Lucene search

K

Books & Papers Security Vulnerabilities

cve
cve

CVE-2021-31787

The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res...

6.5CVSS

6.3AI Score

0.001EPSS

2021-11-30 08:15 PM
18
4
nvd
nvd

CVE-2021-31787

The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res...

6.5CVSS

0.001EPSS

2021-11-30 08:15 PM
1
prion
prion

Information disclosure

The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res...

6.5CVSS

6.4AI Score

0.001EPSS

2021-11-30 08:15 PM
1
cvelist
cvelist

CVE-2021-31787

The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res...

6.6AI Score

0.001EPSS

2021-11-30 07:04 PM
trellix
trellix

The Bug Report November 2021 Edition

The Bug Report — November 2021 Edition By Mark Bereza · November 30, 2021 Your Cybersecurity Comic Relief CVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” Why am I here? For all our newcomers, welcome to the Advanced Threat Research team’s monthly bug...

7.2AI Score

0.003EPSS

2021-11-30 12:00 AM
11
trellix
trellix

The Bug Report November 2021 Edition

The Bug Report — November 2021 Edition By Mark Bereza · November 30, 2021 Your Cybersecurity Comic Relief CVE-2021-20322: Of all the words of mice and men, the saddest are, “it was DNS again.” Why am I here? For all our newcomers, welcome to the Advanced Threat Research team’s monthly bug...

-0.4AI Score

0.003EPSS

2021-11-30 12:00 AM
22
krebs
krebs

The Internet is Held Together With Spit & Baling Wire

A visualization of the Internet made using network routing data. Image: Barrett Lyon, opte.org. Imagine being able to disconnect or redirect Internet traffic destined for some of the world's biggest companies -- just by spoofing an email. This is the nature of a threat vector recently removed by a....

7.1AI Score

2021-11-26 07:03 PM
26
wallarmlab
wallarmlab

Scholarship Results

It's time to sum up the results of the 2021 scholarship! As you know, we extended the scholarship for 1 month until October 30th because there were many applications and few finished papers. By October 30 the situation had not changed, only 1 essay had been added and became 4, the number of...

6.9AI Score

2021-11-25 08:03 PM
21
rapid7blog
rapid7blog

2022 Planning: Prioritizing Defense and Mitigation Through Left of Boom

In the military, the term “left of boom" refers to the strategy and tactics required to prevent — and protect personnel from — explosions by making proactive decisions before the event happens. Unless you've been fortunate enough to avoid tech and media press for the past 24 months, it should be...

7.1AI Score

2021-11-17 02:49 PM
18
mssecure
mssecure

How to assess and improve the security culture of your business

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with _Cygenta Co-founder and Co-Chief.....

6.7AI Score

2021-11-11 06:00 PM
12
mmpc
mmpc

How to assess and improve the security culture of your business

The security community is continuously changing, growing, and learning from each other to better position the world against cyber threats. In the latest Voice of the Community blog series post, Microsoft Security Product Marketing Manager Natalia Godyla talks with _Cygenta Co-founder and Co-Chief.....

6.7AI Score

2021-11-11 06:00 PM
6
impervablog
impervablog

With SLAs for DDoS Mitigation, the devil is in the details

When it comes to choosing the right DDoS protection there are many factors to consider including Network Capacity, Reliability, Service, Price and Time to Mitigation (TTM). In a recent survey, we asked participants what factor they considered most critical when choosing a DDoS protection solution.....

6.8AI Score

2021-11-10 01:42 PM
9
impervablog
impervablog

Why you need to rethink your data security strategy and go beyond DLP

The increasing frequency and scale of data breaches has highlighted the need for organizations to rethink their approach to data security. Data Loss Prevention (DLP) technologies have been around for decades and formed a large part of many organizations’ data protection strategies. However, there.....

7AI Score

2021-11-09 02:29 PM
17
impervablog
impervablog

Infographic: What is the economic impact of a data security platform?

Data security is important regardless of how your organization approaches cybersecurity. Whether it’s a protection-first approach, detection and remediation, or somewhere in between, data security enables organizations to inform on risk posture, protect against unauthorized data access and may...

7.1AI Score

2021-11-04 03:55 PM
8
thn
thn

BlackMatter Ransomware Reportedly Shutting Down; Latest Analysis Released

An analysis of new samples of BlackMatter ransomware for Windows and Linux has revealed the extent to which the operators have continually added new features and encryption capabilities in successive iterations over a three-month period. No fewer than 10 Windows and two Linux versions of the...

6.5AI Score

2021-11-03 03:24 PM
7
kitploit
kitploit

HandleKatz - PIC Lsass Dumper Using Cloned Handles

This tool was implemented as part of our Brucon2021 conference talk and demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same. It compiles down to an executable living fully in its text segment. Thus, the extracted .text segment of the PE file...

7.3AI Score

2021-11-03 11:30 AM
204
avleonov
avleonov

VMconf 22 Vulnerability Management conference: Call For Papers started

Hello everyone! This episode will be about the VMconf 22 Vulnerability Management conference. CFP started on November 1, which will last a month and a half. So please submit your talk or share this video with someone who might be interested. Let's talk about the conference itself. All started with....

