11 December 2020
?
12:35
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
12:35
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
12:35
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
12:35
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
12:35
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7543 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7541 β€Ό

A CWE-425: Direct Request ('Forced Browsing') vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of sensitive data when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-26416 β€Ό

Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions >=8.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-25838 β€Ό

Unauthorized disclosure of sensitive information vulnerability in Micro Focus Filr product. Affecting all 3.x and 4.x versions. The vulnerability could be exploited to disclose unauthorized sensitive information.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7537 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
13:25
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
13:25
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
13:25
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
13:25
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
?
14:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26416 β€Ό

Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions >=8.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-25838 β€Ό

Unauthorized disclosure of sensitive information vulnerability in Micro Focus Filr product. Affecting all 3.x and 4.x versions. The vulnerability could be exploited to disclose unauthorized sensitive information.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-7537 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
14:04
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:05
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
14:05
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
14:05
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
14:05
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
14:05
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
14:05
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
14:05
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:05
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:05
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:05
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:05
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:10
β€Ό CVE-2020-26416 β€Ό

Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions >=8.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:10
β€Ό CVE-2020-25838 β€Ό

Unauthorized disclosure of sensitive information vulnerability in Micro Focus Filr product. Affecting all 3.x and 4.x versions. The vulnerability could be exploited to disclose unauthorized sensitive information.

πŸ“– Read

via "National Vulnerability Database".
14:10
β€Ό CVE-2020-7537 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
14:10
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
14:10
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
14:11
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
14:11
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:11
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:11
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:11
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:11
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:24
β€Ό CVE-2020-7537 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
14:24
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
14:24
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:24
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:24
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:24
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:24
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:24
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
14:24
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
14:25
β€Ό CVE-2020-7537 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
14:25
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
14:25
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:25
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:25
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:25
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:25
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:25
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
14:25
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
14:31
β€Ό CVE-2020-7537 β€Ό

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
14:31
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
14:31
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:31
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:31
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:31
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:31
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:31
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
14:31
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
14:34
β€Ό CVE-2020-28220 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in Modicon M258 Firmware (All versions prior to V5.0.4.11) and SoMachine/SoMachine Motion software (All versions), that could cause a buffer overflow when the length of a file transferred to the webserver is not verified.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7535 β€Ό

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal' Vulnerability Type) vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of information when sending a specially crafted request to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-26409 β€Ό

A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7539 β€Ό

A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause a denial of service vulnerability when a specially crafted packet is sent to the controller over HTTP.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-28214 β€Ό

A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-26415 β€Ό

Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-13357 β€Ό

An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7789 β€Ό

This affects the package node-notifier before 9.0.0. It allows an attacker to run arbitrary commands on Linux machines due to the options params not being sanitised when being passed an array.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7792 β€Ό

This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7788 β€Ό

This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7790 β€Ό

This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.

πŸ“– Read

via "National Vulnerability Database".
14:34
πŸ” Friday Five 12/11 πŸ”

New federal cyber initiatives, phishing campaigns, and anti-trust lawsuits - catch up on all of the week's infosec news with the Friday Five!

πŸ“– Read

via "Digital Guardian".
14:34
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:34
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:34
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:34
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:34
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:34
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
14:34
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
14:34
❌ Facebook Shutters Accounts Used in APT32 Cyberattacks ❌

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks.

πŸ“– Read

via "Threat Post".
14:37
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
14:37
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
14:37
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
14:37
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
14:37
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
14:37
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
14:37
❌ Facebook Shutters Accounts Used in APT32 Cyberattacks ❌

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks.

πŸ“– Read

via "Threat Post".
14:37
β€Ό CVE-2020-12148 β€Ό

A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-28838 β€Ό

Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. Opencart CMS 3.0.3.6 allows attacker to add cart items via Add to cart.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-15357 β€Ό

Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-35144 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
14:37
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
?
15:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Penetration Testing: A Road Map for Improving Outcomes πŸ•΄

As cybersecurity incidents gain sophistication, to ensure we are assessing security postures effectively, it is critical to copy real-world adversaries' tools, tactics, and procedures during testing activities.

πŸ“– Read

via "Dark Reading".
15:25
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
15:25
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
15:25
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
15:25
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
15:25
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
15:25
❌ Facebook Shutters Accounts Used in APT32 Cyberattacks ❌

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks.

πŸ“– Read

via "Threat Post".
15:25
β€Ό CVE-2020-12148 β€Ό

A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-28838 β€Ό

Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. Opencart CMS 3.0.3.6 allows attacker to add cart items via Add to cart.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-15357 β€Ό

Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-35144 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
15:25
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-17515 β€Ό

The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
15:34
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
15:34
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
15:34
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
15:34
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
15:34
❌ Facebook Shutters Accounts Used in APT32 Cyberattacks ❌

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks.

πŸ“– Read

via "Threat Post".
15:34
β€Ό CVE-2020-12148 β€Ό

A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-28838 β€Ό

Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. Opencart CMS 3.0.3.6 allows attacker to add cart items via Add to cart.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-15357 β€Ό

Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-35144 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
15:34
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
15:34
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
?
16:24
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
16:24
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
16:24
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
16:24
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
16:24
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
16:24
❌ Facebook Shutters Accounts Used in APT32 Cyberattacks ❌

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks.

πŸ“– Read

via "Threat Post".
16:24
β€Ό CVE-2020-12148 β€Ό

A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-28838 β€Ό

Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. Opencart CMS 3.0.3.6 allows attacker to add cart items via Add to cart.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-15357 β€Ό

Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-35144 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
16:24
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
16:24
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
16:24
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
16:25
β€Ό CVE-2020-7793 β€Ό

The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).

πŸ“– Read

via "National Vulnerability Database".
16:25
🦿 IoT standards: The US government must create them, and businesses will follow 🦿

The Internet of Things is still in its Wild West phase of development. Standardization is necessary to ensure safety and easier integration.

πŸ“– Read

via "Tech Republic".
16:25
🦿 How cybercriminals are now exploiting COVID-19 vaccines 🦿

Vaccine-related phishing emails and domains are popping up, while criminals are selling phony vaccines via the Dark Web, says Check Point.

πŸ“– Read

via "Tech Republic".
16:25
πŸ•΄ 7 Security Tips For Gamers πŸ•΄

Gamers can expect to be prime targets over the holidays as COVID-19 rages on. Here's some advice on how to keep hackers at bay.

πŸ“– Read

via "Dark Reading".
16:25
πŸ•΄ 'Tis the Season to Confront Third-Party Risk πŸ•΄

On any given day it's hard to ensure that outside companies and individuals adhere to an organization's security practices and policies. But when it's the holidays and, oh, a global pandemic, companies need to be extra vigilant.

πŸ“– Read

via "Dark Reading".
16:25
❌ Facebook Shutters Accounts Used in APT32 Cyberattacks ❌

Facebook shut down accounts and Pages used by two separate threat groups to spread malware and conduct phishing attacks.

πŸ“– Read

via "Threat Post".
16:25
β€Ό CVE-2020-12148 β€Ό

A command injection flaw identified in the nslookup API in Silver Peak Unity ECOSTM (ECOS) appliance software could allow an attacker to execute arbitrary commands with the privileges of the web server running on the EdgeConnect appliance. An attacker could exploit this vulnerability to establish an interactive channel, effectively taking control of the target system. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects all current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-28838 β€Ό

Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. Opencart CMS 3.0.3.6 allows attacker to add cart items via Add to cart.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-15357 β€Ό

Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-35144 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
16:25
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
16:25
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
16:25
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
16:35
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
16:35
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
16:35
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
16:35
β€Ό CVE-2020-27132 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-28439 β€Ό

This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-26264 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-27134 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-28440 β€Ό

All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-7791 β€Ό

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
16:35
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-29590 β€Ό

Versions of the Official teamspeak Docker images through 3.6.0 contain a blank password for the root user. Systems deployed using affected versions of the teamspeak container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
16:45
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
16:45
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
16:45
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
16:46
β€Ό CVE-2020-27132 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-28439 β€Ό

This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-26264 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27134 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-28440 β€Ό

All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-7791 β€Ό

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
?
17:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-29254 β€Ό

TikiWiki 21.2 allows templates to be edited without CSRF protection. This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to follow a maliciously crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in local file Inclusion. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-15023 β€Ό

Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) WPS authentication attempt, it is possible to brute force the overall authentication exchange. This allows an attacker to obtain the recovered WPS PIN in minutes or even seconds, and eventually obtain the Wi-Fi PSK key, gaining access to the Wi=Fi network.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
17:25
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
17:25
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
17:25
β€Ό CVE-2020-27132 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-28439 β€Ό

This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-26264 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-27134 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-28440 β€Ό

All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-7791 β€Ό

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
17:25
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
17:25
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
?
18:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
18:04
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
18:04
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
18:04
β€Ό CVE-2020-27132 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-28439 β€Ό

This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-26264 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-27134 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-28440 β€Ό

All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-7791 β€Ό

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
18:04
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:04
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
18:04
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
18:04
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
18:10
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
18:10
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
18:10
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
18:10
β€Ό CVE-2020-27132 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-28439 β€Ό

This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-26264 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-27134 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-28440 β€Ό

All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-7791 β€Ό

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
18:10
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:10
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
18:10
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
18:11
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
18:25
β€Ό CVE-2020-12149 β€Ό

The configuration backup/restore function in Silver Peak Unity ECOSTM (ECOS) appliance software was found to directly incorporate the user-controlled config filename in a subsequent shell command, allowing an attacker to manipulate the resulting command by injecting valid OS command input. This vulnerability can be exploited by an attacker with authenticated access to the Orchestrator UI or EdgeConnect UI. This affects ll current ECOS versions: 8.1.9.15, 8.3.0.8, 8.3.1.2, 8.3.2.0, 9.0.2.0, and 9.1.0.0.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-29591 β€Ό

Versions of the Official registry Docker images through 2.7.0 contain a blank password for the root user. Systems deployed using affected versions of the registry container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-29589 β€Ό

Versions of the Official kapacitor Docker images through 1.5.0-alpine contain a blank password for the root user. Systems deployed using affected versions of the kapacitor container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-4633 β€Ό

IBM Resilient SOAR V38.0 could allow a remote attacker to execute arbitrary code on the system, caused by formula injection due to improper input validation.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-27508 β€Ό

In two-factor authentication, the system also sending 2fa secret key in response, which enables an intruder to breach the 2fa security.

πŸ“– Read

via "National Vulnerability Database".
18:25
❌ Feds: K-12 Cyberattacks Dramatically on the Rise ❌

Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.

πŸ“– Read

via "Threat Post".
18:25
πŸ•΄ Microsoft Warns of Powerful New Adware πŸ•΄

The new adware, dubbed Adrozek, is being distributed by large, well organized threat actors, according to Microsoft research.

