Azure Marketplace new offers – Volume 162

Azure Marketplace new offers – Volume 162

This article is contributed. See the original author and article here.











We continue to expand the Azure Marketplace ecosystem. For this volume, 120 new offers successfully met the onboarding criteria and went live. See details of the new offers below:





























































































































































































































































































































































































































































Get it now in our marketplace


activemq.png

ActiveMQ: Apache ActiveMQ is a messaging and integration patterns server, allowing users to foster communication from more than one client or server. This communication is managed with features such as computer clustering and ability to use any database as a JMS persistence provider besides virtual memory, cache, and journal persistency. 


AlmaLinux 8 from OpenLogic.png

AlmaLinux 8 from OpenLogic by Perforce: This minimum profile AlmaLinux 8-based image, built by OpenLogic by Perforce, allows users to run the AlmaLinux image on Microsoft Azure, start an SSH server, and provides login access to customize the instance. This image includes 9×5 weekday email support delivered by a team of US-based Enterprise Linux experts.


BiiTrails Business.png

BiiTrails Business: This Microsoft Azure-based BiiTrails blockchain service provides self-service traceability toolkits. This service is low cost, with pay-by-use SaaS, and offloaded IT cost. It’s also easy to use, with permissioned usage, a GUI template editor, and admin dashboard.


CentOS 7 from OpenLogic .png

CentOS 7 from OpenLogic by Perforce: This minimum profile CentOS 7-based image, built by OpenLogic by Perforce, allows users to run the CentOS 7 image on Microsoft Azure, start an SSH server, and provides login access to customize the instance. 


CentOS 8 from OpenLogic .png

CentOS 8 from OpenLogic by Perforce: This minimum profile CentOS 8-based image, built by OpenLogic by Perforce, allows users to run the CentOS 8 image on Microsoft Azure, start an SSH server, and provides login access to customize the instance. 


CentOS Stream Minimal.png

CentOS Stream: This is a minimal CentOS Stream image, mainly used as a common base system on top of which other appliances could be built and tested. It contains just enough packages to run within Microsoft Azure, bring up a SSH server and allow users to login.


CentOS Stream.png

CentOS Stream Minimal: This is a minimal CentOS Stream image with an auto-extending root filesystem, mainly used as a common base system on top of which other appliances could be built and tested. Microsoft Azure Linux Agent, cloud-init, as well as the CentOS Stream security updates available at the release date are included.


EspoCRM.png

EspoCRM: This solution is an open source web application, which enables users to view, enter, and analyze their organization’s relationships with customers and as well as with partners. It’s fast and highly configurable and presents users with a web-based CRM platform.


Explorium External Data Platform.png

Explorium External Data Platform: This solution enables organizations to automatically discover and use thousands of relevant data signals to improve predictions and machine learning model performance. It also allows for efficient integration of third-party data.


Exponent CMS.png

Exponent CMS: This Niles Partners image will configure and publish Exponent CMS, an open-source content management system written in PHP that helps you develop and easily manage dynamic websites without having to code pages or manage navigation.


Intelligent Document Processing.png

Intelligent Document Processing: Hexaware IDP uses Microsoft Azure cognitive services for automatic classification and extraction of data from scanned PDF and handwritten documents, improving accuracy by 80 percent and lowering cost by 30 percent.


kirby.png

Kirby: This Niles Partners offer configures and publishes Kirby, a lightweight, file-based content management system. Kirby provides multilanguage and multistore functionality, so you won’t need plugins if you intend to set up your site for multiple countries or stores.


mantis.png

Mantis: Get the big picture on your team’s performance and improve workflow and efficiency by deploying this Niles Partners image of Mantis, an open-source issue-tracking system and project management solution, to Microsoft Azure.


Modx.png

MODX: MODX Revolution is a content management system and application framework rolled into one. Deploy it on Microsoft Azure via this Niles Partners image to gain peace of mind that your websites will be secure and easily maintained with unparalleled performance. 


Monica Server Ready with Support from Linnovate.png

Monica Server Ready with Support from Linnovate: Monica provides an easy-to-use interface to log everything you know about your contacts. Be a better friend, family member, and co-worker by having vital information like important dates or gift ideas at your fingertips.


NagiOS.png

Nagios: This Microsoft Azure image from Niles Partners allows you to configure and publish Nagios Core, a user-friendly network monitoring solution for Linux operating systems and distributions that includes service state, process state, operating system metrics, and more.


OpenDocman.png

OpenDocMan: Configure and publish OpenDocman, an open-source document management system, to Microsoft Azure via this preconfigured image from Niles Partners. OpenDocMan supports multiple file types and offers a minimalist approach to user interface.


Oscommerce.png

osCommerce: This Microsoft Azure image from Niles Partners allows you to configure and publish osCommerce, an open-source e-commerce platform and online store management solution for any website or web server that has PHP and MySQL installed.


Azure Spend Optimization Service.png

PASOS – Paian Azure Spend and Optimization Service: PAIAN IT Solutions will monitor your Microsoft Azure consumption and give you suggestions for improving your Azure environment, allowing you to focus on your business processes, procedures, and employees.


Processwire.png

ProcessWire: Configure and publish ProcessWire, an open-source content management system, content management framework, and web application framework, via this preconfigured and ready-to-launch Microsoft Azure virtual image from Niles Partners.


RabbitMQ.png

RabbitMQ: This open source messaging broker system from Niles Partners is used for distributing notifications of change events. It is lightweight and simple to deploy and provides applications a common platform for sending and receiving messages on Microsoft Azure.


Rocky Linux 8 from OpenLogic .png

Rocky Linux 8 from OpenLogic by Perforce: Perforce provides this preconfigured image of Rocky Linux 8 from OpenLogic. This image enables users to run Rocky Linux image on Microsoft Azure, start a Secure Shell (SSH) server, and customize the instance.


RubyOnRails.png

Ruby on Rails: Niles Partners is configuring Ruby on Rails, a world-famous open source web application framework, and embedding it with Ubuntu and ready-to-launch image on Microsoft Azure. You can use this high-level programming language to build database-backed web applications ranging from easy to complex.


Spree Commerce.png

Spree Commerce: Easily launch, maintain, and scale your online stores across various platforms using this robust e-commerce solution embedded with Ubuntu along with ready-to-launch image on Microsoft Azure. Spree Commerce contains Linux, java, and Ruby Rails.


Strapi Accelerator.png

Strapi Accelerator: This premium image designed by Ntegral and optimized for production environments is an open-source headless content management system (CMS). Strapi Accelerator is an image based on Ubuntu 20.04.2 LTS, PostgreSQL 12, Nginx, PM2, and Strapi.


Syntheticus.ai-Synthetic Data Generator.png

Syntheticus.ai-Synthetic Data Generator: This B2B SaaS solution by Syntheticus GmbH allows you to synthetically generate data for all your AI and machine learning models. This artificially generated, yet anonymized data, mimics the original data and strengthens your foundation of trust, while mitigating privacy risks.


WildFly.png

WildFly: Niles Partners provides this preconfigured, ready-to-launch virtual machine image of Wildfly for Microsoft Azure. WildFly application builder is a lightweight, flexible tool that runs tremendously fast with a full J2EE stack including Java EE7.



Go further with partner consulting services


App Modernization with AKS- 5-Day Implementation.png

App Modernization with AKS: 5-Day Implementation: Modernize your business applications with this fully managed Azure Kubernetes Service (AKS) offered by Abtis GmbH. This implementation, available only in German, will help provision your first Kubernetes cluster infrastructure and introduce you to DevOps tools.


Application Modernization- 4-Week Assessment.png

Application Modernization: 4-Week Assessment: Cegeka’s four-week assessment serves as a starting point for defining your digital strategy and delivering an actionable IT roadmap and high-level application overview for modernizing your applications using Microsoft Azure.


Azure Data Platform- 2-Week Proof of Concept.png

Azure Data Platform: 2-Week Proof of Concept: Learn how to remove existing barriers between operational data, data warehouses, and analytics while gleaning actionable insights in this offer from Techedge. Their experts will deliver a proof of concept of an integrated data platform centered on Microsoft Azure Synapse Analytics and Power BI.


Azure Development Training- 1-Day Workshop.png

Azure Development Training: 1-Day Workshop: UPPER-LINK’s training workshop will help you identify options as you set out to modernize your existing applications based on your business requirements and develop the operational bricks for your project using Microsoft Azure services and tools. This offer is available only in French.


Azure DevOps Quickstart- 3-Day Proof of Concept.png

Azure DevOps Quickstart: 3-Day Proof of Concept: This offer from Ismile Technologies will help your organization understand core concepts of the Azure DevOps platform and streamline processes so you can learn to quickly launch your first app using Microsoft Azure.


Azure FastStart Service- 5-Day Implementation.png

Azure FastStart Service: 5-Day Implementation: Accelerate your journey to the cloud by collaborating with CANCOM consultants who will help deliver the base configuration of a Microsoft Azure environment to your organization. Set up subscriptions, identity, and security as part of this implementation.


Azure Glidepath for Governance Workshops.png

Azure GlidePath for Governance Workshops: Sirius’ workshop is based on Microsoft’s Azure Cloud Adoption Framework (CAF) and is geared toward helping your organization simplify the complex task of creating a governance program service by establishing a best-practice approach to security, governance, and cost control.


Azure Infrastructure & Data Assessment- 10-Day.png

Azure Infrastructure & Data: 10-Day Assessment: In this assessment, MineData will provide an end-to-end analysis of your organization’s entire IT estate along with a cost overview for migrating your virtual machines, storage, and databases to Microsoft Azure.


Azure Migration Readiness- 5-6 Week Assessment.png

Azure Migration Readiness: 5- to 6-Week Assessment: Experts from Ismile Technologies will help you migrate to Microsoft Azure by first determining the cloud maturity of your company. An analysis of your current infrastructure, creation of a migration roadmap based on key metrics and dependencies will be offered as a follow-up service.


Azure Migration- 5-Day Implementation.png

Azure Migration: 5-Day Implementation: Is your organization looking to adopt a cloud strategy? Through this implementation, the experts at Abtis will migrate your ten most important Windows and SQL Server-based workloads to Microsoft Azure. This offer is available only in German.


Azure Service Advisory- 4-Week Assessment.png

Azure Service Advisory: 4-Week Assessment: In this offer experts from Entelect will help you understand the myriad offerings and technologies that are part of Microsoft Azure’s evolving landscape. You will get a custom plan outlining which solutions within the Azure framework work best for your business needs.


Azure Stack Hub- 4-Week Implementation.png

Azure Stack Hub: 4-Week Implementation: myCloudDoor consultants will help you build and run applications in an autonomous cloud that is completely or partially disconnected from the internet. Gain flexibility and control and easily transfer your app models between Microsoft Azure and Azure Stack Hub.


Azure Synapse Analytics- 2-Hour Workshop.png

Azure Synapse Analytics: 2-Hour Workshop: Get a free education on the Microsoft Azure Synapse Analytics solution from the experts at Altron Karabina so you can identify where this solution can be utilized in your organization. This workshop will help you create a reliable data foundation for your business questions.


Azure Virtual Desktop Journey- 2-Hour Briefing .png

Azure Virtual Desktop Journey: 2-Hour Briefing: In this free briefing, ACP IT Solutions will discuss the benefits of Azure Virtual Desktop, cover infrastructure and costs, identify automation opportunities, and more. This offer is available only in German.


Azure Virtual Desktop- 1-Day Quick-Start Workshop.png

Azure Virtual Desktop: 1-Day Quick-Start Workshop: Appsphere’s consultants will show you how Microsoft Azure Virtual Desktop works and the advantages it offers to you and your company. A comprehensive proof of concept will be provided so you can enable a secure remote desktop experience from virtually anywhere.


Azure Virtual Desktop- 4-Day Implementation.png

Azure Virtual Desktop: 4-Day Implementation: IT sure GmbH will analyze your current environment and optimize it for Microsoft Azure Virtual Desktop, enabling you to manage demanding environments such as CAD workstations. This offer is available only in German.


Azure Virtual Desktop- 4-Week Implementation.png

Azure Virtual Desktop: 4-Week Implementation: As part of their managed service the experts from Long View Systems will help design and deploy Microsoft Azure Virtual Desktop so your organization can close the skills gap and enable a secure remote desktop experience from virtually anywhere.


Azure-Driven ML & Data Science- 4-Week Proof of Concept.png

Azure-Driven ML & Data Science: 4-Week Proof of Concept: Arinti will help guide you through your Microsoft Azure AI journey in this four-week engagement. Deliverables include a data audit report, roadmap for future AI implementations, estimate to scale the proof of concept to a production environment, and more.


Cloud Data Migration- 2-Day Workshop.png

Cloud Data Migration: 2-Day Workshop: Available only in German, Saracus Consulting’s workshop will teach you how to successfully migrate your on-premises database to Microsoft Azure. Learn how you can benefit from the elasticity and agility of Azure services.


Cloud Readiness- 5-Day Assessment.png

Cloud Readiness: 5-Day Assessment: Looking to migrate your applications to the cloud? Cegeka’s five-day Cloud Readiness assessment will help you create a strategic roadmap to ensure you accomplish a successful migration to Microsoft Azure.


