Microsoft Issues Mitigation for Actively Exploited IE Zero-Day
Microsoft published a security advisory containing mitigation measures for an actively exploited zero-day remote code execution (RCE) vulnerability impacting Internet Explorer.
Redmond's advisory says that the company is aware of "limited targeted attacks" targeting this vulnerability.
https://www.bleepingcomputer.com/news/security/microsoft-issues-mitigation-for-actively-exploited-ie-zero-day/
Microsoft published a security advisory containing mitigation measures for an actively exploited zero-day remote code execution (RCE) vulnerability impacting Internet Explorer.
Redmond's advisory says that the company is aware of "limited targeted attacks" targeting this vulnerability.
https://www.bleepingcomputer.com/news/security/microsoft-issues-mitigation-for-actively-exploited-ie-zero-day/
BleepingComputer
Microsoft Issues Mitigation for Actively Exploited IE Zero-Day
Microsoft published a security advisory containing mitigation measures for an actively exploited zero-day remote code execution (RCE) vulnerability impacting Internet Explorer.
Microsoft will fix currently exploited vulnerability affecting IE9,10 and 11
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
https://mspoweruser.com/microsoft-will-fix-currently-exploited-vulnerability-affecting-ie910-and-11/
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
https://mspoweruser.com/microsoft-will-fix-currently-exploited-vulnerability-affecting-ie910-and-11/
MSPoweruser
Microsoft will fix currently exploited vulnerability affecting IE9,10 and 11
At 7.44% Internet Explorer still has more market share than Edge and only slightly less than Firefox. It is therefore good news that Microsoft is set to fix a flaw in the browser which could result in Remote Code Execution if some-one visits a specially crafted…
Citrix Adds SD-WAN WANOP, Updated Mitigations to CVE-2019-19781 Advisory
Citrix has released an article with updates on CVE-2019-19781, a vulnerability affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway. This vulnerability also affects Citrix SD-WAN WANOP product versions 10.2.6 and version 11.0.3.
https://www.us-cert.gov/ncas/current-activity/2020/01/17/citrix-adds-sd-wan-wanop-updated-mitigations-cve-2019-19781
Citrix has released an article with updates on CVE-2019-19781, a vulnerability affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway. This vulnerability also affects Citrix SD-WAN WANOP product versions 10.2.6 and version 11.0.3.
https://www.us-cert.gov/ncas/current-activity/2020/01/17/citrix-adds-sd-wan-wanop-updated-mitigations-cve-2019-19781
www.us-cert.gov
Citrix Adds SD-WAN WANOP, Updated Mitigations to CVE-2019-19781 Advisory | CISA
Citrix has released an article with updates on CVE-2019-19781, a vulnerability affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway. This vulnerability also affects Citrix SD-WAN WANOP product versions 10.2.6 and version 11.0.3. The article…
Microsoft Releases Security Advisory on Internet Explorer Vulnerability
https://www.us-cert.gov/ncas/current-activity/2020/01/17/microsoft-releases-security-advisory-internet-explorer
https://www.us-cert.gov/ncas/current-activity/2020/01/17/microsoft-releases-security-advisory-internet-explorer
www.us-cert.gov
Microsoft Releases Security Advisory on Internet Explorer Vulnerability | CISA
Microsoft has released a security advisory to address a critical vulnerability in Internet Explorer. A remote attacker could exploit this vulnerability to take control of an affected system. According to the advisory, “Microsoft is aware of limited targeted…
Vulnerabilidad de XSS almacenado en Moodle
Fecha de publicación: 20/01/2020
Importancia: 4 - Alta
Recursos afectados:
Moodle, versión 3.8.
Descripción:
El investigador, Cid da Costa, ha detectado una vulnerabilidad de criticidad alta en Moodle. Un atacante remoto podría ejecutar código arbitrario en el sistema.
Solución:
Actualizar Moodle a la versión 3.8.1.