πŸ“– Read

via "Dark Reading".
18:25
β€Ό CVE-2020-27132 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-28439 β€Ό

This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-26264 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth before version 1.9.25 a denial-of-service vulnerability can make a LES server crash via malicious GetProofsV2 request from a connected LES client. This vulnerability only concerns users explicitly enabling les server; disabling les prevents the exploit. The vulnerability was patched in version 1.9.25.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-27134 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-28440 β€Ό

All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-7791 β€Ό

This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
18:25
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:25
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
18:25
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
18:25
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
18:38
β€Ό CVE-2020-29574 β€Ό

An SQL injection vulnerability in the WebAdmin of Cyberoam OS through 2020-12-04 allows unauthenticated attackers to execute arbitrary SQL statements remotely.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:38
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
18:38
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
18:38
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
18:38
β€Ό CVE-2020-27825 β€Ό

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running in parallel on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-26421 β€Ό

Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
18:38
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
?
18:54
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
18:54
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
18:54
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
18:54
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
18:54
β€Ό CVE-2020-27825 β€Ό

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running in parallel on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-26421 β€Ό

Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
18:54
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
18:54
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
?
19:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
19:25
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
19:25
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
19:25
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
19:25
β€Ό CVE-2020-27825 β€Ό

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running in parallel on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-26421 β€Ό

Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
19:25
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
19:25
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
?
20:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27133 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-26265 β€Ό

Go Ethereum, or "Geth", is the official Golang implementation of the Ethereum protocol. In Geth from version 1.9.4 and before version 1.9.20 a consensus-vulnerability could cause a chain split, where vulnerable versions refuse to accept the canonical chain. The fix was included in the Paragade release version 1.9.20. No individual workaround patches have been made -- all users are recommended to upgrade to a newer version.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-27127 β€Ό

Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.

πŸ“– Read

via "National Vulnerability Database".
20:25
❌ PGMiner, Innovative Monero-Mining Botnet, Surprises Researchers ❌

The malware takes aim at PostgreSQL database servers with never-before-seen techniques.

πŸ“– Read

via "Threat Post".
20:25
❌ Adrozek Malware Delivers Fake Ads to 30K Devices a Day ❌

The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat.

πŸ“– Read

via "Threat Post".
20:25
❌ Security Issues in PoS Terminals Open Consumers to Fraud ❌

Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords.

πŸ“– Read

via "Threat Post".
20:25
β€Ό CVE-2020-27825 β€Ό

A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running in parallel on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-26421 β€Ό

Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
20:25
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:25
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
20:35
β€Ό CVE-2020-26421 β€Ό

Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
20:35
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:36
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
20:36
β€Ό CVE-2020-13986 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-15375 β€Ό

Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-13984 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-13988 β€Ό

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-13985 β€Ό

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-15376 β€Ό

Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups.

πŸ“– Read

via "National Vulnerability Database".
20:36
β€Ό CVE-2020-13987 β€Ό

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-26421 β€Ό

Crash in USB HID protocol dissector and possibly other dissectors in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
20:45
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
20:45
β€Ό CVE-2020-13986 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-15375 β€Ό

Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-13984 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

πŸ“– Read

via "National Vulnerability Database".
20:45
β€Ό CVE-2020-13988 β€Ό

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
20:46
β€Ό CVE-2020-13985 β€Ό

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
20:46
β€Ό CVE-2020-15376 β€Ό

Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups.

πŸ“– Read

via "National Vulnerability Database".
20:46
β€Ό CVE-2020-13987 β€Ό

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
?
21:04
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
21:04
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
21:04
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
21:04
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
21:04
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
21:05
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
21:05
β€Ό CVE-2020-13986 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-15375 β€Ό

Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-13984 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-13988 β€Ό

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-13985 β€Ό

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-15376 β€Ό

Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups.

πŸ“– Read

via "National Vulnerability Database".
21:05
β€Ό CVE-2020-13987 β€Ό

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
21:05
🦿 Security moves from blocker to driver of open source adoption 🦿

Commentary: Companies used to look to open source to lower costs. That's still true, but an even bigger driver is security, according to a new developer survey.

πŸ“– Read

via "Tech Republic".
?
21:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
21:25
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
21:25
β€Ό CVE-2020-13986 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-15375 β€Ό

Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-13984 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-13988 β€Ό

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-13985 β€Ό

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-15376 β€Ό

Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups.

πŸ“– Read

via "National Vulnerability Database".
21:25
β€Ό CVE-2020-13987 β€Ό

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
21:25
🦿 Security moves from blocker to driver of open source adoption 🦿

Commentary: Companies used to look to open source to lower costs. That's still true, but an even bigger driver is security, according to a new developer survey.

πŸ“– Read

via "Tech Republic".
?
22:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27713 β€Ό

In certain configurations on version 13.1.3.4, when a BIG-IP AFM HTTP security profile is applied to a virtual server and the BIG-IP system receives a request with specific characteristics, the connection is reset and the Traffic Management Microkernel (TMM) leaks memory.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-26418 β€Ό

Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-35149 β€Ό

lib/utils.js in mquery before 3.2.3 allows a pollution attack because a special property (e.g., __proto__) can be copied during a merge or clone operation.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-29455 β€Ό

A cross-Site Scripting (XSS) vulnerability in this.showInvalid and this.showInvalidCountry in SmartyStreets liveAddressPlugin.js 3.2 allows remote attackers to inject arbitrary web script or HTML via any address parameter (e.g., street or country).

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-27730 β€Ό

In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-26419 β€Ό

Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-5949 β€Ό

On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-5950 β€Ό

On BIG-IP 14.1.0-14.1.2.6, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-5948 β€Ό

On BIG-IP versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-19165 β€Ό

PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-26420 β€Ό

Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.

πŸ“– Read

via "National Vulnerability Database".
22:25
πŸ•΄ FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning πŸ•΄

Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.

πŸ“– Read

via "Dark Reading".
22:25
β€Ό CVE-2020-13986 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-15375 β€Ό

Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-13984 β€Ό

An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-13988 β€Ό

An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-13985 β€Ό

An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-15376 β€Ό

Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups.

πŸ“– Read

via "National Vulnerability Database".
22:25
β€Ό CVE-2020-13987 β€Ό

An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.

πŸ“– Read

via "National Vulnerability Database".
22:25
🦿 Security moves from blocker to driver of open source adoption 🦿

Commentary: Companies used to look to open source to lower costs. That's still true, but an even bigger driver is security, according to a new developer survey.

πŸ“– Read

via "Tech Republic".
22:35
β€Ό CVE-2020-17467 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-17441 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-35175 β€Ό

Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-25111 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-35176 β€Ό

In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-17437 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-24336 β€Ό

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-17468 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-24338 β€Ό

An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
22:35
β€Ό CVE-2020-17442 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-24337 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-17469 β€Ό

An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-17438 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-25108 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-17439 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query with a transaction ID that matches the transaction ID of an incoming reply. Provided that the default DNS cache is quite small (only four records) and that the transaction ID has a very limited set of values that is quite easy to guess, this can lead to DNS cache poisoning.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-24383 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-24340 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The code that processes DNS responses in pico_mdns_handle_data_as_answers_generic() in pico_mdns.c does not check whether the number of answers/responses specified in a DNS packet header corresponds to the response data available in the packet, leading to an out-of-bounds read, invalid pointer dereference, and Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-25107 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-25112 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
22:36
β€Ό CVE-2020-17470 β€Ό

An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-17467 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-17441 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-35175 β€Ό

Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-25111 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-35176 β€Ό

In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-17437 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-24336 β€Ό

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-17468 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
22:38
β€Ό CVE-2020-24338 β€Ό

An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-17442 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-24337 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-17469 β€Ό

An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-17438 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-25108 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-17439 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query with a transaction ID that matches the transaction ID of an incoming reply. Provided that the default DNS cache is quite small (only four records) and that the transaction ID has a very limited set of values that is quite easy to guess, this can lead to DNS cache poisoning.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-24383 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-24340 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The code that processes DNS responses in pico_mdns_handle_data_as_answers_generic() in pico_mdns.c does not check whether the number of answers/responses specified in a DNS packet header corresponds to the response data available in the packet, leading to an out-of-bounds read, invalid pointer dereference, and Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-25107 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-25112 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
22:39
β€Ό CVE-2020-17470 β€Ό

An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.

πŸ“– Read

via "National Vulnerability Database".
?
23:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-17467 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17441 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-35175 β€Ό

Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-25111 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-35176 β€Ό

In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17437 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-24336 β€Ό

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17468 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-24338 β€Ό

An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17442 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-24337 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17469 β€Ό

An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17438 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-25108 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17439 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query with a transaction ID that matches the transaction ID of an incoming reply. Provided that the default DNS cache is quite small (only four records) and that the transaction ID has a very limited set of values that is quite easy to guess, this can lead to DNS cache poisoning.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-24383 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-24340 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The code that processes DNS responses in pico_mdns_handle_data_as_answers_generic() in pico_mdns.c does not check whether the number of answers/responses specified in a DNS packet header corresponds to the response data available in the packet, leading to an out-of-bounds read, invalid pointer dereference, and Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-25107 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-25112 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
23:25
β€Ό CVE-2020-17470 β€Ό

An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.

πŸ“– Read

via "National Vulnerability Database".
12 December 2020
?
00:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-17441 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-35175 β€Ό

Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-25111 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-35176 β€Ό

In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17437 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-24336 β€Ό

An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17468 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-24338 β€Ό

An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17442 β€Ό

An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-24337 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17469 β€Ό

An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17438 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-25108 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17439 β€Ό

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that the incoming DNS replies match outgoing DNS queries in newdata() in resolv.c. Also, arbitrary DNS replies are parsed if there was any outgoing DNS query with a transaction ID that matches the transaction ID of an incoming reply. Provided that the default DNS cache is quite small (only four records) and that the transaction ID has a very limited set of values that is quite easy to guess, this can lead to DNS cache poisoning.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-24383 β€Ό

An issue was discovered in FNET through 4.6.4. The code for processing resource records in mDNS queries doesn't check for proper '\0' termination of the resource record name string, leading to an out-of-bounds read, and potentially causing information leak or Denial-or-Service.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-24340 β€Ό

An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. The code that processes DNS responses in pico_mdns_handle_data_as_answers_generic() in pico_mdns.c does not check whether the number of answers/responses specified in a DNS packet header corresponds to the response data available in the packet, leading to an out-of-bounds read, invalid pointer dereference, and Denial-of-Service.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-25107 β€Ό

An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-25112 β€Ό

An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.

πŸ“– Read

via "National Vulnerability Database".
00:07
β€Ό CVE-2020-17470 β€Ό

An issue was discovered in FNET through 4.6.4. The code that initializes the DNS client interface structure does not set sufficiently random transaction IDs (they are always set to 1 in _fnet_dns_poll in fnet_dns.c). This significantly simplifies DNS cache poisoning attacks.

πŸ“– Read

via "National Vulnerability Database".
00:07
⚠ Subway sandwich scam mystifies loyalty card users ⚠

Subway customers have been on the receiving end of a curiously complex phishing scam.

πŸ“– Read

via "Naked Security".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-35199 β€Ό

Ignite Realtime Openfire 4.6.0 has create-bookmark.jsp groupchatJID Stored XSS.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-35200 β€Ό

Ignite Realtime Openfire 4.6.0 has plugins/clientcontrol/spark-form.jsp Reflective XSS.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-35202 β€Ό

Ignite Realtime Openfire 4.6.0 has plugins/dbaccess/db-access.jsp sql Stored XSS.

πŸ“– Read

via "National Vulnerability Database".
16:36
β€Ό CVE-2020-35201 β€Ό

Ignite Realtime Openfire 4.6.0 has create-bookmark.jsp users Stored XSS.

