Security
Headlines
HeadlinesLatestCVEs

Tag

#oracle

CVE-2021-44514: Read me | OpManager Help

OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishandles authentication for a few audit directories.

CVE
#sql#xss#csrf#vulnerability#web#ios#android#mac#windows#apple#google#microsoft#linux#cisco#red_hat#apache#redis#nodejs#js#git#java#oracle
RHSA-2021:5030: Red Hat Security Advisory: java-1.8.0-ibm security update

An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-35556: OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) * CVE-2021-35559: OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) * CVE-2021-35560: Oracle JDK: unspecified vulnerability fixed in 8u311 (Deployment) * CVE-2021-35564: OpenJDK: Certificates with end dates too far in the future can corrupt k...

CVE-2021-40860: Authenticated SQL injection in the Genesys iWD Manager (CVE-2021-40860 and CVE-2021-40861)

A SQL Injection in the custom filter query component in Genesys intelligent Workload Distribution (IWD) before 9.0.013.11 allows an attacker to execute arbitrary SQL queries via the ql_expression parameter, with which all data in the database can be extracted and OS command execution is possible depending on the permissions and/or database engine.

CVE-2021-41278: feat(transforms): new AES 256 Encryption Transform (#984) · edgexfoundry/app-functions-sdk-go@8fa13c6

Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform. In affected versions broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation. Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends...

CVE-2021-43362: CVE-2021-43362 MedData HBYS Boolen-base Blind SQL Injection - ORACLE

Due to improper sanitization MedData HBYS software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.

CVE-2021-43362: CVE-2021-43362 MedData HBYS Boolen-base Blind SQL Injection - ORACLE

Due to improper sanitization MedData HBYS software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.

CVE-2021-43361: CVE-2021-43361/CVE-2021-43361.txt at main · bartutku/CVE-2021-43361

Due to improper sanitization MedData HBYS software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.

Appsian Security Announces Acquisition of Q Software, a Leader in JD Edwards Security and Compliance

The acquisition provides customers of JD Edwards, along with Oracle EBS and Oracle Cloud, with expanded capabilities for data masking, threat detection and response, and real-time analytics across multiple ERP applications.

How to Avoid Another Let's Encrypt-Like Meltdown

Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

Having Trouble Finding Cybersecurity Talent? You Might Be the Problem

Hiring managers must rethink old-school practices to find the right candidates and be ready to engage in meaningful conversations about their company's values. Here are three ways to start.