‼ CVE-2020-25066 ‼
📖 Read
via "National Vulnerability Database".
A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-14270 ‼
📖 Read
via "National Vulnerability Database".
HCL Domino v9, v10, v11 is susceptible to an Information Disclosure vulnerability in XPages due to improper error handling of user input. An unauthenticated attacker could exploit this vulnerability to obtain information about the XPages software running on the Domino server.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27336 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24676 ‼
📖 Read
via "National Vulnerability Database".
In Symphony Plus Operations and Symphony Plus Historian, some services can be vulnerable to privilege escalation attacks. An unprivileged (but authenticated) user could execute arbitrary code and result in privilege escalation, depending on the user that the service runs as.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24673 ‼
📖 Read
via "National Vulnerability Database".
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24678 ‼
📖 Read
via "National Vulnerability Database".
An authenticated user might execute malicious code under the user context and take control of the system. S+ Operations or S+ Historian database is affected by multiple vulnerabilities such as the possibility to allow remote authenticated users to gain high privileges.📖 Read
via "National Vulnerability Database".
🕴 SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector 🕴
📖 Read
via "Dark Reading".
Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.📖 Read
via "Dark Reading".
Dark Reading
SolarWinds Campaign Focuses Attention on 'Golden SAML' Attack Vector
Adversaries that successfully execute attack can achieve persistent anytime, anywhere access to a victim network, security researchers say.
🦿 Don't let a data breach sink your business: Here's what you need to know 🦿
📖 Read
via "Tech Republic".
Experts offer insights about the legal and financial hits, as well as the devastating loss of reputation, your business might suffer if it is the victim of a data breach.📖 Read
via "Tech Republic".
TechRepublic
Don't let a data breach sink your business: Here's what you need to know
Experts offer insights about the legal and financial hits, as well as the devastating loss of reputation, your business might suffer if it is the victim of a data breach.
‼ CVE-2020-28641 ‼
📖 Read
via "National Vulnerability Database".
In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35658 ‼
📖 Read
via "National Vulnerability Database".
SpamTitan before 7.09 allows attackers to tamper with backups, because backups are not encrypted.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35656 ‼
📖 Read
via "National Vulnerability Database".
Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of admin.php?reqGadget=Components&reqAction=InstallGadget&comp=FileBrowser and admin.php?reqGadget=FileBrowser&reqAction=Files to upload a .php file. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35657 ‼
📖 Read
via "National Vulnerability Database".
Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of UploadTheme to upload a theme ZIP archive containing a .php file that is able to execute OS commands. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.📖 Read
via "National Vulnerability Database".
🕴 Enterprise IoT Security Is a Supply Chain Problem 🕴
📖 Read
via "Dark Reading".
Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.📖 Read
via "Dark Reading".
Dark Reading
Enterprise IoT Security Is a Supply Chain Problem
Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.
❌ Emotet Returns to Hit 100K Mailboxes Per Day ❌
📖 Read
via "Threat Post".
Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.📖 Read
via "Threat Post".
Threat Post
Emotet Returns to Hit 100K Mailboxes Per Day
Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.
❌ Hey Alexa, Who Am I Messaging? ❌
📖 Read
via "Threat Post".
Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info.📖 Read
via "Threat Post".
Threat Post
Hey Alexa, Who Am I Messaging?
Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info.
❌ Third-Party APIs: How to Prevent Enumeration Attacks ❌
📖 Read
via "Threat Post".
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it.📖 Read
via "Threat Post".
Threat Post
Third-Party APIs: How to Prevent Enumeration Attacks
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it.
‼ CVE-2020-35584 ‼
📖 Read
via "National Vulnerability Database".
In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any information the user supplies, including Administrator passwords and screen keys.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35136 ‼
📖 Read
via "National Vulnerability Database".
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25153 ‼
📖 Read
via "National Vulnerability Database".
The built-in web service for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower does not require users to have strong passwords.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35585 ‼
📖 Read
via "National Vulnerability Database".
In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35587 ‼
📖 Read
via "National Vulnerability Database".
** DISPUTED ** In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique.📖 Read
via "National Vulnerability Database".