πŸ“– Read

via "National Vulnerability Database".
14 December 2020
?
08:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-17511 β€Ό

In Airflow versions prior to 1.10.13, when creating a user using airflow CLI, the password gets logged in plain text in the Log table in Airflow Metadatase. Same happened when creating a Connection with a password field.

πŸ“– Read

via "National Vulnerability Database".
08:38
β€Ό CVE-2020-17513 β€Ό

In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-admin based) UI were vulnerable for SSRF attack.

πŸ“– Read

via "National Vulnerability Database".
?
11:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybersecurity experts hail new IoT law 🦿

The bill would increase protection for the billions of connected devices "owned or controlled by the government" in homes and businesses.

πŸ“– Read

via "Tech Republic".
?
12:26
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Startups Should Do Things That Don't Scale, but Security Isn't One of Them πŸ•΄

Emerging businesses that don't embrace scalable security do so at their own peril.

πŸ“– Read

via "Dark Reading".
12:38
β€Ό CVE-2020-29227 β€Ό

An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution.

πŸ“– Read

via "National Vulnerability Database".
?
13:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Sifter 11-R3 πŸ› 

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

πŸ“– Read

via "Packet Storm Security".
13:25
πŸ›  WhatWeb Scanner 0.5.4 πŸ› 

WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.

πŸ“– Read

via "Packet Storm Security".
13:37
❌ New Windows Trojan Steals Browser Credentials, Outlook Files ❌

The newly discovered Python-based malware family targets the Outlook processes, and browser credentials, of Microsoft Windows victims.

πŸ“– Read

via "Threat Post".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 US government agencies compromised by foreign nation-state 🦿

Stretching back for months, the breaches were pulled off by exploiting a vulnerability in network monitoring software from SolarWinds, according to security firm FireEye.

πŸ“– Read

via "Tech Republic".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-35382 β€Ό

SQL Injection in Classbooking before 2.4.1 via the username field of a CSV file when adding a new user.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2020-14244 β€Ό

A vulnerability in the MIME message handling of the Domino server (versions 9 and 10) could potentially be exploited by an unauthenticated attacker resulting in a stack buffer overflow. This could allow a remote attacker to crash the server or inject code into the system which would execute with the privileges of the server.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2020-35378 β€Ό

SQL Injection in the login page in Online Bus Ticket Reservation 1.0 allows attackers to execute arbitrary SQL commands and bypass authentication via the username and password fields.

πŸ“– Read

via "National Vulnerability Database".
14:39
β€Ό CVE-2020-14268 β€Ό

A vulnerability in the MIME message handling of the Notes client (versions 9 and 10) could potentially be exploited by an unauthenticated attacker resulting in a stack buffer overflow. This could allow a remote attacker to crash the client or inject code into the system which would execute with the privileges of the client.

πŸ“– Read

via "National Vulnerability Database".
?
15:47
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” SolarWinds Hacked, Used in Potentially Massive Supply Chain Attack πŸ”

A global intrusion campaign involving the company’s IT monitoring and management software could date back to March.

πŸ“– Read

via "Digital Guardian".
15:56
πŸ•΄ 2021 Security Budgets: Top Priorities, New Realities πŸ•΄

An unprecedented 2020 has shaken up security leaders' usual list of must-have technologies. What's on the horizon? They share with us their spending plans for 2021.

πŸ“– Read

via "Dark Reading".
16:06
❌ Microsoft Office 365 Credentials Under Attack By Fax β€˜Alert’ Emails ❌

Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with the aim of stealing their O365 credentials.

πŸ“– Read

via "Threat Post".
?
16:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report ❌

The attack was mounted via SolarWinds Orion, in a manual and targeted supply-chain effort.

πŸ“– Read

via "Threat Post".
16:39
β€Ό CVE-2020-25179 β€Ό

GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2020-35338 β€Ό

The Web Administrative Interface in Mobile Viewpoint Wireless Multiplex Terminal (WMT) Playout Server 20.2.8 and earlier has a default account with a password of "pokon."

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2020-25175 β€Ό

GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2020-15733 β€Ό

An Origin Validation Error vulnerability in the SafePay component of Bitdefender Antivirus Plus allows a web resource to misrepresent itself in the URL bar. This issue affects: Bitdefender Antivirus Plus versions prior to 25.0.7.29.

πŸ“– Read

via "National Vulnerability Database".
16:39
β€Ό CVE-2020-28856 β€Ό

OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly determine the HTTP request's originating IP address, allowing attackers to spoof it using X-Forwarded-For in the header, by supplying localhost address such as 127.0.0.1, effectively bypassing all IP address based access controls.

πŸ“– Read

via "National Vulnerability Database".
?
17:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Ex-Cisco Employee Convicted for Deleting 16K Webex Accounts ❌

The insider threat will go to jail for two years after compromising Cisco's cloud infrastructure.

πŸ“– Read

via "Threat Post".
?
17:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Kaspersky: Gamers face high and ongoing risk of identity theft and bullying 🦿

A survey of gamers worldwide found that gamers deal with bullying and theft of in-game valuables in addition to identity theft.

πŸ“– Read

via "Tech Republic".
?
18:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Spotify Changes Passwords After Another Data Breach ❌

This is the third breach in the past few weeks for the world’s most popular streaming service.

πŸ“– Read

via "Threat Post".
?
18:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-20136 β€Ό

QuantConnect Lean versions from 2.3.0.0 to 2.4.0.1 are affected by an insecure deserialization vulnerability due to insecure configuration of TypeNameHandling property in Json.NET library.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-16103 β€Ό

Type confusion in Gallagher Command Centre Server allows a remote attacker to crash the server or possibly cause remote code execution. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1236(MR1); 8.20 versions prior to 8.20.1166(MR3); 8.10 versions prior to 8.10.1211(MR5); version 8.00 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-8169 β€Ό

curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-16104 β€Ό

SQL Injection vulnerability in Enterprise Data Interface of Gallagher Command Centre allows a remote attacker with 'Edit Enterprise Data Interfaces' privilege to execute arbitrary SQL against a third party database if EDI is configured to import data from this database. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1236(MR1); 8.20 versions prior to 8.20.1166(MR3); 8.10 versions prior to 8.10.1211(MR5); 8.00 versions prior to 8.00.1228(MR6); version 7.90 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-8257 β€Ό

Improper privilege management on services run by Citrix Gateway Plug-in for Windows, versions before and including 13.0-61.48 and 12.1-58.15, lead to privilege escalation attacks

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-8284 β€Ό

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-8258 β€Ό

Improper privilege management on services run by Citrix Gateway Plug-in for Windows, versions before and including 13.0-61.48 and 12.1-58.15, allows an attacker to modify arbitrary files.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-25183 β€Ό

Medtronic MyCareLink Smart 25000 all versions contain an authentication protocol vuln where the method used to auth between MCL Smart Patient Reader and MyCareLink Smart mobile app is vulnerable to bypass. This vuln allows attacker to use other mobile device or malicious app on smartphone to auth to the patientÒ€ℒs Smart Reader, fools the device into thinking its communicating with the actual smart phone application when executed in range of Bluetooth.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-28861 β€Ό

OpenAsset Digital Asset Management (DAM) 12.0.19 and earlier failed to implement access controls on /Stream/ProjectsCSV endpoint, allowing unauthenticated attackers to gain access to potentially sensitive project information stored by the application.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-28857 β€Ό

OpenAsset Digital Asset Management (DAM) through 12.0.19, does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for stored cross-site scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-25187 β€Ό

Medtronic MyCareLink Smart 25000 all versions are vulnerable when an attacker who gains auth runs a debug command, which is sent to the reader causing heap overflow in the MCL Smart Reader stack. A heap overflow allows attacker to remotely execute code on the MCL Smart Reader, could lead to control of device.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-8282 β€Ό

A security issue was found in EdgePower 24V/54V firmware v1.7.0 and earlier where, due to missing CSRF protections, an attacker would have been able to perform unauthorized remote code execution.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-29511 β€Ό

The encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-8177 β€Ό

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-20183 β€Ό

Insecure direct object reference vulnerability in ZyxelÒ€ℒs P1302-T10 v3 with firmware version 2.00(ABBX.3) and earlier allows attackers to gain privileges and access certain admin pages.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-29303 β€Ό

A cross-site scripting (XSS) vulnerability in the SabaiApp Directories Pro plugin 1.3.45 for WordPress allows remote attackers to inject arbitrary web script or HTML via a POST to /wp-admin/admin.php?page=drts/directories&q=%2F with _drts_form_build_id parameter containing the XSS payload and _t_ parameter set to an invalid or non-existent CSRF token.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-20184 β€Ό

GateOne allows remote attackers to execute arbitrary commands via shell metacharacters in the port field when attempting an SSH connection.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-28858 β€Ό

OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly verify whether a request made to the application was intentionally made by the user, allowing for cross-site request forgery attacks on all user functions.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-28860 β€Ό

OpenAssetDigital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input, incorporating it into its SQL queries, allowing for authenticated blind SQL injection.

πŸ“– Read

via "National Vulnerability Database".
18:39
β€Ό CVE-2020-28859 β€Ό

OpenAsset Digital Asset Management (DAM) through 12.0.19 does not correctly sanitize user supplied input in multiple parameters and endpoints, allowing for reflected cross-site scripting attacks.

πŸ“– Read

via "National Vulnerability Database".
?
18:56
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 18,000 Organizations Possibly Compromised in Massive Supply-Chain Cyberattack πŸ•΄

Nation-state attackers used poisoned SolarWinds network management software updates to distribute malware; US government orders federal civilian agencies to immediately power down the technology.

πŸ“– Read

via "Dark Reading".
?
20:36
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 5 building blocks of a well-developed security culture 🦿

A defined security culture is helping the financial industry, though the fundamentals should apply to any business.

πŸ“– Read

via "Tech Republic".
20:39
β€Ό CVE-2020-25235 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The password used for authentication for the LOGO! Website and the LOGO! Access Tool is sent in a recoverable format. An attacker with access to the network traffic could derive valid logins.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2019-19287 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow attackers to traverse through the file system of the server based by sending specially crafted packets over the network without authentication.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-15796 β€Ό

A vulnerability has been identified in SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) (V20.8), SIMATIC S7-1500 Software Controller (V20.8). The web server of the affected products contains a vulnerability that could allow a remote attacker to trigger a denial-of-service condition by sending a specially crafted HTTP request.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-14368 β€Ό

A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces. When configured with cookies authentication, Theia IDE doesn't properly set the SameSite value, allowing a Cross-Site Request Forgery (CSRF) and consequently allowing a cross-site WebSocket hijack on Theia IDE. This flaw allows an attacker to gain full access to the victim's workspace through the /services endpoint. To perform a successful attack, the attacker conducts a Man-in-the-middle attack (MITM) and tricks the victim into executing a request via an untrusted link, which performs the CSRF and the Socket hijack. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2019-19286 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow SQL injection attacks if an attacker is able to modify content of particular web pages.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-25233 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The firmware update of affected devices contains the private RSA key that is used as a basis for encryption of communication with the device.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-0099 β€Ό

In addWindow of WindowManagerService.java, there is a possible window overlay attack due to an insecure default value. This could lead to local escalation of privilege via tapjacking with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-141745510

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-28396 β€Ό

A vulnerability has been identified in SICAM A8000 CP-8000 (All versions < V16), SICAM A8000 CP-8021 (All versions < V16), SICAM A8000 CP-8022 (All versions < V16). A web server misconfiguration of the affected device can cause insecure ciphers usage by a user´s browser. An attacker in a privileged position could decrypt the communication and compromise confidentiality and integrity of the transmitted information.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-25229 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The implemented encryption for communication with affected devices is prone to replay attacks due to the usage of a static key. An attacker could change the password or change the configuration on any affected device if using prepared messages that were generated for another device.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2019-19289 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2019-19285 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow injections that could lead to XSS attacks if unsuspecting users are tricked into accessing a malicious link.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-0466 β€Ό

In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-0458 β€Ό

In SPDIFEncoder::writeBurstBufferBytes and related methods of SPDIFEncoder.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-160265164

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2019-19283 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The application's web server could expose non-sensitive information about the server's architecture. This could allow an attacker to adapt further attacks to the version in place.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2019-19284 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-0469 β€Ό

In addEscrowToken of LockSettingsService.java, there is a possible loss of the synthetic password due to logic error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168692734

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-25231 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The encryption of program data for the affected devices uses a static key. An attacker could use this key to extract confidential information from protected program files.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-25230 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an outdated cipher mode on port 10005/tcp, an attacker could extract the encryption key from a captured communication with the device.