CloudTrack Governance Journey- 3-Day Workshop.png

CloudTrack Governance Journey: 3-Day Workshop: Atea’s CloudTrack Governance Journey includes three workshops utilizing Microsoft Azure best practices and Atea’s experience configuring Azure environments as a proven method for successfully moving your organization to the cloud.


Costs Optimization- 2-Week Assessment.png

Costs Optimization: 2-Week Assessment: Available only in Spanish, Orion 2000’s Cost Optimization assessment includes an analysis and evaluation of your organization’s Microsoft Azure environment to help you reduce unnecessary costs and identify potential savings.


Data & Analytics Strategy- 5-Day Assessment.png

Data & Analytics Strategy: 5-Day Assessment: Obungi experts will help you use your data as a driver of success by looking at the state of your system, identifying strengths and weaknesses, and jointly developing a target landscape and roadmap based on Microsoft Azure services.


Data Architecture- Half-Day Workshop.png

Data Architecture: Half-Day Workshop: Learn how to more effectively use your data via Microsoft Azure and this free, individually tailored consultation. Experts from Zoi TechCon with work with you to look at integration, metadata, and governance best practices for your data architecture.


Data Platform Modernization- 10-Week Implementation.png

Data Platform Modernization: 10-Week Implementation: This consultation with Business Integration Partners will assess your infrastructure and applications, define future scenarios, and implement a solution for data platform modernization to accelerate your digital transformation.


Data Warehouse - Synapse Analytics- 1-Day Workshop.png

Data Warehouse – Synapse Analytics: 1-Day Workshop: Learn from the experts at Obungi how a modern data warehouse based on Microsoft Azure Synapse Analytics can combine traditional data warehousing with big data and data science to uncover hidden insights and make informed decisions.


DataCenter Modernization 6-Week Implementation.png

DataCenter Modernization 6-Week Implementation: Get help moving to Microsoft Azure with this consulting offer from IT Quest Solutions. You will receive a technical assessment, a cost analysis, and a migration plan detailing how to move your workloads to the cloud.


DevOps Consulting- 2-Week Assessment.png

DevOps Consulting: 2-Week Assessment: This consultation with RCR will improve how you produce and operate applications in Microsoft Azure DevOps through the effective execution of processes, practices, and use of tools that automate the development cycle.


External Identity Access Management- 1-Day Briefing.png

External Identity Access Management: 1-Day Briefing: Avaleris will provide high-level recommendations for an optimal path toward deployment of external identity solutions that will protect your organization from threats and ease onboarding for partners and customers.


Infrastructure Provisioning- 2-Week Assessment.png

Infrastructure Provisioning: 2-Week Assessment: LTTS will help you plan automated infrastructure provisioning using Terraform or Microsoft Azure Resource Manager (ARM) templates, reducing the time it takes you to provision cloud resources from weeks to minutes.


Intelligent Spaces- 4-Week Assessment.png

Intelligent Spaces: 4-Week Assessment: GlobalLogic will assess your office space management system and propose an improved or new solution based on Microsoft Azure, Dynamics 365, and Power BI that will enable people to be in a more safe and comfortable environment.


Introduction to Azure Purview- 1-Day Workshop.png

Introduction to Azure Purview: 1-Day Workshop: This consultation will use practical examples to show the functions and benefits of Microsoft Azure Purview unified data governance service for the different user groups in your company. This offer is only available in German.


Linux Migration- 5-Day Implementation.png

Linux Migration: 5-Day Implementation: Get professional migration for your Linux and open source database workloads. Abtis will migrate your ten most important workloads on the basis of Linux and open source databases to Microsoft Azure safely and quickly. This offer is only available in German.


Machine Learning- 1-Day Workshop.png

Machine Learning: 1-Day Workshop: Learn about the functionality and advantages of machine learning with AppSphere’s offering. Get an overview of the terminology and basic statistical methods and create self-learning data sets with Microsoft Azure Machine Learning Studio.


Modern Workplace Jumpstart- 1-Week Workshop.png

Modern Workplace Jumpstart: 1-Week Workshop: AppSphere‘s consultants will develop an IT architecture/landscape that is heavily based on Microsoft cloud solutions like Office 365 and Azure services, to meet demands for mobility, collaboration, and communication.


Oracle Migration to Azure- 2-Hour Briefing.png

Oracle Migration to Azure: 2-Hour Briefing: This offering from Dimension Data will introduce you to managing and optimizing your Oracle footprint and technology costs by migrating your Oracle workloads to Microsoft Azure (Oracle on Azure) or to PostgreSQL on Azure.


Oracle_PostgreSQL Migration- 6-Week Assessment.png

Oracle/PostgreSQL Migration: 6-Week Assessment: AKVELON will perform this migration to Microsoft Azure PostgreSQL database infrastructure with an option to use state-of-the-art server solutions. Additional services to migrate the application infrastructure are available.


Quick Azure Virtual Desktop- 4-Week Implementation.png

Quick Azure Virtual Desktop: 4-Week Implementation: Ignite’s offering consists of a structured service that will allow a customer to perform a fast standard deployment of an environment of virtualized desktops and applications running in the Microsoft Azure cloud.


SAP on Azure- 2-Week Assessment.png

SAP on Azure: 2-Week Assessment: Reply AG will assess and plan an individual migration to Microsoft Azure based on customer needs, combined with its extensive experiences with SAP systems. This offer will bring best practices and individual class together.


StoreSimple- 4-Week Implementation.png

StoreSimple: 4-Week Implementation: Extended support for Microsoft Azure StorSimple will cease in December 2022. SoftJam will analyze your StorSimple usage pattern and identify the best IaaS/PaaS/SaaS solution to replace it, granting the same level of reliability.


Veeam Cloud Backup for Microsoft 365- 4-Week Implementation.png

Veeam Cloud Backup for Microsoft 365: 4-Week Implementation: Sentia’s offering follows recommendations and best practices from the Microsoft Cloud Adoption Framework for Azure. It implements the concept of an Azure landing zone, providing the foundation for additional Azure workloads.


Win with Analytics - Azure Synapse- 2-Week Proof of Concept.png

Win with Analytics – Azure Synapse: 2-Week Proof of Concept: Altron Karabina will help build “one analytic view’ using Microsoft Azure Synapse Analytics that can impact your business now. Get a high-level analysis and the creation of a one-page statement of success document.



Contact our partners



ADiTaaS IT Service Management



Amdocs Service and Network Automation Solution



Arimac FinTech Suite



Automated Data Harmonization



Axway Managed File Transfer



Azure Sentinel from Atos



Azure Sentinel Managed Service



BAYZYEN



bonbon shop



BusinessNow



CallMiner Eureka



CarnaLife System



Clinicone Telemedicine



CODA Footprint Cloud Appliance



Codestone Managed Services Offering



CogEra



Data Leak Prevention: 4-Hour Workshop



DeviceOn/Kiosk+ with Anomaly Detection Service



DNS Guard



Document Locator



EDGYneer



eGovern File Share Migration to Microsoft 365



Enlabeler Annotate



ESET PROTECT



ESET PROTECT for MSP



Eugenie AI



Exterro Forensic Tool Kit Single Server



Exterro FTK Central 7.4 for Microsoft Azure



Exterro FTK Enterprise for Microsoft Azure



Exterro FTK Lab for Microsoft Azure



EY Modern Finance



FortiGate Next-Generation Firewall for Azure Stack



IDEMIA Smart Connect Consumer



IDEMIA Smart Connect M2M



IFS Cloud



Infosys Modernization Suite



INTAIN Structured Finance



Kofax SignDoc Cloud



Kofax TotalAgility



mcframe SIGNAL CHAIN



Multiple Choice Quiz Corrector API



NetApp Cloud Backup



Nuboj



ogamma Visual Logger for OPC IoT Edge Module



paydash



SmartOMS v1



SOH_Sintra Omnichannel Hub



SolarWinds SQL Sentry



Tripwire IP360 (Device Profiler Ev) 9.2.1



Tripwire IP360 (VnE Manager Ev) 9.2.1



Vector Center Perception Reality Engine



Experiencing Data Latency issue in Azure Portal for Many Data Types – 08/31 – Investigating

This article is contributed. See the original author and article here.

Update: Tuesday, 31 August 2021 17:19 UTC

We continue to investigate issues within Application Insights. Root cause is not fully understood at this time. Some customers continue to experience Application Insights telemetry data latency and/or data gaps. We are working to establish the start time for the issue, initial findings indicate that the problem began at August 31, 17:12 UTC. We currently have no estimate for resolution.
  • Next Update: Before 08/31 18:30 UTC
-Jack Cantwell

FBI-CISA Advisory on Ransomware Awareness for Holidays and Weekends

This article is contributed. See the original author and article here.

Today, the Federal Bureau of Investigation (FBI) and CISA released a Joint Cybersecurity Advisory (CSA) to urge organizations to ensure they protect themselves against ransomware attacks during holidays and weekends—when offices are normally closed.

Although FBI and CISA do not currently have any specific threat reporting indicating a cyberattack will occur over the upcoming Labor Day holiday, malicious cyber actors have launched serious ransomware attacks during other holidays and weekends in 2021. The Joint CSA identifies both immediate and longer term actions organizations can take to protect against the rise in ransomware, including:

CISA and the FBI encourage users to examine their current cybersecurity posture and implement the recommended mitigations in the Joint CSA to manage the risk posed by all cyber threats, including ransomware.

Ransomware Awareness for Holidays and Weekends

This article is contributed. See the original author and article here.

Immediate Actions You Can Take Now to Protect Against Ransomware
• Make an offline backup of your data.
• Do not click on suspicious links.
• If you use RDP, secure and monitor it.
Update your OS and software.
• Use strong passwords.
Use multi-factor authentication.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have observed an increase in highly impactful ransomware attacks occurring on holidays and weekends—when offices are normally closed—in the United States, as recently as the Fourth of July holiday in 2021. The FBI and CISA do not currently have any specific threat reporting indicating a cyberattack will occur over the upcoming Labor Day holiday. However, the FBI and CISA are sharing the below information to provide awareness to be especially diligent in your network defense practices in the run up to holidays and weekends, based on recent actor tactics, techniques, and procedures (TTPs) and cyberattacks over holidays and weekends during the past few months. The FBI and CISA encourage all entities to examine their current cybersecurity posture and implement the recommended best practices and mitigations to manage the risk posed by all cyber threats, including ransomware.

Click here for a PDF copy of this report.

Threat Overview

Recent Holiday Targeting

Cyber actors have conducted increasingly impactful attacks against U.S. entities on or around holiday weekends over the last several months. The FBI and CISA do not currently have specific information regarding cyber threats coinciding with upcoming holidays and weekends. Cyber criminals, however, may view holidays and weekends—especially holiday weekends—as attractive timeframes in which to target potential victims, including small and large businesses. In some cases, this tactic provides a head start for malicious actors conducting network exploitation and follow-on propagation of ransomware, as network defenders and IT support of victim organizations are at limited capacity for an extended time.

  • In May 2021, leading into Mother’s Day weekend, malicious cyber actors deployed DarkSide ransomware against the IT network of a U.S.-based critical infrastructure entity in the Energy Sector, resulting in a week-long suspension of operations. After DarkSide actors gained access to the victim’s network, they deployed ransomware to encrypt victim data and—as a secondary form of extortion—exfiltrated the data before threatening to publish it to further pressure victims into paying the ransom demand.
  • In May 2021, over the Memorial Day weekend, a critical infrastructure entity in the Food and Agricultural Sector suffered a Sodinokibi/REvil ransomware attack affecting U.S. and Australian meat production facilities, resulting in a complete production stoppage.
  • In July 2021, during the Fourth of July holiday weekend, Sodinokibi/REvil ransomware actors attacked a U.S.-based critical infrastructure entity in the IT Sector and implementations of their remote monitoring and management tool, affecting hundreds of organizations—including multiple managed service providers and their customers.

Ransomware Trends

The FBI’s Internet Crime Complaint Center (IC3), which provides the public with a trustworthy source for reporting information on cyber incidents, received 791,790 complaints for all types of internet crime—a record number—from the American public in 2020, with reported losses exceeding $4.1 billion. This represents a 69 percent increase in total complaints from 2019. The number of ransomware incidents also continues to rise, with 2,474 incidents reported in 2020, representing a 20 percent increase in the number of incidents, and a 225 percent increase in ransom demands. From January to July 31, 2021, the IC3 has received 2,084 ransomware complaints with over $16.8M in losses, a 62 percent increase in reporting and 20 percent increase in reported losses compared to the same time frame in 2020.
  The following ransomware variants have been the most frequently reported to FBI in attacks over the last month.

  • Conti
  • PYSA
  • LockBit
  • RansomEXX/Defray777
  • Zeppelin
  • Crysis/Dharma/Phobos

The destructive impact of ransomware continues to evolve beyond encryption of IT assets. Cyber criminals have increasingly targeted large, lucrative organizations and providers of critical services with the expectation of higher value ransoms and increased likelihood of payments. Cyber criminals have also increasingly coupled initial encryption of data with a secondary form of extortion, in which they threaten to publicly name affected victims and release sensitive or proprietary data exfiltrated before encryption, to further encourage payment of ransom. (See CISA’s Fact Sheet: Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches.) Malicious actors have also added tactics, such as encrypting or deleting system backups—making restoration and recovery more difficult or infeasible for impacted organizations.

