‼ CVE-2020-29656 ‼
📖 Read
via "National Vulnerability Database".
An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."📖 Read
via "National Vulnerability Database".
‼ CVE-2020-7337 ‼
📖 Read
via "National Vulnerability Database".
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29655 ‼
📖 Read
via "National Vulnerability Database".
An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29657 ‼
📖 Read
via "National Vulnerability Database".
In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29651 ‼
📖 Read
via "National Vulnerability Database".
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.📖 Read
via "National Vulnerability Database".
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴
📖 Read
via "Dark Reading".
A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.📖 Read
via "Dark Reading".
Dark Reading
Global Cybercrime Losses Cross $1 Trillion Mark
A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴
📖 Read
via "Dark Reading".
Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.📖 Read
via "Dark Reading".
Dark Reading
Black Hat Europe: Dark Reading Video News Desk Coverage
Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌
📖 Read
via "Threat Post".
Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.📖 Read
via "Threat Post".
Threat Post
D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws
Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿
📖 Read
via "Tech Republic".
The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.📖 Read
via "Tech Republic".
TechRepublic
Security firm FireEye hit by state-sponsored cyberattack
The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴
📖 Read
via "Dark Reading".
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.📖 Read
via "Dark Reading".
Dark Reading
Navigating the Security Maze in a New Era of Cyberthreats
Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿
📖 Read
via "Tech Republic".
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.📖 Read
via "Tech Republic".
TechRepublic
Open-source developers say securing their code is a soul-withering waste of time
A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌
📖 Read
via "Threat Post".
Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.📖 Read
via "Threat Post".
Threat Post
COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware
Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.
🦿 How ID fraud has surged in the wake of COVID-19 🦿
📖 Read
via "Tech Republic".
Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.📖 Read
via "Tech Republic".
TechRepublic
How ID fraud has surged in the wake of COVID-19
Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.
‼ CVE-2020-23520 ‼
📖 Read
via "National Vulnerability Database".
imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.📖 Read
via "National Vulnerability Database".
🦿 Phishing emails: More than 25% of American workers fall for them 🦿
📖 Read
via "Tech Republic".
A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.📖 Read
via "Tech Republic".
TechRepublic
Phishing emails: More than 25% of American workers fall for them
A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.
🕴 The Holiday Shopping Season: A Prime Opportunity for Triangulation Fraud 🕴
📖 Read
via "Dark Reading".
As e-commerce sales increase, so does the risk of hard-to-detect online fraud.📖 Read
via "Dark Reading".
Dark Reading
The Holiday Shopping Season: A Prime Opportunity for Triangulation Fraud
As e-commerce sales increase, so does the risk of hard-to-detect online fraud.
‼ CVE-2020-26832 ‼
📖 Read
via "National Vulnerability Database".
SAP AS ABAP (SAP Landscape Transformation), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA (SAP Landscape Transformation), versions - 101, 102, 103, 104, 105, allows a high privileged user to execute a RFC function module to which access should be restricted, however due to missing authorization an attacker can get access to some sensitive internal information of vulnerable SAP system or to make vulnerable SAP systems completely unavailable.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17528 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26831 ‼
📖 Read
via "National Vulnerability Database".
SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request Forgery (SSRF) and denial-of-service (DoS).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26816 ‼
📖 Read
via "National Vulnerability Database".
SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17529 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.📖 Read
via "National Vulnerability Database".