βΌ CVE-2021-45427 βΌ
π Read
via "National Vulnerability Database".
Emerson XWEB 300D EVO 3.0.7--3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal.π Read
via "National Vulnerability Database".
π΄ In the Fight Against Cybercrime, Takedowns Are Only Temporary π΄
π Read
via "Dark Reading".
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.π Read
via "Dark Reading".
Dark Reading
In the Fight Against Cybercrime, Takedowns Are Only Temporary
Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it's far from a perfect strategy.
β Instagram copyright infringment scams β donβt get sucked in! β
π Read
via "Naked Security".
We deconstructed a copyright phish so you don't have to. Be warned: the crooks are getting better at these scams...π Read
via "Naked Security".
Naked Security
Instagram copyright infringment scams β donβt get sucked in!
We deconstructed a copyright phish so you donβt have to. Be warned: the crooks are getting better at these scamsβ¦
π΄ Zero Trust and Access: Protecting the Keys to the Kingdom π΄
π Read
via "Dark Reading".
Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.π Read
via "Dark Reading".
Dark Reading
Zero Trust and Access: Protecting the Keys to the Kingdom
Zero trust moves the control pane closer to the defended asset and attempts to tightly direct access and privileges.
βΌ CVE-2021-45818 βΌ
π Read
via "National Vulnerability Database".
SAFARI Montage 8.7.32 is affected by a CRLF injection vulnerability which can lead to can lead to HTTP response splitting.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43861 βΌ
π Read
via "National Vulnerability Database".
Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. Prior to version 8.13.8, malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to version 8.13.8 to receive a patch. There are no known workarounds aside from upgrading.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45815 βΌ
π Read
via "National Vulnerability Database".
Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability.π Read
via "National Vulnerability Database".
ποΈ Swig Security Review 2021 β Part II ποΈ
π Read
via "The Daily Swig".
Key thinkers on the biggest security stories and trends in 2021π Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Swig Security Review 2021 β Part II
Key thinkers on the biggest security stories and trends in 2021
β APT βAquatic Pandaβ Targets Universities with Log4Shell Exploit Tools β
π Read
via "Threat Post".
Researchers from CrowdStrike disrupted an attempt by the threat group to steal industrial intelligence and military secrets from an academic institution.π Read
via "Threat Post".
Threat Post
APT βAquatic Pandaβ Targets Universities with Log4Shell Exploit Tools
Researchers from CrowdStrike disrupted an attempt by the threat group to steal industrial intelligence and military secrets from an academic institution.
ποΈ HCL DX vendor βcould not reproduceβ allegedly critical vulnerabilities ποΈ
π Read
via "The Daily Swig".
Disclosure process for bugs in HCL DX β formerly WebSphere Portal β seemingly went awryπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
HCL DX vendor βcould not reproduceβ allegedly critical vulnerabilities
Disclosure process for bugs in HCL DX β formerly WebSphere Portal β seemingly went awry
βΌ CVE-2021-43862 βΌ
π Read
via "National Vulnerability Database".
jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).π Read
via "National Vulnerability Database".
π΄ Getting Started With Threat-Informed Security Programs π΄
π Read
via "Dark Reading".
Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.π Read
via "Dark Reading".
Dark Reading
Getting Started With Threat-Informed Security Programs
Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks.
β What the Rise in Cyber-Recon Means for Your Security Strategy β
π Read
via "Threat Post".
Expect many more zero-day exploits in 2022, and cyberattacks using them being launched at a significantly higher rate, warns Aamir Lakhani, researcher at FortiGuard Labs.π Read
via "Threat Post".
Threat Post
What the Rise in Cyber-Recon Means for Your Security Strategy
Expect many more zero-day exploits in 2022, and cyberattacks using them being launched at a significantly higher rate, warns Aamir Lakhani, researcher at FortiGuard Labs.
π¦Ώ How to install the Pritunl VPN server on AlmaLinux π¦Ώ
π Read
via "Tech Republic".
If you're looking for a VPN server to host in-house, look no further than the AlmaLinux/Pritunl combination. See how easy it is to get this service up and running.π Read
via "Tech Republic".
TechRepublic
How to install the Pritunl VPN server on AlmaLinux
If you're looking for a VPN server to host in-house, look no further than the AlmaLinux/Pritunl combination. See how easy it is to get this service up and running.
βΌ CVE-2020-29292 βΌ
π Read
via "National Vulnerability Database".
iBall WRD12EN 1.0.0 devices allow cross-site request forgery (CSRF) attacks as demonstrated by enabling DNS settings or modifying the range for IP addresses.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45379 βΌ
π Read
via "National Vulnerability Database".
Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password.π Read
via "National Vulnerability Database".
βΌ CVE-2021-38876 βΌ
π Read
via "National Vulnerability Database".
IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208404.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20151 βΌ
π Read
via "National Vulnerability Database".
Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20168 βΌ
π Read
via "National Vulnerability Database".
Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4182 βΌ
π Read
via "National Vulnerability Database".
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture fileπ Read
via "National Vulnerability Database".
βΌ CVE-2021-4186 βΌ
π Read
via "National Vulnerability Database".
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture fileπ Read
via "National Vulnerability Database".