Although cyber criminals use a variety of techniques to infect victims with ransomware, the two most prevalent initial access vectors are phishing and brute forcing unsecured remote desktop protocol (RDP) endpoints. Additional common means of initial infection include deployment of precursor or dropper malware; exploitation of software or operating system vulnerabilities; exploitation of managed service providers with access to customer networks; and the use of valid, stolen credentials, such as those purchased on the dark web. Precursor malware enables cyber actors to conduct reconnaissance on victim networks, steal credentials, escalate privileges, exfiltrate information, move laterally on the victim network, and obfuscate command-and-control communications. Cyber actors use this access to: 

  • Evaluate a victim’s ability to pay a ransom.
  • Evaluate a victim’s incentive to pay a ransom to: 
    • Regain access to their data and/or 
    • Avoid having their sensitive or proprietary data publicly leaked.
  • Gather information for follow-on attacks before deploying ransomware on the victim network.

Threat Hunting

The FBI and CISA suggest organizations engage in preemptive threat hunting on their networks. Threat hunting is a proactive strategy to search for signs of threat actor activity to prevent attacks before they occur or to minimize damage in the event of a successful attack. Threat actors can be present on a victim network long before they lock down a system, alerting the victim to the ransomware attack. Threat actors often search through a network to find and compromise the most critical or lucrative targets. Many will exfiltrate large amounts of data. Threat hunting encompasses the following elements of understanding the IT environment by developing a baseline through a behavior-based analytics approach, evaluating data logs, and installing automated alerting systems. 

  • Understand the IT environment’s routine activity and architecture by establishing a baseline. By implementing a behavior-based analytics approach, an organization can better assess user, endpoint, and network activity patterns. This approach can help an organization remain alert on deviations from normal activity and detect anomalies. Understanding when users log in to the network—and from what location—can assist in identifying anomalies. Understanding the baseline environment—including the normal internal and external traffic—can also help in detecting anomalies. Suspicious traffic patterns are usually the first indicators of a network incident but cannot be detected without establishing a baseline for the corporate network.
  • Review data logs. Understand what standard performance looks like in comparison to suspicious or anomalous activity. Things to look for include:
    • Numerous failed file modifications,
    • Increased CPU and disk activity,
    • Inability to access certain files, and
    • Unusual network communications.
  • Employ intrusion prevention systems and automated security alerting systems—such as security information event management software, intrusion detection systems, and endpoint detection and response.
  • Deploy honeytokens and alert on their usage to detect lateral movement.

Indicators of suspicious activity that threat hunters should look for include:

  • Unusual inbound and outbound network traffic,
  • Compromise of administrator privileges or escalation of the permissions on an account,
  • Theft of login and password credentials,
  • Substantial increase in database read volume,
  • Geographical irregularities in access and log in patterns,
  • Attempted user activity during anomalous logon times, 
  • Attempts to access folders on a server that are not linked to the HTML within the pages of the web server, and
  • Baseline deviations in the type of outbound encrypted traffic since advanced persistent threat actors frequently encrypt exfiltration.

See the joint advisory from Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for additional guidance on hunting or investigating a network, and for common mistakes in incident handling. Also review the Ransomware Response Checklist in the CISA-MS-ISAC Joint Ransomware Guide.

Cyber Hygiene Services

CISA offers a range of no-cost cyber hygiene services—including vulnerability scanning and ransomware readiness assessments—to help critical infrastructure organizations assess, identify, and reduce their exposure to cyber threats. By taking advantage of these services, organizations of any size will receive recommendations on ways to reduce their risk and mitigate attack vectors. 

Ransomware Best Practices

The FBI and CISA strongly discourage paying a ransom to criminal actors. Payment does not guarantee files will be recovered, nor does it ensure protection from future breaches. Payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of malware, and/or fund illicit activities. Regardless of whether you or your organization decide to pay the ransom, the FBI and CISA urge you to report ransomware incidents to CISA, a local FBI field office, or by filing a report with IC3 at IC3.gov. Doing so provides the U.S. Government with critical information needed to help victims, track ransomware attackers, hold attackers accountable under U.S. law, and share information to prevent future attacks.

Information Requested

Upon receiving an incident report, the FBI or CISA may seek forensic artifacts, to the extent that affected entities determine such information can be legally shared, including: 

  • Recovered executable file(s),
  • Live memory (RAM) capture,
  • Images of infected systems,
  • Malware samples, and
  • Ransom note.

Recommended Mitigations

The FBI and CISA highly recommend organizations continuously and actively monitor for ransomware threats over holidays and weekends.
  Additionally, the FBI and CISA recommend identifying IT security employees to be available and “on call” during these times, in the event of a ransomware attack. The FBI and CISA also suggest applying the following network best practices to reduce the risk and impact of compromise.

Make an offline backup of your data.

  • Make and maintain offline, encrypted backups of data and regularly test your backups. Backup procedures should be conducted on a regular basis. It is important that backups be maintained offline as many ransomware variants attempt to find and delete or encrypt accessible backups.
  • Review your organization’s backup schedule to take into account the risk of a possible disruption to backup processes during weekends or holidays.

Do not click on suspicious links.

  • Implement a user training program and phishing exercises to raise awareness among users about the risks involved in visiting malicious websites or opening malicious attachments and to reinforce the appropriate user response to phishing and spearphishing emails.

If you use RDP—or other potentially risky services—secure and monitor.

  • Limit access to resources over internal networks, especially by restricting RDP and using virtual desktop infrastructure. After assessing risks, if RDP is deemed operationally necessary, restrict the originating sources and require MFA. If RDP must be available externally, it should be authenticated via VPN.
  • Monitor remote access/RDP logs, enforce account lockouts after a specified number of attempts, log RDP login attempts, and disable unused remote access/RDP ports.
  • Ensure devices are properly configured and that security features are enabled. Disable ports and protocols that are not being used for a business purpose (e.g., RDP Transmission Control Protocol Port 3389). 
  • Disable or block Server Message Block (SMB) protocol outbound and remove or disable outdated versions of SMB. Threat actors use SMB to propagate malware across organizations.
  • Review the security posture of third-party vendors and those interconnected with your organization. Ensure all connections between third-party vendors and outside software or hardware are monitored and reviewed for suspicious activity.
  • Implement listing policies for applications and remote access that only allow systems to execute known and permitted programs under an established security policy.
  • Open document readers in protected viewing modes to help prevent active content from running.

Update your OS and software; scan for vulnerabilities.

  • Upgrade software and operating systems that are no longer supported by vendors to currently supported versions. Regularly patch and update software to the latest available versions. Prioritize timely patching of internet-facing servers—as well as software processing internet data, such as web browsers, browser plugins, and document readers—for known vulnerabilities. Consider using a centralized patch management system; use a risk-based assessment strategy to determine which network assets and zones should participate in the patch management program.
  • Automatically update antivirus and anti-malware solutions and conduct regular virus and malware scans.
  • Conduct regular vulnerability scanning to identify and address vulnerabilities, especially those on internet-facing devices. (See the Cyber Hygiene Services section above for more information on CISA’s free services.)

Use strong passwords.

  • Ensure strong passwords and challenge responses. Passwords should not be reused across multiple accounts or stored on the system where an adversary may have access.

Use multi-factor authentication.

  • Require multi-factor authentication (MFA) for all services to the extent possible, particularly for remote access, virtual private networks, and accounts that access critical systems. 

Secure your network(s): implement segmentation, filter traffic, and scan ports.

  • Implement network segmentation with multiple layers, with the most critical communications occurring in the most secure and reliable layer.
  • Filter network traffic to prohibit ingress and egress communications with known malicious IP addresses. Prevent users from accessing malicious websites by implementing URL blocklists and/or allowlists.
  • Scan network for open and listening ports and close those that are unnecessary.
  • For companies with employees working remotely, secure home networks—including computing, entertainment, and Internet of Things devices—to prevent a cyberattack; use separate devices for separate activities; and do not exchange home and work content. 

Secure your user accounts.

  • Regularly audit administrative user accounts and configure access controls under the principles of least privilege and separation of duties.
  • Regularly audit logs to ensure new accounts are legitimate users.

Have an incident response plan.

  • Create, maintain, and exercise a basic cyber incident response plan that:
    • Includes procedures for response and notification in a ransomware incident and
    • Plans for the possibility of critical systems being inaccessible for a period of time.

Note: for help with developing your plan, review available incident response guidance, such as the Public Power Cyber Incident Response Playbook and the Ransomware Response Checklist in the CISA-MS-ISAC Joint Ransomware Guide.

If your organization is impacted by a ransomware incident, the FBI and CISA recommend the following actions.

  • Isolate the infected system. Remove the infected system from all networks, and disable the computer’s wireless, Bluetooth, and any other potential networking capabilities. Ensure all shared and networked drives are disconnected, whether wired or wireless.
  • Turn off other computers and devices. Power off and segregate (i.e., remove from the network) the infected computer(s). Power off and segregate any other computers or devices that share a network with the infected computer(s) that have not been fully encrypted by ransomware. If possible, collect and secure all infected and potentially infected computers and devices in a central location, making sure to clearly label any computers that have been encrypted. Powering off and segregating infected computers from computers that have not been fully encrypted may allow for the recovery of partially encrypted files by specialists.
  • Secure your backups. Ensure that your backup data is offline and secure. If possible, scan your backup data with an antivirus program to check that it is free of malware.

Additional Resources

For additional resources related to the prevention and mitigation of ransomware, go to https://www.stopransomware.gov as well as the CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide. Stopransomware.gov is the U.S. Government’s new, official one-stop location for resources to tackle ransomware more effectively. Additional resources include:

Power Apps and Dynamics 365 Guides brings data to frontline workers

Power Apps and Dynamics 365 Guides brings data to frontline workers

This article is contributed. See the original author and article here.

Data is everywhere, data is decision making power

The emergence of data is changing the way organizations do business. From our mobile devices to our machinery, everyday activities and interactions create trillions of data points generated by inanimate objects. Unfortunately, data is often stored across disparate systems depriving organizations of access to valuable information and connected insights. To keep up with today’s fast-paced data hierarchy, organizations must rely on solutions that effectively integrate data to derive important business insights, empower frontline workers to make data-driven decisions, and streamline operational efficiency.

Break down information siloes with Microsoft Dynamics 365 Guides, HoloLens 2, and Power Apps

Infusing Power Apps with Dynamics 365 Guides and HoloLens 2 has enabled organizations to give their frontline workers step-by-step holographic instructions while also bringing critical, connected data into view. Using Power Apps, you can connect to your business data stored in on-premises data sources and rapidly build customizable workflows for your unique operational processes.

With Power Apps, you can embed your apps directly into Dynamics 365 Guides, displayed on HoloLens 2. Embedding Power Apps apps into Dynamics 365 Guides enables you to:

  • Create and trigger automated workflows based on captured asset data to simplify business processes seamlessly.
  • Develop issue reports, incorporated into your existing workflow within Dynamics 365 Guides.
  • Report issues directly within the workflow in a non-disruptive and efficient way.
  • Understand historical data and relevant insights.

Guide that shows that within the PC Authoring app, go to the appropriate step, then select the Action tab.

An example of Issue Reporting integrated into Dynamics 365 Guides using Power Apps

Additionally, using Dynamics 365 Guides PC authoring, you can add a website link or directly link to Power Apps apps in your guides, making the opportunities endless for content linking and quick access to resources such as reference manuals, interactive quizzes, or parts re-ordering systems, or an app that provides the latest status of IoT sensors. This feature enables authors to create a seamless workflow for operators so that there is no need to switch from the workflow to access outside documentation as the information is displayed seamlessly in the line of sight.

It doesn’t end there. By integrating Power Apps with Dynamics 365 Remote Assist, you can ensure your operators are connected to apps when performing tasks on the go. Simply connect to Power Apps via your Microsoft Edge browser to access Remote Assist Helper to manage your tasks, apps, and documentation with a remote expert.

Drag the Website link circle to the Action circle in the lower-right corner of the Step Editor pane.

An example of adding in Website link using the Step Editor pane.

Guide that shows a step card where you can view, edit, or delete the link, right-click the Website link button in the Step Editor pane, and then select the appropriate command.

To view, edit, or delete the link, right-click the Website link button in the Step Editor pane and then select the appropriate command.

Auger Groupe Conseil uses Power Apps with Dynamics 365 Guides

Auger Groupe Conseil is a firm specializing in industrial process engineering, with a focus on helping organizations accomplish “Industry 4.0” procedural updates. On a recent client visit at Kruger Paper Inc., Auger Groupe Conseil recognized the opportunity to unify vast amounts of unused data stored across disparate sources with Power Apps with Dynamics 365 Guides.

Using the Power Apps connector in Dynamics 365 Guides, Auger Groupe Conseil was able to bring all of this unused data to their employees in real-time on the shop floor. With the Power Apps connector, the organization was able to take the Dynamics 365 Guides solution a step further by customizing workflows, submitting issue reports, and making optimal adjustments live in their real work environment. The customizable workflows let them create what they need within a workflow, for example, an alert or a report. Overall, this low-code, versatile solution has enabled their organization to effectively maximize their operations and employee performance.

“We realized that all these companies have an enormous amount of data sources and the best way to bring all this data to the employee is to use Power Apps in Guides. Power Apps allows you to customize any workflow.” Alan Marchand, IT Director at Auger Groupe Conseil, in charge of solutions architecture.

a man standing in front of a computer

Frontline worker uses Power Apps and Guides to click into step to customize a workflow, create an alert and submit an issue report.

