‼ CVE-2020-26554 ‼
📖 Read
via "National Vulnerability Database".
REDDOXX MailDepot 2033 (aka 2.3.3022) allows XSS via an incoming HTML e-mail message.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28091 ‼
📖 Read
via "National Vulnerability Database".
cxuucms v3 has a SQL injection vulnerability, which can lead to the leakage of all database data via the keywords parameter via search.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26072 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the SOAP API of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to access and modify information on devices that belong to a different domain. The vulnerability is due to insufficient authorization in the SOAP API. An attacker could exploit this vulnerability by sending SOAP API requests to affected devices for devices that are outside their authorized domain. A successful exploit could allow the attacker to access and modify information on devices that belong to a different domain.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26077 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the access control functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to view lists of users from different domains that are configured on an affected system. The vulnerability is due to improper access control. An attacker could exploit this vulnerability by sending an API request that alters the domain for a requested user list on an affected system. A successful exploit could allow the attacker to view lists of users from different domains on the affected system.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26933 ‼
📖 Read
via "National Vulnerability Database".
Trusted Computing Group (TCG) Trusted Platform Module Library Family 2.0 Library Specification Revisions 1.38 through 1.59 has Incorrect Access Control during a non-orderly TPM shut-down that uses USE_DA_USED. Improper initialization of this shut-down may result in susceptibility to a dictionary attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27126 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in an API of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to improper validation of user-supplied input to an application programmatic interface (API) within Cisco Webex Meetings. An attacker could exploit this vulnerability by convincing a targeted user to follow a link designed to submit malicious input to the API used by Cisco Webex Meetings. A successful exploit could allow the attacker to conduct cross-site scripting attacks and potentially gain access to sensitive browser-based information from the system of a targeted user.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28367 ‼
📖 Read
via "National Vulnerability Database".
Go before 1.14.12 and 1.15.x before 1.15.5 allows Argument Injection.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3367 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.📖 Read
via "National Vulnerability Database".
🦿 Webex security flaw allows people to secretly sneak into meetings as "ghosts" 🦿
📖 Read
via "Tech Republic".
Now patched by Cisco, three flaws in Webex would have given intruders full access to a meeting without being seen, says IBM.📖 Read
via "Tech Republic".
TechRepublic
Webex security flaw allows people to secretly sneak into meetings as "ghosts"
Now patched by Cisco, three flaws in Webex would have given intruders full access to a meeting without being seen, says IBM.
❌ LAPD Bans Facial Recognition, Citing Privacy Concerns ❌
📖 Read
via "Threat Post".
The department has said no thanks to the Clearview AI platform, after an expose showing that officers had used it 475 times during a trial period alone.📖 Read
via "Threat Post".
Threat Post
LAPD Bans Facial Recognition, Citing Privacy Concerns
The department has said no thanks to the Clearview AI platform, after an expose showing that officers had used it 475 times during a trial period alone.
🔏 Congress Passes IoT Bill, Last Hurdle to Becoming Law 🔏
📖 Read
via "Digital Guardian".
The bill, which would establish cybersecurity guidelines for IoT devices purchased by the U.S. government, is on track to become law.📖 Read
via "Digital Guardian".
Digital Guardian
Congress Passes IoT Bill, Last Hurdle to Becoming Law
The bill, which would establish cybersecurity guidelines for IoT devices purchased by the U.S. government, is on track to become law.
🦿 GoPhish: How to run a phishing attack simulation 🦿
📖 Read
via "Tech Republic".
Jack Wallen shows you how to run a phishing simulation on your employees to test their understanding of how this type of attack works.📖 Read
via "Tech Republic".
TechRepublic
How to run a phishing attack simulation with GoPhish
Jack Wallen shows you how to run a phishing simulation on your employees to test their understanding of how this type of attack works.
‼ CVE-2020-28580 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28579 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28574 ‼
📖 Read
via "National Vulnerability Database".
A unauthenticated path traversal arbitrary remote file deletion vulnerability in Trend Micro Worry-Free Business Security 10 SP1 could allow an unauthenticated attacker to exploit the vulnerability and modify or delete arbitrary files on the product's management console.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3586 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco DNA Spaces Connector could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underling operating system with privileges of the web-based management application, which is running as a restricted user. This could result in changes being made to pages served by the web-based management application impacting the integrity or availability of the web-based management application.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27695 ‼
📖 Read
via "National Vulnerability Database".
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27696 ‼
📖 Read
via "National Vulnerability Database".
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3441 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to view sensitive information from the meeting room lobby. This vulnerability is due to insufficient protection of sensitive participant information. An attacker could exploit this vulnerability by browsing the Webex roster. A successful exploit could allow the attacker to gather information about other Webex participants, such as email address and IP address, while waiting in the lobby.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3482 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software could allow an unauthenticated, remote attacker to bypass security controls and send network traffic to restricted destinations. The vulnerability is due to improper validation of specific connection information by the TURN server within the affected software. An attacker could exploit this issue by sending specially crafted network traffic to the affected software. A successful exploit could allow the attacker to send traffic through the affected software to destinations beyond the application, possibly allowing the attacker to gain unauthorized network access.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3419 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit requires the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. The attacker could then exploit this vulnerability to join meetings, without appearing in the participant list, while having full access to audio, video, chat, and screen sharing capabilities.📖 Read
via "National Vulnerability Database".