Como medida preventiva, Moodle recomienda deshabilitar el sistema de mensajería hasta aplicar la actualización.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-xss-almacenado-moodle
Fecha de publicación: 20/01/2020
Importancia: 4 - Alta
Recursos afectados:
Moodle, versión 3.8.
Descripción:
El investigador, Cid da Costa, ha detectado una vulnerabilidad de criticidad alta en Moodle. Un atacante remoto podría ejecutar código arbitrario en el sistema.
Solución:
Actualizar Moodle a la versión 3.8.1.
Como medida preventiva, Moodle recomienda deshabilitar el sistema de mensajería hasta aplicar la actualización.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-xss-almacenado-moodle
INCIBE-CERT
Vulnerabilidad de XSS almacenado en Moodle
El investigador, Cid da Costa, ha detectado una vulnerabilidad de criticidad alta en Moodle. Un atacante remoto podría ejecutar código arbitrario en el sistema.
Denegación de servicio en las familias Unity y Unity XT de Dell EMC
Fecha de publicación: 21/01/2020
Importancia: 4 - Alta
Recursos afectados:
Dell EMC Unity y Unity XT Operating Environment (OE) versiones anteriores a la 5.0.2.0.5.009;
Dell EMC Unity VSA Operating Environment (OE) versiones anteriores a la 5.0.2.0.5.009.
Descripción:
Dell EMC ha detectado una vulnerabilidad de criticidad alta. Un atacante remoto, sin autenticación, podría generar una condición de denegación de servicio (DoS).
Solución:
Actualizar Dell EMC Unity y Dell EMC Unity XT Operating Environment (OE) a la versión 5.0.2.0.5.009 o posterior;
Dell EMC Unity VSA Operating Environment (OE) a la versión 5.0.2.0.5.009 o posterior.
Detalle:
La vulnerabilidad reside en la implementación del SSH empleada para el servicio SFTP en el servidor NAS. Un atacante remoto, sin autenticación, podría generar una condición de denegación de servicio (DoS). Se ha reservado el identificador CVE-2020-5319 para esta vulnerabilidad.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/denegacion-servicio-las-familias-unity-y-unity-xt-dell-emc
Fecha de publicación: 21/01/2020
Importancia: 4 - Alta
Recursos afectados:
Dell EMC Unity y Unity XT Operating Environment (OE) versiones anteriores a la 5.0.2.0.5.009;
Dell EMC Unity VSA Operating Environment (OE) versiones anteriores a la 5.0.2.0.5.009.
Descripción:
Dell EMC ha detectado una vulnerabilidad de criticidad alta. Un atacante remoto, sin autenticación, podría generar una condición de denegación de servicio (DoS).
Solución:
Actualizar Dell EMC Unity y Dell EMC Unity XT Operating Environment (OE) a la versión 5.0.2.0.5.009 o posterior;
Dell EMC Unity VSA Operating Environment (OE) a la versión 5.0.2.0.5.009 o posterior.
Detalle:
La vulnerabilidad reside en la implementación del SSH empleada para el servicio SFTP en el servidor NAS. Un atacante remoto, sin autenticación, podría generar una condición de denegación de servicio (DoS). Se ha reservado el identificador CVE-2020-5319 para esta vulnerabilidad.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/denegacion-servicio-las-familias-unity-y-unity-xt-dell-emc
INCIBE-CERT
Denegación de servicio en las familias Unity y Unity XT de Dell EMC
Dell EMC ha detectado una vulnerabilidad de criticidad alta. Un atacante remoto, sin autenticación, podría generar una condición de denegación de servicio (DoS).