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-0465 β€Ό

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
20:39
β€Ό CVE-2020-25707 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916

πŸ“– Read

via "National Vulnerability Database".
15 December 2020
?
03:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-35470 β€Ό

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

πŸ“– Read

via "National Vulnerability Database".
03:39
β€Ό CVE-2020-35471 β€Ό

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

πŸ“– Read

via "National Vulnerability Database".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ Phishing tricks that really work – and how to avoid them ⚠

Get inside the mindset of your adversaries to increase your chances of spotting a phish.

πŸ“– Read

via "Naked Security".
?
12:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ The Private Sector Needs a Cybersecurity Transformation πŸ•΄

Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.

πŸ“– Read

via "Dark Reading".
12:36
🦿 How understanding cognitive science can strengthen cybersecurity's weak links 🦿

Learn how applying cognitive science is one way to thwart cybercriminals' abilities to get unsuspecting users to do their bidding.

πŸ“– Read

via "Tech Republic".
12:39
⚠ Naked Security Live – How to avoid β€œbig brand” email scams ⚠

Here's the latest Naked Security video - watch now (and please share with your friends)!

πŸ“– Read

via "Naked Security".
12:39
β€Ό CVE-2020-28203 β€Ό

An issue was discovered in Foxit Reader and PhantomPDF 10.1.0.37527 and earlier. There is a null pointer access/dereference while opening a crafted PDF file, leading the application to crash (denial of service).

πŸ“– Read

via "National Vulnerability Database".
?
14:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  American Fuzzy Lop plus plus 3.0c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
14:06
🦿 The lines between corporate and tech strategy continue to blur 🦿

Strategic platforms with advanced analytics, automation, and AI are on tap for 2021, according to Deloitte.

πŸ“– Read

via "Tech Republic".
14:06
❌ Millions of Unpatched IoT, OT Devices Threaten Critical Infrastructure ❌

Industrial, factory and medical gear remain largely unpatched when it comes to the URGENT/11 and CDPwn groups of vulnerabilities.

πŸ“– Read

via "Threat Post".
14:06
❌ Agent Tesla Keylogger Gets Data Theft and Targeting Update ❌

The infamous keylogger has shifted its targeting tactics and now collects stored credentials for less-popular web browsers and email clients.

πŸ“– Read

via "Threat Post".
?
14:37
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 45 Million Medical Images Left Exposed Online ❌

A six-month investigation by CybelAngel discovered unsecured sensitive patient data available for third parties to access for blackmail, fraud or other nefarious purposes.

πŸ“– Read

via "Threat Post".
14:40
β€Ό CVE-2020-0280 β€Ό

In nci_proc_ee_management_rsp of nci_hrcv.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-136565424

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-8936 β€Ό

An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enclave.

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-8944 β€Ό

An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-0497 β€Ό

In canUseBiometric of BiometricServiceBase, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-158481661

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-27021 β€Ό

In avrc_ctrl_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168712245

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-27028 β€Ό

In filter_incoming_event of hci_layer.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-141618611

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-0500 β€Ό

In startInputUncheckedLocked of InputMethodManager.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154913391

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-8937 β€Ό

An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is located. This allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-27035 β€Ό

In priorLinearAllocation of C2AllocatorIon.cpp, there is a possible use-after-free due to improper locking. This could lead to local information disclosure in the media codec with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-152239213

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-8940 β€Ό

An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-0484 β€Ό

In destroyResources of ComposerClient.h, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155769496

πŸ“– Read

via "National Vulnerability Database".
14:40
β€Ό CVE-2020-27026 β€Ό

During boot, the device unlock interface behaves differently depending on if a fingerprint registered to the device is present. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-79776455

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-27029 β€Ό

In TextView of TextView.java, there is a possible app hang due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-140218875

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-27024 β€Ό

In smp_br_state_machine_event of smp_br_main.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure triggered by a malformed Bluetooth packet, with no additional execution privileges needed. User interaction is not needed for exploitation. Bounds Sanitizer mitigates this in the default configuration.Product: AndroidVersions: Android-11Android ID: A-162327732

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-0485 β€Ό

In areFunctionsSupported of UsbBackend.java, there is a possible access to tethering from a guest account due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-166125765

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-0482 β€Ό

In command of IncidentService.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150706572

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-27030 β€Ό

In onCreate of HandleApiCalls.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege that allows an app to set or dismiss the alarm with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150612638

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-0477 β€Ό

In sendLinkConfigurationChangedBroadcast of ClientModeImpl.java, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of the current network configuration with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162246414

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-0499 β€Ό

In FLAC__bitreader_read_rice_signed_block of bitreader.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156076070

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-27025 β€Ό

In EapFailureNotifier.java and SimRequiredNotifier.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156008365

πŸ“– Read

via "National Vulnerability Database".
?
16:06
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Why I'm not concerned about the rise in Linux attacks 🦿

Jack Wallen explains why he's not worried that the rise in popularity of the Linux operating system will mean your open source platforms will be vulnerable to attacks.

πŸ“– Read

via "Tech Republic".
16:06
🦿 Linux attacks are rising: Why I'm not concerned 🦿

Jack Wallen explains why he's not worried that the rise in popularity of the Linux operating system will mean your open source platforms will be vulnerable to attacks.

πŸ“– Read

via "Tech Republic".
?
16:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Nowhere to Hide: Don't Let Your Guard Down This Holiday Season πŸ•΄

Harden your defenses to ensure that your holiday downtime doesn't become an open door for cyber threats.

πŸ“– Read

via "Dark Reading".
16:40
β€Ό CVE-2020-29481 β€Ό

An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/<domid> are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-2083 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-29480 β€Ό

An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27057 β€Ό

In getGpuStatsGlobalInfo and getGpuStatsAppInfo of GpuService.cpp, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of gpu statistics with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-161903239

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-2089 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-2080 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-29483 β€Ό

An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-29479 β€Ό

An issue was discovered in Xen through 4.14.x. In the Ocaml xenstored implementation, the internal representation of the tree has special cases for the root node, because this node has no parent. Unfortunately, permissions were not checked for certain operations on the root node. Unprivileged guests can get and modify permissions, list, and delete the root node. (Deleting the whole xenstore tree is a host-wide denial of service.) Achieving xenstore write access is also possible. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27056 β€Ό

In SELinux policies of mls, there is a missing permission check. This could lead to local information disclosure of package metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-161356067

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27039 β€Ό

In postNotification of ServiceRecord.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153878498

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27045 β€Ό

In CE_SendRawFrame of ce_main.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157649398

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27777 β€Ό

A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-29570 β€Ό

An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27050 β€Ό

In rw_i93_send_cmd_write_multi_blocks of rw_i93.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157650365

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27040 β€Ό

In phNxpNciHal_core_initialized of phNxpNciHal.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the NFC server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153731880

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-2082 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-29567 β€Ό

An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-29571 β€Ό

An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27047 β€Ό

In ce_t4t_update_binary of ce_t4t.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157649298

πŸ“– Read

via "National Vulnerability Database".
16:40
β€Ό CVE-2020-27038 β€Ό

In process of C2SoftVorbisDec.cpp, there is a possible resource exhaustion due to a memory leak. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-154302257

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29569 β€Ό

An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29486 β€Ό

An issue was discovered in Xen through 4.14.x. Nodes in xenstore have an ownership. In oxenstored, a owner could give a node away. However, node ownership has quota implications. Any guest can run another guest out of quota, or create an unbounded number of nodes owned by dom0, thus running xenstored out of memory A malicious guest administrator can cause a denial of service against a specific guest or against the whole host. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29484 β€Ό

An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-2084 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29568 β€Ό

An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29487 β€Ό

An issue was discovered in Xen XAPI before 2020-12-15. Certain xenstore keys provide feedback from the guest, and are therefore watched by toolstack. Specifically, keys are watched by xenopsd, and data are forwarded via RPC through message-switch to xapi. The watching logic in xenopsd sends one RPC update containing all data, any time any single xenstore key is updated, and therefore has O(N^2) time complexity. Furthermore, message-switch retains recent (currently 128) RPC messages for diagnostic purposes, yielding O(M*N) space complexity. The quantity of memory a single guest can monopolise is bounded by xenstored quota, but the quota is fairly large. It is believed to be in excess of 1G per malicious guest. In practice, this manifests as a host denial of service, either through message-switch thrashing against swap, or OOMing entirely, depending on dom0's configuration. (There are no quotas in xenopsd to limit the quantity of keys that result in RPC traffic.) A buggy or malicious guest can cause unreasonable memory usage in dom0, resulting in a host denial of service. All versions of XAPI are vulnerable. Systems that are not using the XAPI toolstack are not vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-2087 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27051 β€Ό

In NFA_RwI93WriteMultipleBlocks of nfa_rw_api.cc, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157650338

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27048 β€Ό

In RW_SendRawFrame of rw_main.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157650117

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-25712 β€Ό

A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27043 β€Ό

In nfc_enabled of nfc_main.cc, there is a possible out of bounds read due to an incorrect increment. This could lead to local information disclosure via firmware with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-155234594

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27052 β€Ό

In getLockTaskLaunchMode of ActivityRecord.java, there is a possible way for any app to start in Lock Task Mode due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-158833495

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-29482 β€Ό

An issue was discovered in Xen through 4.14.x. A guest may access xenstore paths via absolute paths containing a full pathname, or via a relative path, which implicitly includes /local/domain/$DOMID for their own domain id. Management tools must access paths in guests' namespaces, necessarily using absolute paths. oxenstored imposes a pathname limit that is applied solely to the relative or absolute path specified by the client. Therefore, a guest can create paths in its own namespace which are too long for management tools to access. Depending on the toolstack in use, a malicious guest administrator might cause some management tools and debugging operations to fail. For example, a guest administrator can cause "xenstore-ls -r" to fail. However, a guest administrator cannot prevent the host administrator from tearing down the domain. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27053 β€Ό

In broadcastWifiCredentialChanged of ClientModeImpl.java, there is a possible location permission bypass due to a missing permission check. This could lead to local information disclosure of the WiFi network name with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-159371448

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-27147 β€Ό

The REST API component of TIBCO Software Inc.'s TIBCO PartnerExpress contains a vulnerability that theoretically allows an unauthenticated attacker with network access to obtain an authenticated login URL for the affected system via a REST API. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: version 6.2.0.

