Lucene search

K

Medtronic N'vision Clinician Programmer Security Vulnerabilities

fedora
fedora

[SECURITY] Fedora 30 Update: meson-0.50.0-4.fc30

Meson is a build system designed to optimize programmer productivity. It aims to do this by providing simple, out-of-the-box support for modern software development tools and practices, such as unit tests, coverage reports, Valgrind, CCache and the...

2.1AI Score

2019-04-17 04:05 PM
9
zdi
zdi

OMRON CX-One CX-Programmer CXP File Parsing Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the...

6.6CVSS

4AI Score

0.015EPSS

2019-04-15 12:00 AM
12
cve
cve

CVE-2019-6556

When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the...

6.6CVSS

6.5AI Score

0.015EPSS

2019-04-10 08:29 PM
28
nvd
nvd

CVE-2019-6556

When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the...

6.6CVSS

6.6AI Score

0.015EPSS

2019-04-10 08:29 PM
prion
prion

Code injection

When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the...

6.6CVSS

6.6AI Score

0.015EPSS

2019-04-10 08:29 PM
2
cvelist
cvelist

CVE-2019-6556

When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the...

6.6AI Score

0.015EPSS

2019-04-10 07:48 PM
1
ics
ics

Omron CX-Programmer

EXECUTIVE SUMMARY CVSS v3 6.6 ATTENTION: Low skill level to exploit Vendor: Omron Equipment: CX-Programmer within CX-One Vulnerability: Use After Free 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute code under the privileges of the...

6.6CVSS

6.9AI Score

0.015EPSS

2019-04-04 12:00 PM
66
schneier
schneier

Hacking Instagram to Get Free Meals in Exchange for Positive Reviews

This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I could monetize a large following -- or in my desired case -- use it to have my meals paid for. So I did just that. I created an...

1.1AI Score

2019-04-02 11:16 AM
45
openvas
openvas

Fedora Update for cfitsio FEDORA-2019-3c1aed2aa9

The remote host is missing an update for...

8.8CVSS

8.8AI Score

0.009EPSS

2019-03-28 12:00 AM
15
fedora
fedora

[SECURITY] Fedora 28 Update: cfitsio-3.430-2.fc28

CFITSIO is a library of C and FORTRAN subroutines for reading and writing data files in FITS (Flexible Image Transport System) data format. CFITSIO simplifies the task of writing software that deals with FITS files by providing an easy to use set of high-level routines that insulate the programmer....

8.8CVSS

1.4AI Score

0.009EPSS

2019-03-27 03:28 AM
9
nvd
nvd

CVE-2019-6540

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5CVSS

6.4AI Score

0.001EPSS

2019-03-26 06:29 PM
cve
cve

CVE-2019-6540

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5CVSS

6.3AI Score

0.001EPSS

2019-03-26 06:29 PM
39
prion
prion

Design/Logic Flaw

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5CVSS

6.4AI Score

0.001EPSS

2019-03-26 06:29 PM
2
cvelist
cvelist

CVE-2019-6540

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.4AI Score

0.001EPSS

2019-03-26 05:47 PM
1
prion
prion

Authentication flaw

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5CVSS

6.4AI Score

0.001EPSS

2019-03-25 10:29 PM
4
nvd
nvd

CVE-2019-6538

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5CVSS

6.4AI Score

0.001EPSS

2019-03-25 10:29 PM
cve
cve

CVE-2019-6538

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5CVSS

6.4AI Score

0.001EPSS

2019-03-25 10:29 PM
41
cvelist
cvelist

CVE-2019-6538

The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro...

6.5AI Score

0.001EPSS

2019-03-25 09:26 PM
1
threatpost
threatpost

Medtronic Defibrillators Have Critical Flaws, Warns DHS

The Department of Homeland Security has issued an emergency alert warning of critical flaws allowing attackers to tamper with several Medtronic medical devices, including defibrillators. The two vulnerabilities – comprised of a medium and critical-severity flaw – exist in 20 products made by the...

2.5AI Score

0.975EPSS

2019-03-22 04:07 PM
361
thn
thn

Medtronic's Implantable Defibrillators Vulnerable to Life-Threatening Hacks

The U.S. Department of Homeland Security Thursday issued an advisory warning people of severe vulnerabilities in over a dozen heart defibrillators that could allow attackers to fully hijack them remotely, potentially putting lives of millions of patients at risk. Cardioverter Defibrillator is a...

