‼ CVE-2020-35469 ‼
📖 Read
via "National Vulnerability Database".
The Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root user. Systems deployed using affected versions of the Terracotta Server OSS container may allow a remote attacker to achieve root access with a blank password.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35464 ‼
📖 Read
via "National Vulnerability Database".
Version 1.3.0 of the Weave Cloud Agent Docker image contains a blank password for the root user. Systems deployed using affected versions of the Weave Cloud Agent container may allow a remote attacker to achieve root access with a blank password.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35122 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the Keysight Database Connector plugin before 1.5.0 for Confluence. A malicious user could bypass the access controls for using a saved database connection profile to submit arbitrary SQL against a saved database connection.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28458 ‼
📖 Read
via "National Vulnerability Database".
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26258 ‼
📖 Read
via "National Vulnerability Database".
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5682 ‼
📖 Read
via "National Vulnerability Database".
Improper input validation in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to cause a denial of service via unspecified vectors.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26259 ‼
📖 Read
via "National Vulnerability Database".
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35476 ‼
📖 Read
via "National Vulnerability Database".
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26273 ‼
📖 Read
via "National Vulnerability Database".
osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqlite databases on disk. This _does_ allow arbitrary files to be created, but they will be sqlite databases. It does not appear to allow existing non-sqlite files to be overwritten. This has been patched in osquery 4.6.0. There are several mitigating factors and possible workarounds. In some deployments, the people with access to these interfaces may be considered administrators. In some deployments, configuration is managed by a central tool. This tool can filter for the `ATTACH` keyword. osquery can be run as non-root user. Because this also limits the desired access levels, this requires deployment specific testing and configuration.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-5683 ‼
📖 Read
via "National Vulnerability Database".
Directory traversal vulnerability in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to alter the data by uploading a specially crafted file.📖 Read
via "National Vulnerability Database".
🕴 Why Secure Email Gateways Rewrite Links (and Why They Shouldn't) 🕴
📖 Read
via "Dark Reading".
Redirecting a user to a trusted server buys a secure email gateway company some time while it decides whether a URL is malicious -- but there are avoidable drawbacks to this approach.📖 Read
via "Dark Reading".
Dark Reading
Why Secure Email Gateways Rewrite Links (and Why They Shouldn't)
Redirecting a user to a trusted server buys a secure email gateway company some time while it decides whether a URL is malicious -- but there are avoidable drawbacks to this approach.
🕴 SSO and MFA Are Only Half Your Identity Governance Strategy 🕴
📖 Read
via "Dark Reading".
We need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.📖 Read
via "Dark Reading".
Dark Reading
SSO and MFA Are Only Half Your Identity Governance Strategy
We need better ways to manage user identities for accessing applications, especially given the strain it places on overworked IT and security teams.
‼ CVE-2020-25617 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows Relative Path Traversal by an authenticated user of the N-Central Administration Console (NAC), leading to execution of OS commands as root.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29363 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29362 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25619 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network services on the 127.0.0.1 interface, even though this feature was only intended for user-to-agent communication.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-29361 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25618 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in SolarWinds N-Central 12.3.0.670. The sudo configuration has incorrect access control because the nable web user account is effectively able to run arbitrary OS commands as root (i.e., the use of root privileges is not limited to specific programs listed in the sudoers file).📖 Read
via "National Vulnerability Database".
🦿 Social engineering: How psychology and employees can be part of the solution 🦿
📖 Read
via "Tech Republic".
Social engineering is allowing cybercriminals the way in. Learn how to lock that door.📖 Read
via "Tech Republic".
TechRepublic
Social engineering: How psychology and employees can be part of the solution
Social engineering is allowing cybercriminals the way in. Learn how to lock that door.
❌ Sextortionist Campaign Targets iOS, Android Users with New Spyware ❌
📖 Read
via "Threat Post".
Goontact lures users of illicit sites through Telegram and other secure messaging apps and steals their information for future fraudulent use.📖 Read
via "Threat Post".
Threat Post
Sextortionist Campaign Targets iOS, Android Users with New Spyware
Goontact lures users of illicit sites through Telegram and other secure messaging apps and steals their information for future fraudulent use.
🕴 Patching Still Poses Problems for Industrial Controllers, Networking Devices 🕴
📖 Read
via "Dark Reading".
More than 90% of devices that run the popular VxWorks embedded operating system remain vulnerable to critical flaws disclosed more than a year ago.📖 Read
via "Dark Reading".
Dark Reading
Patching Still Poses Problems for Industrial Controllers, Networking Devices
More than 90% of devices that run the popular VxWorks embedded operating system remain vulnerable to critical flaws disclosed more than a year ago.