πŸ“– Read

via "National Vulnerability Database".
16:46
β€Ό CVE-2020-2088 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
16:57
πŸ•΄ 45M Medical Imaging Files Left Accessible Online πŸ•΄

A range of medical images, including X-rays and CT scans, were exposed on more than 2,140 unprotected servers, researchers report.

πŸ“– Read

via "Dark Reading".
?
17:18
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” Additional CCPA Regulations Proposed by California AG πŸ”

The potential updates to the data privacy law build off of others proposed in October.

πŸ“– Read

via "Digital Guardian".
?
17:57
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Medical Imaging Leaks Highlight Unhealthy Security Practices πŸ•΄

More than 45 million unique images, such as X-rays and MRI scans, are accessible to anyone on the Internet, security firm says.

πŸ“– Read

via "Dark Reading".
?
18:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Firefox Patches Critical Mystery Bug, Also Impacting Google Chrome ❌

Mozilla Foundation releases Firefox 84 browser, fixing several flaws and delivering performance gains and Apple processor support.

πŸ“– Read

via "Threat Post".
18:37
❌ Gitpaste-12 Worm Widens Set of Exploits in New Attacks ❌

The worm returned in recent attacks against web applications, IP cameras and routers.

πŸ“– Read

via "Threat Post".
18:37
❌ Easy WP SMTP Security Bug Can Reveal Admin Credentials ❌

A poorly configured file opens users up to site takeover.

πŸ“– Read

via "Threat Post".
18:40
β€Ό CVE-2020-25757 β€Ό

A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2020-25759 β€Ό

An issue was discovered on D-Link DSR-250 3.17 devices. Certain functionality in the Unified Services Router web interface could allow an authenticated attacker to execute arbitrary commands, due to a lack of validation of inputs provided in multipart HTTP POST requests.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2020-10770 β€Ό

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2020-25195 β€Ό

The length of the input fields of Host Engineering H0-ECOM100, H2-ECOM100, and H4-ECOM100 modules are verified only on the client side when receiving input from the configuration web server, which may allow an attacker to bypass the check and send input to crash the device.

πŸ“– Read

via "National Vulnerability Database".
18:40
β€Ό CVE-2020-25758 β€Ό

An issue was discovered on D-Link DSR-250 3.17 devices. Insufficient validation of configuration file checksums could allow a remote, authenticated attacker to inject arbitrary crontab entries into saved configurations before uploading. These entries are executed as root.

πŸ“– Read

via "National Vulnerability Database".
18:41
β€Ό CVE-2020-14302 β€Ό

A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicious user to perform replay attacks.

πŸ“– Read

via "National Vulnerability Database".
?
19:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Subway Sandwich Loyalty-Card Users Suffer Ham-Handed Phishing Scam ❌

Subway loyalty program members in U.K. and Ireland have been sent scam emails to trick them into downloading malware.

πŸ“– Read

via "Threat Post".
?
20:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Twitter Fined in Irish GDPR Action πŸ•΄

The $547K fine results from an issue Twitter reported in 2019.

πŸ“– Read

via "Dark Reading".
20:40
β€Ό CVE-2020-35381 β€Ό

jsonparser 1.0.0 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a GET call.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2020-35380 β€Ό

GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2020-23957 β€Ό

Pega Platform through 8.4.x is affected by Cross Site Scripting (XSS) via the ConnectionID parameter, as demonstrated by a pyActivity=Data-TRACERSettings.pzStartTracerSession request to a PRAuth URI.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2020-35416 β€Ό

Multiple cross-site scripting (XSS) vulnerabilities exist in PHPJabbers Appointment Scheduler 2.3, in the index.php admin login webpage (with different request parameters), allows remote attackers to inject arbitrary web script or HTML.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2020-28072 β€Ό

A Remote Code Execution vulnerability exists in DourceCodester Alumni Management System 1.0. An authenticated attacker can upload arbitrary file in the gallery.php page and executing it on the server reaching the RCE.

πŸ“– Read

via "National Vulnerability Database".
20:40
β€Ό CVE-2020-29606 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
?
21:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Concerns Run High as More Details of SolarWinds Hack Emerge πŸ•΄

Enterprises running company's Orion network management software should assume compromise and respond accordingly, security experts say.

πŸ“– Read

via "Dark Reading".
?
22:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to prepare for quantum computing cybersecurity threats 🦿

Find out two steps your business can take now to prepare employees, as well as infrastructure, for possible quantum computing-related cybersecurity risks.

πŸ“– Read

via "Tech Republic".
?
22:45
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-35467 β€Ό

The Docker Docs Docker image through 2020-12-14 contains a blank password for the root user. Systems deployed using affected versions of the Docker Docs container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35466 β€Ό

The Blackfire Docker image through 2020-12-14 contains a blank password for the root user. Systems deployed using affected versions of the Blackfire container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-29663 β€Ό

Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2018-16243 β€Ό

SolarWinds Database Performance Analyzer (DPA) 11.1.468 and 12.0.3074 have several persistent XSS vulnerabilities, related to logViewer.iwc, centralManage.cen, userAdministration.iwc, database.iwc, alertManagement.iwc, eventAnnotations.iwc, and central.cen.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35468 β€Ό

The Appbase streams Docker image 2.1.2 contains a blank password for the root user. Systems deployed using affected versions of the streams container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35121 β€Ό

An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could insert arbitrary JavaScript into saved macro parameters that would execute when a user viewed a page with that instance of the macro.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35193 β€Ό

The official sonarqube docker images before alpine (Alpine specific) contain a blank password for a root user. System using the sonarqube docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35465 β€Ό

The FullArmor HAPI File Share Mount Docker image through 2020-12-14 contains a blank password for the root user. Systems deployed using affected versions of the FullArmor HAPI File Share Mount container may allow the remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35463 β€Ό

Version 1.0.0 of the Instana Dynamic APM Docker image contains a blank password for the root user. Systems deployed using affected versions of the Instana Dynamic APM container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:45
β€Ό CVE-2020-35462 β€Ό

Version 3.16.0 of the CoScale agent Docker image contains a blank password for the root user. Systems deployed using affected versions of the CoScale agent container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:46
β€Ό CVE-2020-35469 β€Ό

The Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root user. Systems deployed using affected versions of the Terracotta Server OSS container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:46
β€Ό CVE-2020-35464 β€Ό

Version 1.3.0 of the Weave Cloud Agent Docker image contains a blank password for the root user. Systems deployed using affected versions of the Weave Cloud Agent container may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
22:46
β€Ό CVE-2020-35122 β€Ό

An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could bypass the access controls for using a saved database connection profile to submit arbitrary SQL against a saved database connection.

πŸ“– Read

via "National Vulnerability Database".
16 December 2020
?
11:25
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-28458 β€Ό

All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.

πŸ“– Read

via "National Vulnerability Database".
11:25
β€Ό CVE-2020-26258 β€Ό

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.

πŸ“– Read

via "National Vulnerability Database".
11:25
β€Ό CVE-2020-5682 β€Ό

Improper input validation in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to cause a denial of service via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
11:25
β€Ό CVE-2020-26259 β€Ό

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.

πŸ“– Read

via "National Vulnerability Database".
11:25
β€Ό CVE-2020-35476 β€Ό

A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)

πŸ“– Read

via "National Vulnerability Database".
11:25
β€Ό CVE-2020-26273 β€Ό

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqlite databases on disk. This _does_ allow arbitrary files to be created, but they will be sqlite databases. It does not appear to allow existing non-sqlite files to be overwritten. This has been patched in osquery 4.6.0. There are several mitigating factors and possible workarounds. In some deployments, the people with access to these interfaces may be considered administrators. In some deployments, configuration is managed by a central tool. This tool can filter for the `ATTACH` keyword. osquery can be run as non-root user. Because this also limits the desired access levels, this requires deployment specific testing and configuration.

πŸ“– Read

via "National Vulnerability Database".
11:25
β€Ό CVE-2020-5683 β€Ό

Directory traversal vulnerability in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to alter the data by uploading a specially crafted file.

πŸ“– Read

via "National Vulnerability Database".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why Secure Email Gateways Rewrite Links (and Why They Shouldn't) πŸ•΄

Redirecting a user to a trusted server buys a secure email gateway company some time while it decides whether a URL is malicious -- but there are avoidable drawbacks to this approach.

πŸ“– Read

via "Dark Reading".
12:28
πŸ•΄ SSO and MFA Are Only Half Your Identity Governance Strategy πŸ•΄

We need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.

πŸ“– Read

via "Dark Reading".
12:41
β€Ό CVE-2020-25617 β€Ό

An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows Relative Path Traversal by an authenticated user of the N-Central Administration Console (NAC), leading to execution of OS commands as root.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2020-29363 β€Ό

An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2020-29362 β€Ό

An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2020-25619 β€Ό

An issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network services on the 127.0.0.1 interface, even though this feature was only intended for user-to-agent communication.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2020-29361 β€Ό

An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.

πŸ“– Read

via "National Vulnerability Database".
12:41
β€Ό CVE-2020-25618 β€Ό

An issue was discovered in SolarWinds N-Central 12.3.0.670. The sudo configuration has incorrect access control because the nable web user account is effectively able to run arbitrary OS commands as root (i.e., the use of root privileges is not limited to specific programs listed in the sudoers file).

πŸ“– Read

via "National Vulnerability Database".
?
13:07
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Social engineering: How psychology and employees can be part of the solution 🦿

Social engineering is allowing cybercriminals the way in. Learn how to lock that door.

πŸ“– Read

via "Tech Republic".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Sextortionist Campaign Targets iOS, Android Users with New Spyware ❌

Goontact lures users of illicit sites through Telegram and other secure messaging apps and steals their information for future fraudulent use.

πŸ“– Read

via "Threat Post".
?
13:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Patching Still Poses Problems for Industrial Controllers, Networking Devices πŸ•΄

More than 90% of devices that run the popular VxWorks embedded operating system remain vulnerable to critical flaws disclosed more than a year ago.

πŸ“– Read

via "Dark Reading".
14:08
❌ The SolarWinds Perfect Storm: Default Password, Access Sales and More ❌

Meanwhile, Microsoft and other vendors are quickly moving to block the Sunburst backdoor used in the attack.

πŸ“– Read

via "Threat Post".
?
14:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-29607 β€Ό

A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2019-14483 β€Ό

AdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2019-14477 β€Ό

AdRem NetCrunch 10.6.0.4587 has Improper Credential Storage since the internal user database is readable by low-privileged users and passwords in the database are weakly encoded or encrypted.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2019-14482 β€Ό

AdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2019-14480 β€Ό

AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-25621 β€Ό

An issue was discovered in SolarWinds N-Central 12.3.0.670. The local database does not require authentication: security is only based on ability to access a network interface. The database has keys and passwords.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-5360 β€Ό

Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability resulting in undefined behaviour, or a crash of the affected systems.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-25620 β€Ό

An issue was discovered in SolarWinds N-Central 12.3.0.670. Hard-coded Credentials exist by default for local user accounts named support@n-able.com and nableadmin@n-able.com. These allow logins to the N-Central Administrative Console (NAC) and/or the regular web interface.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-14248 β€Ό

BigFix Inventory up to v10.0.2 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-25622 β€Ό

An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows CSRF.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-5359 β€Ό

Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to an Unchecked Return Value Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to modify and corrupt the encrypted data.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-26198 β€Ό

Dell EMC iDRAC9 versions prior to 4.32.10.00 and 4.40.00.00 contain a reflected cross-site scripting vulnerability in the iDRAC9 web application. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victimÒ€ℒs browser by tricking a victim in to following a specially crafted link.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-14254 β€Ό

TLS-RSA cipher suites are not disabled in HCL BigFix Inventory up to v10.0.2. If TLS 2.0 and secure ciphers are not enabled then an attacker can passively record traffic and later decrypt it.

