βΌ CVE-2020-14312 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.π Read
via "National Vulnerability Database".
βΌ CVE-2020-11836 βΌ
π Read
via "National Vulnerability Database".
OPPO Android Phone with MTK chipset and Android 8.1/9/10/11 versions have an information leak vulnerability. The Γ’β¬œadb shell getprop ro.vendor.aee.enforcingΓ’β¬οΏ½ or Γ’β¬œadb shell getprop ro.vendor.aee.enforcingΓ’β¬οΏ½ return no.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22301 βΌ
π Read
via "National Vulnerability Database".
Mate 30 10.0.0.203(C00E201R7P2) have a buffer overflow vulnerability. After obtaining the root permission, an attacker can exploit the vulnerability to cause buffer overflow.π Read
via "National Vulnerability Database".
βΌ CVE-2020-5812 βΌ
π Read
via "National Vulnerability Database".
Nessus AMI versions 8.12.0 and earlier were found to either not validate, or incorrectly validate, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack.π Read
via "National Vulnerability Database".
βΌ CVE-2021-22307 βΌ
π Read
via "National Vulnerability Database".
There is a weak algorithm vulnerability in Mate 3010.0.0.203(C00E201R7P2). The protection is insufficient for the modules that should be protected. Local attackers can exploit this vulnerability to affect the integrity of certain module.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20176 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/gem.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.10-56.π Read
via "National Vulnerability Database".
βΌ CVE-2021-26723 βΌ
π Read
via "National Vulnerability Database".
Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS.π Read
via "National Vulnerability Database".
βΌ CVE-2020-36242 βΌ
π Read
via "National Vulnerability Database".
In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3122 βΌ
π Read
via "National Vulnerability Database".
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."π Read
via "National Vulnerability Database".
βΌ CVE-2020-36243 βΌ
π Read
via "National Vulnerability Database".
The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.π Read
via "National Vulnerability Database".
β Perl.com gets its domain back β normal service restored! β
π Read
via "Naked Security".
All's well that ends well.π Read
via "Naked Security".
Naked Security
Perl.com gets its domain back β normal service restored!
Allβs well that ends well.
βΌ CVE-2020-11920 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).π Read
via "National Vulnerability Database".
βΌ CVE-2020-11915 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.π Read
via "National Vulnerability Database".
π¦Ώ World Economic Forum calls cybersecurity one of the "key threats of the next decade" π¦Ώ
π Read
via "Tech Republic".
The Global Risks Report highlights the onslaught of cyberattacks and a failure of governments to stop them.π Read
via "Tech Republic".
TechRepublic
World Economic Forum calls cybersecurity one of the "key threats of the next decade"
The Global Risks Report highlights the onslaught of cyberattacks and a failure of governments to stop them.
π΄ Hidden Dangers of Microsoft 365's Power Automate and eDiscovery Tools π΄
π Read
via "Dark Reading".
Attackers are using legitimate enterprise tools to execute attacks and carry out malicious actions. Security teams must take action now.π Read
via "Dark Reading".
Darkreading
Hidden Dangers of Microsoft 365's Power Automate and eDiscovery Tools
Attackers are using legitimate enterprise tools to execute attacks and carry out malicious actions. Security teams must take action now.
βΌ CVE-2020-26052 βΌ
π Read
via "National Vulnerability Database".
Online Marriage Registration System 1.0 is affected by stored cross-site scripting (XSS) vulnerabilities in multiple parameters.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26051 βΌ
π Read
via "National Vulnerability Database".
College Management System Php 1.0 suffers from SQL injection vulnerabilities in the index.php page from POST parameters 'unametxt' and 'pwdtxt', which are not filtered before passing a SQL query.π Read
via "National Vulnerability Database".
β WestRock Ransomware Attack Hinders Packaging Production β
π Read
via "Threat Post".
The ransomware attack, affecting OT systems, resulted in some of WestRock's facilities lagging in production levels.π Read
via "Threat Post".
Threat Post
WestRock Ransomware Attack Hinders Packaging Production
The ransomware attack, affecting OT systems, resulted in some of WestRock's facilities lagging in production levels.
π¦Ώ How much is your info worth on the Dark Web? For Americans, it's just $8 π¦Ώ
π Read
via "Tech Republic".
A Comparitech report found that Japan and the UAE have the most expensive identities available on illicit marketplaces at an average price of $25.π Read
via "Tech Republic".
TechRepublic
How much is your info worth on the Dark Web? For Americans, it's just $8
A Comparitech report found that Japan and the UAE have the most expensive identities available on illicit marketplaces at an average price of $25.
β Fake Forcepoint Google Chrome Extension Hacks Windows Users β
π Read
via "Threat Post".
In a unique attack, cybercriminals locally install an extension to manipulate data in internal web applications that the victims have access to.π Read
via "Threat Post".
Threat Post
Fake Forcepoint Google Chrome Extension Hacks Windows Users
In a unique attack, cybercriminals locally install an extension to manipulate data in internal web applications that the victims have access to.
π AIDE 0.17.2 π
π Read
via "Packet Storm Security".
AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.π Read
via "Packet Storm Security".
Packetstormsecurity
AIDE 0.17.2 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers