βΌ CVE-2020-8740 βΌ
π Read
via "National Vulnerability Database".
Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8760 βΌ
π Read
via "National Vulnerability Database".
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8752 βΌ
π Read
via "National Vulnerability Database".
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8764 βΌ
π Read
via "National Vulnerability Database".
Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12307 βΌ
π Read
via "National Vulnerability Database".
Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12304 βΌ
π Read
via "National Vulnerability Database".
Improper access control in Installer for Intel(R) DAL SDK before version 2.1 for Windows may allow an authenticated user to potentially enable escalation of privileges via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12319 βΌ
π Read
via "National Vulnerability Database".
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12321 βΌ
π Read
via "National Vulnerability Database".
Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28270 βΌ
π Read
via "National Vulnerability Database".
Overview:Prototype pollution vulnerability in Γ’β¬˜object-hierarchy-accessΓ’β¬β’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12308 βΌ
π Read
via "National Vulnerability Database".
Improper access control for the Intel(R) Computing Improvement Program before version 2.4.5982 may allow an unprivileged user to potentially enable information disclosure via network access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8757 βΌ
π Read
via "National Vulnerability Database".
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12312 βΌ
π Read
via "National Vulnerability Database".
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28269 βΌ
π Read
via "National Vulnerability Database".
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.π Read
via "National Vulnerability Database".
π¦Ώ How and when to change your Google password π¦Ώ
π Read
via "Tech Republic".
If you've ever been tempted to change your Google account password, but weren't sure how, don't let that confusion stop you. Jack Wallen walks you through the process.π Read
via "Tech Republic".
TechRepublic
How and when to change your Google password
If you've ever been tempted to change your Google account password, but weren't sure how, don't let that confusion stop you. Jack Wallen walks you through the process.
π΄ New 'CostaRicto' Hack-for-Hire Group Targets Global Businesses π΄
π Read
via "Dark Reading".
The group of APT mercenaries uses bespoke malware and strong operation security to target a range of organizations, located primarily in Southeast Asia.π Read
via "Dark Reading".
Dark Reading
New 'CostaRicto' Hack-for-Hire Group Targets Global Businesses
The group of APT mercenaries uses bespoke malware and strong operation security to target a range of organizations, located primarily in Southeast Asia.
π Despite Pandemic, Cybersecurity Skills Gap Shrinking π
π Read
via "Digital Guardian".
An industry nonprofit suggests that because of the pandemic, the cybersecurity talent gap is shrinking for the first time but that more than half of organizations still are at risk because of cybersecurity staff shortages.π Read
via "Digital Guardian".
Digital Guardian
Despite Pandemic, Cybersecurity Skills Gap Shrinking
An industry nonprofit suggests that because of the pandemic, the cybersecurity talent gap is shrinking for the first time but that more than half of organizations still are at risk because of cybersecurity staff shortages.
βΌ CVE-2020-12335 βΌ
π Read
via "National Vulnerability Database".
Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26805 βΌ
π Read
via "National Vulnerability Database".
In Sentrifugo 3.2, admin can edit employee's informations via this endpoint --> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, "employeeNumId" parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12332 βΌ
π Read
via "National Vulnerability Database".
Improper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12323 βΌ
π Read
via "National Vulnerability Database".
Improper input validation in the Intel(R) ADAS IE before version ADAS_IE_1.0.766 may allow a privileged user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-24525 βΌ
π Read
via "National Vulnerability Database".
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".