-0.3AI Score

2021-11-01 12:19 AM
13
impervablog
impervablog

5 elements to include in a cybersecurity strategy for any size business

Whether you obsess about cybersecurity every day or you are completely new to the process, there are certain things that you should consider to make your company’s cybersecurity strategy successful. In this post, we’ll reveal five elements you should include in your strategy, regardless of whether....

0.7AI Score

2021-10-27 01:05 PM
14
d0znpp
d0znpp

Layer 7 DDoS Attacks: ❗️ Methods and Ways of Mitigation

The web has been the greatest type of development in the 21st century. It has uncovered the whole world to more current prospects and more effective methods of living. Today, we have various sites, online stores, online papers, etc. Essentially everything is online nowadays. Be that as it may, the....

AI Score

2021-10-22 03:07 PM
24
impervablog
impervablog

Forrester report suggests Imperva Data Protection delivers high value and rapid ROI

In mid-2021, Imperva commissioned Forrester Research to interview five current Imperva enterprise customers - two in the financial services industry and three in the insurance industry. The goal of the exercise was to gain insight into the economic impact of deploying the Imperva data security...

0.5AI Score

2021-10-19 12:21 PM
14
wpvulndb
wpvulndb

Affiliate Manager < 2.8.7 - Admin+ SQL injection

The plugin does not validate the orderby parameter before using it in an SQL statement in the admin dashboard, leading to an SQL Injection issue PoC POST /wp-admin/admin.php?page=wpam-affiliates&tab;=export_data&orderby;=if(&order;=0,1,SLEEP(10)) HTTP/1.1 Accept:...

7.2CVSS

2.2AI Score

0.001EPSS

2021-10-11 12:00 AM
8
patchstack
patchstack

WordPress Asgaros Forum plugin <= 1.15.12 - Unauthenticated SQL Injection (SQLi) vulnerability

Unauthenticated SQL Injection (SQLi) vulnerability discovered by JrXnm in WordPress Asgaros Forum plugin (versions &lt;= 1.15.12). Solution Update the WordPress Asgaros Forum plugin to the latest available version (at least...

9.8CVSS

3.3AI Score

0.195EPSS

2021-10-11 12:00 AM
15
patchstack
patchstack

WordPress WPSchoolPress plugin <= 2.1.9 - Multiple Authenticated SQL Injections (SQLi) vulnerabilities

Multiple Authenticated SQL Injections (SQLi) vulnerabilities discovered by JrXnm in WordPress WPSchoolPress plugin (versions &lt;= 2.1.9). Solution Update the WordPress WPSchoolPress plugin to the latest available version (at least...

8.8CVSS

2.8AI Score

0.001EPSS

2021-10-11 12:00 AM
8
wpexploit
wpexploit

Affiliate Manager < 2.8.7 - Admin+ SQL injection

The plugin does not validate the orderby parameter before using it in an SQL statement in the admin dashboard, leading to an SQL Injection...

7.2CVSS

2.1AI Score

0.001EPSS

2021-10-11 12:00 AM
361
kitploit
kitploit

FUSE - A Penetration Testing Tool For Finding File Upload Bugs

FUSE is a penetration testing system designed to identify Unrestricted Executable File Upload (UEFU) vulnerabilities. The details of the testing strategy is in our paper, "FUSE: Finding File Upload Bugs via Penetration Testing", which appeared in NDSS 2020. To see how to configure and execute...

8.8CVSS

-0.8AI Score

EPSS

2021-10-10 08:30 PM
74
threatpost
threatpost

Exchange/Outlook Autodiscover Bug Spills $100K+ Email Passwords

Guardicore security researcher Amit Serper has discovered a severe design bug in MIcrosoft Exchange’s autodiscover – a protocol that lets users easily configure applications such as Microsoft Outlook with just email addresses and passwords. The flaw has caused the Autodiscover service to leak...

5.3CVSS

0.1AI Score

EPSS

2021-09-24 06:46 PM
43
threatpost
threatpost

46% of On-Prem Databases Globally Contain Vulnerabilities: Is Yours Safe?

By Elad Erez, Chief Innovation Officer, Imperva Is there a day that goes by where you don’t read a news headline about a mega-breach impacting millions of people? It’s an unlikely scenario, particularly at a time when the volume of data breaches are rising by an astonishing 30 percent annually....

0.1AI Score

2021-09-21 01:00 PM
24
impervablog
impervablog

When data privacy and protection are rights, don’t get it wrong

Twenty-one years ago, Latanya Sweeney showed that it’s possible to uniquely identify 87% of Americans with just three pieces of personal data: gender, ZIP code and full date of birth. Long before anyone had heard the words ‘data lake’, ‘cloud storage’ or ‘big data’, nevermind ‘social media’, it...

0.6AI Score

2021-09-15 06:15 PM
10
rapid7blog
rapid7blog

The Rise of Disruptive Ransomware Attacks: A Call To Action

Our collective use of and dependence on technology has come quite a long way since 1989. That year, the first documented ransomware attack — the AIDS Trojan — was spread via physical media (5 1⁄4" floppy disks) delivered by the postal service to individuals subscribed to a mailing list. The...

