to impersonate a legitimate user.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41256 βΌ
π Read
via "National Vulnerability Database".
nextcloud news-android is an Android client for the Nextcloud news/feed reader app. In affected versions the Nextcloud News for Android app has a security issue by which a malicious application installed on the same device can send it an arbitrary Intent that gets reflected back, unintentionally giving read and write access to non-exported Content Providers in Nextcloud News for Android. Users should upgrade to version 0.9.9.63 or higher as soon as possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36329 βΌ
π Read
via "National Vulnerability Database".
Dell EMC Streaming Data Platform versions before 1.3 contain an Indirect Object Reference Vulnerability. A remote malicious user may potentially exploit this vulnerability to gain sensitive information.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36326 βΌ
π Read
via "National Vulnerability Database".
Dell EMC Streaming Data Platform, versions prior to 1.3 contain an SSL Strip Vulnerability in the User Interface (UI). A remote unauthenticated attacker could potentially exploit this vulnerability, leading to a downgrade in the communications between the client and server into an unencrypted format.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36327 βΌ
π Read
via "National Vulnerability Database".
Dell EMC Streaming Data Platform versions before 1.3 contain a Server Side Request Forgery Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to perform port scanning of internal networks and make HTTP requests to an arbitrary domain of the attacker's choice.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36328 βΌ
π Read
via "National Vulnerability Database".
Dell EMC Streaming Data Platform versions before 1.3 contain a SQL Injection Vulnerability. A remote malicious user may potentially exploit this vulnerability to execute SQL commands to perform unauthorized actions and retrieve sensitive information from the database.π Read
via "National Vulnerability Database".
π¦Ώ Deloitte: How sensitive AI data may become more private and secure in 2022 π¦Ώ
π Read
via "Tech Republic".
Technologies are available to better protect the data used in artificial intelligence, but they're not quite ready for prime time, says Deloitte.π Read
via "Tech Republic".
TechRepublic
Deloitte: How sensitive AI data may become more private and secure in 2022
Technologies are available to better protect the data used in artificial intelligence, but they're not quite ready for prime time, says Deloitte.