βΌ CVE-2021-38918 βΌ
π Read
via "National Vulnerability Database".
IBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a specific sequence of VM management operations could lead to a violation of the isolation between peer VMs. IBM X-Force ID: 210019.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28711 βΌ
π Read
via "National Vulnerability Database".
Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713π Read
via "National Vulnerability Database".
βΌ CVE-2021-28713 βΌ
π Read
via "National Vulnerability Database".
Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713π Read
via "National Vulnerability Database".
π Top Tips for Preventing BEC Scams π
π Read
via "".
Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam? We asked a panel of experts.π Read
via "".
Digital Guardian
Top Tips for Preventing BEC Scams
Business email compromise scams have cost companies billions over the past several years. How can businesses best protect themselves against a BEC scam? We asked a panel of experts.
β Uber Bug, Ignored for Years, Casts Doubt on Official Uber Emails β
π Read
via "Threat Post".
A simple-to-exploit bug that allows bad actors to send emails from Uber's official system -- skating past email security -- went unaddressed despite multiple flagging by researchers.π Read
via "Threat Post".
Threat Post
Uber Bug, Ignored for Years, Casts Doubt on Official Uber Emails
A simple-to-exploit bug that allows bad actors to send emails from Uber's official system β skating past email security β went unaddressed despite flagging by multiple researchers.
π΄ NY AG: 1.1M Online Consumer Accounts Found Compromised in Credential-Stuffing Attacks π΄
π Read
via "Dark Reading".
Stolen credentials tied to cyberattack incidents at 17 "well-known" online retailers, restaurant chains, food delivery services.π Read
via "Dark Reading".
Dark Reading
NY AG: 1.1M Online Consumer Accounts Found Compromised in Credential-Stuffing Attacks
Stolen credentials tied to cyberattack incidents at 17 "well-known" online retailers, restaurant chains, food delivery services.
β Broward Breach Highlights Healthcare Supply-Chain Problems β
π Read
via "Threat Post".
More than 1.3 million patient records were stolen in the just-disclosed breach, which occurred back in October.π Read
via "Threat Post".
Threat Post
Broward Breach Highlights Healthcare Supply-Chain Problems
More than 1.3 million patient records were stolen in the just-disclosed breach, which occurred back in October.
βΌ CVE-2022-21652 βΌ
π Read
via "National Vulnerability Database".
Shopware is an open source e-commerce software platform. In affected versions shopware would not invalidate a user session in the event of a password change. With version 5.7.7 the session validation was adjusted, so that sessions created prior to the latest password change of a customer account can't be used to login with said account. This also means, that upon a password change, all existing sessions for a given customer account are automatically considered invalid. There is no workaround for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21642 βΌ
π Read
via "National Vulnerability Database".
Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45831 βΌ
π Read
via "National Vulnerability Database".
A Null Pointer Dereference vulnerability exitgs in GPAC 1.0.1 in MP4Box via __strlen_avx2, which causes a Denial of Service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45830 βΌ
π Read
via "National Vulnerability Database".
A heap-based buffer overflow vulnerability exists in HDF5 1.13.1-1 via H5F_addr_decode_len in /hdf5/src/H5Fint.c, which could cause a Denial of Service.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43816 βΌ
π Read
via "National Vulnerability Database".
containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.π Read
via "National Vulnerability Database".
βΌ CVE-2021-43779 βΌ
π Read
via "National Vulnerability Database".
GLPI is an open source IT Asset Management, issue tracking system and service desk system. The GLPI addressing plugin in versions < 2.9.1 suffers from authenticated Remote Code Execution vulnerability, allowing access to the server's underlying operating system using command injection abuse of functionality. There is no workaround for this issue and users are advised to upgrade or to disable the addressing plugin.π Read
via "National Vulnerability Database".
βΌ CVE-2022-21651 βΌ
π Read
via "National Vulnerability Database".
Shopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.π Read
via "National Vulnerability Database".
π΄ New Attack Campaign Exploits Microsoft Signature Verification π΄
π Read
via "Dark Reading".
The Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.π Read
via "Dark Reading".
Dark Reading
New Attack Campaign Exploits Microsoft Signature Verification
The Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.
β βElephant Beetleβ Lurks for Months in Networks β
π Read
via "Threat Post".
The group blends into an environment before loading up trivial, thickly stacked, fraudulent financial transactions too tiny to be noticed but adding up to millions of dollars.π Read
via "Threat Post".
Threat Post
βElephant Beetleβ Lurks for Months in Networks
The group blends into an environment before loading up trivial, thickly stacked, fraudulent financial transactions too tiny to be noticed but adding up to millions of dollars.
β 1.1M Compromised Accounts Found at 17 Major Companies β
π Read
via "Threat Post".
The accounts fell victim to credential-stuffing attacks, according to the New York State AG.π Read
via "Threat Post".
Threat Post
1.1M Compromised Accounts Found at 17 Major Companies
The accounts fell victim to credential-stuffing attacks, according to the New York State AG.
βΌ CVE-2021-45832 βΌ
π Read
via "National Vulnerability Database".
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 at at hdf5/src/H5Eint.c, which causes a Denial of Service (context-dependent).π Read
via "National Vulnerability Database".
βΌ CVE-2022-21653 βΌ
π Read
via "National Vulnerability Database".
Jawn is an open source JSON parser. Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack which may result in a denial of service. Most applications do not implement these traits directly, but inherit from a library. `jawn-parser-1.3.1` fixes this issue and users are advised to upgrade. For users unable to upgrade override `objectContext()` to use a collision-safe collection.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45833 βΌ
π Read
via "National Vulnerability Database".
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 via the H5D__create_chunk_file_map_hyper function in /hdf5/src/H5Dchunk.c, which causes a Denial of Service (context-dependent).π Read
via "National Vulnerability Database".
βΌ CVE-2021-46144 βΌ
π Read
via "National Vulnerability Database".
Roundcube before 1.4.13 and 1.5.x before 1.5.2 allows XSS via an HTML e-mail message with crafted Cascading Style Sheets (CSS) token sequences.π Read
via "National Vulnerability Database".