Lucene search

K

SICK FX0-GENT00000, SICK FX0-GENT00030, SICK FX0-GMOD00000, SICK FX0-GMOD00010, SICK FX0-GPNT00000, SICK FX0-GPNT00030, SICK UE410-EN1, SICK UE410-EN3, SICK UE410-EN3S04, SICK UE410-EN4 Security Vulnerabilities

cve
cve

CVE-2021-32496

SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects...

5.3CVSS

5.1AI Score

0.001EPSS

2021-06-28 12:15 PM
22
prion
prion

Code injection

SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects...

5.3CVSS

5.2AI Score

0.001EPSS

2021-06-28 12:15 PM
1
cvelist
cvelist

CVE-2021-32496

SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects...

5.4AI Score

0.001EPSS

2021-06-28 11:02 AM
malwarebytes
malwarebytes

Cloud vs on premises: 3 reasons the Cloud is winning

Thanks to the vast rollout of COVID-19 vaccines to millions of people in the US and Europe, some of us are finally seeing some semblance of a return to normalcy. And organizations, who have experienced first-hand the struggle to stay afloat during months of struggle, are expecting to transition...

-0.3AI Score

2021-06-11 03:26 PM
48
veracode
veracode

Arbitrary Code Execution

python3 is vulnerable to arbitrary code execution. IP address octets are left stripped instead of evaluated as valid IP addresses due to improper input validation of octal strings in the stdlib ipaddress allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on....

9.8CVSS

6AI Score

0.008EPSS

2021-05-24 09:29 AM
14
malwarebytes
malwarebytes

A doctor reveals the human cost of the HSE ransomware attack

"It’s cracking, the whole thing." The words were delivered quickly, but in a thoughtful and measured way. As if the person saying them was used to delivering difficult news. Little surprise, given they belonged to a doctor. But this doctor wasn't describing a medical condition—this was their...

6.7AI Score

2021-05-20 12:20 PM
38
mssecure
mssecure

Business email compromise campaign targets wide range of orgs with gift card scam

Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to critical business...

AI Score

2021-05-06 04:00 PM
197
mmpc
mmpc

Business email compromise campaign targets wide range of orgs with gift card scam

Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)—a damaging form of phishing designed to gain access to critical business...

AI Score

2021-05-06 04:00 PM
198
osv
osv

CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP...

9.8CVSS

6.9AI Score

0.008EPSS

2021-05-06 01:15 PM
17
cve
cve

CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP...

9.8CVSS

9.3AI Score

0.008EPSS

2021-05-06 01:15 PM
4847
17
nvd
nvd

CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP...

9.8CVSS

0.008EPSS

2021-05-06 01:15 PM
2
prion
prion

Improper access control

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP...

9.8CVSS

8.3AI Score

0.008EPSS

2021-05-06 01:15 PM
61
osv
osv

ipaddress leading zeros in IPv4 address

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP...

9.8CVSS

9.3AI Score

0.008EPSS

2021-05-06 12:00 AM
11
cvelist
cvelist

CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP...

9.6AI Score

0.008EPSS

2021-05-06 12:00 AM
ubuntucve
ubuntucve

CVE-2021-29921

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses. Bugs https://bugs.python.org/issue36384 Notes Author| Note ---|--- mdeslaur |...

9.8CVSS

8.4AI Score

0.008EPSS

2021-05-06 12:00 AM
29
threatpost
threatpost

Why Retailers Fail to Stop Shopping Bots

In the 1970s the United States encountered an “oil embargo” that dramatically curtailed people from being able to purchase gasoline for their vehicles. “No Gas Today” signs were everywhere. Gas rationing was imposed by only allowing car owners to buy gas based on whether the final numbers on their....

-0.2AI Score

2021-05-04 02:12 PM
35
osv
osv

Improper parsing of octal bytes in netmask

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

9.1CVSS

3.7AI Score

0.059EPSS

2021-04-14 03:03 PM
29
github
github

Improper parsing of octal bytes in netmask

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

9.1CVSS

3.7AI Score

0.059EPSS

2021-04-14 03:03 PM
117
veracode
veracode

Access Control Bypass

The Data::Validate::IP module is vulnerable to access control bypass. It does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP...