πŸ“– Read

via "National Vulnerability Database".
14:41
β€Ό CVE-2020-4008 β€Ό

The installer of the macOS Sensor for VMware Carbon Black Cloud prior to 3.5.1 handles certain files in an insecure way. A malicious actor who has local access to the endpoint on which a macOS sensor is going to be installed, may overwrite a limited number of files with output from the sensor installation.

πŸ“– Read

via "National Vulnerability Database".
?
15:27
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ›  Zeek 3.2.3 πŸ› 

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.

πŸ“– Read

via "Packet Storm Security".
15:38
❌ Ryuk, Egregor Ransomware Attacks Leverage SystemBC Backdoor ❌

In the past few months researchers have detected hundreds of attempted SystemBC deployments globally, as part of recent Ryuk and Egregor ransomware attacks.

πŸ“– Read

via "Threat Post".
?
16:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Why the Weakest Links Matter πŸ•΄

The recent FireEye and SolarWinds compromises reinforce the fact that risks should be understood, controls should be in place, and care should be taken at every opportunity.

πŸ“– Read

via "Dark Reading".
16:28
πŸ•΄ Senior Managers Twice as Likely to Share Work Devices With Outsiders πŸ•΄

New survey finds top C-suite managers are much shakier on security than their junior counterparts.

πŸ“– Read

via "Dark Reading".
16:41
β€Ό CVE-2020-7781 β€Ό

This affects the package connection-tester before 0.2.1. The injection point is located in line 15 in index.js. The following PoC demonstrates the vulnerability:

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2019-14479 β€Ό

AdRem NetCrunch 10.6.0.4587 allows Remote Code Execution. In the NetCrunch web client, a read-only administrator can execute arbitrary code on the server running the NetCrunch server software.

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2019-14481 β€Ό

AdRem NetCrunch 10.6.0.4587 has a Cross-Site Request Forgery (CSRF) vulnerability in the NetCrunch web client. Successful exploitation requires a logged-in user to open a malicious page and leads to account takeover.

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2020-7837 β€Ό

An issue was discovered in ML Report Program. There is a stack-based buffer overflow in function sub_41EAF0 at MLReportDeamon.exe. The function will call vsprintf without checking the length of strings in parameters given by attacker. And it finally leads to a stack-based buffer overflow via access to crafted web page. This issue affects: Infraware ML Report 2.19.312.0000.

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2019-14476 β€Ό

AdRem NetCrunch 10.6.0.4587 has a Server-Side Request Forgery (SSRF) vulnerability in the NetCrunch server. Every user can trick the server into performing SMB requests to other systems.

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2019-14478 β€Ό

AdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript code in the context of the user's browser if the victim opens or searches for a node whose "Display Name" contains an XSS payload.

πŸ“– Read

via "National Vulnerability Database".
16:41
β€Ό CVE-2020-35133 β€Ό

irfanView 4.56 contains an error processing parsing files of type .pcx. Which leads to out-of-bounds writing at i_view32+0xdb60.

πŸ“– Read

via "National Vulnerability Database".
16:54
πŸ” EDR vs. EPP vs. MDR πŸ”

In this blog we break down the differences between three different types of endpoint protection systems: EDR, EPP, and MDR.

πŸ“– Read

via "Digital Guardian".
?
17:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Corporate Credentials for Sale on the Dark Web: How to Protect Employees and Data πŸ•΄

It's past time to retire passwords in favor of other methods for authenticating users and securing systems.

πŸ“– Read

via "Dark Reading".
?
18:41
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26274 β€Ό

In systeminformation (npm package) before version 4.31.1 there is a command injection vulnerability. The problem was fixed in version 4.31.1 with a shell string sanitation fix.

πŸ“– Read

via "National Vulnerability Database".
?
18:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ US-CERT Reports 17,447 Vulnerabilities Recorded in 2020 πŸ•΄

This marks the fourth year in a row that a record number of vulnerabilities has been discovered, following 17,306 in 2019.

πŸ“– Read

via "Dark Reading".
?
19:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ New IRS Form Fraud Campaign Targets G Suite Users πŸ•΄

At least 50,000 executives have been affected so far.

πŸ“– Read

via "Dark Reading".
19:37
🦿 How Apple's new App Store privacy requirements may affect users and app developers 🦿

Apple now requires apps to reveal how user data may be collected, but some companies aren't happy about the policy.

πŸ“– Read

via "Tech Republic".
?
19:58
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Attackers Leverage IMAP to Infiltrate Email Accounts πŸ•΄

Researchers believe cybercriminals are using a tool dubbed Email Appender to directly connect with compromised email accounts via IMAP.

πŸ“– Read

via "Dark Reading".
?
20:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ FireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to Respond πŸ•΄

White House National Security Council establishes unified group to coordinate response across federal agencies to the threat.

πŸ“– Read

via "Dark Reading".
20:41
β€Ό CVE-2020-28930 β€Ό

A Cross-Site Scripting (XSS) issue in the 'update user' and 'delete user' functionalities in settings/users.php in EPSON EPS TSE Server 8 (21.0.11) allows an authenticated attacker to inject a JavaScript payload in the user management page that is executed by an administrator.

πŸ“– Read

via "National Vulnerability Database".
20:41
β€Ό CVE-2020-28931 β€Ό

Lack of an anti-CSRF token in the entire administrative interface in EPSON EPS TSE Server 8 (21.0.11) allows an unauthenticated attacker to force an administrator to execute external POST requests by visiting a malicious website.

πŸ“– Read

via "National Vulnerability Database".
20:41
β€Ό CVE-2020-4904 β€Ό

IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

πŸ“– Read

via "National Vulnerability Database".
20:41
β€Ό CVE-2020-4907 β€Ό

IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

πŸ“– Read

via "National Vulnerability Database".
20:41
β€Ό CVE-2020-4905 β€Ό

IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow an remote attacker to obtain sensitive information, caused by a man in the middle attack. By SSL striping, an attacker could exploit this vulnerability to obtain sensitive information.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-4657 β€Ό

IBM Sterling B2B Integrator 5.2.0.0 through 6.0.3.2 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186094.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-4906 β€Ό

IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 allows web pages to be stored locally which can be read by another user on the system.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-4908 β€Ό

IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 returns the product version and release information on the login dialog. This information could be used in further attacks against the system.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-28929 β€Ό

Unrestricted access to the log downloader functionality in EPSON EPS TSE Server 8 (21.0.11) allows an unauthenticated attacker to remotely retrieve administrative hashed credentials via the maintenance/troubleshoot.php?download=1 URI.

πŸ“– Read

via "National Vulnerability Database".
20:42
β€Ό CVE-2020-4658 β€Ό

IBM Sterling File Gateway 2.2.0.0 through 6.0.3.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186095.

πŸ“– Read

via "National Vulnerability Database".
17 December 2020
?
03:42
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-35191 β€Ό

The official drupal docker images before 8.5.10-fpm-alpine (Alpine specific) contain a blank password for a root user. System using the drupal docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35189 β€Ό

The official kong docker images before 1.0.2-alpine (Alpine specific) contain a blank password for a root user. System using the kong docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35194 β€Ό

The official influxdb docker images before 1.7.3-meta-alpine (Alpine specific) contain a blank password for a root user. System using the influxdb docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-29652 β€Ό

A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35123 β€Ό

In Zimbra Collaboration Suite Network Edition versions < 9.0.0 P10 and 8.8.15 P17, there exists an XXE vulnerability in the saml consumer store extension, which is vulnerable to XXE attacks. This has been fixed in Zimbra Collaboration Suite Network edition 9.0.0 Patch 10 and 8.8.15 Patch 17.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35197 β€Ό

The official memcached docker images before 1.5.11-alpine (Alpine specific) contain a blank password for a root user. System using the memcached docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35453 β€Ό

HashiCorp Vault EnterpriseÒ€ℒs Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35177 β€Ό

HashiCorp Vault and Vault Enterprise allowed the enumeration of users via the LDAP auth method. Fixed in 1.5.6 and 1.6.1.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35196 β€Ό

The official rabbitmq docker images before 3.7.13-beta.1-management-alpine (Alpine specific) contain a blank password for a root user. System using the rabbitmq docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35186 β€Ό

The official adminer docker images before 4.7.0-fastcgi contain a blank password for a root user. System using the adminer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-25011 β€Ό

A sensitive information disclosure vulnerability in Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers Software Version:R0002.P05 allows remote attackers to get username and password by request /cgi-bin/webadminget.cgi script via the browser.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35184 β€Ό

The official composer docker images before 1.8.3 contain a blank password for a root user. System using the composer docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-27199 β€Ό

The Magic Home Pro application 1.5.1 for Android allows Authentication Bypass. The security control that the application currently has in place is a simple Username and Password authentication function. Using enumeration, an attacker is able to forge a User specific token without the need for correct password to gain access to the mobile application as that victim user.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-25095 β€Ό

LogRhythm Platform Manager (PM) 7.4.9 allows CSRF. The Web interface is vulnerable to Cross-site WebSocket Hijacking (CSWH). If a logged-in PM user visits a malicious site in the same browser session, that site can perform a CSRF attack to create a WebSocket from the victim client to the vulnerable PM server. Once the socket is created, the malicious site can interact with the vulnerable web server in the context of the logged-in user. This can include WebSocket payloads that result in command execution.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-29436 β€Ό

Sonatype Nexus Repository Manager 3.x before 3.29.0 allows a user with admin privileges to configure the system to gain access to content outside of NXRM via an XXE vulnerability. Fixed in version 3.29.0.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35195 β€Ό

The official haproxy docker images before 1.8.18-alpine (Alpine specific) contain a blank password for a root user. System using the haproxy docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-25094 β€Ό

LogRhythm Platform Manager 7.4.9 allows Command Injection. To exploit this, an attacker can inject arbitrary program names and arguments into a WebSocket. These are forwarded to any remote server with a LogRhythm Smart Response agent installed. By default, the commands are run with LocalSystem privileges.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-25010 β€Ό

An arbitrary code execution vulnerability in Kyland KPS2204 6 Port Managed Din-Rail Programmable Serial Device Servers Software Version:R0002.P05 allows remote attackers to upload a malicious script file by constructing a POST type request and writing a payload in the request parameters as an instruction to write a file.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-35188 β€Ό

The official chronograf docker images before 1.7.7-alpine (Alpine specific) contain a blank password for a root user. System using the chronograf docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

πŸ“– Read

via "National Vulnerability Database".
03:42
β€Ό CVE-2020-25096 β€Ό

LogRhythm Platform Manager (PM) 7.4.9 has Incorrect Access Control. Users within LogRhythm can be delegated different roles and privileges, intended to limit what data and services they can interact with. However, no access control is enforced for WebSocket-based communication to the PM application server, which will forward requests to any configured back-end server, regardless of whether the user's access rights should permit this. As a result, even the most low-privileged user can interact with any back-end component that has a LogRhythm agent installed.

