βΌ CVE-2019-14586 βΌ
π Read
via "National Vulnerability Database".
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14563 βΌ
π Read
via "National Vulnerability Database".
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4783 βΌ
π Read
via "National Vulnerability Database".
IBM Spectrum Protect Plus 10.1.0 through 10.1.6 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 189214.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12352 βΌ
π Read
via "National Vulnerability Database".
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-12351 βΌ
π Read
via "National Vulnerability Database".
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-6939 βΌ
π Read
via "National Vulnerability Database".
Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.π Read
via "National Vulnerability Database".
βΌ CVE-2019-14575 βΌ
π Read
via "National Vulnerability Database".
Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.π Read
via "National Vulnerability Database".
βΌ CVE-2020-7928 βΌ
π Read
via "National Vulnerability Database".
A user authorized to perform database queries may trigger a read overrun and access arbitrary memory by issuing specially crafted queries. This issue affects: MongoDB Inc. MongoDB Server v4.5 versions prior to 4.5.1; v4.4 versions prior to 4.4.1; v4.2 versions prior to 4.2.9; v4.0 versions prior to 4.0.20; v3.6 versions prior to 3.6.20.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4854 βΌ
π Read
via "National Vulnerability Database".
IBM Spectrum Protect Plus 10.1.0 thorugh 10.1.6 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 190454.π Read
via "National Vulnerability Database".
βΌ CVE-2020-4771 βΌ
π Read
via "National Vulnerability Database".
IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.10.and 7.1.0.000 through 7.1.11 could allow a remote attacker to obtain sensitive information, caused by improper authentication of a websocket endpoint. By using known tools to subscribe to the websocket event stream, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 188993.π Read
via "National Vulnerability Database".
βΌ CVE-2018-20803 βΌ
π Read
via "National Vulnerability Database".
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4 versions prior to 3.4.19.π Read
via "National Vulnerability Database".
π΄ Chinese APT Group Returns to Target Catholic Church & Diplomatic Groups π΄
π Read
via "Dark Reading".
APT group TA416 reemerges with new changes to its documented tool sets so it can continue launching espionage campaigns.π Read
via "Dark Reading".
Dark Reading
Chinese APT Group Returns to Target Catholic Church & Diplomatic Groups
APT group TA416 reemerges with new changes to its documented tool sets so it can continue launching espionage campaigns.
β TA416 APT Rebounds With New PlugX Malware Variant β
π Read
via "Threat Post".
The TA416 APT has returned in spear phishing attacks against a range of victims - from the Vatican to diplomats in Africa - with a new Golang version of its PlugX malware loader.π Read
via "Threat Post".
Threat Post
TA416 APT Rebounds With New PlugX Malware Variant
The TA416 APT has returned in spear phishing attacks against a range of victims β from the Vatican to diplomats in Africa β with a new Golang version of its PlugX malware loader.
π΄ Manchester United Suffers Cyberattack π΄
π Read
via "Dark Reading".
Premier League soccer club says the attack didn't affect its website and app, and it doesn't appears to have exposed any fan or customer data either.π Read
via "Dark Reading".
Dark Reading
Manchester United Suffers Cyberattack
Premier League soccer club says the attack didn't affect its website and app, and it doesn't appears to have exposed any fan or customer data either.
β GoDaddy Employees Tricked into Compromising Cryptocurrency Sites β
π Read
via "Threat Post".
βVishingβ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid.π Read
via "Threat Post".
Threat Post
GoDaddy Employees Tricked into Compromising Cryptocurrency Sites
βVishingβ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid.
βΌ CVE-2020-28927 βΌ
π Read
via "National Vulnerability Database".
There is a Stored XSS in Magicpin v2.1 in the User Registration section. Each time an admin visits the manage user section from the admin panel, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15248 βΌ
π Read
via "National Vulnerability Database".
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.470, backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. Issue has been patched in Build 470 (v1.0.470) & v1.1.1.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28864 βΌ
π Read
via "National Vulnerability Database".
Buffer overflow in WinSCP 5.17.8 allows a malicious FTP server to cause a denial of service or possibly have other unspecified impact via a long file name.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15247 βΌ
π Read
via "National Vulnerability Database".
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.469, an authenticated backend user with the cms.manage_pages, cms.manage_layouts, or cms.manage_partials permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to cms.enableSafeMode being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having cms.enableSafeMode enabled, but would be a problem for anyone relying on cms.enableSafeMode to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. Issue has been patched in Build 469 (v1.0.469) and v1.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26239 βΌ
π Read
via "National Vulnerability Database".
Scratch Addons is a WebExtension that supports both Chrome and Firefox. Scratch Addons before version 1.3.2 is vulnerable to DOM-based XSS. If the victim visited a specific website, the More Links addon of the Scratch Addons extension used incorrect regular expression which caused the HTML-escaped values to be unescaped, leading to XSS. Scratch Addons version 1.3.2 fixes the bug. The extension will be automatically updated by the browser. More Links addon can be disabled via the option of the extension.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15249 βΌ
π Read
via "National Vulnerability Database".
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.469, backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain (i.e. /storage/app/media/evil.svg), but they would have to convince their target to visit that location directly in the target's browser as the backend does not display SVGs inline anywhere, SVGs are only displayed as image resources in the backend and are thus unable to be executed. Issue has been patched in Build 469 (v1.0.469) & v1.1.0.π Read
via "National Vulnerability Database".