‼ CVE-2019-19876 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An EnMon PHP script was vulnerable to SQL injection, a different vulnerability than CVE-2019-10006.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-10772 ‼
📖 Read
via "National Vulnerability Database".
An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020:2414. Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fix for CVE-2020-12662, and it does not affect upstream versions of Unbound.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25708 ‼
📖 Read
via "National Vulnerability Database".
A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27218 ‼
📖 Read
via "National Vulnerability Database".
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29374 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29369 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29371 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-20934 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29370 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29372 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29373 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29368 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.📖 Read
via "National Vulnerability Database".
❌ 2021 Healthcare Cybersecurity Priorities: Experts Weigh In ❌
📖 Read
via "Threat Post".
Hackers are putting a bullseye on healthcare. Experts explore why hospitals are being singled out and what any company can do to better protect themselves.📖 Read
via "Threat Post".
Threat Post
2021 Healthcare Cybersecurity Priorities: Experts Weigh In
Hackers are putting a bullseye on healthcare. Experts explore why hospitals are being singled out and what any company can do to better protect themselves.
🦿 7 big data goals for 2021: AI, DevOps, hybrid cloud, and more 🦿
📖 Read
via "Tech Republic".
As you plan your big data strategy for next year, keep these seven goals in mind.📖 Read
via "Tech Republic".
TechRepublic
7 big data goals for 2021: AI, DevOps, hybrid cloud, and more | TechRepublic
As you plan your big data strategy for next year, keep these seven goals in mind.
🛠 nfstream 6.2.5 🛠
📖 Read
via "Packet Storm Security".
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.📖 Read
via "Packet Storm Security".
Packetstormsecurity
nfstream 6.2.5 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
‼ CVE-2020-29376 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. There is an !j@l#y$z%x6x7q8c9z) password for the admin account to authenticate to the TELNET service.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29381 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29380 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-the-middle attack on the management of the appliance.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29383 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. A hardcoded RSA private key (specific to V1600D4L and V1600D-MINI) is contained in the firmware images.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29382 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29375 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. An low-privileged (non-admin) attacker can use a hardcoded password (4ef9cea10b2362f15ba4558b1d5c081f) to create an admin user.📖 Read
via "National Vulnerability Database".