7.4AI Score

2021-09-10 01:30 PM
21
cve
cve

CVE-2021-34143

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging.....

6.5CVSS

6.3AI Score

0.001EPSS

2021-09-07 07:15 AM
30
cve
cve

CVE-2021-34146

The Bluetooth Classic implementation in the Cypress CYW920735Q60EVB does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and restart (crash) of the device by flooding it with LMP_AU_Rand packets after the...

6.5CVSS

6.3AI Score

0.001EPSS

2021-09-07 07:15 AM
23
nvd
nvd

CVE-2021-34146

The Bluetooth Classic implementation in the Cypress CYW920735Q60EVB does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and restart (crash) of the device by flooding it with LMP_AU_Rand packets after the...

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
2
nvd
nvd

CVE-2021-34147

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 does not properly handle the reception of a malformed LMP timing accuracy response followed by multiple reconnections to the link slave, allowing attackers to exhaust device BT resources and eventually.....

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
2
cve
cve

CVE-2021-31786

The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing attackers to trigger a disconnection and deadlock of the device by connecting with a forged....

6.5CVSS

6.5AI Score

0.001EPSS

2021-09-07 07:15 AM
23
nvd
nvd

CVE-2021-31786

The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing attackers to trigger a disconnection and deadlock of the device by connecting with a forged....

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
1
nvd
nvd

CVE-2021-34143

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging.....

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
3
cve
cve

CVE-2021-34147

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 does not properly handle the reception of a malformed LMP timing accuracy response followed by multiple reconnections to the link slave, allowing attackers to exhaust device BT resources and eventually.....

6.5CVSS

6.3AI Score

0.001EPSS

2021-09-07 07:15 AM
33
cve
cve

CVE-2021-34149

The Bluetooth Classic implementation on the Texas Instruments CC256XCQFN-EM does not properly handle the reception of continuous LMP_AU_Rand packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after the paging...

6.5CVSS

6.3AI Score

0.001EPSS

2021-09-07 07:15 AM
22
cve
cve

CVE-2021-31612

The Bluetooth Classic implementation on Zhuhai Jieli AC690X devices does not properly handle the reception of an oversized LMP packet greater than 17 bytes during the LMP auto rate procedure, allowing attackers in radio range to trigger a deadlock via a crafted LMP...

6.5CVSS

6.4AI Score

0.001EPSS

2021-09-07 07:15 AM
20
nvd
nvd

CVE-2021-31612

The Bluetooth Classic implementation on Zhuhai Jieli AC690X devices does not properly handle the reception of an oversized LMP packet greater than 17 bytes during the LMP auto rate procedure, allowing attackers in radio range to trigger a deadlock via a crafted LMP...

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
1
nvd
nvd

CVE-2021-34148

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with a greater ACL Length after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service...

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
1
nvd
nvd

CVE-2021-34149

The Bluetooth Classic implementation on the Texas Instruments CC256XCQFN-EM does not properly handle the reception of continuous LMP_AU_Rand packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after the paging...

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
1
cve
cve

CVE-2021-31611

The Bluetooth Classic implementation on Zhuhai Jieli AC690X and AC692X devices does not properly handle an out-of-order LMP Setup procedure that is followed by a malformed LMP packet, allowing attackers in radio range to deadlock a device via a crafted LMP packet. The user needs to manually reboot....

5.7CVSS

5.5AI Score

0.001EPSS

2021-09-07 07:15 AM
17
cve
cve

CVE-2021-31785

The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user...

6.5CVSS

6.3AI Score

0.001EPSS

2021-09-07 07:15 AM
25
nvd
nvd

CVE-2021-31785

The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user...

6.5CVSS

0.001EPSS

2021-09-07 07:15 AM
1
cve
cve

CVE-2021-34145

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with an invalid Baseband packet type (and LT_ADDRESS and LT_ADDR) after completion of the LMP setup procedure, allowing attackers in radio.....

5.3CVSS

5.2AI Score

0.001EPSS

2021-09-07 07:15 AM
21
nvd
nvd

CVE-2021-34145

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with an invalid Baseband packet type (and LT_ADDRESS and LT_ADDR) after completion of the LMP setup procedure, allowing attackers in radio.....

5.3CVSS

0.001EPSS

2021-09-07 07:15 AM
cve
cve

CVE-2021-34148

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with a greater ACL Length after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service...

6.5CVSS

6.3AI Score

0.001EPSS

2021-09-07 07:15 AM
22
nvd
nvd

CVE-2021-31611

The Bluetooth Classic implementation on Zhuhai Jieli AC690X and AC692X devices does not properly handle an out-of-order LMP Setup procedure that is followed by a malformed LMP packet, allowing attackers in radio range to deadlock a device via a crafted LMP packet. The user needs to manually reboot....

5.7CVSS

0.001EPSS

2021-09-07 07:15 AM
2
cve
cve

CVE-2021-28139

The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield...

8.8CVSS

8.7AI Score

0.001EPSS

2021-09-07 07:15 AM
26
Total number of security vulnerabilities3170