β Relentless Log4j Attacks Include State Actors, Possible Worm β
π Read
via "Threat Post".
More than 1.8 million attacks, against half of all corporate networks, have already launched to exploit Log4Shell.π Read
via "Threat Post".
Threat Post
Relentless Log4j Attacks Include State Actors, Possible Worm
More than 1.8 million attacks, against half of all corporate networks, have already launched to exploit Log4Shell.
π΄ Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft π΄
π Read
via "Dark Reading".
Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say.π Read
via "Dark Reading".
Dark Reading
Original Fix for Log4j Flaw Fails to Fully Protect Against DoS Attacks, Data Theft
Organizations should upgrade ASAP to new version of logging framework released Tuesday by the Apache Foundation, security experts say.
π΄ Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft π΄
π Read
via "Dark Reading".
Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.π Read
via "Dark Reading".
Darkreading
Companies Must Assess Threats to AI & ML Systems in 2022: Microsoft
Most companies lack the proper tools to assess their vulnerability to threats facing their AI systems and ML pipelines, prompting Microsoft to release a risk assessment framework.
βΌ CVE-2021-45085 βΌ
π Read
via "National Vulnerability Database".
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45096 βΌ
π Read
via "National Vulnerability Database".
KNIME Analytics Platform before 4.5.0 is vulnerable to XXE (external XML entity injection) via a crafted workflow file (.knwf), aka AP-17730.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45095 βΌ
π Read
via "National Vulnerability Database".
pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45100 βΌ
π Read
via "National Vulnerability Database".
The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45087 βΌ
π Read
via "National Vulnerability Database".
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title.π Read
via "National Vulnerability Database".
βΌ CVE-2021-44023 βΌ
π Read
via "National Vulnerability Database".
A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45086 βΌ
π Read
via "National Vulnerability Database".
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45102 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45101 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2021-45099 βΌ
π Read
via "National Vulnerability Database".
** DISPUTED ** The addon.stdin service in addon-ssh (aka Home Assistant Community Add-on: SSH & Web Terminal) before 10.0.0 has an attack surface that requires social engineering. NOTE: the vendor does not agree that this is a vulnerability; however, addon.stdin was removed as a defense-in-depth measure against complex social engineering situations.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45088 βΌ
π Read
via "National Vulnerability Database".
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45098 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45092 βΌ
π Read
via "National Vulnerability Database".
Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45097 βΌ
π Read
via "National Vulnerability Database".
KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content.π Read
via "National Vulnerability Database".
π΄ Rise in API-Based Attacks Underscore Investments in New Tools π΄
π Read
via "Dark Reading".
Noname Security's Series C fundraising tips the startup to over $1 billion in valuation, a sign that organizations are beginning to look for API security tools and investor are looking for innovation in the space.π Read
via "Dark Reading".
Dark Reading
Rise in API-Based Attacks Underscore Investments in New Tools
Noname Security's Series C fundraising tips the startup to over $1 billion in valuation -- a sign that organizations are beginning to look for API security tools and investors are looking for innovation in the space.
βΌ CVE-2021-4121 βΌ
π Read
via "National Vulnerability Database".
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')π Read
via "National Vulnerability Database".
βΌ CVE-2021-4123 βΌ
π Read
via "National Vulnerability Database".
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)π Read
via "National Vulnerability Database".
ποΈ How expired web domains help criminal hackers unlock enterprise defenses ποΈ
π Read
via "The Daily Swig".
Allow domains to βdropβ and youβre increasing the effectiveness of a variety of attacksπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
How expired web domains help criminal hackers unlock enterprise defenses
Allow domains to βdropβ and youβre increasing the effectiveness of a variety of attacks