Get started

The post Power Apps and Dynamics 365 Guides brings data to frontline workers appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Meet a recent Microsoft Learn Student Ambassador graduate: Nandita Gaur

Meet a recent Microsoft Learn Student Ambassador graduate: Nandita Gaur

This article is contributed. See the original author and article here.

This is the next installment of our blog series highlighting Microsoft Learn Student Ambassadors who achieved the Gold milestone and have recently graduated from university. Each blog in the series features a different student and highlights their accomplishments, their experience with the Student Ambassadors community, and what they’re up to now.


 


Today we’d like to introduce Nandita Gaur who is from India and recently graduated from ABES Engineering College with a degree in Computer Science and Engineering.


Student_Developer_Team_0-1629833405373.png


 


Responses have been edited for clarity and length. 


 


When you joined the Student Ambassador community in 2019, did you have specific goals you wanted to reach, such as a particular skill or quality?  What were they?  Did you achieve them? How has the program impacted you in general? 


 


Microsoft has always been my dream organization, so when I got to know about this amazing program by Microsoft for students, I had to join. Before joining the community, my goals were oriented towards my personal growth. I wanted to enhance my resume by learning new skills, meet new people around the globe working on various technologies, and meet people of Microsoft.  Now that I have graduated from this program, I have grown so much as a person. I have achieved all my goals. In fact, a lot more than that. I am a lot more confident in public speaking skills as compared to before. I have learned about Cloud Computing, Machine Learning, and Artificial Intelligence, gained knowledge about various Microsoft products, and I have met various impactful personalities around the globe.


 


The Student Ambassadors community has impacted me so much. My mindset has changed. I have realized that emphasizing just only on the personal growth is not going to help you much in the life. It’s all about making an impact. It’s about how many people are going to get benefitted by the work you do.


 


What are the accomplishments that you’re the proudest of and why?


 


I have conducted many events, thus impacting a lot of people, but one thing that I am truly proud of is winning the Azure Developer Stories contest, a blogging contest held in April 2020 wherein we had to document a project based on Machine Learning. I didn’t really know Machine Learning before this contest, but since it was declared during lockdown, I had all the time to study. So I referred to Microsoft Learn and based on all the knowledge I gathered from it, I made a project on COVID-19 Analysis using Python. I just couldn’t believe it when the results were announced. I was declared winner among all the Student Ambassadors of India. This boosted my confidence a lot.


 


“Nothing is tough; all it takes is some dedication.”


 


I was too reluctant to start Machine Learning then because it covers a lot of mathematics, something which I tried to avoid for as long as possible. I couldn’t find good resources to study Machine Learning online, and this contest by the Student Ambassador community introduced me to a well-structured course on Microsoft Learn on Machine Learning. I had no reason to procrastinate. I had the all the resources. I had to start learning.


 


I am really proud of all the learning I have gathered about Machine Learning and fighting the habit of procrastination.


 


What do you have planned after graduation? 


 


I will be working as a Support Engineer with the Microsoft India CE&S team on Dynamics 365. I also plan to keep mentoring the students of my college so that they can achieve more than they think they can.


 


If you could redo your time as a Student Ambassador, is there anything you would have done differently?


 


I could have made much more connections. Although I have made a lot of friends, I was reluctant in the beginning to talk to anyone. I didn’t prefer speaking much. If I had spoken more, then I would have probably got the chance to be a speaker at Microsoft Build or Ignite.


 


If you were to describe the community to a student who is interested in joining, what would you say about it to convince him or her to join?


 


It is a wonderful opportunity that grooms your personality and helps you evolve as a person. You get to meet talented people across the globe and learn various technologies with them and make strong connections that may help you in your career. You get to know what’s going inside Microsoft and about the Microsoft mission, its culture and values, and you build a close connection with Microsoft employees who mentor you in making projects, provide you valuable career tips, and also provide you with various speaking opportunities at international conferences. You will know what’s going around the world in the field of technology and have a clearer picture of how technology can be used to create an impact in this world.


 


What advice would you give to new Student Ambassadors?


 


Push aside your inhibitions and start talking around. Start discussions, involve yourself in conversations, and conduct useful events that may help the students of your local community at University.


 


Just organizing events is not helpful. You have to attend sessions too. All the speakers from Microsoft are immensely talented professionals who have interesting knowledge to offer that is going to help you at every point in your career. You have a lot to take and to offer. So take full advantage of the opportunities that the Student Ambassadors team is offering you.


 


Do you have a motto in life, a guiding principle that drives you?


 


During lockdown I was much too demotivated. There was a lot of negativity in the environment. To top it off, placement season for post-graduation job was overhead. I had lost my productivity because of all the chaos around and felt like I am making no progress in life. Luckily I landed on this song called “Hall of Fame” by an Irish band “The Script”. It is an inspirational song that says you can do anything you set your mind to as long as you believe in yourself and try.  It motivated me to get up and start working, so I made this song my guiding principle.


 


What is one random fact few people know about you?


 


I am good at palmistry. My classmates in the high school consulted with me, showing their hands to me to know about their future, personality, and what could be done to improve it. Even teachers too! I enjoyed this fame but eventually realized that this does not help with anything except unnecessary worrying among the folks for their future. When I moved to college, I kept this skill as a secret. Actually, I have given up this job completely, so please don’t consult me for this (LOL).


 


Good luck to you in your journey, Nandita!

CISA Adds Single-Factor Authentication to list of Bad Practices

This article is contributed. See the original author and article here.

Today, CISA added the use of single-factor authentication for remote or administrative access systems to our Bad Practices list of exceptionally risky cybersecurity practices. Single-factor authentication is a common low-security method of authentication. It only requires matching one factor—such as a password—to a username to gain access to a system.

Although these Bad Practices should be avoided by all organizations, they are especially dangerous in organizations that support Critical Infrastructure or National Critical Functions.  

CISA encourages all organizations to review the Bad Practices webpage and to engage in the necessary actions and critical conversations to address Bad Practices. For guidance on setting up strong authentication, see the CISA Capacity Enhancement Guide: Implementing Strong Authentication.

Vulnerability Summary for the Week of August 23, 2021

This article is contributed. See the original author and article here.

