βΌ CVE-2021-21955 βΌ
π Read
via "National Vulnerability Database".
An authentication bypass vulnerability exists in the get_aes_key_info_by_packetid() function of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. Generic network sniffing can lead to password recovery. An attacker can sniff network traffic to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20139 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 3 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20146 βΌ
π Read
via "National Vulnerability Database".
An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20140 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 10 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40279 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/bad.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20138 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower routerΓ’β¬β’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21954 βΌ
π Read
via "National Vulnerability Database".
A command execution vulnerability exists in the wifi_country_code_update functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to arbitrary command execution.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20144 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 49 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41694 βΌ
π Read
via "National Vulnerability Database".
An Incorrect Access Control vulnerability exists in Premiumdatingscript 4.2.7.7 via the password change procedure in requests\user.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20145 βΌ
π Read
via "National Vulnerability Database".
Gryphon Tower routers contain an unprotected openvpn configuration file which can grant attackers access to the Gryphon homebound VPN network which exposes the LAN interfaces of other users' devices connected to the same service. An attacker could leverage this to make configuration changes to, or otherwise attack victims' devices as though they were on an adjacent network.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20137 βΌ
π Read
via "National Vulnerability Database".
A reflected cross-site scripting vulnerability exists in the url parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could exploit this issue by tricking a user into following a specially crafted link, granting the attacker javascript execution in the context of the victim's browser.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20141 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated command injection vulnerability exists in the parameters of operation 32 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41697 βΌ
π Read
via "National Vulnerability Database".
A reflected Cross Site Scripting (XSS) vulnerability exists in Premiumdatingscript 4.2.7.7 via the aerror_description parameter in assets/sources/instagram.php script.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41695 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in Premiumdatingscript 4.2.7.7 via the ip parameter in connect.php. .π Read
via "National Vulnerability Database".
π΄ Why the Private Sector Is Key to Stopping Russian Hacking Group APT29 π΄
π Read
via "Dark Reading".
Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy.π Read
via "Dark Reading".
Dark Reading
Why the Private Sector Is Key to Stopping Russian Hacking Group APT29
Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy.
β S3 Ep62: The S in IoT stands for security (and much more) [Podcast+Transcript] β
π Read
via "Naked Security".
Listen now or read as an article! (Full transcript inside.)π Read
via "Naked Security".
Naked Security
S3 Ep62: The S in IoT stands for security (and much more) [Podcast+Transcript]
Listen now or read as an article! (Full transcript inside.)
π¦Ώ 2021 marks another record year for security vulnerabilities π¦Ώ
π Read
via "Tech Republic".
The number of new security flaws recorded by NIST has already surpassed the total for 2020, the fifth record-breaking year in a row.π Read
via "Tech Republic".
TechRepublic
2021 marks another record year for security vulnerabilities
The number of new security flaws recorded by NIST has already surpassed the total for 2020, the fifth record-breaking year in a row.
π¦Ώ How to restrict server users to a specific directory in Linux π¦Ώ
π Read
via "Tech Republic".
Need to lock down that Linux server so certain remote users can only access a specific directory and only for file upload and download purposes? Jack Wallen shows you how.π Read
via "Tech Republic".
TechRepublic
How to restrict server users to a specific directory in Linux | TechRepublic
Need to lock down that Linux server so certain remote users can only access a specific directory and only for file upload and download purposes? Jack Wallen shows you how.
π΄ One-Third of Phishing Pages Gone in a Day π΄
π Read
via "Dark Reading".
Security experts say the first hours in a phishing page's life are the most dangerous for users.π Read
via "Dark Reading".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π¦Ώ How to protect your business and its data during the 2021 holiday season π¦Ώ
π Read
via "Tech Republic".
It's the first year of major holiday travel in the post-pandemic remote work world. Here's what businesses can do to protect themselves from elevated holiday cybersecurity risks.π Read
via "Tech Republic".
TechRepublic
How to protect your business and its data during the 2021 holiday season
It's the first year of major holiday travel in the post-pandemic remote work world. Here's what businesses can do to protect themselves from elevated holiday cybersecurity risks.
βΌ CVE-2021-20373 βΌ
π Read
via "National Vulnerability Database".
IBM Db2 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an Information Disclosure when using the LOAD utility as under certain circumstances the LOAD utility does not enforce directory restrictions. IBM X-Force ID: 199521.π Read
via "National Vulnerability Database".