6.5CVSS

1.4AI Score

0.001EPSS

2019-03-22 11:54 AM
93
securelist
securelist

Hacking microcontroller firmware through a USB

In this article, I want to demonstrate extracting the firmware from a secure USB device running on the Cortex M0. Who hacks video game consoles? The manufacture of counterfeit and unlicensed products is widespread in the world of video game consoles. It's a multi-billion dollar industry in which...

-0.5AI Score

0.0004EPSS

2019-03-21 04:00 PM
808
securelist
securelist

Mobile malware evolution 2018

The statistical data for this report came from all Kaspersky Lab mobile security solutions, not just Kaspersky Mobile Antivirus for Android. Consequently, the comparative data for 2017 may differ from the data for the same period published in the previous report. The analytical scope was expanded.....

-0.4AI Score

2019-03-05 10:00 AM
110
hackerone
hackerone

PuTTY (European Commission - DIGIT): Assertion `col >= 0 && col < line->cols' failed, process aborted while streaming ouput from remote server

Summary: During the course of testing putty-0.70-2019-03-01.e0a7697 on Fedora 29 compiled with clang version 7.0.1 (Fedora 7.0.1-4.fc29), we discovered it was possible to abort a remote client by streaming data at it in such a way as to trigger an assertion failure in terminal.c. putty:...

AI Score

2019-03-01 03:32 PM
8
krebs
krebs

Crypto Mining Service Coinhive to Call it Quits

Roughly one year ago, KrebsOnSecurity published a lengthy investigation into the individuals behind Coinhive[.]com, a cryptocurrency mining service that has been heavily abused to force hacked Web sites to mine virtual currency. On Tuesday, Coinhive announced plans to pull the plug on the project.....

6.8AI Score

2019-02-27 11:19 PM
51
threatpost
threatpost

Reddit Gold: Alice and Bob, Caught in a Web of Lies

Alice and Bob, the beloved (or not-so-beloved, depending) placeholder characters often used in cryptography examples, have been spotted in the middle of a web of deceit and intrigue by eagle-eyed Redditers. Think lies. Broken hearts. Even…murder. Yep, you heard that right. It all starts with the...

-0.3AI Score

2019-02-22 09:23 PM
134
packetstorm

-0.8AI Score

2019-02-14 12:00 AM
189
hackerone
hackerone

PuTTY (European Commission - DIGIT): Assertion `len == 1' failed, process aborted while streaming ouput from remote server

Summary: During the course of testing putty-0.70-2019-02-12.75dda5e on Fedora 29 compiled with clang version 7.0.1 (Fedora 7.0.1-1.fc29), we discovered it was possible to abort a remote client by streaming data at it in such a way as to trigger an assertion failure. putty: unix/gtkwin.c:3801:...

AI Score

2019-02-13 07:43 PM
27
avleonov
avleonov

No left boundary for Vulnerability Detection

It's another common problem in nearly all Vulnerability Management products. In the post "What’s wrong with patch-based Vulnerability Management checks?" I wrote about the issues in plugin descriptions, now let's see what can go wrong with the detection logic. The problem is that Vulnerability...

-0.2AI Score

2019-02-11 10:31 AM
76
malwarebytes
malwarebytes

How to browse the Internet safely at work

This Safer Internet Day, we teamed up with ethical hacking and web application security company Detectify to provide security tips for both workplace Internet users and web developers. This article is aimed at employees of all levels. If you’re a programmer looking to create secure websites, visit....

-0.7AI Score

2019-02-05 04:00 PM
90
ics
ics

Omron Multiple Product Vulnerabilities

OVERVIEW Air Force Institute of Technology researcher Stephen Dunlap has identified vulnerabilities in Omron Corporation’s CX-Programmer software, CJ2M series programmable logic controller (PLC), and CJ2H series PLC. Omron Corporation has produced new versions that mitigate these vulnerabilities......

6.7AI Score

0.003EPSS

2019-01-31 12:00 PM
30
thn
thn

FBI Mapping 'Joanap Malware' Victims to Disrupt the North Korean Botnet

The United States Department of Justice (DoJ) announced Wednesday its effort to "map and further disrupt" a botnet tied to North Korea that has infected numerous Microsoft Windows computers across the globe over the last decade. Dubbed Joanap, the botnet is believed to be part of "Hidden...

