‼ CVE-2016-2101 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-5428 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-5415 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-6326 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30313 ‼
📖 Read
via "National Vulnerability Database".
Honeywell Experion PKS Safety Manager through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0051, there is a Honeywell Experion PKS Safety Manager multiple proprietary protocols with unauthenticated functionality issue. The affected components are characterized as: Honeywell Experion TCP (51000/TCP), Safety Builder (51010/TCP). The potential impact is: Manipulate controller state, Manipulate controller configuration, Manipulate controller logic, Manipulate controller files, Manipulate IO. The Honeywell Experion PKS Distributed Control System (DCS) Safety Manager utilizes several proprietary protocols for a wide variety of functionality, including process data acquisition, controller steering and configuration management. These protocols include: Experion TCP (51000/TCP) and Safety Builder (51010/TCP). None of these protocols have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocols in question. An attacker capable of invoking the protocols' functionalities could achieve a wide range of adverse impacts, including (but not limited to), the following: for Experion TCP (51000/TCP): Issue IO manipulation commands, Issue file read/write commands; and for Safety Builder (51010/TCP): Issue controller start/stop commands, Issue logic download/upload commands, Issue file read commands, Issue system time change commands. A mitigating factor with regards to some, but not all, of the above functionality is that these require the Safety Manager physical keyswitch to be in the right position.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30314 ‼
📖 Read
via "National Vulnerability Database".
Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).📖 Read
via "National Vulnerability Database".
‼ CVE-2016-4458 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30320 ‼
📖 Read
via "National Vulnerability Database".
Saia Burgess Controls (SBC) PCD through 2022-05-06 uses a Broken or Risky Cryptographic Algorithm. According to FSCT-2022-0063, there is a Saia Burgess Controls (SBC) PCD S-Bus weak credential hashing scheme issue. The affected components are characterized as: S-Bus (5050/UDP) authentication. The potential impact is: Authentication bypass. The Saia Burgess Controls (SBC) PCD controllers utilize the S-Bus protocol (5050/UDP) for a variety of engineering purposes. It is possible to configure a password in order to restrict access to sensitive engineering functionality. Authentication is done by using the S-Bus 'write byte' message to a specific address and supplying a hashed version of the password. The hashing algorithm used is based on CRC-16 and as such not cryptographically secure. An insecure hashing algorithm is used. An attacker capable of passively observing traffic can intercept the hashed credentials and trivially find collisions allowing for authentication without having to bruteforce a keyspace defined by the actual strength of the password. This allows the attacker access to sensitive engineering functionality such as uploading/downloading control logic and manipulating controller configuration.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-3709 ‼
📖 Read
via "National Vulnerability Database".
Possible cross-site scripting vulnerability in libxml after commit 960f0e2.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-3692 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-0786 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-0796 ‼
📖 Read
via "National Vulnerability Database".
WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files is prone to multiple vulnerabilities, including open proxy and security bypass vulnerabilities because it fails to properly verify user-supplied input. An attacker may leverage these issues to hide attacks directed at a target site from behind vulnerable website or to perform otherwise restricted actions and subsequently download files with the extension mp3, mp4a, wav and ogg from anywhere the web server application has read access to the system. WordPress Plugin mb.miniAudioPlayer-an HTML5 audio player for your mp3 files version 1.7.6 is vulnerable; prior versions may also be affected.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-2122 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-3701 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-6315 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2016. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-4426 ‼
📖 Read
via "National Vulnerability Database".
In zulip before 1.3.12, bot API keys were accessible to other users in the same realm.📖 Read
via "National Vulnerability Database".
📢 Should you take your password manager off the internet? 📢
📖 Read
via "ITPro".
How keeping data offline in a closed loop on a self-service model can help shore up all your apps and services📖 Read
via "ITPro".
IT PRO
Should you take your password manager off the internet? | IT PRO
How keeping data offline in a closed loop on a self-service model can help shore up all your apps and services
📢 European company unmasked as cyber mercenary group with ties to Russia 📢
📖 Read
via "ITPro".
The company that's similar to NSO Group has been active since 2016 and has used different zero-days in Windows and Adobe products to infect victims with powerful, evasive spyware📖 Read
via "ITPro".
IT PRO
European company unmasked as cyber mercenary group with ties to Russia | IT PRO
The company that's similar to NSO Group has been active since 2016 and has used different zero-days in Windows and Adobe products to infect victims with powerful, evasive spyware
📢 Equifax eyes increased fraud prevention capabilities with Midigator acquisition 📢
📖 Read
via "ITPro".
The deal marks Equifax’s twelfth acquisition since the beginning of 2021📖 Read
via "ITPro".
IT PRO
Equifax eyes increased fraud prevention capabilities with Midigator acquisition | IT PRO
The deal marks Equifax’s twelfth acquisition since the beginning of 2021
📢 ZoomInfo hires new First Chief Security Officer 📢
📖 Read
via "ITPro".
Cybersecurity expert Tomer Gershoni will oversee the software firm’s physical, digital security and privacy efforts📖 Read
via "ITPro".
IT PRO
ZoomInfo hires new First Chief Security Officer | IT PRO
Cybersecurity expert Tomer Gershoni will oversee the software firm’s physical, digital security and privacy efforts
📢 What is subnetting? 📢
📖 Read
via "ITPro".
Partitioning a single network can help relieve network congestion and increase security📖 Read
via "ITPro".
IT PRO
What is subnetting? | IT PRO
Partitioning a single network can help relieve network congestion and increase security