Author Archives: CIRT Team



CIRT Team

in Security Advisories & Alerts

CVE-2020-15504: Sophos XG Firewall Admin Web Interface sql injection

DESCRIPTIONA SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other versions >= 17.0 have received a hotfix. IMPACT9.8 CRITICAL SYSTEM AFFECTEDSophos XG Firewall v18.0 MR1 and...

Read More

0
15 Oct 2020
in Security Advisories & Alerts

Critical Patches Issued for Microsoft Products, October 13, 2020

DESCRIPTIONMultiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with...

Read More

0
15 Oct 2020
in Security Advisories & Alerts

A Vulnerability in Adobe Flash Player Could Allow for Arbitrary Code Execution (APSB20-58)

DESCRIPTIONA vulnerability has been discovered in Adobe Flash Player, which could allow for arbitrary code execution. Adobe Flash Player is a widely distributed multimedia and application player used to enhance the user experience when visiting web pages or reading email messages. Successful exploitation of this vulnerability could result in an attacker executing arbitrary code in the context of the affected application. Depending on the privileges...

Read More

0
15 Oct 2020
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could...

Read More

0
12 Oct 2020
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

DESCRIPTIONMultiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of a privileged process....

Read More

0
07 Oct 2020
সাইবার জগতে অভ্যন্তরীণ আক্রমনে ক্ষতির পরিমান আনুমানিক ২০ লক্ষ ডলার
in Articles, Bangla Articles, News

সাইবার জগতে অভ্যন্তরীণ আক্রমনে ক্ষতির পরিমান আনুমানিক ২০ লক্ষ ডলার

সাইবার জগতে অভ্যন্তরীণ আক্রমণ একটি ভয়ানক হুমকির নাম। প্রতিষ্ঠানে চাকুরীরত কর্মকর্তা-কর্মচারীদের কোন একজনের অবহেলা বা অসতর্কভাবে ডিজিটাল ডিভাইস বা যন্ত্রপাতির ব্যবহার বা ক্ষতিকারক (ম্যালিশিয়াস) কর্মকানন্ডের প্রেক্ষিতে প্রতিষ্ঠানকে সাইবার আক্রমনের স্বীকার হতে হয় এবং সমূহ ক্ষতির সম্মুখীন হতে হয়। বিটগ্লাস কর্তৃক সম্পাদিত একটি জরিপ প্রতিবেদন অনুযায়ী বিগত ১২ মাসে বিভিন্ন প্রতিষ্ঠানে সংঘটিত সাইবার আক্রমণগুলোর আনুমানিক ৬১% এর সাথে সেই প্রতিষ্ঠানেরই আভ্যন্তরীণ কর্মকর্তা-কর্মচারী জড়িত ছিলেন। আভ্যন্তরীণ হুমকিগুলোর...

Read More

0
04 Oct 2020
in Security Advisories & Alerts

Treck IP stacks contain multiple vulnerabilities

DESCRIPTIONTreck IP network stack software is designed for and used in a variety of embedded systems. The software can be licensed and integrated in various ways, including compiled from source, licensed for modification and reuse and finally as a dynamic or static linked library. Treck IP software contains multiple vulnerabilities, most of which are caused by memory management bugs. For more details on the vulnerabilities...

Read More

0
30 Sep 2020
Fileless Malware: An Emerging Threat
in Articles, English articles, News

Fileless Malware: An Emerging Threat

Introduction Fileless malware attack is on the rise, and it’s one of the foremost important digital infiltration threats to companies, according to Symantec’s 2019 Internet Security Threat Report. The magnitude of this threat is usually seen within the Report’s finding that malicious PowerShell scripts — one of the key components of fileless malware attacks — increased quite 1,000 percent in 2018 and accounted for 89...

Read More

0
28 Sep 2020
Page 15 of 134« First...10...1314151617...203040...Last »