Security Advisories & Alerts

Drupal core – Moderately critical – Cross-site scripting – SA-CORE-2020-007

DESCRIPTION The Drupal AJAX API does not disable JSONP by default, which can lead to cross-site scripting. SYSTEM AFFECTED Following actions are recommended to be taken: Install the latest version: • If you are using Drupal 7.x, upgrade to Drupal 7.73. • If you are using Drupal 8.8.x, upgrade to Drupal 8.8.10. • If you are using Drupal 8.9.x, upgrade to Drupal 8.9.6. • If...

Read More


IPTV encoder devices contain multiple vulnerabilities

DESCRIPTIONMultiple vulnerabilities exist in various Video Over IP (Internet Protocol) encoder devices, also known as IPTV/H.264/H.265 video encoders. These vulnerabilities allow an unauthenticated remote attacker to execute arbitrary code and perform other unauthorized actions on a vulnerable system. IMPACT     • Full administrative access via backdoor password (CVE-2020-24215)    • Administrative root access via backdoor password (CVE-2020-24218)    • Arbitrary file read via path traversal (CVE-2020-24219)    •...

Read More


Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

DESCRIPTIONMultiple vulnerabilities have been discovered in iOS, iPadOS, watchOS, tvOS, watchOS, Xcode, and Safari. The most severe of these vulnerabilities could allow for arbitrary code execution.     • iOS is a mobile operating system for Apple cellphones.    • iPadOS is a mobile operating system for Apple tablets.    • tvOS is an operating system for the Apple media streaming device Apple TV.    • WatchOS is an...

Read More


Microsoft Excel Remote Code Execution Vulnerability

DESCRIPTIONA remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view,...

Read More


CVE-2020-1472 “Zerologon” Critical Privilege Escalation critical vulnerability

Description:An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka ‘Netlogon Elevation of Privilege Vulnerability’. The prime elements of this vulnerability are the weak encryption standards and the authentication process used in the Netlogon protocol. As new Windows Domain Controllers use standard AES-256 as encryption standards, incorrect use...

Read More


Page 49 of 132« First...102030...4748495051...607080...Last »