βΌ CVE-2021-41610 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-27339. Reason: This candidate is a reservation duplicate of CVE-2020-27339. Notes: All CVE users should reference CVE-2020-27339 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
π΄ McMenamins Breach Affected 23 Years of Employee Data π΄
π Read
via "Dark Reading".
The Oregon-based hospitality and dining business reports the data was compromised in a Dec. 12 ransomware attack.π Read
via "Dark Reading".
Dark Reading
McMenamins Breach Affected 23 Years of Employee Data
The Oregon-based hospitality and dining business reports the data was compromised in a Dec. 12 ransomware attack.
π΄ Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells π΄
π Read
via "Dark Reading".
Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.π Read
via "Dark Reading".
Dark Reading
Attackers Exploit Log4j Flaws in Hands-on-Keyboard Attacks to Drop Reverse Shells
Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely used Apache logging framework.
π¦Ώ Google makes the perfect case for why you shouldn't use Chrome π¦Ώ
π Read
via "Tech Republic".
Google says Manifest V3 is focused on security, privacy and performance, but it could also break Chrome browser extensions used by millions of people.π Read
via "Tech Republic".
TechRepublic
Google makes the perfect case for why you shouldn't use Chrome
Google says Manifest V3 is focused on security, privacy and performance, but it could also break Chrome browser extensions used by millions of people.
β Microsoft Sees Rampant Log4j Exploit Attempts, Testing β
π Read
via "Threat Post".
Microsoft says it's only going to get worse: It's seen state-sponsored and cyber-criminal attackers probing systems for the Log4Shell flaw through the end of December.π Read
via "Threat Post".
Threat Post
Microsoft Sees Rampant Log4j Exploit Attempts, Testing
Microsoft says it's only going to get worse: It's seen state-sponsored and cyber-criminal attackers probing systems for the Log4Shell flaw through the end of December.
βΌ CVE-2022-21649 βΌ
π Read
via "National Vulnerability Database".
Convos is an open source multi-user chat that runs in a web browser. Characters starting with "https://" in the chat window create an <a> tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for "<" or ">" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41388 βΌ
π Read
via "National Vulnerability Database".
Netskope client prior to 89.x on macOS is impacted by a local privilege escalation vulnerability. The XPC implementation of nsAuxiliarySvc process does not perform validation on new connections before accepting the connection. Thus any low privileged user can connect and call external methods defined in XPC service as root, elevating their privilege to the highest level.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21650 βΌ
π Read
via "National Vulnerability Database".
Convos is an open source multi-user chat that runs in a web browser. You can't use SVG extension in Convos' chat window, but you can upload a file with an .html extension. By uploading an SVG file with an html extension the upload filter can be bypassed. This causes Stored XSS. Also, after uploading a file the XSS attack is triggered upon a user viewing the file. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22045 βΌ
π Read
via "National Vulnerability Database".
VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.π Read
via "National Vulnerability Database".
π΄ CrowdStrike Incorporates Intel CPU Telemetry into Falcon Sensor π΄
π Read
via "Dark Reading".
The Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.π Read
via "Dark Reading".
Dark Reading
CrowdStrike Incorporates Intel CPU Telemetry Into Falcon Sensor
The Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.
βΌ CVE-2021-43946 βΌ
π Read
via "National Vulnerability Database".
Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /secure/EditSubscription.jspa endpoint. The affected versions are before version 8.21.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22567 βΌ
π Read
via "National Vulnerability Database".
Bidirectional Unicode text can be interpreted and compiled differently than how it appears in editors which can be exploited to get nefarious code passed a code review by appearing benign. An attacker could embed a source that is invisible to a code reviewer that modifies the behavior of a program in unexpected ways.π Read
via "National Vulnerability Database".
βΌ CVE-2021-41043 βΌ
π Read
via "National Vulnerability Database".
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.π Read
via "National Vulnerability Database".
βΌ CVE-2021-31589 βΌ
π Read
via "National Vulnerability Database".
BeyondTrust Secure Remote Access Base Software through 6.0.1 allows an attacker to achieve full admin access to the appliance, by tricking the administrator into creating a new admin account through an XSS/CSRF attack involving a crafted request to the /appliance/users?action=edit endpoint. This cross-site-scripting (XSS) vulnerability occurs when it does not properly sanitize an unauthenticated crafted web request to the serverπ Read
via "National Vulnerability Database".
βΌ CVE-2020-15933 βΌ
π Read
via "National Vulnerability Database".
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.π Read
via "National Vulnerability Database".
ποΈ Indian academic bookseller Oswaal Books fixes alleged RCE and other serious vulnerabilities with Shopify relaunch ποΈ
π Read
via "The Daily Swig".
Researcher claims he found RCE, authentication bypass, CSRF flawsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Indian academic bookseller Oswaal Books fixes alleged RCE and other serious vulnerabilities with Shopify relaunch
Researcher claims he found RCE, authentication bypass, CSRF flaws
β βMalsmokeβ Exploits Microsoftβs E-Signature Verification β
π Read
via "Threat Post".
The info-stealing campaign using ZLoader malware β previously used to deliver Ryuk and Conti ransomware β already has claimed more than 2,000 victims across 111 countries.π Read
via "Threat Post".
Threat Post
βMalsmokeβ Exploits Microsoftβs E-Signature Verification
The info-stealing campaign using ZLoader malware β previously used to deliver Ryuk and Conti ransomware β already has claimed more than 2,000 victims across 111 countries.
ποΈ Web skimming attacks on hundreds of real estate websites deployed via cloud video hosting service ποΈ
π Read
via "The Daily Swig".
Attackers leverage software supply chain to compromise high-traffic sitesπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Web skimming attacks on hundreds of real estate websites deployed via cloud video hosting service
Attackers leverage software supply chain to compromise high-traffic sites
π΄ Putting Ransomware Gangs Out of Business With AI π΄
π Read
via "Dark Reading".
Organizations need to take matters into their own hands with a new approach.π Read
via "Dark Reading".
Dark Reading
Putting Ransomware Gangs Out of Business With AI
Organizations need to take matters into their own hands with a new approach.
β Apple Home software bug could lock you out of your iPhone β
π Read
via "Naked Security".
The finder of this bug insists it "poses a serious risk". We're not so sure, but we recommend you take steps to avoid it anyway.π Read
via "Naked Security".
Naked Security
Apple Home software bug could lock you out of your iPhone
The finder of this bug insists it βposes a serious riskβ. Weβre not so sure, but we recommend you take steps to avoid it anyway.
β FTC threatens βlegal actionβ over unpatched Log4j and other vulns β
π Read
via "Naked Security".
Remember the Equifax breach? Remember the $700m penalty? In case you'd forgotten, here's the FTC to refresh your memory!π Read
via "Naked Security".
Naked Security
FTC threatens βlegal actionβ over unpatched Log4j and other vulns
Remember the Equifax breach? Remember the $700m penalty? In case youβd forgotten, hereβs the FTC to refresh your memory!