❌ Gitpaste-12 Worm Targets Linux Servers, IoT Devices ❌
📖 Read
via "Threat Post".
The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.📖 Read
via "Threat Post".
Threat Post
Gitpaste-12 Worm Targets Linux Servers, IoT Devices
The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.
🕴 The Oracle-Walmart-TikTok Deal Is Not Enough 🕴
📖 Read
via "Dark Reading".
The social media deal raises issues involving data custodianship and trusted tech partnerships.📖 Read
via "Dark Reading".
Dark Reading
The Oracle-Walmart-TikTok Deal Is Not Enough
The social media deal raises issues involving data custodianship and trusted tech partnerships.
‼ CVE-2020-25170 ‼
📖 Read
via "National Vulnerability Database".
An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26214 ‼
📖 Read
via "National Vulnerability Database".
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26213 ‼
📖 Read
via "National Vulnerability Database".
In teler before version 0.0.1, if you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills. The issue is patched in teler 0.0.1 and 0.0.1-dev5.1.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25174 ‼
📖 Read
via "National Vulnerability Database".
A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user.📖 Read
via "National Vulnerability Database".
‼ CVE-2017-18926 ‼
📖 Read
via "National Vulnerability Database".
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25172 ‼
📖 Read
via "National Vulnerability Database".
A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-8577 ‼
📖 Read
via "National Vulnerability Database".
SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5794 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
❌ Feds Seize $1B in Bitcoin from Silk Road ❌
📖 Read
via "Threat Post".
The illegal marketplace was hacked prior to it's takedown -- the IRS has now tracked down those stolen funds, it said.📖 Read
via "Threat Post".
Threat Post
Feds Seize $1B in Bitcoin from Silk Road
The illegal marketplace was hacked prior to it's takedown — the IRS has now tracked down those stolen funds, it said.
❌ Campari Site Suffers Ransomware Hangover ❌
📖 Read
via "Threat Post".
The Ragnar Locker operators released a stolen contract between Wild Turkey and actor Matthew McConaughey, as proof of compromise.📖 Read
via "Threat Post".
Threat Post
Campari Site Suffers Ransomware Hangover
The Ragnar Locker operators released a stolen contract between Wild Turkey and actor Matthew McConaughey, as proof of compromise.
🕴 Apple Patches 24 Vulnerabilities Across Product Lines 🕴
📖 Read
via "Dark Reading".
The vulnerabilities include three for which exploits have already been seen in the wild.📖 Read
via "Dark Reading".
Dark Reading
Apple Patches 24 Vulnerabilities Across Product Lines
The vulnerabilities include three for which exploits have already been seen in the wild.
🕴 New Gitpaste-12 Botnet Exploits 12 Known Vulnerabilities 🕴
📖 Read
via "Dark Reading".
Researchers discover a new worm and botnet dubbed Gitpaste-12 for its ability to spread via GitHub and Pastebin.📖 Read
via "Dark Reading".
Dark Reading
New Gitpaste-12 Botnet Exploits 12 Known Vulnerabilities
Researchers discover a new worm and botnet dubbed Gitpaste-12 for its ability to spread via GitHub and Pastebin.
‼ CVE-2020-26084 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3551 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3590 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27123 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3595 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root group on the underlying operating system. The vulnerability is due to incorrect permissions being set when the affected command is executed. An attacker could exploit this vulnerability by executing the affected command on an affected system. A successful exploit could allow the attacker to gain root privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3574 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the TCP packet processing functionality of Cisco IP Phones could allow an unauthenticated, remote attacker to cause the phone to stop responding to incoming calls, drop connected calls, or unexpectedly reload. The vulnerability is due to insufficient TCP ingress packet rate limiting. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the targeted device. A successful exploit could allow the attacker to impact operations of the phone or cause the phone to reload, leading to a denial of service (DoS) condition.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3588 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in virtualization channel messaging in Cisco Webex Meetings Desktop App for Windows could allow a local attacker to execute arbitrary code on a targeted system. This vulnerability occurs when this app is deployed in a virtual desktop environment and using virtual environment optimization. This vulnerability is due to improper validation of messages processed by the Cisco Webex Meetings Desktop App. A local attacker with limited privileges could exploit this vulnerability by sending malicious messages to the affected software by using the virtualization channel interface. A successful exploit could allow the attacker to modify the underlying operating system configuration, which could allow the attacker to execute arbitrary code with the privileges of a targeted user. Note: This vulnerability can be exploited only when Cisco Webex Meetings Desktop App is in a virtual desktop environment on a hosted virtual desktop (HVD) and is configured to use the Cisco Webex Meetings virtual desktop plug-in for thin clients.📖 Read
via "National Vulnerability Database".