Lucene search

K

Medtronic N'vision Clinician Programmer Security Vulnerabilities

openvas
openvas

Fedora: Security Advisory for log4j (FEDORA-2021-abbe24e41c)

The remote host is missing an update for...

10CVSS

9.5AI Score

0.976EPSS

2021-12-27 12:00 AM
4
wallarmlab
wallarmlab

PCI Penetration Test – Everything You Need to Know

Introduction For any association that cycles, stores or sends charge card information, entrance testing has been a commitment since 2013. That is the point at which the consistence necessities set up by the Payment Card Industry Security Standards Council (PCI SSC) were refreshed to mirror the...

-0.1AI Score

2021-12-23 08:41 AM
9
openvas
openvas

Fedora: Security Advisory for log4j (FEDORA-2021-66d6c484f3)

The remote host is missing an update for...

10CVSS

10AI Score

0.976EPSS

2021-12-23 12:00 AM
6
redhat
redhat

(RHSA-2021:5269) Moderate: rh-maven36-log4j12 security update

Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) For more details about the security issue(s), including the impact, a CVSS...

0.9AI Score

0.127EPSS

2021-12-22 09:14 PM
50
fedora
fedora

[SECURITY] Fedora 34 Update: log4j-2.16.0-1.fc34

Log4j is a tool to help the programmer output log statements to a variety of output...

10CVSS

1.3AI Score

0.976EPSS

2021-12-22 01:14 AM
26
centos
centos

log4j security update

CentOS Errata and Security Advisory CESA-2021:5206 Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) For more details about the...

7.5CVSS

9.6AI Score

0.127EPSS

2021-12-21 09:36 PM
124
redhat
redhat

(RHSA-2021:5206) Moderate: log4j security update

Log4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) For more details about the security issue(s), including the impact, a CVSS...

0.9AI Score

0.127EPSS

2021-12-20 08:38 AM
79
openvas
openvas

Fedora: Security Advisory for log4j (FEDORA-2021-017d19088b)

The remote host is missing an update for...

7.5AI Score

2021-12-20 12:00 AM
4
openvas
openvas

Fedora: Security Advisory for ldns (FEDORA-2021-bb6f4df303)

The remote host is missing an update for...

7.5AI Score

2021-12-20 12:00 AM
4
openvas
openvas

Fedora: Security Advisory for ldns (FEDORA-2021-75d5f6c531)

The remote host is missing an update for...

7.5AI Score

2021-12-20 12:00 AM
1
fedora
fedora

[SECURITY] Fedora 35 Update: log4j-2.16.0-1.fc35

Log4j is a tool to help the programmer output log statements to a variety of output...

1.3AI Score

2021-12-18 01:23 AM
3
fedora
fedora

[SECURITY] Fedora 35 Update: ldns-1.8.1-3.fc35

ldns is a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. We also define a higher level API which allows a programmer to (for instance) create or sign...

2.3AI Score

2021-12-17 01:13 AM
6
fedora
fedora

[SECURITY] Fedora 34 Update: ldns-1.8.1-3.fc34

ldns is a library with the aim to simplify DNS programming in C. All low-level DNS/DNSSEC operations are supported. We also define a higher level API which allows a programmer to (for instance) create or sign...

2.3AI Score

2021-12-17 01:06 AM
4
wallarmlab
wallarmlab

What Is Local File Inclusion Vulnerability?

Introduction This article clarifies what nearby record consideration (LFI) weaknesses are, including the way assailants can take advantage of them on weak web applications and what safe coding practices can assist you with forestalling local document incorporation assaults. Record incorporations...

-0.2AI Score

2021-12-16 05:59 AM
14
cert
cert

Apache Log4j allows insecure JNDI lookups

Overview Apache Log4j allows insecure JNDI lookups that could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the vulnerable Java application using Log4j. CISA has published Apache Log4j Vulnerability Guidance and provides a Software List. Description The....

10CVSS

10AI Score

EPSS

2021-12-15 12:00 AM
987
openvas
openvas

Fedora: Security Advisory for log4j (FEDORA-2021-f0f501d01f)

The remote host is missing an update for...

