‼ CVE-2020-3470 ‼
📖 Read
via "National Vulnerability Database".
Multiple vulnerabilities in the API subsystem of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges. The vulnerabilities are due to improper boundary checks for certain user-supplied input. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the API subsystem of an affected system. When this request is processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying operating system (OS).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28578 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28572 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28581 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27697 ‼
📖 Read
via "National Vulnerability Database".
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-3471 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to maintain bidirectional audio despite being expelled from an active Webex session. The vulnerability is due to a synchronization issue between meeting and media services on a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit could allow the attacker to maintain the audio connection of a Webex session despite being expelled.📖 Read
via "National Vulnerability Database".
❌ Widespread Scans Underway for RCE Bugs in WordPress Websites ❌
📖 Read
via "Threat Post".
WordPress websites using buggy Epsilon Framework themes are being hunted by hackers.📖 Read
via "Threat Post".
Threat Post
Widespread Scans Underway for RCE Bugs in WordPress Websites
WordPress websites using buggy Epsilon Framework themes are being hunted by hackers.
🕴 Online Shopping Surge Puts Focus on Consumer Security Habits 🕴
📖 Read
via "Dark Reading".
Companies will have to tread a fine line between delivering security and a frictionless shopping experience, security firms say.📖 Read
via "Dark Reading".
Dark Reading
Online Shopping Surge Puts Focus on Consumer Security Habits
Companies will have to tread a fine line between delivering security and a frictionless shopping experience, security firms say.
🕴 Cisco Webex Vulns Let 'Ghost' Attendees Spy on Meetings 🕴
📖 Read
via "Dark Reading".
Three vulnerabilities, patched today, could let an attacker snoop on meetings undetected after the host removes them.📖 Read
via "Dark Reading".
Dark Reading
Cisco Webex Vulns Let 'Ghost' Attendees Spy on Meetings
Three vulnerabilities, patched today, could let an attacker snoop on meetings undetected after the host removes them.
‼ CVE-2020-26215 ‼
📖 Read
via "National Vulnerability Database".
Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-22723 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-15301 ‼
📖 Read
via "National Vulnerability Database".
SuiteCRM through 7.11.13 allows CSV Injection via registration fields in the Accounts, Contacts, Opportunities, and Leads modules. These fields are mishandled during a Download Import File Template operation.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26226 ‼
📖 Read
via "National Vulnerability Database".
In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-14208 ‼
📖 Read
via "National Vulnerability Database".
SuiteCRM 7.11.13 is affected by stored Cross-Site Scripting (XSS) in the Documents preview functionality. This vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-15300 ‼
📖 Read
via "National Vulnerability Database".
SuiteCRM through 7.11.13 has an Open Redirect in the Documents module via a crafted SVG document.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13799 ‼
📖 Read
via "National Vulnerability Database".
Western Digital iNAND devices through 2020-06-03 allow Authentication Bypass via a capture-replay attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25454 ‼
📖 Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) vulnerability in grocy 2.7.1 via the add recipe module, which gets executed when deleting the recipe.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5947 ‼
📖 Read
via "National Vulnerability Database".
In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers. Only these platforms are affected: BIG-IP 2000 series (C112), BIG-IP 4000 series (C113), BIG-IP i2000 series (C117), BIG-IP i4000 series (C115), BIG-IP Virtual Edition (VE).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-8279 ‼
📖 Read
via "National Vulnerability Database".
Missing validation of server certificates for out-going connections in Nextcloud Social < 0.4.0 allowed a man-in-the-middle attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-15710 ‼
📖 Read
via "National Vulnerability Database".
Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-8278 ‼
📖 Read
via "National Vulnerability Database".
Improper access control in Nextcloud Social app version 0.3.1 allowed to read posts of any user.📖 Read
via "National Vulnerability Database".