adobe — acrobat_reader_dc Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28552
MISC adobe — acrobat_reader_dc
  Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28632
MISC adobe — acrobat_reader_dc
  Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28554
MISC adobe — acrobat_reader_dc
  Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Out-of-bounds read vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28551
MISC adobe — acrobat_reader_dc
  Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28631
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28612
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28611
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28609
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by a heap corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28607
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28615
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28605
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28604
MISC adobe — after_effects Adobe After Effects version 18.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28602
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28614
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28608
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28603
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28610
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28601
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28600
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28616
MISC adobe — after_effects
  Adobe After Effects version 18.2 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28606
MISC adobe — animate Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose potential sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28630
MISC adobe — animate Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Write vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28622
MISC adobe — animate Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28618
MISC adobe — animate
  Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28617
MISC adobe — animate
  Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28619
MISC adobe — animate
  Adobe Animate version 21.0.6 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28620
MISC adobe — animate
  Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28621
MISC adobe — animate
  Adobe Animate version 21.0.6 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28629
MISC adobe — creative_cloud_desktop_application
  Adobe Creative Cloud Desktop Application (installer) version 2.4 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-24 not yet calculated CVE-2021-28594
MISC adobe — creative_cloud_desktop_application
  Adobe Creative Cloud Desktop Application (installer) version 2.4 (and earlier) is affected by an Insecure temporary file creation vulnerability. An attacker could leverage this vulnerability to cause arbitrary file overwriting in the context of the current user. Exploitation of this issue requires physical interaction to the system. 2021-08-24 not yet calculated CVE-2021-28633
MISC adobe — experience_manager_cloud_service Adobe Experience Manager Cloud Service offering, as well as versions 6.5.8.0 (and below) is affected by a Server-side Request Forgery. An authenticated attacker could leverage this vulnerability to contact systems blocked by the dispatcher. Exploitation of this issue does not require user interaction. 2021-08-24 not yet calculated CVE-2021-28627
MISC adobe — experience_manager_cloud_service Adobe Experience Manager Cloud Service offering, as well as versions 6.5.8.0 (and below) is affected by a Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. 2021-08-24 not yet calculated CVE-2021-28628
MISC adobe — experience_manager_cloud_service
  Adobe Experience Manager Cloud Service offering, as well as versions 6.5.8.0 (and below) is affected by a Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. 2021-08-24 not yet calculated CVE-2021-28625
MISC adobe — experience_manager_cloud_service
  Adobe Experience Manager Cloud Service offering, as well as versions 6.5.8.0 (and below) is affected by an Improper Authorization vulnerability allowing users to create nodes under a location. An unauthenticated attacker could leverage this vulnerability to cause an application denial-of-service. Exploitation of this issue does not require user interaction. 2021-08-24 not yet calculated CVE-2021-28626
MISC adobe — framemaker
  Adobe Framemaker version 2020.0.1 (and earlier) and 2019.0.8 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-23 not yet calculated CVE-2021-28596
MISC adobe — media_encoder
  Adobe Media Encoder version 15.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. 2021-08-23 not yet calculated CVE-2021-36013
MISC apache — nifi_minifi
  From Apache NiFi MiNiFi C++ version 0.5.0 the c2 protocol implements an “agent-update” command which was designed to patch the application binary. This “patching” command defaults to calling a trusted binary, but might be modified to an arbitrary value through a “c2-update” command. Said command is then executed using the same privileges as the application binary. This was addressed in version 0.10.0 2021-08-24 not yet calculated CVE-2021-33191
MISC
MLIST
MLIST aruba — airwave_management_platform
  A remote cross-site scripting (XSS) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.13.0. Aruba has released upgrades for the Aruba AirWave Management Platform that address this security vulnerability. 2021-08-26 not yet calculated CVE-2021-37715
MISC atlassian — jira_server_and_data_center
  Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1. 2021-08-25 not yet calculated CVE-2021-39112
MISC axis — device_manager
  A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices. 2021-08-25 not yet calculated CVE-2021-31989
MISC basercms — basercms
  baserCMS is an open source content management system with a focus on Japanese language support. In affected versions there is a cross-site scripting vulnerability in the file upload function of the management system of baserCMS. Users are advised to update as soon as possible. No workaround are available to mitigate this issue. 2021-08-25 not yet calculated CVE-2021-39136
MISC
CONFIRM
MISC
JVN bento4 — bento4
  The AP4_CttsAtom class in Core/Ap4CttsAtom.cpp in Bento4 1.5.1.0 allows remote attackers to cause a denial of service (application crash), related to a memory allocation failure, as demonstrated by mp2aac. 2021-08-25 not yet calculated CVE-2018-10790
MISC
MISC binderhub — binderhub
  BinderHub is a kubernetes-based cloud service that allows users to share reproducible interactive computing environments from code repositories. In affected versions a remote code execution vulnerability has been identified in BinderHub, where providing BinderHub with maliciously crafted input could execute code in the BinderHub context, with the potential to egress credentials of the BinderHub deployment, including JupyterHub API tokens, kubernetes service accounts, and docker registry credentials. This may provide the ability to manipulate images and other user created pods in the deployment, with the potential to escalate to the host depending on the underlying kubernetes configuration. Users are advised to update to version 0.2.0-n653. If users are unable to update they may disable the git repo provider by specifying the `BinderHub.repo_providers` as a workaround. 2021-08-25 not yet calculated CVE-2021-39159
CONFIRM
MISC blog_mini — blog_mini
  Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component ‘/admin/custom/blog-plugin/add’. 2021-08-27 not yet calculated CVE-2020-18998
MISC blog_mini — blog_mini
  Cross Site Scripting (XSS) in Blog_mini v1.0 allows remote attackers to execute arbitrary code via the component ‘/admin/submit-articles’. 2021-08-27 not yet calculated CVE-2020-18999
MISC braun — spacecom2 An improper sanitization of input vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to gain user-level command-line access by passing a raw external string straight through to printf statements. The attacker is required to be on the same network as the device. 2021-08-25 not yet calculated CVE-2021-33886
MISC
MISC braun — spacecom2
  A Missing Authentication for Critical Function vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to reconfigure the device from an unknown source because of lack of authentication on proprietary networking commands. 2021-08-25 not yet calculated CVE-2021-33882
MISC
MISC braun — spacecom2
  A Cleartext Transmission of Sensitive Information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by snooping on the network traffic. The exposed data includes critical values for a pump’s internal configuration. 2021-08-25 not yet calculated CVE-2021-33883
MISC
MISC braun — spacecom2
  An Unrestricted Upload of File with Dangerous Type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API. This can result in critical files being overwritten. 2021-08-25 not yet calculated CVE-2021-33884
MISC
MISC braun — spacecom2
  An Insufficient Verification of Data Authenticity vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to send the device malicious data that will be used in place of the correct data. This results in full system command access and execution because of the lack of cryptographic signatures on critical data sets. 2021-08-25 not yet calculated CVE-2021-33885
MISC
MISC cachet — cachet Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. 2021-08-27 not yet calculated CVE-2021-39173
MISC
CONFIRM cachet — cachet
  Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. 2021-08-27 not yet calculated CVE-2021-39172
MISC
CONFIRM cachet — cachet
  Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator’s password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it’s developing 2.4 branch is affected. 2021-08-26 not yet calculated CVE-2021-39165
MISC
CONFIRM cachet — cachet
  Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard. 2021-08-28 not yet calculated CVE-2021-39174
MISC
CONFIRM cacti — cacti
  Multiple Cross Site Scripting (XSS) vulneratiblities exist in Cacti 1.2.12 in (1) reports_admin.php, (2) data_queries.php, (3) datat.ph_inpup, (4) graph_templates.php, (5) graphs.php, (6) reports_admin.php, and (7) data_input.php. 2021-08-27 not yet calculated CVE-2020-23226
MISC canon — oce_print_exec_workgroup
  Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection. 2021-08-23 not yet calculated CVE-2021-39367
MISC care2x — hospital_information_management
  Stored cross-site scripting (XSS) vulnerability in Care2x Hospital Information Management 2.7 Alpha. The vulnerability has found POST requests in /modules/registration_admission/patient_register.php page with “name_middle”, “addr_str”, “station”, “name_maiden”, “name_2”, “name_3” parameters. 2021-08-26 not yet calculated CVE-2021-36352
MISC
MISC cerner — mobile_care
  A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell. 2021-08-24 not yet calculated CVE-2021-36385
MISC
MISC
MISC cisco — application_policy_infrastructure_controller
  A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an unauthenticated, remote attacker to read or write arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker could exploit this vulnerability by using a specific API endpoint to upload a file to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on an affected device. 2021-08-25 not yet calculated CVE-2021-1577
CISCO cisco — application_policy_infrastructure_controller
  A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected device. This vulnerability is due to an improper policy default setting. An attacker could exploit this vulnerability by using a non-privileged credential for Cisco ACI Multi-Site Orchestrator (MSO) to send a specific API request to a managed Cisco APIC or Cloud APIC device. A successful exploit could allow the attacker to obtain Administrator credentials on the affected device. 2021-08-25 not yet calculated CVE-2021-1578
CISCO cisco — cisco — application_policy_infrastructure_controller
  A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device. 2021-08-25 not yet calculated CVE-2021-1579
CISCO cisco — cisco — application_policy_infrastructure_controller
  Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. 2021-08-25 not yet calculated CVE-2021-1580
CISCO cisco — cisco — application_policy_infrastructure_controller
  Multiple vulnerabilities in the web UI and API endpoints of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow a remote attacker to perform a command injection or file upload attack on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. 2021-08-25 not yet calculated CVE-2021-1581
CISCO cisco — cisco — application_policy_infrastructure_controller
  A vulnerability in the web UI of Cisco Application Policy Infrastructure Controller (APIC) or Cisco Cloud APIC could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by sending malicious input to the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based interface or access sensitive, browser-based information. 2021-08-25 not yet calculated CVE-2021-1582
CISCO cisco — cisco — nexus_9000_series_fabric_switches
  A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition. 2021-08-25 not yet calculated CVE-2021-1586
CISCO cisco — nexus_9000_series_fabric_switches
  A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, remote attacker to cause a queue wedge on a leaf switch, which could result in critical control plane traffic to the device being dropped. This could result in one or more leaf switches being removed from the fabric. This vulnerability is due to mishandling of ingress TCP traffic to a specific port. An attacker could exploit this vulnerability by sending a stream of TCP packets to a specific port on a Switched Virtual Interface (SVI) configured on the device. A successful exploit could allow the attacker to cause a specific packet queue to queue network buffers but never process them, leading to an eventual queue wedge. This could cause control plane traffic to be dropped, resulting in a denial of service (DoS) condition where the leaf switches are unavailable. Note: This vulnerability requires a manual intervention to power-cycle the device to recover. 2021-08-25 not yet calculated CVE-2021-1523
CISCO cisco — nexus_9000_series_fabric_switches
  A vulnerability in the fabric infrastructure file system access control of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker with Administrator privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to read arbitrary files on the file system of the affected device. 2021-08-25 not yet calculated CVE-2021-1583
CISCO cisco — nexus_9000_series_fabric_switches
  A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient restrictions during the execution of a specific CLI command. An attacker with administrative privileges could exploit this vulnerability by performing a command injection attack on the vulnerable command. A successful exploit could allow the attacker to access the underlying operating system as root. 2021-08-25 not yet calculated CVE-2021-1584
CISCO cisco — nexus_9500_series_switches A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches could allow an unauthenticated, remote attacker to bypass access control list (ACL) rules that are configured on an affected device. This vulnerability is due to oversubscription of resources that occurs when applying ACLs to port channel interfaces. An attacker could exploit this vulnerability by attempting to access network resources that are protected by the ACL. A successful exploit could allow the attacker to access network resources that would be protected by the ACL that was applied on the port channel interface. 2021-08-25 not yet calculated CVE-2021-1591
CISCO cisco — nx-os_software A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. 2021-08-25 not yet calculated CVE-2021-1588
CISCO cisco — nx-os_software
  A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific packets with a Transparent Interconnection of Lots of Links (TRILL) OAM EtherType. An attacker could exploit this vulnerability by sending crafted packets, including the TRILL OAM EtherType of 0x8902, to a device that is part of a VXLAN Ethernet VPN (EVPN) fabric. A successful exploit could allow the attacker to cause an affected device to experience high CPU usage and consume excessive system resources, which may result in overall control plane instability and cause the affected device to reload. Note: The NGOAM feature is disabled by default. 2021-08-25 not yet calculated CVE-2021-1587
CISCO cisco — nx-os_software
  A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a login process to unexpectedly restart, causing a denial of service (DoS) condition. This vulnerability is due to a logic error in the implementation of the system login block-for command when an attack is detected and acted upon. An attacker could exploit this vulnerability by performing a brute-force login attack on an affected device. A successful exploit could allow the attacker to cause a login process to reload, which could result in a delay during authentication to the affected device. 2021-08-25 not yet calculated CVE-2021-1590
CISCO cisco — ucs_manager
  A vulnerability in the way Cisco UCS Manager software handles SSH sessions could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management for established SSH sessions. An attacker could exploit this vulnerability by opening a significant number of SSH sessions on an affected device. A successful exploit could allow the attacker to cause a crash and restart of internal Cisco UCS Manager software processes and a temporary loss of access to the Cisco UCS Manager CLI and web UI. Note: The attacker must have valid user credentials to authenticate to the affected device. 2021-08-25 not yet calculated CVE-2021-1592
CISCO codesys — codesys
  An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21869
MISC cscape — cscape Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write via an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process. 2021-08-25 not yet calculated CVE-2021-33015
MISC cscape — cscape
  Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process. 2021-08-25 not yet calculated CVE-2021-32975
MISC cscape — cscape
  Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute code in the context of the current process. 2021-08-25 not yet calculated CVE-2021-32995
MISC cxuucms — cxuucms
  Multiple Cross Site Scripting (XSS) vulnerabilities exists in CXUUCMS 3.1 in the search and c parameters in (1) public/search.php and in the (2) c parameter in admin.php. 2021-08-23 not yet calculated CVE-2021-39599
MISC cxuucms — cxuucms
  SQL Injection vulnerability in cxuucms 3.1 ivia the pid parameter in public/admin.php. 2021-08-27 not yet calculated CVE-2021-3264
MISC d-link — dsr-500n
  ** UNSUPPORTED WHEN ASSIGNED ** D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the ‘/etc/passwd’ file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2021-08-23 not yet calculated CVE-2021-39615
MISC
MISC
MISC d-link — dvg-3104ms
  ** UNSUPPORTED WHEN ASSIGNED ** D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credentials for undocumented user accounts in the ‘/etc/passwd’ file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2021-08-23 not yet calculated CVE-2021-39613
MISC
MISC
MISC d-link — dvx-2000ms
  D-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the ‘/etc/passwd’ file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. 2021-08-23 not yet calculated CVE-2021-39614
MISC
MISC
MISC d-link — multiple_devices
  An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router via the HTTP request parameter in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. 2021-08-24 not yet calculated CVE-2021-39510
MISC
MISC d-link — multiple_devices
  An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 750m11ac wireless router via the HTTP request parameter in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. 2021-08-24 not yet calculated CVE-2021-39509
MISC
MISC dedecms — dedecms
  An arbitrary file upload vulnerability in the /uploads/dede component of DedeCMS V5.7SP2 allows attackers to upload a webshell in HTM format. 2021-08-27 not yet calculated CVE-2020-18114
MISC dedecms — dedecms
  The plus/search.php component in DedeCMS 5.7 SP2 allows remote attackers to execute arbitrary PHP code via the typename parameter because the contents of typename.inc are under an attacker’s control. 2021-08-24 not yet calculated CVE-2020-18917
MISC detect-charachter-encoding — detect-charachter-encoding
  detect-character-encoding is an open source character encoding inspection library. In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). No workaround are available and all users should update to resolve this issue. 2021-08-24 not yet calculated CVE-2021-39157
