βΌ CVE-2021-38508 βΌ
π Read
via "National Vulnerability Database".
By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23859 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated attacker is able to send a special HTTP request, that causes a service to crash. In case of a standalone VRM or BVMS with VRM installation this crash also opens the possibility to send further unauthenticated commands to the service. On some products the interface is only local accessible lowering the CVSS base score. For a list of modified CVSS scores, please see the official Bosch Advisory Appendix chapter Modified CVSS Scores for CVE-2021-23859π Read
via "National Vulnerability Database".
βΌ CVE-2021-38504 βΌ
π Read
via "National Vulnerability Database".
When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43528 βΌ
π Read
via "National Vulnerability Database".
Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43533 βΌ
π Read
via "National Vulnerability Database".
When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43542 βΌ
π Read
via "National Vulnerability Database".
Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.π Read
via "National Vulnerability Database".
βΌ CVE-2021-23862 βΌ
π Read
via "National Vulnerability Database".
A crafted configuration packet sent by an authenticated administrative user can be used to execute arbitrary commands in system context. This issue also affects installations of the VRM, DIVAR IP, BVMS with VRM installed, the VIDEOJET decoder (VJD-7513 and VJD-8000).π Read
via "National Vulnerability Database".
βΌ CVE-2021-23860 βΌ
π Read
via "National Vulnerability Database".
An error in a page handler of the VRM may lead to a reflected cross site scripting (XSS) in the web-based interface. To exploit this vulnerability an attack must be able to modify the HTTP header that is sent. This issue also affects installations of the DIVAR IP and BVMS with VRM installed.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43539 βΌ
π Read
via "National Vulnerability Database".
Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43544 βΌ
π Read
via "National Vulnerability Database".
When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21950 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in the CMD_DEVICE_GET_SERVER_LIST_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h in function recv_server_device_response_msg_process. A specially-crafted network packet can lead to code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44529 βΌ
π Read
via "National Vulnerability Database".
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).π Read
via "National Vulnerability Database".
βΌ CVE-2021-43546 βΌ
π Read
via "National Vulnerability Database".
It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.π Read
via "National Vulnerability Database".
π¦Ώ Android malware infected more than 300,000 devices with banking trojans π¦Ώ
π Read
via "Tech Republic".
The initial apps in Google Play were safe, but the creators found a way around the Play Store's protections to install malware on Android users' devices. Here's how it happened and how to stay safe.π Read
via "Tech Republic".
TechRepublic
Android malware infected more than 300,000 devices with banking trojans
The initial apps in Google Play were safe, but the creators found a way around the Play Store's protections to install malware on Android users' devices. Here's how it happened and how to stay safe.
βΌ CVE-2021-43811 βΌ
π Read
via "National Vulnerability Database".
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.π Read
via "National Vulnerability Database".
βοΈ Canada Charges Its βMost Prolific Cybercriminalβ βοΈ
π Read
via "Krebs on Security".
A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as "the most prolific cybercriminal we've identified in Canada," but so far they've released few other details about the investigation or the defendant. Helpfully, an email address and nickname apparently connected to the accused offer some additional clues.π Read
via "Krebs on Security".
Krebsonsecurity
Canada Charges Its βMost Prolific Cybercriminalβ
A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as "theβ¦
βΌ CVE-2021-3817 βΌ
π Read
via "National Vulnerability Database".
wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Commandπ Read
via "National Vulnerability Database".
ποΈ Grafana urges web devs to update following path traversal bug disclosure ποΈ
π Read
via "The Daily Swig".
βWith all good intentions, I had placed the Grafana team in a bit of a stressful situationβ, researcher admitsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Grafana urges web devs to update following path traversal bug disclosure
βWith all good intentions, I had placed the Grafana team in a bit of a stressful situation,β researcher admits
π΄ Intel 471 Forms Tech Alliance With CyCognito π΄
π Read
via "Dark Reading".
Enterprises will see improved access to data and more relevant insights that will enable them to further strengthen their cybersecurity postures.π Read
via "Dark Reading".
Dark Reading
Intel 471 Forms Tech Alliance With CyCognito
Enterprises will see improved access to data and more relevant insights that will enable them to further strengthen their cybersecurity postures.
π΄ (ISC)Β² Welcomes Students to Apply for its Undergraduate, Graduate, and Women's Cybersecurity Scholarships π΄
π Read
via "Dark Reading".
Scholarships are part of an effort to bridge the cybersecurity workforce gap.π Read
via "Dark Reading".
Dark Reading
(ISC)Β² Welcomes Students to Apply for its Undergraduate, Graduate, and Women's Cybersecurity Scholarships
Scholarships are part of an effort to bridge the cybersecurity workforce gap.
π΄ Zscaler Extends Zero Trust Exchange Platform to Deliver Zero Trust for Workloads π΄
π Read
via "Dark Reading".
Solution secures cloud-to-Internet, cloud-to-cloud, cloud-to-data center, and intra-cloud communications.π Read
via "Dark Reading".
Dark Reading
Zscaler Extends Zero Trust Exchange Platform to Deliver Zero Trust for Workloads
Solution secures cloud-to-Internet, cloud-to-cloud, cloud-to-data center, and intra-cloud communications.