Increased Emotet Malware Activity
https://www.us-cert.gov/ncas/current-activity/2020/01/22/increased-emotet-malware-activity
https://www.us-cert.gov/ncas/current-activity/2020/01/22/increased-emotet-malware-activity
www.us-cert.gov
Increased Emotet Malware Activity | CISA
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of a recent increase in targeted Emotet malware attacks. Emotet is a sophisticated Trojan that commonly functions as a downloader or dropper of other malware. Emotet primarily spreads via…
Samba Releases Security Updates
The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit one of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Samba Security Announcements for CVE-2019-14902, CVE-2019-14907, and CVE-2019-19344 and apply the necessary updates and workarounds.
https://www.us-cert.gov/ncas/current-activity/2020/01/21/samba-releases-security-updates
The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit one of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Samba Security Announcements for CVE-2019-14902, CVE-2019-14907, and CVE-2019-19344 and apply the necessary updates and workarounds.
https://www.us-cert.gov/ncas/current-activity/2020/01/21/samba-releases-security-updates
www.us-cert.gov
Samba Releases Security Updates | CISA
The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit one of these vulnerabilities to take control of an affected system.
Múltiples vulnerabilidades en productos Cisco
Fecha de publicación: 23/01/2020
Importancia: 5 - Crítica
Recursos afectados:
Cisco FMC Software, si está configurado para autenticar a los usuarios de la interfaz web de gestión a través de un servidor LDAP externo;
Cisco TelePresence:
Integrator C Series;
MX Series;
SX Series;
System EX Series.
Cisco Webex:
Board;
DX Series;
Room Series.
Cisco IOS XE SD-WAN Software, versiones 16.11 y anteriores;
Cisco SD-WAN Solution vManage Software, versión 18.4.1;
Cisco Smart Software Manager On-Prem. versiones anteriores a 7-201910;
Cisco IOS XR Software, versiones posteriores a 6.6.1, o anteriores a 6.6.3, 7.0.2, 7.1.1, o 7.2.1.
Descripción:
Se han identificado 12 vulnerabilidades en productos Cisco, una de severidad crítica y el resto de severidad alta, que podrían permitir omisión de autenticación en LDAP, acceso a rutas no controlado, credenciales por defecto, escalada de privilegios o denegación de servicio.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-cisco-60
Fecha de publicación: 23/01/2020
Importancia: 5 - Crítica
Recursos afectados:
Cisco FMC Software, si está configurado para autenticar a los usuarios de la interfaz web de gestión a través de un servidor LDAP externo;
Cisco TelePresence:
Integrator C Series;
MX Series;
SX Series;
System EX Series.
Cisco Webex:
Board;
DX Series;
Room Series.
Cisco IOS XE SD-WAN Software, versiones 16.11 y anteriores;
Cisco SD-WAN Solution vManage Software, versión 18.4.1;
Cisco Smart Software Manager On-Prem. versiones anteriores a 7-201910;
Cisco IOS XR Software, versiones posteriores a 6.6.1, o anteriores a 6.6.3, 7.0.2, 7.1.1, o 7.2.1.
Descripción:
Se han identificado 12 vulnerabilidades en productos Cisco, una de severidad crítica y el resto de severidad alta, que podrían permitir omisión de autenticación en LDAP, acceso a rutas no controlado, credenciales por defecto, escalada de privilegios o denegación de servicio.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-cisco-60
INCIBE-CERT
Múltiples vulnerabilidades en productos Cisco
Se han identificado 12 vulnerabilidades en productos Cisco, una de severidad crítica y el resto de severidad alta, que podrían permitir omisión de autenticación en LDAP, acceso a rutas no controlado, credenciales por defecto, escalada de privilegios o denegación…
Divulgación de clave privada del certificado TLS en routers Netgear
Fecha de publicación: 23/01/2020
Importancia: 4 - Alta
Recursos afectados:
Routers de los modelos:
R8900;
R9000;
RAX120;
XR700.
Descripción:
Netgear ha publicado un aviso, de severidad alta, informando de una vulnerabilidad de divulgación de clave privada del certificado TLS.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/divulgacion-clave-privada-del-certificado-tls-routers-netgear
Fecha de publicación: 23/01/2020
Importancia: 4 - Alta
Recursos afectados:
Routers de los modelos:
R8900;
R9000;
RAX120;
XR700.
Descripción:
Netgear ha publicado un aviso, de severidad alta, informando de una vulnerabilidad de divulgación de clave privada del certificado TLS.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/divulgacion-clave-privada-del-certificado-tls-routers-netgear
INCIBE-CERT
Divulgación de clave privada del certificado TLS en routers Netgear
Netgear ha publicado un aviso, de severidad alta, informando de una vulnerabilidad de divulgación de clave privada del certificado TLS.
