π΄ One-Third of Phishing Pages Gone in a Day π΄
π Read
via "Dark Reading".
Security experts say the first hours in a phishing page's life are the most dangerous for users.π Read
via "Dark Reading".
Dark Reading
Endpoint Security recent news | Dark Reading
Explore the latest news and expert commentary on Endpoint Security, brought to you by the editors of Dark Reading
π¦Ώ How to protect your business and its data during the 2021 holiday season π¦Ώ
π Read
via "Tech Republic".
It's the first year of major holiday travel in the post-pandemic remote work world. Here's what businesses can do to protect themselves from elevated holiday cybersecurity risks.π Read
via "Tech Republic".
TechRepublic
How to protect your business and its data during the 2021 holiday season
It's the first year of major holiday travel in the post-pandemic remote work world. Here's what businesses can do to protect themselves from elevated holiday cybersecurity risks.
βΌ CVE-2021-20373 βΌ
π Read
via "National Vulnerability Database".
IBM Db2 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an Information Disclosure when using the LOAD utility as under certain circumstances the LOAD utility does not enforce directory restrictions. IBM X-Force ID: 199521.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40282 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, abd 2021 in dl/dl_download.php. when registering ordinary users.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38926 βΌ
π Read
via "National Vulnerability Database".
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to gain privileges due to allowing modification of columns of existing tasks. IBM X-Force ID: 210321.π Read
via "National Vulnerability Database".
βΌ CVE-2021-29678 βΌ
π Read
via "National Vulnerability Database".
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a user with DBADM authority to access other databases and read or modify files. IBM X-Force ID: 199914.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38931 βΌ
π Read
via "National Vulnerability Database".
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1, and 11.5 is vulnerable to an information disclosure as a result of a connected user having indirect read access to a table where they are not authorized to select from. IBM X-Force ID: 210418.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39002 βΌ
π Read
via "National Vulnerability Database".
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38951 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume all available CPU resources. IBM X-Force ID: 211405.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22568 βΌ
π Read
via "National Vulnerability Database".
When using the dart pub publish command to publish a package to a third-party package server, the request would be authenticated with an oauth2 access_token that is valid for publishing on pub.dev. Using these obtained credentials, an attacker can impersonate the user on pub.dev. We recommend upgrading past https://github.com/dart-lang/sdk/commit/d787e78d21e12ec1ef712d229940b1172aafcdf8 or beyond version 2.15.0π Read
via "National Vulnerability Database".
βΌ CVE-2021-43703 βΌ
π Read
via "National Vulnerability Database".
An Incorrect Access Control vulnerability exists in zzcms less than or equal to 2019 via admin.php. After disabling JavaScript, you can directly access the administrator console.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19682 βΌ
π Read
via "National Vulnerability Database".
A Cross Site Request Forgery (CSRF) vulnerability exits in ZZZCMS V1.7.1 via the save_user funciton in save.php.π Read
via "National Vulnerability Database".
βΌ CVE-2020-19683 βΌ
π Read
via "National Vulnerability Database".
A Cross Site Scripting (XSS) exists in ZZZCMS V1.7.1 via an editfile action in save.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41265 βΌ
π Read
via "National Vulnerability Database".
Flask-AppBuilder is a development framework built on top of Flask. Verions prior to 3.3.4 contain an improper authentication vulnerability in the REST API. The issue allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. This only affects non database authentication types and new REST API endpoints. Users should upgrade to Flask-AppBuilder 3.3.4 to receive a patch.π Read
via "National Vulnerability Database".
βΌ CVE-2021-40281 βΌ
π Read
via "National Vulnerability Database".
An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 in dl/dl_print.php when registering ordinary users.π Read
via "National Vulnerability Database".
ποΈ Human error bugs increasingly making a splash in hacker-powered pen tests β report ποΈ
π Read
via "The Daily Swig".
HackerOne study charts effects of digital transformation and cloud migrationπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Human error bugs increasingly making a splash in hacker-powered pen tests β report
HackerOne study charts effects of digital transformation and cloud migration
π΄ New Firefox Sandbox Isolates Third-Party Libraries π΄
π Read
via "Dark Reading".
RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.π Read
via "Dark Reading".
Dark Reading
New Firefox Sandbox Isolates Third-Party Libraries
RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.
βΌ CVE-2021-4084 βΌ
π Read
via "National Vulnerability Database".
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')π Read
via "National Vulnerability Database".
βΌ CVE-2021-4081 βΌ
π Read
via "National Vulnerability Database".
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')π Read
via "National Vulnerability Database".
βΌ CVE-2021-4082 βΌ
π Read
via "National Vulnerability Database".
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
β βKarakurtβ Extortion Threat Emerges, But Says No to Ransomware β
π Read
via "Threat Post".
The threat group, first identified in June, focuses solely on data exfiltration and subsequent extortion, and has already targeted 40 victims since September.π Read
via "Threat Post".
Threat Post
βKarakurtβ Extortion Threat Emerges, But Says No to Ransomware
The threat group, first identified in June, focuses solely on data exfiltration and subsequent extortion, and has already targeted 40 victims since September.