βΌ CVE-2020-29065 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2020. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2020-13886 βΌ
π Read
via "National Vulnerability Database".
Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27207 βΌ
π Read
via "National Vulnerability Database".
Zetetic SQLCipher 4.x before 4.4.1 has a use-after-free, related to sqlcipher_codec_pragma and sqlite3Strlen30 in sqlite3.c. A remote denial of service attack can be performed. For example, a SQL injection can be used to execute the crafted SQL command sequence. After that, some unexpected RAM data is read.π Read
via "National Vulnerability Database".
βΌ CVE-2020-29042 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in BigBlueButton through 2.2.29. A brute-force attack may occur because an unlimited number of codes can be entered for a meeting that is protected by an access code.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25738 βΌ
π Read
via "National Vulnerability Database".
CyberArk Endpoint Privilege Manager (EPM) 11.1.0.173 allows attackers to bypass a Credential Theft protection mechanism by injecting a DLL into a process that normally has credential access, such as a Chrome process that reads credentials from a SQLite database.π Read
via "National Vulnerability Database".
π΄ Failing Toward Zero: Why Your Security Needs to Fail to Get Better π΄
π Read
via "Dark Reading".
Each security incident should lead to a successive reduction in future incidences of the same type. Organizations that fail toward zero embrace failure and learn from their mistakes.π Read
via "Dark Reading".
Dark Reading
Failing Toward Zero: Why Your Security Needs to Fail to Get Better
Each security incident should lead to a successive reduction in future incidences of the same type. Organizations that fail toward zero embrace failure and learn from their mistakes.
β ThreatList: Cyber Monday Looms β But Shoppers Oblivious to Top Retail Threats β
π Read
via "Threat Post".
Online shoppers are blissfully unaware of credit card skimming threats and malicious shopping apps as they head into this year's Black Friday and Cyber Monday holiday shopping events.π Read
via "Threat Post".
Threat Post
ThreatList: Cyber Monday Looms β But Shoppers Oblivious to Top Retail Threats
Online shoppers are blissfully unaware of credit card skimming threats and malicious shopping apps as they head into this year's Black Friday and Cyber Monday holiday shopping events.
β Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes β
π Read
via "Threat Post".
While 2021 will present evolving threats and new challenges, it will also offer new tools and technologies that will we hope shift the balance towards the defense.π Read
via "Threat Post".
Threat Post
Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes
Gurucul CEO Saryu Nayyar discusses 2021's evolving threats and new challenges β and new tools and technologies that will we hope shift the balance towards the defense.
π΄ 5 Signs Someone Might be Taking Advantage of Your Security Goodness π΄
π Read
via "Dark Reading".
Not everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.π Read
via "Dark Reading".
Dark Reading
5 Signs Someone Might be Taking Advantage of Your Security Goodness
Not everyone in a security department is acting in good faith, and they'll do what they can to bypass those who do. Here's how to spot them.
β TurkeyBombing Puts New Twist on Zoom Abuse β
π Read
via "Threat Post".
Threat actors already stole nearly 4,000 credentials before the holiday was even over, according to report.π Read
via "Threat Post".
Threat Post
TurkeyBombing Puts New Twist on Zoom Abuse
Threat actors already stole nearly 4,000 credentials before the holiday was even over, according to report.
π΄ Test π΄
π Read
via "Dark Reading".
A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.π Read
via "Dark Reading".
Dark Reading
Test
A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.
βΌ CVE-2020-28921 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Devid Espenschied PC Analyser through 4.10. The PCADRVX64.SYS kernel driver exposes IOCTL functionality that allows low-privilege users to read and write to arbitrary Model Specific Registers (MSRs). This could lead to arbitrary Ring-0 code execution and escalation of privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2019-19873 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get information from the AprolSqlServer DBMS by bypassing authentication, a different vulnerability than CVE-2019-16356 and CVE-2019-9983.π Read
via "National Vulnerability Database".
βΌ CVE-2019-19874 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. Some web scripts in the web interface allowed injection and execution of arbitrary unintended commands on the web server, a different vulnerability than CVE-2019-16364.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27746 βΌ
π Read
via "National Vulnerability Database".
Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.π Read
via "National Vulnerability Database".
βΌ CVE-2017-15685 βΌ
π Read
via "National Vulnerability Database".
Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27745 βΌ
π Read
via "National Vulnerability Database".
Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.π Read
via "National Vulnerability Database".
βΌ CVE-2017-15684 βΌ
π Read
via "National Vulnerability Database".
Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system.π Read
via "National Vulnerability Database".
βΌ CVE-2020-7780 βΌ
π Read
via "National Vulnerability Database".
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie.π Read
via "National Vulnerability Database".
βΌ CVE-2017-15680 βΌ
π Read
via "National Vulnerability Database".
In Crafter CMS Crafter Studio 3.0.1 an IDOR vulnerability exists which allows unauthenticated attackers to view and modify administrative data.π Read
via "National Vulnerability Database".
βΌ CVE-2017-15686 βΌ
π Read
via "National Vulnerability Database".
Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal usersΓ’β¬β’ cookies.π Read
via "National Vulnerability Database".