
White Papers
Video
Cartoon Contest
Latest Comment: Here’s a couple..
“Look, our commute has just become virtual”
or
“I didn’t think it was possible but it looks like AI has just hacked the highway”
Current Issue
Flash Poll
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Bug Report
From DHS/US-CERT’s National Vulnerability Database
CVE-2008-3280
PUBLISHED: 2021-05-21
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do n…
CVE-2021-21549
PUBLISHED: 2021-05-21
Dell EMC XtremIO Versions prior to 6.3.3-8, contain a Cross-Site Request Forgery Vulnerability in XMS. A non-privileged attacker could potentially exploit this vulnerability, leading to a privileged victim application user being tricked into sending state-changing requests to the vulnerable applicat…
CVE-2021-21552
PUBLISHED: 2021-05-21
Dell Wyse Windows Embedded System versions WIE10 LTSC 2019 and earlier contain an improper authorization vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to bypass the restricted environment and perform unauthorized actions on the aff…
CVE-2021-33500
PUBLISHED: 2021-05-21
PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs o…
CVE-2021-27811
PUBLISHED: 2021-05-21
A code injection vulnerability has been discovered in the Upgrade function of QibosoftX1 v1.0. An attacker is able execute arbitrary PHP code via exploitation of client_upgrade_edition.php and Upgrade.php.
The post Data in Danger Amid New IT Challenges appeared first on Malware Devil.
https://malwaredevil.com/2021/05/21/data-in-danger-amid-new-it-challenges-2/?utm_source=rss&utm_medium=rss&utm_campaign=data-in-danger-amid-new-it-challenges-2
No comments:
Post a Comment