β Food-Supply Giant Americold Admits Cyberattack β
π Read
via "Threat Post".
A reported ransomware attack took down operations at the company, which in talks for COVID-19 vaccine-distribution contracts.π Read
via "Threat Post".
Threat Post
Food-Supply Giant Americold Admits Cyberattack
A reported ransomware attack took down operations at the company, which in talks for COVID-19 vaccine-distribution contracts.
βΌ CVE-2020-11830 βΌ
π Read
via "National Vulnerability Database".
QualityProtect has a vulnerability to execute arbitrary system commands, affected product is com.oppo.qualityprotect V2.0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-11831 βΌ
π Read
via "National Vulnerability Database".
OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28054 βΌ
π Read
via "National Vulnerability Database".
JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4718 βΌ
π Read
via "National Vulnerability Database".
IBM Jazz Reporting Service 6.0.6, 6.0.6.1, 7.0, and 7.0.1 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187731.π Read
via "National Vulnerability Database".
βΌ CVE-2020-11829 βΌ
π Read
via "National Vulnerability Database".
Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4701 βΌ
π Read
via "National Vulnerability Database".
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2020-9049 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in specified versions of American Dynamics victor Web Client and Software House CΓ’β¬Β’CURE Web Client could allow an unauthenticated attacker on the network to create and sign their own JSON Web Token and use it to execute an HTTP API Method without the need for valid authentication/authorization. Under certain circumstances, this could be used by an attacker to impact system availability by conducting a Denial of Service attack.π Read
via "National Vulnerability Database".
π¦Ώ Linux servers: How to encrypt files with gocryptfs π¦Ώ
π Read
via "Tech Republic".
Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.π Read
via "Tech Republic".
TechRepublic
Linux servers: How to encrypt files with gocryptfs | TechRepublic
Looking for an easy to use encryption tool to protect data on your Linux servers? Jack Wallen shows you how to install and use gocryptfs to serve that very purpose.
π American Fuzzy Lop plus plus 2.68c π
π Read
via "Packet Storm Security".
Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.π Read
via "Packet Storm Security".
Packetstormsecurity
American Fuzzy Lop plus plus 2.68c β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π erfs 1.4 π
π Read
via "Packet Storm Security".
erfs is an easy-to-use, easy-to-setup, hassle-free secure file system with the encrypted data being stored on a remote cloud server without having to trust the server. The client is a bash-script. The cloud server is provided by THC for free (as in free beer!). There is no limit per user, no limit of the number of file systems and no limit of how many locations can access the same file system simultaneously. It supports collaboration and the same filesystem can be accessed from different computers at the same time. The data is securely and seamlessly synchronized. The server has no knowledge of the content. A rogue server operator can not access the data. All key material is created on the user's computer and never stored or transferred to the server.π Read
via "Packet Storm Security".
Packetstormsecurity
erfs 1.4 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Global Socket 1.4.22 π
π Read
via "Packet Storm Security".
Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.π Read
via "Packet Storm Security".
Packetstormsecurity
Global Socket 1.4.22 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β Code42 Incydr Series: Protect IP with Code42 Incydr β
π Read
via "Threat Post".
The Code42 Incydr data risk detection and response solution focuses on giving security teams simplicity, signal and speed.π Read
via "Threat Post".
Threat Post
Code42 Incydr Series: Protect IP with Code42 Incydr
The Code42 Incydr data risk detection and response solution focuses on giving security teams simplicity, signal and speed.
π΄ COVID-19: Latest Security News & Commentary π΄
π Read
via "Dark Reading".
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.π Read
via "Dark Reading".
Dark Reading
COVID-19: Latest Security News & Commentary
Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.
π΄ The Yellow Brick Road to Risk Management π΄
π Read
via "Dark Reading".
Beginning the journey to risk management can be daunting, but protecting your business is worth every step.π Read
via "Dark Reading".
Dark Reading
The Yellow Brick Road to Risk Management
Beginning the journey to risk management can be daunting, but protecting your business is worth every step.
βΌ CVE-2020-25702 βΌ
π Read
via "National Vulnerability Database".
In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28942 βΌ
π Read
via "National Vulnerability Database".
An issue exists in PrimeKey EJBCA before 7.4.3 when enrolling with EST while proxied through an RA over the Peers protocol. As a part of EJBCA's domain security model, the peer connector allows the restriction of client certificates (for the RA, not the end user) to a limited set of allowed CAs, thus restricting the accessibility of that RA to the rights it has within a specific role. While this works for other protocols such as CMP, it was found that the EJBCA enrollment over an EST implementation bypasses this check, allowing enrollment with a valid client certificate through any functioning and authenticated RA connected to the CA. NOTE: an attacker must already have a trusted client certificate and authorization to enroll against the targeted CA.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25700 βΌ
π Read
via "National Vulnerability Database".
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25699 βΌ
π Read
via "National Vulnerability Database".
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25698 βΌ
π Read
via "National Vulnerability Database".
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28947 βΌ
π Read
via "National Vulnerability Database".
In MISP 2.4.134, XSS exists in the template element index view because the id parameter is mishandled.π Read
via "National Vulnerability Database".