7.5CVSS

6.2AI Score

0.002EPSS

2021-04-12 11:40 PM
4
cve
cve

CVE-2021-28918

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

9.1CVSS

7AI Score

0.059EPSS

2021-04-01 01:15 PM
89
9
nvd
nvd

CVE-2021-28918

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

9.1CVSS

0.059EPSS

2021-04-01 01:15 PM
osv
osv

CVE-2021-28918

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

9.1CVSS

9.3AI Score

0.059EPSS

2021-04-01 01:15 PM
3
prion
prion

Input validation

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

9.1CVSS

7AI Score

0.059EPSS

2021-04-01 01:15 PM
5
cvelist
cvelist

CVE-2021-28918

Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs...

7.4AI Score

0.059EPSS

2021-04-01 12:33 PM
nvd
nvd

CVE-2021-29662

The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP...

7.5CVSS

0.002EPSS

2021-03-31 06:15 PM
cve
cve

CVE-2021-29662

The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP...

7.5CVSS

7.5AI Score

0.002EPSS

2021-03-31 06:15 PM
36
9
osv
osv

CVE-2021-29662

The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP...

7.5CVSS

6.8AI Score

0.002EPSS

2021-03-31 06:15 PM
2
prion
prion

Improper access control

The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP...

7.5CVSS

7.6AI Score

0.002EPSS

2021-03-31 06:15 PM
4
cvelist
cvelist

CVE-2021-29662

The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP...

7.8AI Score

0.002EPSS

2021-03-31 05:28 PM
veracode
veracode

Server-Side Request Forgery (SSRF)

netmask is vulnerable to server-side request forgery (SSRF). The package is not able to differentiate private IP addresses as external IP addresses, and would allow an attacker to trick the application into parsing an IP address incorrectly. Successful exploitation of the vulnerability depends on.....

9.1CVSS

4AI Score

0.059EPSS

2021-03-31 12:33 AM
32
hackerone
hackerone

Node.js: Unexpected input validation of octal literals in nodejs v15.12.0 and below returns defined values for all undefined octal literals.

Summary: Unexpected input validation of octal literals in the nodejs implementation of V8 JavaScript engine V8 9.0.257.13 and below returns defined values for all undefined octal literals where otherwise should return undefined. Input data 08, 09... 078, 079 should return undefined, as evinced by.....

9.8CVSS

-0.3AI Score

0.059EPSS

2021-03-30 02:26 PM
11
github
github

netmask npm package mishandles octal input data

The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for...

9.1CVSS

7.2AI Score

0.059EPSS

2021-03-29 09:32 PM
43
osv
osv

netmask npm package mishandles octal input data

The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for...

9.1CVSS

7.2AI Score

0.059EPSS

2021-03-29 09:32 PM
9
securelist
securelist

Doxing in the corporate sector

Introduction Doxing refers to the collection of confidential information about a person without their consent for the purpose of inflicting harm on that person or to otherwise gain some benefit from gathering or disclosing such information. Normally, doxing involves a threat to specific people,...

0.2AI Score

2021-03-29 10:00 AM
152
cve
cve

CVE-2021-27231

Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email...

5.4CVSS

5.2AI Score

0.001EPSS

2021-02-16 04:15 AM
34
5
osv
osv

CVE-2021-27231

Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email...

5.4CVSS

6.6AI Score

0.001EPSS

2021-02-16 04:15 AM
6
nvd
nvd

CVE-2021-27231

Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email...

5.4CVSS

0.001EPSS

2021-02-16 04:15 AM
1
prion
prion

Design/Logic Flaw

Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email...

5.4CVSS

5.3AI Score

0.001EPSS

2021-02-16 04:15 AM
2
cvelist
cvelist

CVE-2021-27231

Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email...

5.6AI Score

0.001EPSS

2021-02-16 03:19 AM
krebs
krebs

What’s most interesting about the Florida water system hack? That we heard about it at all.

