βΌ CVE-2021-36195 βΌ
π Read
via "National Vulnerability Database".
Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43978 βΌ
π Read
via "National Vulnerability Database".
Allegro WIndows 3.3.4152.0, embeds software administrator database credentials into its binary files, which allows users to access and modify data using the same credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41017 βΌ
π Read
via "National Vulnerability Database".
Multiple heap-based buffer overflow vulnerabilities in some web API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow a remote authenticated attacker to execute arbitrary code or commands via specifically crafted HTTP requests.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41025 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in the authentication mechanism of confd in FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 thorugh 6.0.7, including an instance of concurrent execution using shared resource with improper synchronization and one of authentication bypass by capture-replay, may allow a remote unauthenticated attacker to circumvent the authentication process and authenticate as a legitimate cluster peer.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36173 βΌ
π Read
via "National Vulnerability Database".
A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36720 βΌ
π Read
via "National Vulnerability Database".
PineApp - Mail Secure - Attacker sending a request to :/blocking.php?url=<script>alert(1)</script> and stealing cookies .π Read
via "National Vulnerability Database".
βΌ CVE-2021-36718 βΌ
π Read
via "National Vulnerability Database".
SYNEL - eharmonynew / Synel Reports - The attacker can log in to the system with default credentials and export a report of eharmony system with sensetive data (Employee name, Employee ID number, Working hours etc') The vulnerabilety has been addressed and fixed on version 11. Default credentials , Security miscommunication , Sensetive data exposure vulnerability in Synel Reports of SYNEL eharmonynew, Synel Reports allows an attacker to log into the system with default credentials. This issue affects: SYNEL eharmonynew, Synel Reports 8.0.2 version 11 and prior versions.π Read
via "National Vulnerability Database".
β Malicious npm Code Packages Built for Hijacking Discord Servers β
π Read
via "Threat Post".
The lurking code-bombs lift Discord tokens from users of any applications that pulled the packages into their code bases.π Read
via "Threat Post".
Threat Post
Malicious npm Code Packages Built for Hijacking Discord Servers
The lurking code-bombs lift Discord tokens from users of any applications that pulled the packages into their code bases.
π΄ How to Stop Hackers From Turning Your Systems Against You π΄
π Read
via "Dark Reading".
Cybercriminals are increasingly adopting "living-off-the-landβ techniques, leveraging commonly used tools to fly under the radar of conventional detection tools. But with AI, thousands of organizations have regained the upper hand.π Read
via "Dark Reading".
Dark Reading
How to Stop Hackers From Turning Your Systems Against You
Cybercriminals are increasingly adopting "living-off-the-landβ techniques, leveraging commonly used tools to fly under the radar of conventional detection tools. But with AI, thousands of organizations have regained the upper hand.
βΌ CVE-2021-43527 βΌ
π Read
via "National Vulnerability Database".
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21951 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in the CMD_DEVICE_GET_SERVER_LIST_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h in function read_udp_push_config_file. A specially-crafted network packet can lead to code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38505 βΌ
π Read
via "National Vulnerability Database".
Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43531 βΌ
π Read
via "National Vulnerability Database".
When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21957 βΌ
π Read
via "National Vulnerability Database".
A privilege escalation vulnerability exists in the Remote Server functionality of Dream Report ODS Remote Connector 20.2.16900.0. A specially-crafted command injection can lead to elevated capabilities. An attacker can provide a malicious file to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43530 βΌ
π Read
via "National Vulnerability Database".
A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43545 βΌ
π Read
via "National Vulnerability Database".
Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38508 βΌ
π Read
via "National Vulnerability Database".
By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23859 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859π Read
via "National Vulnerability Database".
βΌ CVE-2021-38504 βΌ
π Read
via "National Vulnerability Database".
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43528 βΌ
π Read
via "National Vulnerability Database".
Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43533 βΌ
π Read
via "National Vulnerability Database".
When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94.π Read
via "National Vulnerability Database".