Forwarded from Una al día
Expuestos 250 millones de registros de asistencia al cliente de Microsoft
https://unaaldia.hispasec.com/2020/01/250-millones-de-registros-de-asistencia-al-cliente-de-microsoft-expuestos.html
https://unaaldia.hispasec.com/2020/01/250-millones-de-registros-de-asistencia-al-cliente-de-microsoft-expuestos.html
Una al Día
Expuestos 250 millones de registros de asistencia al cliente de Microsoft — Una al Día
Si se ha puesto en contacto con Microsoft para solicitar asistencia técnica en los últimos 14 años, su consulta técnica, junto con alguna información personal identificable, puede haber estado en p…
Cisco Releases Security Updates
Cisco has released updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
https://www.us-cert.gov/ncas/current-activity/2020/01/23/cisco-releases-security-updates
Cisco has released updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
https://www.us-cert.gov/ncas/current-activity/2020/01/23/cisco-releases-security-updates
www.us-cert.gov
Cisco Releases Security Updates | CISA
Cisco has released updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security…
#Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure
https://www.microsoft.com/security/blog/2020/01/23/azure-security-benchmark-90-security-compliance-best-practices-azure-workloads/
https://www.microsoft.com/security/blog/2020/01/23/azure-security-benchmark-90-security-compliance-best-practices-azure-workloads/
Microsoft Security Blog
Azure Security Benchmark—90 security and compliance best practices for your workloads in Azure
Azure Security Benchmark offers a collection of over 90 security best practices and recommendations you can employ to increase the overall security and compliance of all your workloads in Azure.
Omisión de restricciones de seguridad en MQ Appliance de IBM
Fecha de publicación: 24/01/2020
Importancia: 4 - Alta
Recursos afectados:
IBM MQ Appliance, versión 8.0;
IBM MQ Appliance, versión 9.1 LTS;
IBM MQ Appliance, versión 9.1 CD.
Descripción:
IBM ha detectado una vulnerabilidad de criticidad alta que afecta a sus productos MQ Appliance. Un atacante local podría omitir las restricciones de seguridad.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/omision-restricciones-seguridad-mq-appliance-ibm
Fecha de publicación: 24/01/2020
Importancia: 4 - Alta
Recursos afectados:
IBM MQ Appliance, versión 8.0;
IBM MQ Appliance, versión 9.1 LTS;
IBM MQ Appliance, versión 9.1 CD.
Descripción:
IBM ha detectado una vulnerabilidad de criticidad alta que afecta a sus productos MQ Appliance. Un atacante local podría omitir las restricciones de seguridad.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/omision-restricciones-seguridad-mq-appliance-ibm
INCIBE-CERT
Omisión de restricciones de seguridad en MQ Appliance de IBM
IBM ha detectado una vulnerabilidad de criticidad alta que afecta a sus productos MQ Appliance. Un atacante local podría omitir las restricciones de seguridad.
Citrix Releases Security Updates for SD-WAN WANOP
Citrix has released security updates to address the CVE-2019-19781 vulnerability in Citrix SD-WAN WANOP. An attacker could exploit this vulnerability to take control of an affected system. Citrix has also released an Indicators of Compromise Scanner that aims to identify evidence of successful exploitation of CVE-2019-19781.
https://www.us-cert.gov/ncas/current-activity/2020/01/23/citrix-releases-security-updates-sd-wan-wanop
Citrix has released security updates to address the CVE-2019-19781 vulnerability in Citrix SD-WAN WANOP. An attacker could exploit this vulnerability to take control of an affected system. Citrix has also released an Indicators of Compromise Scanner that aims to identify evidence of successful exploitation of CVE-2019-19781.