CONFIRM
MISC
MISC discourse — discourse
  Discourse is an open source platform for community discussion. In affected versions category names can be used for Cross-site scripting(XSS) attacks. This is mitigated by Discourse’s default Content Security Policy and this vulnerability only affects sites which have modified or disabled or changed Discourse’s default Content Security Policy have allowed for moderators to modify categories. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks. 2021-08-26 not yet calculated CVE-2021-39161
CONFIRM doyocms — doyocms
  A SQL injection vulnerability in admin.php of DOYOCMS 2.3 allows attackers to execute arbitrary SQL commands via the orders[] parameter. 2021-08-26 not yet calculated CVE-2020-19821
MISC dzzoffice — dzzoffice
  A cross-site scripting (XSS) vulnerability in the referer parameter of Dzzoffice 2.02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. 2021-08-26 not yet calculated CVE-2020-19703
MISC earclink — espcms-p8
  EARCLINK ESPCMS-P8 was discovered to contain a SQL injection vulnerability in the espcms_web/Search.php component via the attr_array parameter. This vulnerability allows attackers to access sensitive database information. 2021-08-24 not yet calculated CVE-2020-18913
MISC eclipse_cyclone — eclipse_cyclone
  A stack buffer overflow in /ddsi/q_bitset.h of Eclipse IOT Cyclone DDS Project v0.1.0 causes the DDS subscriber server to crash. 2021-08-23 not yet calculated CVE-2020-18734
MISC
MISC
MISC eclipse_cyclone — eclipse_cyclone
  A heap buffer overflow in /src/dds_stream.c of Eclipse IOT Cyclone DDS Project v0.1.0 causes the DDS subscriber server to crash. 2021-08-23 not yet calculated CVE-2020-18735
MISC
MISC
MISC elf-g10hn — elf-g10hn
  There is a logic vulnerability in Elf-G10HN 1.0.0.608. An unauthenticated attacker could perform specific operations to exploit this vulnerability. Due to insufficient security design, successful exploit could allow an attacker to add users to be friends without prompting in the target device. 2021-08-23 not yet calculated CVE-2021-22449
MISC emtec — zoc
  EmTec ZOC before 8.02.2 allows e[201~ pastes, a different vulnerability than CVE-2021-32198. 2021-08-26 not yet calculated CVE-2021-40147
MISC envoy — envoy Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions after Envoy sends a locally generated response it must stop further processing of request or response data. However when local response is generated due the internal buffer overflow while request or response is processed by the filter chain the operation may not be stopped completely and result in accessing a freed memory block. A specifically constructed request delivered by an untrusted downstream or upstream peer in the presence of extensions that modify and increase the size of request or response bodies resulting in a Denial of Service when using extensions that modify and increase the size of request or response bodies, such as decompressor filter. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to address incomplete termination of request processing after locally generated response. As a workaround disable Envoy’s decompressor, json-transcoder or grpc-web extensions or proprietary extensions that modify and increase the size of request or response bodies, if feasible. 2021-08-24 not yet calculated CVE-2021-32781
MISC
CONFIRM envoy — envoy Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions when ext-authz extension is sending request headers to the external authorization service it must merge multiple value headers according to the HTTP spec. However, only the last header value is sent. This may allow specifically crafted requests to bypass authorization. Attackers may be able to escalate privileges when using ext-authz extension or back end service that uses multiple value headers for authorization. A specifically constructed request may be delivered by an untrusted downstream peer in the presence of ext-authz extension. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to the ext-authz extension to correctly merge multiple request header values, when sending request for authorization. 2021-08-24 not yet calculated CVE-2021-32777
CONFIRM
MISC envoy — envoy
  Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions Envoy transitions a H/2 connection to the CLOSED state when it receives a GOAWAY frame without any streams outstanding. The connection state is transitioned to DRAINING when it receives a SETTING frame with the SETTINGS_MAX_CONCURRENT_STREAMS parameter set to 0. Receiving these two frames in the same I/O event results in abnormal termination of the Envoy process due to invalid state transition from CLOSED to DRAINING. A sequence of H/2 frames delivered by an untrusted upstream server will result in Denial of Service in the presence of untrusted **upstream** servers. Envoy versions 1.19.1, 1.18.4 contain fixes to stop processing of pending H/2 frames after connection transition to the CLOSED state. 2021-08-24 not yet calculated CVE-2021-32780
CONFIRM
MISC envoy — envoy
  Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susceptible to Denial of Service when Envoy is configured with high limit on H/2 concurrent streams. An attacker wishing to exploit this vulnerability would require a client opening and closing a large number of H/2 streams. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to reduce time complexity of resetting HTTP/2 streams. As a workaround users may limit the number of simultaneous HTTP/2 dreams for upstream and downstream peers to a low number, i.e. 100. 2021-08-24 not yet calculated CVE-2021-32778
MISC
CONFIRM envoy — envoy
  Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI ‘#fragment’ element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final “/admin” path element, or is using a negative assertion with final path element of “/admin”. The client sends request to “/app1/admin#foo”. In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as “/admin#foo” and mismatches with the configured “/admin” path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the offending “#foo” fragment which violates RFC3986 or with the nonsensical “%23foo” text appended. A specifically constructed request with URI containing ‘#fragment’ element delivered by an untrusted client in the presence of path based request authorization resulting in escalation of Privileges when path based request authorization extensions. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes that removes fragment from URI path in incoming requests. 2021-08-24 not yet calculated CVE-2021-32779
MISC
CONFIRM exiv2 — exiv2 A float point exception in the printLong function in tags_int.cpp of Exiv2 0.27.99.0 allows attackers to cause a denial of service (DOS) via a crafted tif file. 2021-08-23 not yet calculated CVE-2020-18774
MISC exiv2 — exiv2
  Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal::Nikon1MakerNote::print0x0088 in nikonmn_int.cpp which can result in an information leak. 2021-08-23 not yet calculated CVE-2020-18771
MISC exiv2 — exiv2
  An invalid memory access in the decode function in iptc.cpp of Exiv2 0.27.99.0 allows attackers to cause a denial of service (DOS) via a crafted tif file. 2021-08-23 not yet calculated CVE-2020-18773
MISC feehicms — feehicms
  Insufficient filtering of the tag parameters in feehicms 0.1.3 allows attackers to execute arbitrary web or HTML via a crafted payload. 2021-08-26 not yet calculated CVE-2020-19709
MISC ffmpeg — ffmpeg
  adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted. 2021-08-21 not yet calculated CVE-2021-38171
MISC
MISC flatcore-cms — flatcore-cms
  Remote Code Execution (RCE) vulnerabilty exists in FlatCore-CMS 2.0.7 via the upload addon plugin, which could let a remote malicious user exeuct arbitrary php code. 2021-08-23 not yet calculated CVE-2021-39608
MISC flatcore-cms — flatcore-cms
  Cross Site Scripting (XSS) vulnerability exiss in FlatCore-CMS 2.0.7 via the upload image function. 2021-08-23 not yet calculated CVE-2021-39609
MISC forgerock — access_management
  ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue. 2021-08-25 not yet calculated CVE-2021-37153
MISC
CONFIRM forgerock — access_management
  In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion. 2021-08-25 not yet calculated CVE-2021-37154
MISC
CONFIRM gd — graphics_library
  ** DISPUTED ** gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor’s position is “The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes.” 2021-08-26 not yet calculated CVE-2021-40145
MISC
MISC
MISC gecos — gecos
  opensysusers through 0.6 does not safely use eval on files in sysusers.d that may contain shell metacharacters. For example, it allows command execution via a crafted GECOS field whereas systemd-sysusers (a program with the same specification) does not do that. 2021-08-25 not yet calculated CVE-2021-40084
MISC
MISC gitlab — ce/ee Improper authorization in GitLab CE/EE affecting all versions since 12.6 allowed guest users to create issues for Sentry errors and track their status 2021-08-25 not yet calculated CVE-2021-22256
MISC
CONFIRM
MISC gitlab — ce/ee Under specialized conditions, GitLab CE/EE versions starting 7.10 may allow existing GitLab users to use an invite URL meant for another email address to gain access into a group. 2021-08-25 not yet calculated CVE-2021-22243
CONFIRM
MISC gitlab — ce/ee Improper authorization in GitLab EE affecting all versions since 13.4 allowed a user who previously had the necessary access to trigger deployments to protected environments under specific conditions after the access has been removed 2021-08-23 not yet calculated CVE-2021-22253
MISC
MISC
CONFIRM gitlab — ce/ee A confusion between tag and branch names in GitLab CE/EE affecting all versions since 13.7 allowed a Developer to access protected CI variables which should only be accessible to Maintainers 2021-08-23 not yet calculated CVE-2021-22252
CONFIRM
MISC
MISC gitlab — ce/ee Improper authorization in GitLab CE/EE affecting all versions since 13.3 allowed users to view and delete impersonation tokens that administrators created for their account 2021-08-25 not yet calculated CVE-2021-22250
CONFIRM
MISC
MISC gitlab — ce/ee Under specialized conditions, GitLab may allow a user with an impersonation token to perform Git actions even if impersonation is disabled. This vulnerability is present in GitLab CE/EE versions before 13.12.9, 14.0.7, 14.1.2 2021-08-25 not yet calculated CVE-2021-22237
MISC
CONFIRM gitlab — ce/ee Improper validation of commit author in GitLab CE/EE affecting all versions allowed an attacker to make several pages in a project impossible to view 2021-08-25 not yet calculated CVE-2021-22245
MISC
MISC
CONFIRM gitlab — ce/ee
  Due to improper handling of OAuth client IDs, new subscriptions generated OAuth tokens on an incorrect OAuth client application. This vulnerability is present in GitLab CE/EE since version 14.1. 2021-08-25 not yet calculated CVE-2021-22236
CONFIRM
MISC gitlab — ce/ee
  Insufficient input sanitization in Mermaid markdown in GitLab CE/EE version 11.4 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown 2021-08-25 not yet calculated CVE-2021-22242
MISC
CONFIRM
MISC gitlab — ce/ee
  Improper authorization in GitLab CE/EE affecting all versions since 13.0 allows guests in private projects to view CI/CD analytics 2021-08-25 not yet calculated CVE-2021-22247
CONFIRM
MISC
MISC gitlab — ce/ee
  Improper authorization in the vulnerability report feature in GitLab EE affecting all versions since 13.1 allowed a reporter to access vulnerability data 2021-08-25 not yet calculated CVE-2021-22244
CONFIRM
MISC
MISC gnome — evolution-rss
  In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011. 2021-08-22 not yet calculated CVE-2021-39361
MISC
MISC gnome — grilo
  In GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011. 2021-08-22 not yet calculated CVE-2021-39365
MISC
MISC
DEBIAN gnome — libzapojit
  In GNOME libzapojit through 0.0.3, zpj-skydrive.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011. 2021-08-22 not yet calculated CVE-2021-39360
MISC
MISC go-ethereum — go-ethereum
  go-ethereum is the official Go implementation of the Ethereum protocol. In affected versions a consensus-vulnerability in go-ethereum (Geth) could cause a chain split, where vulnerable versions refuse to accept the canonical chain. Further details about the vulnerability will be disclosed at a later date. A patch is included in the upcoming `v1.10.8` release. No workaround are available. 2021-08-24 not yet calculated CVE-2021-39137
MISC
CONFIRM gotenberg — gotenberg
  It is possible to inject HTML and/or JavaScript in the HTML to PDF conversion in Gotenberg through 6.2.1 via the /convert/html endpoint. 2021-08-26 not yet calculated CVE-2020-14161
MISC
MISC
MISC gotenberg — gotenberg
  An SSRF vulnerability in Gotenberg through 6.2.1 exists in the remote URL to PDF conversion, which results in a remote attacker being able to read local files or fetch intranet resources. 2021-08-26 not yet calculated CVE-2020-14160
MISC
MISC
MISC gpac_project — advanced_content_library An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input using the “ctts” FOURCC code can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21836
MISC gpac_project — advanced_content_library An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when the library encounters an atom using the “trun” FOURCC code due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21850
MISC gpac_project — advanced_content_library An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when the library encounters an atom using the “tfra” FOURCC code due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21849
MISC gpac_project — advanced_content_library An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The library will actually reuse the parser for atoms with the “stsz” FOURCC code when parsing atoms that use the “stz2” FOURCC code and can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21848
MISC gpac_project — advanced_content_library
  An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input used to process an atom using the “saio” FOURCC code cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21840
MISC gpac_project — advanced_content_library
  An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when reading an atom using the ‘sbgp’ FOURCC code can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21841
MISC gpac_project — advanced_content_library
  An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when decoding the atom for the “co64” FOURCC can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21834
MISC gpac_project — advanced_content_library
  An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when decoding the atom associated with the “csgp” FOURCC can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21835
MISC gpac_project — advanced_content_library
  An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when processing an atom using the ‘ssix’ FOURCC code, due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21842
MISC huawei — cloudengine
  There is a denial of service vulnerability in some huawei products. In specific scenarios, due to the improper handling of the packets, an attacker may craft the specific packet. Successful exploit may cause some services abnormal. Affected product versions include:CloudEngine 12800 V200R005C00SPC800, CloudEngine 5800 V200R005C00SPC800, CloudEngine 6800 V200R005C00SPC800, CloudEngine 7800 V200R005C00SPC800. 2021-08-23 not yet calculated CVE-2021-22328
MISC huawei — multiple_products
  There is a denial of service vulnerability in Huawei products. A module cannot deal with specific messages due to validating inputs insufficiently. Attackers can exploit this vulnerability by sending specific messages to affected module. This can cause denial of service. Affected product versions include: S12700 V200R013C00SPC500, V200R019C00SPC500; S5700 V200R013C00SPC500, V200R019C00SPC500; S6700 V200R013C00SPC500, V200R019C00SPC500; S7700 V200R013C00SPC500, V200R019C00SPC500. 2021-08-23 not yet calculated CVE-2021-22357
MISC ibm — aix
  IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 201106. 2021-08-26 not yet calculated CVE-2021-29727
XF
CONFIRM ibm — aix
  IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to gain root privileges. IBM X-Force ID: 203977. 2021-08-26 not yet calculated CVE-2021-29801
CONFIRM
XF ibm — aix
  IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 206086. 2021-08-26 not yet calculated CVE-2021-29862
XF
CONFIRM ibm — api_connect
  IBM API Connect 5.0.0.0 through 5.0.8.11 could alllow a remote user to obtain sensitive information or conduct denial of serivce attacks due to open ports. IBM X-Force ID: 201018. 2021-08-26 not yet calculated CVE-2021-29715
XF
CONFIRM ibm — api_connect
  IBM API Connect 5.0.0.0 through 5.0.8.11 could allow a user to potentially inject code due to unsanitized user input. IBM X-Force ID: 202774. 2021-08-26 not yet calculated CVE-2021-29772
CONFIRM
XF ibm — mximo_asset_management
  IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 201694. 2021-08-27 not yet calculated CVE-2021-29744
XF
CONFIRM iec104 — iec104
  A segmentation violation in the Iec104_Deal_I function of IEC104 v1.0 allows attackers to cause a denial of service (DOS). 2021-08-23 not yet calculated CVE-2020-18730
MISC iec104 — iec104
  A segmentation violation in the Iec104_Deal_FirmUpdate function of IEC104 v1.0 allows attackers to cause a denial of service (DOS). 2021-08-23 not yet calculated CVE-2020-18731
MISC istio — istio
  Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. According to [RFC 4343](https://datatracker.ietf.org/doc/html/rfc4343), Istio authorization policy should compare the hostname in the HTTP Host header in a case insensitive way, but currently the comparison is case sensitive. The proxy will route the request hostname in a case-insensitive way which means the authorization policy could be bypassed. As an example, the user may have an authorization policy that rejects request with hostname “httpbin.foo” for some source IPs, but the attacker can bypass this by sending the request with hostname “Httpbin.Foo”. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize Host header before the authorization check. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide. 2021-08-24 not yet calculated CVE-2021-39155
MISC
CONFIRM istio — istio
  Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path. 2021-08-24 not yet calculated CVE-2021-39156
MISC
CONFIRM joomla! — joomla!
  An issue was discovered in Joomla! 4.0.0. The media manager does not correctly check the user’s permissions before executing a file deletion command. 2021-08-24 not yet calculated CVE-2021-26040
MISC joplin — joplin
  The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms. 2021-08-24 not yet calculated CVE-2021-23431
MISC
MISC jupyter — nbgitpuller
  nbgitpuller is a Jupyter server extension to sync a git repository one-way to a local path. Due to unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. This has been resolved in version 0.10.2 and all users are advised to upgrade. No work around exist for users who can not upgrade. 2021-08-25 not yet calculated CVE-2021-39160
MISC
CONFIRM
MISC knot_resolver — knot_resolver Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof). 2021-08-25 not yet calculated CVE-2021-40083
MISC lg — n1t1_10124_devices
  Network Attached Storage on LG N1T1*** 10124 devices allows an unauthenticated attacker to gain root access via OS command injection in the en/ajp/plugins/access.ssh/checkInstall.php destServer parameter. 2021-08-24 not yet calculated CVE-2021-38306
MISC
MISC
MISC libav — libav
  In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_p_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file. 2021-08-23 not yet calculated CVE-2020-18778
MISC libav — libav
  In Libav 12.3, there is a heap-based buffer over-read in vc1_decode_b_mb_intfi in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file. 2021-08-23 not yet calculated CVE-2020-18775
MISC libav — libav
  In Libav 12.3, there is a segmentation fault in vc1_decode_b_mb_intfr in vc1_block.c that allows an attacker to cause denial-of-service via a crafted file. 2021-08-23 not yet calculated CVE-2020-18776
MISC mender — enterprise
  The useradm service 1.14.0 (in Northern.tech Mender Enterprise 2.7.x before 2.7.1) and 1.13.0 (in Northern.tech Mender Enterprise 2.6.x before 2.6.1) allows users to access the system with their JWT token after logout, because of missing invalidation (if the JWT verification cache is enabled). 2021-08-27 not yet calculated CVE-2021-35342
MISC
MISC mezzanine — mezzanine
  Cross Site Scripting (XSS) in Mezzanine v4.3.1 allows remote attackers to execute arbitrary code via the ‘Description’ field of the component ‘admin/blog/blogpost/add/’. This issue is different than CVE-2018-16632. 2021-08-27 not yet calculated CVE-2020-19002