Stories about computer security tend to go viral when they bridge the vast divide between geeks and luddites, and this week's news about a hacker who tried to poison a Florida town's water supply was understandably front-page material. But for security nerds who've been warning about this sort of.....

7AI Score

2021-02-10 10:13 PM
204
threatpost
threatpost

CES 2021 Gadgets: Worst in Privacy and Security Awards

This year’s Consumer Electronics Show was hampered by the pandemic, but that didn’t stop an expert panel from convening to award this year’s dubious CES 2021 Worst in Show honors in the context of gadget privacy and security. Overall trends from the week included ever-connected devices constantly.....

-0.9AI Score

2021-01-15 10:04 PM
49
mssecure
mssecure

Azure Active Directory empowers frontline workers with simplified and secure access

Howdy folks, The past year has shown us all just how critical frontline workers are to our communities and our economy. They’re the people behind the counter, in the call centers, in hospital ICUs, on the supermarket floor—doing the critical work that makes the difference in feeding our families,.....

0.1AI Score

2021-01-13 06:00 PM
42
mmpc
mmpc

Azure Active Directory empowers frontline workers with simplified and secure access

Howdy folks, The past year has shown us all just how critical frontline workers are to our communities and our economy. They’re the people behind the counter, in the call centers, in hospital ICUs, on the supermarket floor—doing the critical work that makes the difference in feeding our families,.....

0.1AI Score

2021-01-13 06:00 PM
46
threatpost
threatpost

CISOs Prep For COVID-19 Exposure Notification in the Workplace

With the potential of employees going back into the workplace on the horizon, chief information security officers (CISOs) are mulling applications that utilize exposure notifications in order to track COVID-19’s spread in the office. Steve Moore, chief security strategist with Exabeam, said he is.....

-0.8AI Score

2021-01-13 02:00 PM
194
hackerone
hackerone

h1-ctf: How The Hackers Saved Christmas

{F1139789} Challenge I 🤖 "What are you doing?" I asked myself. I was about to trespass a clear warning to keep out. {F1139744} "Have you lost your mind?" But I couldn't help it. I was born for this. And I wasn't going to back down. There are 12 more days until Christmas Eve, and I wasn't going to....

-0.3AI Score

2020-12-31 03:39 PM
142
cve
cve

CVE-2020-25507

An incorrect permission assignment during the installation script of TeamworkCloud 18.0 thru 19.0 allows a local unprivileged attacker to execute arbitrary code as root. During installation, the user is instructed to set the system enviroment file with world writable permissions (0777...

7.8CVSS

7.7AI Score

0.002EPSS

2020-12-28 08:15 PM
53
nvd
nvd

CVE-2020-25507

An incorrect permission assignment during the installation script of TeamworkCloud 18.0 thru 19.0 allows a local unprivileged attacker to execute arbitrary code as root. During installation, the user is instructed to set the system enviroment file with world writable permissions (0777...

7.8CVSS

7.8AI Score

0.002EPSS

2020-12-28 08:15 PM
3
prion
prion

Code injection

An incorrect permission assignment during the installation script of TeamworkCloud 18.0 thru 19.0 allows a local unprivileged attacker to execute arbitrary code as root. During installation, the user is instructed to set the system enviroment file with world writable permissions (0777...

7.8CVSS

7.8AI Score

0.002EPSS

2020-12-28 08:15 PM
cvelist
cvelist

CVE-2020-25507

An incorrect permission assignment during the installation script of TeamworkCloud 18.0 thru 19.0 allows a local unprivileged attacker to execute arbitrary code as root. During installation, the user is instructed to set the system enviroment file with world writable permissions (0777...

7.8AI Score

0.002EPSS

2020-12-28 07:33 PM
rapid7blog
rapid7blog

Help Others Be "Cyber Aware" This Festive Season—And All Year Round!

Are you tired of being the cybersecurity help desk for everyone you know? Are you frustrated with spending all your time securing your corporate environment, only to have to deal with the threat that snuck in through naive end-users? Are you new to security and wondering how you ended up here?...

-0.4AI Score

2020-12-17 08:43 PM
26
Total number of security vulnerabilities919