‼ CVE-2020-22120 ‼
📖 Read
via "National Vulnerability Database".
A remote code execution (RCE) vulnerability in /root/run/adm.php?admin-ediy&part=exdiy of imcat v5.1 allows authenticated attackers to execute arbitrary code.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39270 ‼
📖 Read
via "National Vulnerability Database".
In Ping Identity RSA SecurID Integration Kit before 3.2, user impersonation can occur.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25218 ‼
📖 Read
via "National Vulnerability Database".
In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-22124 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the \inc\config.php component of joyplus-cms v1.6 allows attackers to access sensitive information.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25928 ‼
📖 Read
via "National Vulnerability Database".
The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: DNS response processing functions: dns_upcall(), getoffset(), dnc_set_answer(). The attack vector is: a specific DNS response packet. The code does not check the "response data length" field of individual DNS answers, which may cause out-of-bounds read/write operations, leading to Information leak, Denial-or-Service, or Remote Code Execution, depending on the context.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25927 ‼
📖 Read
via "National Vulnerability Database".
The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header corresponds to the query/response data available in the DNS packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-37617 ‼
📖 Read
via "National Vulnerability Database".
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. The Nextcloud Desktop Client invokes its uninstaller script when being installed to make sure there are no remnants of previous installations. In versions 3.0.3 through 3.2.4, the Client searches the `Uninstall.exe` file in a folder that can be written by regular users. This could lead to a case where a malicious user creates a malicious `Uninstall.exe`, which would be executed with administrative privileges on the Nextcloud Desktop Client installation. This issue is fixed in Nextcloud Desktop Client version 3.3.0. As a workaround, do not allow untrusted users to create content in the `C:\` system folder and verify that there is no malicious `C:\Uninstall.exe` file on the system.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25926 ‼
📖 Read
via "National Vulnerability Database".
The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39286 ‼
📖 Read
via "National Vulnerability Database".
Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25767 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in HCC Embedded NicheStack IPv4 4.1. The dnc_copy_in routine for parsing DNS domain names does not check whether a domain name compression pointer is pointing within the bounds of the packet (e.g., forward compression pointer jumps are allowed), which leads to an Out-of-bounds Read, and a Denial-of-Service as a consequence.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-19669 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Request Forgery (CSRF) vulnerability exists in Eyoucms 1.3.6 that can add an admin account via /login.php?m=admin&c=Admin&a=admin_add&lang=cn.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-22122 ‼
📖 Read
via "National Vulnerability Database".
A SQL injection vulnerability in /oa.php?c=Staff&a=read of Find a Place LJCMS v 1.3 allows attackers to access sensitive database information via a crafted POST request.📖 Read
via "National Vulnerability Database".
🦿 Expert: Cyberattacks in the energy sector put lives in danger 🦿
📖 Read
via "Tech Republic".
Zero-trust is a good way to prevent hackers from gaining control of our infrastructure and energy industries, expert says.📖 Read
via "Tech Republic".
TechRepublic
Expert: Cyberattacks in the energy sector put lives in danger
Zero-trust is a good way to prevent hackers from gaining control of our infrastructure and energy industries, expert says.
‼ CVE-2021-34745 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the AppDynamics .NET Agent for Windows could allow an attacker to leverage an authenticated, local user account to gain SYSTEM privileges. This vulnerability is due to the .NET Agent Coordinator Service executing code with SYSTEM privileges. An attacker with local access to a device that is running the vulnerable agent could create a custom process that would be launched with those SYSTEM privileges. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system. This vulnerability is fixed in AppDynamics .NET Agent Release 21.7.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34730 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34749 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Server Name Identification (SNI) request filtering of Cisco Web Security Appliance (WSA), Cisco Firepower Threat Defense (FTD), and the Snort detection engine could allow an unauthenticated, remote attacker to bypass filtering technology on an affected device and exfiltrate data from a compromised host. This vulnerability is due to inadequate filtering of the SSL handshake. An attacker could exploit this vulnerability by using data from the SSL client hello packet to communicate with an external server. A successful exploit could allow the attacker to execute a command-and-control attack on a compromised host and perform additional data exfiltration attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-1561 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the spam quarantine feature of Cisco Secure Email and Web Manager, formerly Cisco Security Management Appliance (SMA), could allow an authenticated, remote attacker to gain unauthorized access and modify the spam quarantine settings of another user. This vulnerability exists because access to the spam quarantine feature is not properly restricted. An attacker could exploit this vulnerability by sending malicious requests to an affected system. A successful exploit could allow the attacker to modify another user's spam quarantine settings, possibly disabling security controls or viewing email messages stored on the spam quarantine interfaces.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34715 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the image verification function of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute code with internal user privileges on the underlying operating system. The vulnerability is due to insufficient validation of the content of upgrade packages. An attacker could exploit this vulnerability by uploading a malicious archive to the Upgrade page of the administrative web interface. A successful exploit could allow the attacker to execute code with user-level privileges (the _nobody account) on the underlying operating system.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34734 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the Link Layer Discovery Protocol (LLDP) implementation for the Cisco Video Surveillance 7000 Series IP Cameras firmware could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper management of memory resources, referred to as a double free. An attacker could exploit this vulnerability by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34716 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as the root user. This vulnerability is due to incorrect handling of certain crafted software images that are uploaded to the affected device. An attacker could exploit this vulnerability by authenticating to the system as an administrative user and then uploading specific crafted software images to the affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-22345 ‼
📖 Read
via "National Vulnerability Database".
/graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter.📖 Read
via "National Vulnerability Database".