MISC microsoft — edge Microsoft Edge (Chromium-based) Information Disclosure Vulnerability 2021-08-26 not yet calculated CVE-2021-36929
MISC microsoft — edge
  Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36931. 2021-08-26 not yet calculated CVE-2021-36928
MISC microsoft — edge
  Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36928. 2021-08-26 not yet calculated CVE-2021-36931
MISC miniftpd — miniftpd
  A Buffer Overflow vulnerabilty exists in Miniftpd 1.0 in the do_mkd function in the ftpproto.c file, which could let a remote malicious user cause a Denial of Service. 2021-08-23 not yet calculated CVE-2021-39602
MISC misskey — misskey
  Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site scripting (XSS). XSS could compromise the API request token. This issue has been fixed in version 12.51.0. There are no known workarounds aside from upgrading. 2021-08-27 not yet calculated CVE-2021-39169
CONFIRM
MISC mit — kerberos
  The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field. 2021-08-23 not yet calculated CVE-2021-37750
MISC
MISC
CONFIRM
FEDORA mootools — mootools
  This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge() 2021-08-24 not yet calculated CVE-2021-23432
MISC movable_type — movable_type Cross-site scripting vulnerability in Setting screen of Server Sync of Movable Type (Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series) and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20812
MISC
MISC movable_type — movable_type Cross-site scripting vulnerability in Website Management screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20810
MISC
MISC movable_type — movable_type Cross-site scripting vulnerability in List of Assets screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20811
MISC
MISC movable_type — movable_type Cross-site scripting vulnerability in Edit screen of Content Data of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series) and Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series)) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20813
MISC
MISC movable_type — movable_type
  Cross-site scripting vulnerability in Setting screen of ContentType Information Widget Plugin of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20814
MISC
MISC movable_type — movable_type
  Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20815
MISC
MISC movable_type — movable_type
  Cross-site scripting vulnerability in Search screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20808
MISC
MISC movable_type — movable_type
  Cross-site scripting vulnerability in Create screens of Entry, Page, and Content Type of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors. 2021-08-26 not yet calculated CVE-2021-20809
MISC
MISC mz_automation — gmbh_lib60870
  A denial of service vulnerability exists in the ASDU message processing functionality of MZ Automation GmbH lib60870.NET 2.2.0. A specially crafted network request can lead to loss of communications. An attacker can send an unauthenticated message to trigger this vulnerability. 2021-08-25 not yet calculated CVE-2021-21778
MISC nascent — remkon_device_manager
  In NASCENT RemKon Device Manager 4.0.0.0, a Directory Traversal vulnerability in a log-reading function in maintenance/readLog.php allows an attacker to read any file via a specialized URL. 2021-08-24 not yet calculated CVE-2021-38612
MISC
MISC nascent — remkon_device_manager
  A command-injection vulnerability in the Image Upload function of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to execute arbitrary commands, as root, via shell metacharacters in the filename parameter to assets/index.php. 2021-08-24 not yet calculated CVE-2021-38611
MISC
MISC nascent — remkon_device_manager
  The assets/index.php Image Upload feature of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to upload any code to the target system and achieve remote code execution. 2021-08-24 not yet calculated CVE-2021-38613
MISC
MISC netwide_assembler — netwide_assembler
  Buffer Overflow in Netwide Assembler (NASM) v2.15.xx allows attackers to cause a denial of service via ‘crc64i’ in the component ‘nasmlib/crc64’. This issue is different than CVE-2019-7147. 2021-08-25 not yet calculated CVE-2020-18974
MISC ngiflib — ngiflib
  ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary. 2021-08-27 not yet calculated CVE-2021-36530
MISC ngiflib — ngiflib
  ngiflib 0.4 has a heap overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode, GetByte() reads memory buffer without checking the boundary. 2021-08-27 not yet calculated CVE-2021-36531
MISC nvcaffe — nvcaffe
  NVCaffe’s python required dependencies list used to contain `gfortran`version prior to 0.17.4, entry which does not exist in the repository pypi.org. An attacker could potentially have posted malicious files to pypi.org causing a user to install it within NVCaffe. 2021-08-23 not yet calculated CVE-2021-39158
CONFIRM object-path — object-path
  This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === ‘__proto__’ returns false if currentPath is [‘__proto__’]. This is because the === operator returns always false when the type of the operands is different. 2021-08-27 not yet calculated CVE-2021-23434
MISC
MISC
MISC
MISC octobercms — octobercms
  octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5. 2021-08-26 not yet calculated CVE-2021-32648
MISC
MISC
CONFIRM octobercms — octobercms
  octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can exploit this vulnerability to bypass authentication and takeover of and user account on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. This only affects frontend users and the attacker must obtain a Laravel secret key for cookie encryption and signing in order to exploit this vulnerability. The issue has been patched in Build 472 and v1.1.5. 2021-08-26 not yet calculated CVE-2021-29487
MISC
CONFIRM
MISC ok-file-formats — ok-file-formats
  ok-file-formats through 2021-04-29 has a heap-based buffer overflow in the ok_csv_circular_buffer_read function in ok_csv.c. 2021-08-24 not yet calculated CVE-2021-32263
MISC ok-file-formats — ok-file-formats
  Heap-based Buffer Overflow vulnerability exists in ok-file-formats 1 via the ok_jpg_generate_huffman_table function in ok_jpg.c. 2021-08-27 not yet calculated CVE-2021-28233
MISC opc_foundation — local_discovery_server
  In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service (DoS) by sending carefully crafted messages that lead to Access of a Memory Location After the End of a Buffer. 2021-08-27 not yet calculated CVE-2021-40142
MISC
MISC openexr — ucompress
  There’s a flaw in OpenEXR’s rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability. 2021-08-25 not yet calculated CVE-2021-3605
MISC openmage — magento_lts
  OpenMage Magento LTS is an alternative to the Magento CE official releases. Prior to versions 19.4.15 and 20.0.11, layout XML enabled admin users to execute arbitrary commands via block methods. The latest OpenMage Versions up from v19.4.15 and v20.0.11 have this Issue patched. 2021-08-27 not yet calculated CVE-2021-32758
MISC
CONFIRM
MISC openmage — magento_lts
  OpenMage magento-lts is an alternative to the Magento CE official releases. Due to missing sanitation in data flow in versions prior to 19.4.15 and 20.0.13, it was possible for admin users to upload arbitrary executable files to the server. OpenMage versions 19.4.15 and 20.0.13 have a patch for this Issue. 2021-08-27 not yet calculated CVE-2021-32759
MISC
CONFIRM
MISC openssl — openssl ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL’s own “d2i” functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the “data” and “length” fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the “data” field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y). 2021-08-24 not yet calculated CVE-2021-3712
CONFIRM
CONFIRM
CONFIRM
DEBIAN
MLIST
MLIST
MLIST
CONFIRM openssl — openssl
  In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the “out” parameter can be NULL and, on exit, the “outlen” parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the “out” parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). 2021-08-24 not yet calculated CVE-2021-3711
CONFIRM
CONFIRM
DEBIAN
MLIST
MLIST
MLIST
CONFIRM openzepplin — openzepplin
  OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team’s control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. 2021-08-27 not yet calculated CVE-2021-39168
MISC
CONFIRM
MISC openzepplin — openzepplin
  OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team’s control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. 2021-08-27 not yet calculated CVE-2021-39167
MISC
CONFIRM
MISC pac-resolver — pac-resolver
  This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer. 2021-08-24 not yet calculated CVE-2021-23406
MISC
MISC
MISC
MISC
MISC passport-saml — passport-saml
  Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. Prior to version 3.1.0, a malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack. This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2. 2021-08-27 not yet calculated CVE-2021-39171
CONFIRM
MISC philips — healthcare_tasy_electronic_medical_record
  Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter. 2021-08-24 not yet calculated CVE-2021-39376
MISC philips — healthcare_tasy_electronic_medical_record
  Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the WAdvancedFilter/getDimensionItemsByCode FilterValue parameter. 2021-08-24 not yet calculated CVE-2021-39375
MISC
MISC plib — plib
  In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability is found in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file. 2021-08-24 not yet calculated CVE-2021-38714
MISC podofo — podofo
  Stack-based Buffer Overflow in PoDoFo v0.9.6 allows attackers to cause a denial of service via the component ‘src/base/PdfDictionary.cpp:65’. 2021-08-25 not yet calculated CVE-2020-18971
MISC podofo — podofo
  Exposure of Sensitive Information to an Unauthorized Actor in PoDoFo v0.9.6 allows attackers to obtain sensitive information via ‘IsNextToken’ in the component ‘src/base/PdfToenizer.cpp’. 2021-08-25 not yet calculated CVE-2020-18972
MISC ponzu — ponzu
  A cross site request forgery (CSRF) vulnerability in the configure.html component of Ponzu 0.11.0 allows attackers to change user and administrator credentials, and add or delete administrator accounts. 2021-08-20 not yet calculated CVE-2020-24130
MISC popojicms — popojicms Directory Traversal vulnerability exists in PopojiCMS 2.0.1 via the id parameter in admin.php. 2021-08-25 not yet calculated CVE-2020-19547
MISC popojicms — popojicms
  Cross Site Request Forgery (CSRF) vulnerability exist in PopojiCMS 2.0.1 in po-admin/route.php?mod=user&act=multidelete. 2021-08-25 not yet calculated CVE-2021-28070
MISC popojicms — popojicms
  Cross Site Scripting (XSS) vulnerability exists in PopojiCMS 2.0.1 in admin.php?mod=menumanager——— edit menu. 2021-08-25 not yet calculated CVE-2020-18065
MISC prestashop — smartdatasoft_smartblog
  Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller. 2021-08-24 not yet calculated CVE-2021-37538
MISC
MISC primekey — ejbca An issue was discovered in PrimeKey EJBCA before 7.6.0. CMP RA Mode can be configured to use a known client certificate to authenticate enrolling clients. The same RA client certificate is used for revocation requests as well. While enrollment enforces multi tenancy constraints (by verifying that the client certificate has access to the CA and Profiles being enrolled against), this check was not performed when authenticating revocation operations, allowing a known tenant to revoke a certificate belonging to another tenant. 2021-08-25 not yet calculated CVE-2021-40088
MISC primekey — ejbca An issue was discovered in PrimeKey EJBCA before 7.6.0. The General Purpose Custom Publisher, which is normally run to invoke a local script upon a publishing operation, was still able to run if the System Configuration setting Enable External Script Access was disabled. With this setting disabled it’s not possible to create new such publishers, but existing publishers would continue to run. 2021-08-25 not yet calculated CVE-2021-40089
MISC primekey — ejbca
  An issue was discovered in PrimeKey EJBCA before 7.6.0. As part of the configuration of the aliases for SCEP, CMP, EST, and Auto-enrollment, the enrollment secret was reflected on a page (that can only be viewed by an administrator). While hidden from direct view, checking the page source would reveal the secret. 2021-08-25 not yet calculated CVE-2021-40086
MISC primekey — ejbca
  An issue was discovered in PrimeKey EJBCA before 7.6.0. When audit logging changes to the alias configurations of various protocols that use an enrollment secret, any modifications to the secret were logged in cleartext in the audit log (that can only be viewed by an administrator). This affects use of any of the following protocols: SCEP, CMP, or EST. 2021-08-25 not yet calculated CVE-2021-40087
MISC qemu — qemu
  An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host. 2021-08-25 not yet calculated CVE-2021-3713
MISC raspap — raspap raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content. 2021-08-24 not yet calculated CVE-2021-38557
MISC
MISC
MISC raspap — raspap includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection. 2021-08-24 not yet calculated CVE-2021-38556
MISC
MISC
MISC recaptcha_solver — recaptcha_solver
  An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user’s browser by these servers. 2021-08-22 not yet calculated CVE-2021-39362
MISC simiki — simiki
  Command Injection in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary system commands via line 64 of the component ‘simiki/blob/master/simiki/config.py’. 2021-08-27 not yet calculated CVE-2020-19001
MISC simiki — simiki
  Cross Site Scripting (XSS) in Simiki v1.6.2.1 and prior allows remote attackers to execute arbitrary code via line 54 of the component ‘simiki/blob/master/simiki/generators.py’. 2021-08-27 not yet calculated CVE-2020-19000
MISC solarwinds — web_help_desk
  Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the “Web Help Desk Getting Started Wizard”, especially the admin account creationpage, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback. 2021-08-26 not yet calculated CVE-2021-32076
MISC sony — audio_usb_driver
  Untrusted search path vulnerability in the installer of Sony Audio USB Driver V1.10 and prior and the installer of HAP Music Transfer Ver.1.3.0 and prior allows an attacker to gain privileges and execute arbitrary code via a Trojan horse DLL in an unspecified directory. 2021-08-26 not yet calculated CVE-2021-20793
MISC
MISC
MISC
MISC spring-boot-admin — spring-boot-admin
  A stored cross-site scripting (XSS) vulnerability via ResourceController.java in spring-boot-admin as of 20190710 allows attackers to execute arbitrary web scripts or HTML. 2021-08-26 not yet calculated CVE-2020-19704
MISC sqlite — sqlite
  ** DISPUTED ** A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library. 2021-08-24 not yet calculated CVE-2021-36690
MISC startserver — startserver
  All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization. 2021-08-24 not yet calculated CVE-2021-23430
MISC
MISC tcpreplay — tcpreplay
  Buffer Overflow in Tcpreplay v4.3.2 allows attackers to cause a Denial of Service via the ‘do_checksum’ function in ‘checksum.c’. It can be triggered by sending a crafted pcap file to the ‘tcpreplay-edit’ binary. This issue is different than CVE-2019-8381. 2021-08-25 not yet calculated CVE-2020-18976
MISC thinkphp-zcms — thinkphp-zcms
  thinkphp-zcms as of 20190715 allows SQL injection via index.php?m=home&c=message&a=add. 2021-08-26 not yet calculated CVE-2020-19705
MISC transpile — transpile
  All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function. 2021-08-24 not yet calculated CVE-2021-23429
MISC
MISC ubuntu — ubuntu IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn’t have access to anymore (CVE-2021-28696). 2021-08-27 not yet calculated CVE-2021-28696
MISC ubuntu — ubuntu
  IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn’t have access to anymore (CVE-2021-28696). 2021-08-27 not yet calculated CVE-2021-28695
MISC ubuntu — ubuntu
  IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn’t have access to anymore (CVE-2021-28696). 2021-08-27 not yet calculated CVE-2021-28694
MISC umbraco — forms
  A security issue in Umbraco Forms 4.0.0 to and including 8.7.5 could lead to a remote code execution attack and/or arbitrary file deletion. 2021-08-25 not yet calculated CVE-2021-37334
MISC
MISC unsquash — squashfs-tools
  Squashfs-Tools in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination. 2021-08-27 not yet calculated CVE-2021-40153
MISC
MISC
MISC vaadin — vaadin
  Improper check in CheckboxGroup in com.vaadin:vaadin-checkbox-flow versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled Checkbox inside enabled CheckboxGroup component via unspecified vectors. 2021-08-25 not yet calculated CVE-2021-33605
CONFIRM
CONFIRM vizio — multiple_products
  Several high privileged APIs on the Vizio P65-F1 6.0.31.4-2 and E50x-E1 10.0.31.4-2 Smart TVs do not enforce access controls, allowing an unauthenticated threat actor to access privileged functionality, leading to OS command execution. The specific attack methodology is a file upload. 2021-08-26 not yet calculated CVE-2021-27944
MISC
MISC wms — wms
  The GET parameter “id” in WMS v1.0 is passed without filtering, which allows attackers to perform SQL injection. 2021-08-27 not yet calculated CVE-2020-18106
MISC wordpress — wordpress
  The update functionality in the rslider_page uses an rs_id POST parameter which is not validated, sanitised or escaped before being inserted in sql query, therefore leading to SQL injection for users having Administrator role. 2021-08-23 not yet calculated CVE-2021-24557
MISC
MISC wordpress — wordpress
  The WP SMS WordPress plugin before 5.4.13 does not sanitise the “wp_group_name” parameter before outputting it back in the “Groups” page, leading to an Authenticated Stored Cross-Site Scripting issue 2021-08-23 not yet calculated CVE-2021-24561
CONFIRM
MISC wordpress — wordpress
  The Giveaway WordPress plugin through 1.2.2 is vulnerable to an SQL Injection issue which allows an administrative user to execute arbitrary SQL commands via the $post_id on the options.php page. 2021-08-23 not yet calculated CVE-2021-24497
MISC xen_security — xen_security
  grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes. 2021-08-27 not yet calculated CVE-2021-28697
MISC xen_security — xen_security
  xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an administrator originally configured. 2021-08-27 not yet calculated CVE-2021-28700
MISC xen_security — xen_security
  long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren’t in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of “cooperating” guests may, however, cause the effects to be more severe. 2021-08-27 not yet calculated CVE-2021-28698
MISC xen_security — xen_security
  inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing. 2021-08-27 not yet calculated CVE-2021-28699
MISC xstream — xstream XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39154
CONFIRM
MISC xstream — xstream XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39153
MISC
CONFIRM xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39147
CONFIRM
MISC xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39140
MISC
CONFIRM xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. If you rely on XStream’s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. 2021-08-23 not yet calculated CVE-2021-39150
MISC
CONFIRM xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39148
CONFIRM
MISC xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39149
MISC
CONFIRM xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. 2021-08-23 not yet calculated CVE-2021-39151
CONFIRM
MISC xstream — xstream
  XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream’s security framework with a whitelist limited to the minimal required types. If you rely on XStream’s default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. 2021-08-23 not yet calculated CVE-2021-39152
MISC
CONFIRM youdiancms — youdiancms
  A lack of filtering for searched keywords in the search bar of YouDianCMS 8.0 allows attackers to perform SQL injection. 2021-08-27 not yet calculated CVE-2020-18116
MISC yourls — yourls
  yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames 2021-08-26 not yet calculated CVE-2021-3734
MISC
CONFIRM zzcms — zzc,s
  A remote code execution (RCE) vulnerability in template_user.php of ZZCMS version 2018 allows attackers to execute arbitrary PHP code via the “ml” and “title” parameters. 2021-08-26 not yet calculated CVE-2020-19822
MISC
DevOps Primer (Part 1)