https://www.us-cert.gov/ncas/current-activity/2020/01/23/citrix-releases-security-updates-sd-wan-wanop
www.us-cert.gov
Citrix Releases Security Updates for SD-WAN WANOP | CISA
Citrix has released security updates to address the CVE-2019-19781 vulnerability in Citrix SD-WAN WANOP. An attacker could exploit this vulnerability to take control of an affected system. Citrix has also released an Indicators of Compromise Scanner that…
ICS Advisory (ICSA-20-021-01)
Honeywell Maxpro VMS & NVR
1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Honeywell
Equipment: MAXPRO VMS & NVR
Vulnerabilities: Deserialization of Untrusted Data, SQL Injection
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could result in elevation of privileges, cause a denial-of-service condition, or allow unauthenticated remote code execution.
https://www.us-cert.gov/ics/advisories/icsa-20-021-01
Honeywell Maxpro VMS & NVR
1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Honeywell
Equipment: MAXPRO VMS & NVR
Vulnerabilities: Deserialization of Untrusted Data, SQL Injection
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could result in elevation of privileges, cause a denial-of-service condition, or allow unauthenticated remote code execution.
https://www.us-cert.gov/ics/advisories/icsa-20-021-01
www.us-cert.gov
Honeywell Maxpro VMS & NVR | CISA
1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Honeywell
Equipment: MAXPRO VMS & NVR
Vulnerabilities: Deserialization of Untrusted Data, SQL Injection
2. RISK EVALUATION
Successful exploitation of…
CVSS v3 9.8
ATTENTION: Exploitable remotely/low skill level to exploit
Vendor: Honeywell
Equipment: MAXPRO VMS & NVR
Vulnerabilities: Deserialization of Untrusted Data, SQL Injection
2. RISK EVALUATION
Successful exploitation of…
Alert (AA20-020A)
Critical Vulnerability in #Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP
Summary
Note: As of January 24, 2020, Citrix has released all expected updates in response to CVE-2019-19781.[1]
On January 19, 2020, Citrix released firmware updates for Citrix Application Delivery Controller (ADC) and Citrix Gateway versions 11.1 and 12.0.
On January 22, 2020, Citrix released security updates for vulnerable SD-WAN WANOP appliances.
On January 23, 2020, Citrix released firmware updates for Citrix ADC and Gateway versions 12.1 and 13.0.
On January 24, 2020, Citrix released firmware updates for Citrix ADC and Gateway version 10.5.
A remote, unauthenticated attacker could exploit CVE-2019-19781 to perform arbitrary code execution.[2] This vulnerability has been detected in exploits in the wild.[3]
The Cybersecurity and Infrastructure Agency (CISA) strongly recommends that all users and administrators upgrade their vulnerable appliances as soon as possible.
https://www.us-cert.gov/ncas/alerts/aa20-020a
Critical Vulnerability in #Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP
Summary
Note: As of January 24, 2020, Citrix has released all expected updates in response to CVE-2019-19781.[1]
On January 19, 2020, Citrix released firmware updates for Citrix Application Delivery Controller (ADC) and Citrix Gateway versions 11.1 and 12.0.
On January 22, 2020, Citrix released security updates for vulnerable SD-WAN WANOP appliances.
On January 23, 2020, Citrix released firmware updates for Citrix ADC and Gateway versions 12.1 and 13.0.
On January 24, 2020, Citrix released firmware updates for Citrix ADC and Gateway version 10.5.
A remote, unauthenticated attacker could exploit CVE-2019-19781 to perform arbitrary code execution.[2] This vulnerability has been detected in exploits in the wild.[3]
The Cybersecurity and Infrastructure Agency (CISA) strongly recommends that all users and administrators upgrade their vulnerable appliances as soon as possible.
https://www.us-cert.gov/ncas/alerts/aa20-020a
www.us-cert.gov
Critical Vulnerability in Citrix Application Delivery Controller, Gateway, and SD-WAN WANOP | CISA
Note: As of January 24, 2020, Citrix has released all expected updates in response to CVE-2019-19781.[1]
Vulnerabilidad de inyección XXE en IBM Security Access Manager
Fecha de publicación: 28/01/2020
Importancia: 4 - Alta
Recursos afectados:
IBM Security Access Manager (ISAM), versión 9.0.
