‼ CVE-2020-25839 ‼
📖 Read
via "National Vulnerability Database".
NetIQ Identity Manager 4.8 prior to version 4.8 SP2 HF1 are affected by an injection vulnerability. This vulnerability is fixed in NetIQ IdM 4.8 SP2 HF1.📖 Read
via "National Vulnerability Database".
❌ New Grelos Skimmer Variants Siphon Credit Card Data ❌
📖 Read
via "Threat Post".
Domains related to the new variant of the Grelos web skimmer have compromised dozens of websites so far.📖 Read
via "Threat Post".
Threat Post
New Grelos Skimmer Variants Siphon Credit Card Data
Domains related to the new variant of the Grelos web skimmer have compromised dozens of websites so far.
‼ CVE-2020-28974 ‼
📖 Read
via "National Vulnerability Database".
A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26236 ‼
📖 Read
via "National Vulnerability Database".
In ScratchVerifier before commit a603769, an attacker can hijack the verification process to log into someone else's account on any site that uses ScratchVerifier for logins. A possible exploitation would follow these steps: 1. User starts login process. 2. Attacker attempts login for user, and is given the same verification code. 3. User comments code as part of their normal login. 4. Before user can, attacker completes the login process now that the code is commented. 5. User gets a failed login and attacker now has control of the account. Since commit a603769 starting a login twice will generate different verification codes, causing both user and attacker login to fail. For clients that rely on a clone of ScratchVerifier not hosted by the developers, their users may attempt to finish the login process as soon as possible after commenting the code. There is no reliable way for the attacker to know before the user can finish the process that the user has commented the code, so this vulnerability only really affects those who comment the code and then take several seconds before finishing the login.📖 Read
via "National Vulnerability Database".
🕴 How Industrial IoT Security Can Catch Up With OT/IT Convergence 🕴
📖 Read
via "Dark Reading".
Ransomware can easily make a connection between IT and OT already. How can blue teams do the same?📖 Read
via "Dark Reading".
Dark Reading
How Industrial IoT Security Can Catch Up With OT/IT Convergence
Ransomware can easily make a connection between IT and OT already. How can blue teams do the same?
🕴 Facebook Messenger Flaw Enabled Spying on Android Callees 🕴
📖 Read
via "Dark Reading".
A critical flaw in Facebook Messenger on Android would let someone start an audio or video call without the victim's knowledge.📖 Read
via "Dark Reading".
Dark Reading
Facebook Messenger Flaw Enabled Spying on Android Callees
A critical flaw in Facebook Messenger on Android would let someone start an audio or video call without the victim's knowledge.
🕴 Security Pros Push for More Pervasive Threat Modeling 🕴
📖 Read
via "Dark Reading".
With the release of the "Threat Modeling Manifesto," a group of 16 security professionals hope to prompt more companies to consider the threats to software.📖 Read
via "Dark Reading".
Dark Reading
Security Pros Push for More Pervasive Threat Modeling
With the release of the Threat Modeling Manifesto, a group of 16 security professionals hope to prompt more companies to consider the threats to software.
🦿 Study finds 31% of third-party vendors could cause significant damage to organizations if breached 🦿
📖 Read
via "Tech Republic".
Risk professionals relying on questionnaire-based assessments could be in for a rude awakening, according to Mastercard's RiskRecon and the Cyentia Institute.📖 Read
via "Tech Republic".
TechRepublic
Study finds 31% of third-party vendors could cause significant damage to organizations if breached
Risk professionals relying on questionnaire-based assessments could be in for a rude awakening, according to Mastercard's RiskRecon and the Cyentia Institute.
❌ VMware Fixes Critical Flaw in ESXi Hypervisor ❌
📖 Read
via "Threat Post".
The critical and important-severity flaws were found by a team at the China-based Tiunfu Cup hacking challenge.📖 Read
via "Threat Post".
Threat Post
VMware Fixes Critical Flaw in ESXi Hypervisor
The critical and important-severity flaws were found by a team at the China-based Tiunfu Cup hacking challenge.
❌ Good Heavens! 10M Impacted in Pray.com Data Exposure ❌
📖 Read
via "Threat Post".
The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists.📖 Read
via "Threat Post".
Threat Post
Good Heavens! 10M Impacted in Pray.com Data Exposure
The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists.
❌ Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns ❌
📖 Read
via "Threat Post".
Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns.📖 Read
via "Threat Post".
Threat Post
Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns
Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns.
‼ CVE-2020-4004 ‼
📖 Read
via "National Vulnerability Database".
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28845 ‼
📖 Read
via "National Vulnerability Database".
A CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-20739 ‼
📖 Read
via "National Vulnerability Database".
im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-19878 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get access to historical data from AprolSqlServer by bypassing authentication, a different vulnerability than CVE-2019-16358.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28921 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Devid Espenschied PC Analyser through 4.10. The PCADRVX64.SYS kernel driver exposes IOCTL functionality that allows low-privilege users to read and write to arbitrary Model Specific Registers (MSRs). This could lead to arbitrary Ring-0 code execution and escalation of privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-19873 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get information from the AprolSqlServer DBMS by bypassing authentication, a different vulnerability than CVE-2019-16356 and CVE-2019-9983.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-19874 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. Some web scripts in the web interface allowed injection and execution of arbitrary unintended commands on the web server, a different vulnerability than CVE-2019-16364.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27746 ‼
📖 Read
via "National Vulnerability Database".
Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.📖 Read
via "National Vulnerability Database".
‼ CVE-2017-15685 ‼
📖 Read
via "National Vulnerability Database".
Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27745 ‼
📖 Read
via "National Vulnerability Database".
Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.📖 Read
via "National Vulnerability Database".