7AI Score

2019-01-31 08:03 AM
116
thn
thn

Learn Python Programming – 7 Courses Video Training Bundle

It's no secret that learning how to code is one of the most important things you can do when it comes to the beginning or furthering practically any career in programming and technology. The only problem a beginner often faces is that there are seemingly countless programming languages to choose...

0.7AI Score

2019-01-24 12:28 PM
193
threatpost
threatpost

Automotive Security: It’s More Than Just What’s Under The Hood

It’s a cool Saturday evening as I head out for a night on the town with my wife and some friends. We’re in a late model German made vehicle driving – below the speed limit – as we drive onto the open road. While focusing on the road I notice a strange effect happening to the radio as I accelerate.....

AI Score

2018-12-17 05:29 PM
21
malwarebytes
malwarebytes

How threat actors are using SMB vulnerabilities

Some of the most devastating ransomware and Trojan malware variants depend on vulnerabilities in the Windows Server Message Block (SMB) to propagate through an organization’s network. Windows SMB is a protocol used by PCs for file and printer sharing, as well as for access to remote services. A...

8.1CVSS

0.4AI Score

0.973EPSS

2018-12-14 04:00 PM
1332
prion
prion

Information disclosure

Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and...

4.6CVSS

4.7AI Score

0.001EPSS

2018-12-14 03:29 PM
4
cve
cve

CVE-2018-18984

Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and...

4.6CVSS

4.7AI Score

0.001EPSS

2018-12-14 03:29 PM
24
nvd
nvd

CVE-2018-18984

Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and...

4.6CVSS

4.7AI Score

0.001EPSS

2018-12-14 03:29 PM
1
cvelist
cvelist

CVE-2018-18984

Medtronic CareLink 2090 Programmer CareLink 9790 Programmer 29901 Encore Programmer, all versions, The affected products do not encrypt or do not sufficiently encrypt the following sensitive information while at rest PII and...

4.7AI Score

0.001EPSS

2018-12-14 03:00 PM
1
threatpost
threatpost

Linux.org Redirected to NSFW Page Spewing Racial Epithets

The Linux organization said late Friday that its main domain, Linux.org, was hacked and defaced in a DNS hijacking incident. The group said that someone was able to compromise the registrar account for the domain and point its DNS to another server — as well as lock administrators out from...

0.5AI Score

2018-12-11 02:28 PM
11
zdi
zdi

OMRON CX-One CX-Programmer CXP File Parsing Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The issue results from the lack of...

7.8CVSS

4.9AI Score

0.001EPSS

2018-12-10 12:00 AM
10
openvas
openvas

Omron CX-Programmer Detection (Windows SMB Login)

SMB login-based detection of Omron...

7.1AI Score

2018-12-06 12:00 AM
9
prion
prion

Code injection

In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code...

7.8CVSS

7.7AI Score

0.001EPSS

2018-12-04 10:29 PM
1
nvd
nvd

CVE-2018-18989

In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code...

7.8CVSS

7.7AI Score

0.001EPSS

2018-12-04 10:29 PM
nvd
nvd

CVE-2018-18993

Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a...

7.8CVSS

8.1AI Score

0.323EPSS

2018-12-04 10:29 PM
prion
prion

Stack overflow

Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a...

7.8CVSS

8.1AI Score

0.323EPSS

2018-12-04 10:29 PM
2
cve
cve

CVE-2018-18989

In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code...

7.8CVSS

7.6AI Score

0.001EPSS

2018-12-04 10:29 PM
27
cve
cve

CVE-2018-18993

Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a...

7.8CVSS

8AI Score

0.323EPSS

2018-12-04 10:29 PM
30
cvelist
cvelist

CVE-2018-18989

In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code...

7.7AI Score

0.001EPSS

2018-12-04 10:00 PM
1
cvelist
cvelist

CVE-2018-18993

Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a...

8.1AI Score

0.323EPSS

2018-12-04 10:00 PM
1
thn
thn

New Ransomware Spreading Rapidly in China Infected Over 100,000 PCs

A new piece of ransomware is spreading rapidly across China that has already infected more than 100,000 computers in the last four days as a result of a supply-chain attack... and the number of infected users is continuously increasing every hour. What's Interesting? Unlike almost every...

7.1AI Score

2018-12-04 07:16 PM
189
Total number of security vulnerabilities1358