โผ CVE-2020-28641 โผ
๐ Read
via "National Vulnerability Database".
In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35658 โผ
๐ Read
via "National Vulnerability Database".
SpamTitan before 7.09 allows attackers to tamper with backups, because backups are not encrypted.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35656 โผ
๐ Read
via "National Vulnerability Database".
Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of admin.php?reqGadget=Components&reqAction=InstallGadget&comp=FileBrowser and admin.php?reqGadget=FileBrowser&reqAction=Files to upload a .php file. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35657 โผ
๐ Read
via "National Vulnerability Database".
Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of UploadTheme to upload a theme ZIP archive containing a .php file that is able to execute OS commands. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.๐ Read
via "National Vulnerability Database".
๐ด Enterprise IoT Security Is a Supply Chain Problem ๐ด
๐ Read
via "Dark Reading".
Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.๐ Read
via "Dark Reading".
Dark Reading
Enterprise IoT Security Is a Supply Chain Problem
Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.
โ Emotet Returns to Hit 100K Mailboxes Per Day โ
๐ Read
via "Threat Post".
Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.๐ Read
via "Threat Post".
Threat Post
Emotet Returns to Hit 100K Mailboxes Per Day
Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.
โ Hey Alexa, Who Am I Messaging? โ
๐ Read
via "Threat Post".
Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info.๐ Read
via "Threat Post".
Threat Post
Hey Alexa, Who Am I Messaging?
Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info.
โ Third-Party APIs: How to Prevent Enumeration Attacks โ
๐ Read
via "Threat Post".
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it.๐ Read
via "Threat Post".
Threat Post
Third-Party APIs: How to Prevent Enumeration Attacks
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it.
โผ CVE-2020-35584 โผ
๐ Read
via "National Vulnerability Database".
In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any information the user supplies, including Administrator passwords and screen keys.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35136 โผ
๐ Read
via "National Vulnerability Database".
Dolibarr 12.0.3 is vulnerable to authenticated Remote Code Execution. An attacker who has the access the admin dashboard can manipulate the backup function by inserting a payload into the filename for the zipfilename_template parameter to admin/tools/dolibarr_export.php.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-25153 โผ
๐ Read
via "National Vulnerability Database".
The built-in web service for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower does not require users to have strong passwords.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35585 โผ
๐ Read
via "National Vulnerability Database".
In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35587 โผ
๐ Read
via "National Vulnerability Database".
** DISPUTED ** In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-25192 โผ
๐ Read
via "National Vulnerability Database".
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows sensitive information to be displayed without proper authorization.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-9439 โผ
๐ Read
via "National Vulnerability Database".
Multiple cross-site scripting (XSS) vulnerabilities in Uncanny Owl Tin Canny LearnDash Reporting before 3.4.4 allows authenticated remote attackers to inject arbitrary web script or HTML via the search_key GET Parameter in TinCan_Content_List_Table.php, message GET Parameter in licensing.php, tc_filter_group parameter in reporting-admin-menu.php, tc_filter_user parameter in reporting-admin-menu.php, tc_filter_course parameter in reporting-admin-menu.php, tc_filter_lesson parameter in reporting-admin-menu.php, tc_filter_module parameter in reporting-admin-menu.php, tc_filter_action parameter in reporting-admin-menu.php, tc_filter_data_range parameter in reporting-admin-menu.php, or tc_filter_data_range_last parameter in reporting-admin-menu.php.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-6159 โผ
๐ Read
via "National Vulnerability Database".
URLs using รขโฌœjavascript:รขโฌ๏ฟฝ have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-25190 โผ
๐ Read
via "National Vulnerability Database".
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower stores and transmits the credentials of third-party services in cleartext.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-29550 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in URVE Build 24.03.2020. The password of an integration user account (used for the connection of the MS Office 365 Integration Service) is stored in cleartext in configuration files as well as in the database. The following files contain the password in cleartext: Profiles/urve/files/sql_db.backup, Server/data/pg_wal/000000010000000A000000DD, Server/data/base/16384/18617, and Server/data/base/17202/8708746. This causes the password to be displayed as cleartext in the HTML code as roomsreservationimport_password in /urve/roomsreservationimport/roomsreservationimport/update-HTML5.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-11720 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and possibly below. During the installation, it sets up administrative access by default with the account admin and password 0000. After the installation, users/admins are not prompted to change this password.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-11718 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and below. Its software-update packages are downloaded via cleartext HTTP.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-35586 โผ
๐ Read
via "National Vulnerability Database".
In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase letters).๐ Read
via "National Vulnerability Database".