Descripción:
Varios investigadores de IBM X-Force Ethical Hacking Team han descubierto una vulnerabilidad con severidad alta, de tipo XML External Entity (XXE), en IBM Security Access Manager.
Solución:
Actualizar IBM Security Access Manager a la versión 9.0.7.1.
Detalle:
IBM Security Access Manager (ISAM) es vulnerable a un ataque de tipo XML External Entity (XXE) cuando procesa datos XML. Un atacante remoto podría explotar esta vulnerabilidad para exponer información sensible o consumir recursos de memoria. Se ha reservado el identificador CVE-2019-4707 para esta vulnerabilidad.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-inyeccion-xxe-ibm-security-access-manager
Fecha de publicación: 28/01/2020
Importancia: 4 - Alta
Recursos afectados:
IBM Security Access Manager (ISAM), versión 9.0.
Descripción:
Varios investigadores de IBM X-Force Ethical Hacking Team han descubierto una vulnerabilidad con severidad alta, de tipo XML External Entity (XXE), en IBM Security Access Manager.
Solución:
Actualizar IBM Security Access Manager a la versión 9.0.7.1.
Detalle:
IBM Security Access Manager (ISAM) es vulnerable a un ataque de tipo XML External Entity (XXE) cuando procesa datos XML. Un atacante remoto podría explotar esta vulnerabilidad para exponer información sensible o consumir recursos de memoria. Se ha reservado el identificador CVE-2019-4707 para esta vulnerabilidad.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-inyeccion-xxe-ibm-security-access-manager
INCIBE-CERT
Vulnerabilidad de inyección XXE en IBM Security Access Manager
Varios investigadores de IBM X-Force Ethical Hacking Team han descubierto una vulnerabilidad con severidad alta, de tipo XML External Entity (XXE), en IBM Security Access Manager.
Attacking Azure, Azure AD, and Introducing PowerZure
https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a
https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a
Medium
Attacking Azure, Azure AD, and Introducing PowerZure
Interacting with Azure, offensively
Critical Remote Code Execution Bug Fixed in OpenBSD SMTP Server
A critical vulnerability in the free OpenSMTPD email server present in many Unix-based systems can be exploited to run shell commands with root privileges.
https://www.bleepingcomputer.com/news/security/critical-remote-code-execution-bug-fixed-in-openbsd-smtp-server/
A critical vulnerability in the free OpenSMTPD email server present in many Unix-based systems can be exploited to run shell commands with root privileges.
https://www.bleepingcomputer.com/news/security/critical-remote-code-execution-bug-fixed-in-openbsd-smtp-server/
BleepingComputer
Critical Remote Code Execution Bug Fixed in OpenBSD SMTP Server
A critical vulnerability in the free OpenSMTPD email server present in many Unix-based systems can be exploited to run shell commands with root privileges.
Actualización de seguridad de Joomla! 3.9.15
Fecha de publicación: 29/01/2020
Importancia: 2 - Baja
Recursos afectados:
Joomla! CMS, versiones desde la 3.0.0, hasta la 3.9.14.
Descripción:
Joomla! ha publicado una nueva versión que soluciona 3 vulnerabilidades de criticidad baja en su núcleo, de los tipos CSRF y XSS.
Solución:
Actualizar a la versión 3.9.15
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-joomla-3915
Fecha de publicación: 29/01/2020
Importancia: 2 - Baja
Recursos afectados:
Joomla! CMS, versiones desde la 3.0.0, hasta la 3.9.14.
Descripción:
Joomla! ha publicado una nueva versión que soluciona 3 vulnerabilidades de criticidad baja en su núcleo, de los tipos CSRF y XSS.
Solución:
Actualizar a la versión 3.9.15
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-joomla-3915
INCIBE-CERT
Actualización de seguridad de Joomla! 3.9.15
Joomla! ha publicado una nueva versión que soluciona 3 vulnerabilidades de criticidad baja en su núcleo, de los tipos CSRF y XSS.