DevOps Primer (Part 1)

This article is contributed. See the original author and article here.

Get started with DevOps Guest post by Charlie Johnstone, Curriculum & Quality Leader for Computing, Film & TV at New College Lanarkshire: Microsoft Learn for Educator Ambassador



What is DevOps


DevOps enables better communications between developers, operations, quality and security professionals in an organisation, it is not software or hardware and not just a methodology, it is so much more! What it does is bring together the people in your teams (both developers and ops people), products and processes to deliver value to your end users.


 


This blog will focus on some of the tools and services used within Azure DevOps to build test and deploy your projects wherever you want to deploy, whether it be on prem or in the cloud.


 


This blog will be delivered in multiple parts, in this part, following a short primer, I will discuss part of the planning process using Azure Boards


image002.gifPlan:

 



In the plan phase, the DevOps teams will specify and detail what the application will do. They may use tools like Kanban boards and Scrum for this planning.


 


Develop:


This is fairly obvious, this is mainly focused on coding, testing and reviewing. Automation is important here using automated testing and continuous integration (CI). In Azure, this would be done in a Dev/Test environment


 


Deliver:


In this phase, the application is deployed to a production environment, including the application’s infrastructure requirements. At this stage, the applications should be made available to customers, and should be scalable.


 


Operate:


Once in the production environment, the applications need monitoring to ensure high availability, if issues are found then maintenance and troubleshooting are necessary.



Each of these phases relies on each other and, to some degree, involves each of the aforementioned roles.


 


DevOps Practices


Continuous Integration (CI) & Continuous Delivery (CD)


Continuous Integration allows developers to merge code updates into the main code branch. Every time new code is committed, automated testing takes place to ensure stability of the main branch with bugs identified prior to merging.


 


Continuous Delivery automatically deploys new versions of your applications into your production environment.


 


Used together as CI/CD, you will benefit from automation all the way from committing new code to its deployment in your production environment, this allows incremental changes in code to be quickly and safely deployed.


 


Tools for CI/CD include Azure Pipelines and GitHub Actions.


 


Version Control


Version control systems basically track the history of changes to a project’s code. In an environment where where multiple developers are collaborating on a project, version control is vital. Tools like Git provide for development teams to collaborate on projects in writing code. Version control systems allow for code changes happening in the same files, dealing with conflicts and rolling back to previous states where necessary.


 


Azure Boards


This is where you can begin to manage your projects by creating your work items. Azure Boards has native support for Kanban and Scrum as well as reporting tools and customisable dashboards, and is fully scalable.


 


We are going to use Basic process for this walkthrough, other available process types are Agile, Scrum and CMMI.


 


To begin your project, go to https://dev.azure.com/ and sign in. The first task you need to do is optionally to create a new organization.


 



image004.jpg


 


After selecting “Continue”, you will have the opportunity to name your organisation and choose the region where you want your project hosted.


 


image006.jpg


 


Following this step we will create our new project, for the purposes of this article, I’ve named it “BBlog2 Project”, made it private, selected Git for version control and chosen to use Basic process for work items.


 


image008.jpg


 


The next step is to create the “Boards” you will be using


 


image010.jpg


 


It is worth a look at the screens on the welcome dialog. Once you have done this you will see a screen similar to that below.


 


image012.jpg


 


This is where we will define our work items. I have created some simple items for demonstration purposes. Having created these items, the next screen will show how simple it is to change the status of an item.


 


image014.jpg


 


Once your project is properly underway, it is very easy to change a work item’s state from To Do, to Doing and finally to Done. This gives you a simple visual view of where your work items are. The next 2 screens show all my work items created both in the Boards and Work Items tabs, but there’s still work to be done here, as you’ll see, all items are currently unassigned and no schedules have been created.


 


image016.jpg


 


image018.jpg


 


For the next screen I have set the dates for the project, using the default “Sprint 1” Iteration name.


 


image020.jpg


 


Having done some tasks slightly out of order, my next task was to create my team, I would have been better doing this earlier. To do this, I returned to “Project Settings” (bottom left of screen) and selected the “Teams” page below.


At this stage I was the only team member of the only team


 


image022.jpg


 


At this stage it’s a simple process to add team members by selecting “Add” on the right of the screen and searching your Azure AD for your desired team members.


 


On completion of this process you should see a fully populated team as below, names and emails blurred for privacy reasons


 


image024.jpg


 


At this point if we return to our Boards tab, and select a work item, you will see (highlighted) that the items are still unassigned, clicking this area will allow you to assign this task to a member of your team.


 


image026.jpg


 


The final screen below shows that all the Work Items have now been assigned. The team members will then start to work on the items and change the state form To Do, to Doing. When a task is completed, it can then be updated to Done.


 


This is a very straightforward tool to use, and I have only really touched the surface of it, as a getting started guide, the next item in this series will be on Pipelines.


 


My main source for this post has been an excellent new resource https://docs.microsoft.com/en-us/learn/modules/get-started-with-devops/. For more useful information on Azure DevOps services, another great resource is https://docs.microsoft.com/en-us/azure/devops/get-started/?view=azure-devops.


 


The reason for the focus on Azure Boards is that my team is embarking on a new journey, we are beginning to teach DevOps to our first year students. Microsoft has provided great resources which are assisting us in this endeavour.


 


For students and faculty, Microsoft offers $100 of Azure credit per year on validation of your status as a student or educator, just follow the link here for Microsoft Azure for Student 


 


This is far from the only DevOps resource offered by Microsoft. For a some more introductory information for educators wishing to become involved with DevOps, a great quick read is https://docs.microsoft.com/en-us/azure/education-hub/azure-dev-tools-teaching/about-program. This provides an introduction on how to get your students started with Azure and gives you and your students the opportunity to claim your free $100 in order study Azure; download a wealth of free software; get free licences for Azure DevOps and get started with how computing works now and in the future.


 


My team has only been working with Azure since the beginning of the 2021, initially focusing on the Fundamentals courses AZ-900 (Azure Fundamentals) and AI-900 (Azure AI Fundamentals)


 


We are adding DP-900 (Azure Data Fundamentals) and SC-900 (Security, Compliance, and Identity Fundamentals) to the courses we offer to our first year students.


 


Our second and third-year students are being given the opportunity to move to role based certifications through a pilot programme for AZ-104 (Microsoft Azure Administrator) to make their employment prospects much greater.


 


Our experience of these courses to date has been great, the students have been very engaged with many taking multiple courses. Our industry contacts have also taken notice with one large organisation offering our students a month’s placement in order to develop a talent stream.


 


My recommendations for how to approach the fundamentals courses is possibly slightly unusual. Though at this stage I think the most important courses for students to study are AZ-900 to learn about cloud computing in general and the tools and services within Azure; and DP-900 because data drives everything! I would start the students journey with AI-900, this is a great introduction to artificial intelligence services and tools in Azure, which like the other fundamentals courses, contains excellent labs for students to complete and does not require coding skills. The reason I recommend starting with AI-900 is that it provides a great “hook”, students love this course and on completion want more. This has made our job of engaging the students in the, arguably, more difficult courses quite straightforward.


 


If you don’t feel ready to teach complete courses or have a cohort for whom it wouldn’t be appropriate, Microsoft is happy for you to use their materials in a piecemeal manner, just pick out the parts you need. My team are going to do this with local schools, our plan is to give in introduction to all the fundamentals courses already mentioned over 10 hours.


 


To get fully involved and access additional great resources, sign up either as an individual educator or as an institution to the Microsoft Learn Educator Programme.


 



Education needs to move away from just developing software for PC and on-prem environments and embrace the cloud, services such as Azure is not the future, it is NOW! It’s time to get on board or risk your graduates being irrelevant to the modern workplace.