πŸ“– Read

via "National Vulnerability Database".
?
11:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Phone scammers were able to get 270% more personal information in 2020 than in 2019 🦿

The COVID-19 crisis enabled scammers to take advantage of the guileless, as bad actors were able to extract personal information from targets, according to a new report from First Orion.

πŸ“– Read

via "Tech Republic".
11:41
⚠ S3 Ep11: DIY phishes, sandwich scams and vaccine hacking [Podcast] ⚠

Here's the latest podcast - listen now!

πŸ“– Read

via "Naked Security".
?
12:28
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ VPNs, MFA & the Realities of Remote Work πŸ•΄

The work-from-home-era is accelerating cloud-native service adoption.

πŸ“– Read

via "Dark Reading".
12:39
⚠ When zombie malware leads to big-money ransomware attacks ⚠

SophosLabs investigates SystemBC, a malware utility for launching fileless malware attacks, including big-money ransomware.

πŸ“– Read

via "Naked Security".
?
13:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How to protect your organization following the SolarWinds compromise 🦿

Whether your organization uses the vulnerable SolarWinds software or you want to defend yourself against similar exploits, here are recommendations from four sources.

πŸ“– Read

via "Tech Republic".
?
14:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ 3M Users Targeted by Malicious Facebook, Insta Browser Add-Ons ❌

Researchers identify malware existing in popular add-ons for Facebook, Vimeo, Instagram and others that are commonly used in browsers from Google and Microsoft.

πŸ“– Read

via "Threat Post".
14:09
❌ Code42 Incydr Series: Bringing Shadow IT into the light with Code42 Incydr ❌

The massive shift to remote work has turbocharged the shadow IT problem.

πŸ“– Read

via "Threat Post".
?
14:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cryptologists Crack Zodiac Killer’s 340 Cipher ❌

The Zodiac’s serial killer’s 340 cipher, which couldn’t be solved for 50 years, has been cracked by a remote team of mathematicians.

πŸ“– Read

via "Threat Post".
14:42
β€Ό CVE-2020-22083 β€Ό

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function.

πŸ“– Read

via "National Vulnerability Database".
?
15:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 The worst bugs in the top programming languages 🦿

A heatmap shows PHP has the most flaws followed by C++, then Java, .Net, JavaScript, and Python in Veracode's annual security report.

πŸ“– Read

via "Tech Republic".
?
15:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 51% of WFH Parents Say Children Have Accessed Work Accounts πŸ•΄

In addition, 14% of surveyed parents who are working from home say their children have access to their work devices, new data shows.

πŸ“– Read

via "Dark Reading".
?
15:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Rising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond πŸ•΄

For those who work in the security industry 2020 has been a particularly challenging year. Chris Price talks to five industry leaders from different perspectives in the sector about how they coped with COVID and asks them to look forward to 2021.

πŸ“– Read

via "Dark Reading".
15:59
πŸ›  Zed Attack Proxy 2.10.0 Cross Platform Package πŸ› 

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

πŸ“– Read

via "Packet Storm Security".
?
16:19
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ” DoppelPaymer Ransomware Gang Threatening Victims πŸ”

In a recent FBI note the agency outlined how DoppelPaymer ransomware attacks have impacted critical infrastructure - and the lengths the attackers have gone to get paid.

πŸ“– Read

via "Digital Guardian".
16:29
πŸ•΄ CISA: SolarWinds Not the Only Initial Attack Vector in Massive Breach πŸ•΄

Agency says it has "evidence of additional initial access vectors" besides SolarWinds' Orion software.

πŸ“– Read

via "Dark Reading".
16:38
🦿 How to quickly encrypt text for Apple Mail 🦿

Jack Wallen shows you how easy it can be to encrypt text to be sent via email, using Apple Mail and the GPG Suite.

πŸ“– Read

via "Tech Republic".
16:41
❌ RubyGems Packages Laced with Bitcoin-Stealing Malware ❌

Two malicious software building blocks that could be baked into web applications prey on unsuspecting users.

πŸ“– Read

via "Threat Post".
16:41
❌ Air-Gap Attack Turns Memory Modules into Wi-Fi Radios ❌

Attack turns SDRAM buses into a Wi-Fi radio to leak data from air-gapped computers.

πŸ“– Read

via "Threat Post".
16:44
β€Ό CVE-2020-15292 β€Ό

Lack of validation on data read from guest memory in IntPeGetDirectory, IntPeParseUnwindData, IntLogExceptionRecord, IntKsymExpandSymbol and IntLixTaskDumpTree may lead to out-of-bounds read or it could cause DoS due to integer-overflor (IntPeGetDirectory), TOCTOU (IntPeParseUnwindData) or insufficient validations.

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-15294 β€Ό

Compiler Optimization Removal or Modification of Security-critical Code vulnerability in IntPeParseUnwindData() results in multiple dereferences to the same pointer. If the pointer is located in memory-mapped from the guest space, this may cause a race-condition where the generated code would dereference the same address twice, thus obtaining different values, which may lead to arbitrary code execution. This issue affects: Bitdefender Hypervisor Introspection versions prior to 1.132.2.

πŸ“– Read

via "National Vulnerability Database".
16:44
β€Ό CVE-2020-15293 β€Ό

Memory corruption in IntLixCrashDumpDmesg, IntLixTaskFetchCmdLine, IntLixFileReadDentry and IntLixFileGetPath due to insufficient guest-data input validation may lead to denial of service conditions.

πŸ“– Read

via "National Vulnerability Database".
?
17:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Police Vouch for Hacker Who Guessed Trump’s Twitter Password ❌

No charges for Dutch ethical hacker Victor Gevers who prosecutors say did actually access Trump’s Twitter account by guessing his password, β€œMAGA2020!” last October.

πŸ“– Read

via "Threat Post".
?
17:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ XDR 101: What's the Big Deal About Extended Detection & Response? πŸ•΄

Extended Detection and Response (XDR) could be the security management technology of your dreams...or not. What makes this technical 'evolution' so interesting to so many companies?

πŸ“– Read

via "Dark Reading".
?
18:38
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 How using tactical literacy makes it harder for cybercriminals to fool end users 🦿

End users just want to do their job, not become cybersecurity experts. When providing users with cybersecurity help, keep these tips in mind.

πŸ“– Read

via "Tech Republic".
18:42
β€Ό CVE-2020-35491 β€Ό

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.

πŸ“– Read

via "National Vulnerability Database".
18:42
β€Ό CVE-2020-4845 (security_key_lifecycle_manager) β€Ό

IBM Security Key Lifecycle Manager 3.0.1 and 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190289.

πŸ“– Read

via "National Vulnerability Database".
18:42
β€Ό CVE-2020-35489 β€Ό

The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows Unrestricted File Upload and remote code execution because a filename may contain special characters.

πŸ“– Read

via "National Vulnerability Database".
18:42
β€Ό CVE-2020-35545 β€Ό

Time-based SQL injection exists in Spotweb 1.4.9 via the query string.

πŸ“– Read

via "National Vulnerability Database".
18:42
β€Ό CVE-2020-35490 β€Ό

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2020-26276 β€Ό

Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. The fix was made using https://github.com/mattermost/xml-roundtrip-validator If upgrade to 3.5.1 is not possible, users should disable SSO authentication in Fleet.

πŸ“– Read

via "National Vulnerability Database".
18:43
β€Ό CVE-2020-4846 (security_key_lifecycle_manager) β€Ό

IBM Security Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190290.

πŸ“– Read

via "National Vulnerability Database".
?
20:09
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Nuclear Weapons Agency Hacked in Widening Cyberattack – Report ❌

Sources said the DoE suffered "damage" in the attack, which also likely extends beyond the initially known SolarWinds Orion attack vector.

πŸ“– Read

via "Threat Post".
?
20:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ How to Increase Your Security Posture with Fewer Resources ❌

Plixer's Justin Jett, Compliance & Audit director, discusses how to do more with less when your security resources are thin.

πŸ“– Read

via "Threat Post".
20:43
β€Ό CVE-2020-8465 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.

πŸ“– Read

via "National Vulnerability Database".
20:43
β€Ό CVE-2020-8464 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product's admin interface to users who would not normally have access.

πŸ“– Read

via "National Vulnerability Database".
20:43
β€Ό CVE-2020-8463 β€Ό

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths.

πŸ“– Read

via "National Vulnerability Database".
20:43
β€Ό CVE-2020-8466 β€Ό

A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.

πŸ“– Read

via "National Vulnerability Database".
20:43
β€Ό CVE-2020-8462 β€Ό

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product.

πŸ“– Read

via "National Vulnerability Database".
20:43
β€Ό CVE-2020-27010 β€Ό

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462.

πŸ“– Read

via "National Vulnerability Database".
20:43
β€Ό CVE-2020-8461 β€Ό

A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.

πŸ“– Read

via "National Vulnerability Database".
?
22:39
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
⚠ β€œIs it you in the video?” – don’t fall for this Messenger scam ⚠

If a friend asks "is it you in the video", don't be in hurry to find out!

πŸ“– Read

via "Naked Security".
22:43
β€Ό CVE-2020-12521 β€Ό

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13509 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) Using the IRP 0x9c4060cc gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability and this access could allow for information leakage of sensitive data.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-14232 β€Ό

A vulnerability in the input parameter handling of HCL Notes v9 could potentially be exploited by an authenticated attacker resulting in a stack buffer overflow. This could allow the attacker to crash the program or inject code into the system which would execute with the privileges of the currently logged in user.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13528 β€Ό

An information disclosure vulnerability exists in the Web Manager and telnet CLI functionality of Lantronix XPort EDGE 3.0.0.0R11, 3.1.0.0R9, 3.4.0.0R12 and 4.2.0.0R7. A specially crafted HTTP request can cause information disclosure. An attacker can sniff the network to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13516 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406144 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-12517 β€Ό

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-12518 β€Ό

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-20138 β€Ό

Cross Site Scripting (XSS) vulnerability in the Showtime2 Slideshow module in CMS Made Simple (CMSMS) 2.2.4.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-20140 β€Ό

Cross Site Scripting (XSS) vulnerability in Remote Report component under the Open menu in Flexmonster Pivot Table & Charts 2.7.17.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13511 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d4 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13518 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c402084 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-12522 β€Ό

The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-20142 β€Ό

Cross Site Scripting (XSS) vulnerability in the "To Remote CSV" component under "Open" Menu in Flexmonster Pivot Table & Charts 2.7.17.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13517 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406104 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-20141 β€Ό

Cross Site Scripting (XSS) vulnerability in the To OLAP (XMLA) component Under the Connect menu in Flexmonster Pivot Table & Charts 2.7.17.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-27780 β€Ό

A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-12519 β€Ό

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13510 β€Ό

An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d0 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-13527 β€Ό

An authentication bypass vulnerability exists in the Web Manager functionality of Lantronix XPort EDGE 3.0.0.0R11, 3.1.0.0R9, 3.4.0.0R12 and 4.2.0.0R7. A specially crafted HTTP request can cause increased privileges. An attacker can send an HTTP request to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
22:43
β€Ό CVE-2020-20139 β€Ό

Cross Site Scripting (XSS) vulnerability in the Remote JSON component Under the Connect menu in Flexmonster Pivot Table & Charts 2.7.17.

πŸ“– Read

via "National Vulnerability Database".
18 December 2020
?
08:46
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-27340 β€Ό

The online help portal of Mitel MiCollab before 9.2 could allow an attacker to redirect a user to an unauthorized website by executing malicious script due to insufficient access control.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-35474 β€Ό

In MediaWiki before 1.35.1, the combination of Html::rawElement and Message::text leads to XSS because the definition of MediaWiki:recentchanges-legend-watchlistexpiry can be changed onwiki so that the output is raw HTML.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-26177 β€Ό

In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-26173 β€Ό

An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-26174 β€Ό

tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. This allows an attacker to upload any file as an attachment to a workitem.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-35478 β€Ό

MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. MediaWiki:blanknamespace potentially can be output as raw HTML with SCRIPT tags via LogFormatter::makePageLink(). This affects MediaWiki 1.33.0 and later.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-35480 β€Ό

An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don't exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing sensitive information about the hidden status to unprivileged viewers. This exists on various code paths.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-35554 β€Ό

An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. There is a WebView SSL error-handler vulnerability. The LG ID is LVE-SMP-200026 (December 2020).

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-26175 β€Ό

In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-35555 β€Ό

An issue was discovered on LG mobile devices with Android OS 10 software. When a dual-screen configuration is supported, the device does not lock upon disconnection of a call with the cover closed. The LG ID is LVE-SMP-200027 (December 2020).

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-35548 β€Ό

An issue was discovered in Finder on Samsung mobile devices with Q(10.0) software. A call to a non-existent provider allows attackers to cause a denial of service. The Samsung ID is SVE-2020-18629 (December 2020).

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-25609 β€Ό

The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could allow an authenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to view and modify user data.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-25610 β€Ό

The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-26171 β€Ό

In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2020-27639 β€Ό

The Bluetooth handset of Mitel MiVoice 6873i, 6930, and 6940 SIP phones with firmware before 5.1.0.SP6 could allow an unauthenticated attacker within Bluetooth range to pair a rogue Bluetooth device when a phone handset loses connection, due to an improper pairing mechanism. A successful exploit could allow an attacker to eavesdrop on conversations.

πŸ“– Read

via "National Vulnerability Database".
08:46
β€Ό CVE-2019-16955 β€Ό

SolarWinds Web Help Desk 12.7.0 allows XSS via an uploaded SVG document in a request.

πŸ“– Read

via "National Vulnerability Database".
08:47
β€Ό CVE-2020-25612 β€Ό

The NuPoint Messenger of Mitel MiCollab before 9.2 could allow an attacker with escalated privilege to access user files due to insufficient access control. Successful exploit could potentially allow an attacker to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
08:47
β€Ό CVE-2020-26172 β€Ό

Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.

πŸ“– Read

via "National Vulnerability Database".
08:47
β€Ό CVE-2020-35475 β€Ό

In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)

πŸ“– Read

via "National Vulnerability Database".
08:47
β€Ό CVE-2020-35479 β€Ό

MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry itself does not escape in all code paths. For example, the return of Language::userTimeAndDate is is always unsafe for HTML in a month value. This affects MediaWiki 1.12.0 and later.

πŸ“– Read

via "National Vulnerability Database".
?
12:29
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 2021 Cybersecurity Predictions: The Intergalactic Battle Begins πŸ•΄

There's much in store for the future of cybersecurity, and the most interesting things aren't happening on Earth.

πŸ“– Read

via "Dark Reading".
?
12:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ 5 Key Takeaways from the SolarWinds Breach πŸ•΄

New details continue to emerge each day, and there may be many more lessons to learn from what could be among the largest cyberattacks ever.

πŸ“– Read

via "Dark Reading".
13:10
❌ Insider Threats: What Are They, Really? ❌

"Insider threat" or "human error" shows up a lot as the major cause of data breaches across all types of reports out there. But often it's not defined, or it's not clearly defined, so people conjure up their own definition.

πŸ“– Read

via "Threat Post".
?
13:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cyberpunk 2077 Headaches Grow: New Spyware Found in Fake Android Download ❌

Threat actors impersonate Google Play store in scam as Sony pulls the game off the PlayStation store due to myriad performance issues.

πŸ“– Read

via "Threat Post".
?
14:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 Cybersecurity can use some help from AI and ML 🦿

Howard professor says security must reach all types of networks, including IoT and ad hoc networks.

πŸ“– Read

via "Tech Republic".
14:08
🦿 AI, ML can bolster cybersecurity, and vice versa, professor says 🦿

Howard University professor talks about his research in emerging technologies.

πŸ“– Read

via "Tech Republic".
14:11
❌ Microsoft Caught Up in SolarWinds Spy Effort, Joining Federal Agencies ❌

The ongoing, growing campaign is β€œeffectively an attack on the United States and its government and other critical institutions,” Microsoft warned.

πŸ“– Read

via "Threat Post".
?
14:43
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-4764 β€Ό

IBM Planning Analytics 2.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 188898.

πŸ“– Read

via "National Vulnerability Database".
14:43
β€Ό CVE-2020-25494 β€Ό

Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.

πŸ“– Read

via "National Vulnerability Database".
14:43
β€Ό CVE-2020-25901 β€Ό

Host Header Injection in Spiceworks 7.5.7.0 allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.

πŸ“– Read

via "National Vulnerability Database".
14:43
β€Ό CVE-2020-25495 β€Ό

A reflected Cross-site scripting (XSS) vulnerability in Xinuo (formerly SCO) Openserver version 5 and 6 allows remote attackers to inject arbitrary web script or HTML tag via the parameter 'section'.

πŸ“– Read

via "National Vulnerability Database".
?
16:08
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
🦿 SolarWinds-related cyberattacks pose grave risk to government and private sector, says CISA 🦿

The attacks have reportedly hit the US Energy Department and the Federal Energy Regulatory Commission as well as other vital agencies and companies around the world.

πŸ“– Read

via "Tech Republic".
16:08
🦿 Beware of cybercriminals: Keep your guard up during the last-minute shopping frenzy 🦿

TechRepublic spoke with email security firm Tessian's CEO Tim Sadler, who tells us how to avoid being phished or scammed during the search for perfect presents.

πŸ“– Read

via "Tech Republic".
16:08
🦿 Predicting 2021 in cybersecurity: DDoS attacks, 5G speed, AI security, and more 🦿

Expert pleads with companies to realize they are potential attack victims, no matter their size.

πŸ“– Read

via "Tech Republic".
16:08
🦿 Good and bad news for cybersecurity in 2021 🦿

Expert sees improvement in attacks as well as defense technologies. He reminds businesses that all companies are potential targets.

πŸ“– Read

via "Tech Republic".
16:11
❌ Sunburst’s C2 Secrets Reveal Second-Stage SolarWinds Victims ❌

Examining the backdoor's DNS communications led researchers to find a government agency and a big U.S. telco that were flagged for further exploitation in the spy campaign.

πŸ“– Read

via "Threat Post".
?
16:44
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
β€Ό CVE-2020-26251 β€Ό

Open Zaak is a modern, open-source data- and services-layer to enable zaakgericht werken, a Dutch approach to case management. In Open Zaak before version 1.3.3 the Cross-Origin-Resource-Sharing policy in Open Zaak is currently wide open - every client is allowed. This allows evil.com to run scripts that perform AJAX calls to known Open Zaak installations, and the browser will not block these. This was intended to only apply to development machines running on localhost/127.0.0.1. Open Zaak 1.3.3 disables CORS by default, while it can be opted-in through environment variables. The vulnerability does not actually seem exploitable because: a) The session cookie has a `Same-Site: Lax` policy which prevents it from being sent along in Cross-Origin requests. b) All pages that give access to (production) data are login-protected c) `Access-Control-Allow-Credentials` is set to `false` d) CSRF checks probably block the remote origin, since they're not explicitly added to the trusted allowlist.

πŸ“– Read

via "National Vulnerability Database".
?
17:59
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
πŸ•΄ Microsoft Confirms Its Network Was Breached With Tainted SolarWinds Updates πŸ•΄

Attack on thousands of other companies as "moment of reckoning" for governments and industry, company president says.

πŸ“– Read

via "Dark Reading".
?
18:40
πŸ›‘ Cybersecurity & Privacy news πŸ›‘
❌ Cloud is King: 9 Software Security Trends to Watch in 2021 ❌

Researchers predict software security will continue to struggle to keep up with cloud and IoT in the new year.

πŸ“– Read

via "Threat Post".
18:44
β€Ό CVE-2020-13514 β€Ό

A privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0e0 gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-20298 β€Ό

Eval injection vulnerability in the parserCommom method in the ParserTemplate class in zzz_template.php in zzzphp 1.7.2 allows remote attackers to execute arbitrary commands.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-20276 β€Ό

An unauthenticated stack-based buffer overflow vulnerability in common.c's handle_PORT in uftpd FTP server versions 2.10 and earlier can be abused to cause a crash and could potentially lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-13512 β€Ό

A privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0d8 gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-27687 β€Ό

ThingsBoard before v3.2 is vulnerable to Host header injection in password-reset emails. This allows an attacker to send malicious links in password-reset emails to victims, pointing to an attacker-controlled server. Lack of validation of the Host header allows this to happen.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-13519 β€Ό

A privilege escalation vulnerability exists in the WinRing0x64 Driver IRP 0x9c402088 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-26280 β€Ό

OpenSlides is a free, Web-based presentation and assembly system for managing and projecting agenda, motions, and elections of assemblies. OpenSlides version 3.2, due to unsufficient user input validation and escaping, it is vulnerable to persistant cross-site scripting (XSS). In the web applications users can enter rich text in various places, e.g. for personal notes or in motions. These fields can be used to store arbitrary JavaScript Code that will be executed when other users read the respective text. An attacker could utilize this vulnerability be used to manipulate votes of other users, hijack the moderators session or simply disturb the meeting. The vulnerability was introduced with 6eae497abeab234418dfbd9d299e831eff86ed45 on 16.04.2020, which is first included in the 3.2 release. It has been patched in version 3.3 ( in commit f3809fc8a97ee305d721662a75f788f9e9d21938, merged in master on 20.11.2020).

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-13513 β€Ό

A privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0dc gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-20277 β€Ό

There are multiple unauthenticated directory traversal vulnerabilities in different FTP commands in uftpd FTP server versions 2.7 to 2.10 due to improper implementation of a chroot jail in common.c's compose_abspath function that can be abused to read or write to arbitrary files on the filesystem, leak process memory, or potentially lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-20299 β€Ό

WeiPHP 5.0 does not properly restrict access to pages, related to using POST.

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-20285 β€Ό

There is a XSS in the user login page in zzcms 2019. Users can inject js code by the referer header via user/login.php

πŸ“– Read

via "National Vulnerability Database".
18:44
β€Ό CVE-2020-20300 β€Ό

SQL injection vulnerability in the wp_where function in WeiPHP 5.0.

πŸ“– Read

via "National Vulnerability Database".