10CVSS

10AI Score

0.976EPSS

2021-12-15 12:00 AM
3
fedora
fedora

[SECURITY] Fedora 35 Update: log4j-2.15.0-1.fc35

Log4j is a tool to help the programmer output log statements to a variety of output...

10CVSS

1.3AI Score

0.976EPSS

2021-12-13 05:13 PM
82
securelist
securelist

CVE-2021-44228 vulnerability in Apache Log4j library

Updated 2021-12-20 CVE-2021-44228 and CVE-2021-45046 summary A couple of weeks ago information security media reported the discovery of the critical vulnerability CVE-2021-44228 in the Apache Log4j library (CVSS severity level 10 out of 10). The threat, also named Log4Shell or LogJam, is a Remote.....

10CVSS

0.9AI Score

0.976EPSS

2021-12-13 02:10 PM
1276
nessus
nessus

RHEL 8 : Red Hat OpenStack Platform 16.1 (python-eventlet) (RHSA-2021:5071)

The remote Redhat Enterprise Linux 8 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2021:5071 advisory. Eventlet is a networking library written in Python. It achieves high scalability by using non-blocking io while at the same time retaining...

5.3CVSS

5.9AI Score

0.001EPSS

2021-12-11 12:00 AM
17
redhat
redhat

(RHSA-2021:5071) Moderate: Red Hat OpenStack Platform 16.1 (python-eventlet) security update

Eventlet is a networking library written in Python. It achieves high scalability by using non-blocking io while at the same time retaining high programmer usability by using coroutines to make the non-blocking io operations appear blocking at the source code level. Security Fix(es): improper...

1AI Score

0.001EPSS

2021-12-09 07:50 PM
10
d0znpp
d0znpp

What is AES Advanced Encryption Standard ❓

In any case, AES cipher is the famous framework that aids in digital encoding facts making use of a maintained 128-digit, 192-piece, or 256-cycle symmetric encryption estimate from the Advanced Encryption Standard (AES), additionally called FIPS 197. The AES is a PC protection general for...

-0.4AI Score

2021-12-03 08:04 AM
21
cnvd
cnvd

Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 has an unspecified vulnerability (CNVD-2022-77534)

The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is a portable cardiac rhythm management (Crm) programming system from Boston Scientific, Inc. Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is a portable rhythm management (Crm)...

6.8CVSS

2.1AI Score

0.001EPSS

2021-11-05 12:00 AM
2
cnvd
cnvd

Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 Encryption Error Vulnerability

The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is a portable cardiac rhythm management (Crm) programming system from Boston Scientific, Inc. The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is vulnerable to an encryption error that.....

6.8CVSS

2AI Score

0.001EPSS

2021-11-05 12:00 AM
7
cnvd
cnvd

Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 Data Validation Error Vulnerability

The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is a portable cardiac rhythm management (Crm) programming system from Boston Scientific, Inc. The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is vulnerable to a data validation error...

6.8CVSS

3.1AI Score

0.001EPSS

2021-11-05 12:00 AM
3
cnvd
cnvd

Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 Access Control Error Vulnerability

The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is a portable cardiac rhythm management (Crm) programming system from Boston Scientific, Inc. The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is vulnerable to an access control error...

7.6CVSS

2.9AI Score

0.001EPSS

2021-11-05 12:00 AM
3
cnvd
cnvd

Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 has an unspecified vulnerability

The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 is a portable cardiac rhythm management (Crm) programming system from Boston Scientific, Inc. The Boston Scientific ZOOM LATITUDE Programmer/Recorder/Monitor (PRM) Model 3120 contains a security vulnerability that...

6.4CVSS

1.7AI Score

0.001EPSS

2021-11-05 12:00 AM
7
pentestpartners
pentestpartners

DCOM abuse and lateral movement with Cobalt Strike

Introduction When researching lateral movement techniques I came across a post from Raphael Mudge (of Cobalt Strike fame). He details scripting an Aggressor Script for Matt Nelson’s MMC20.Application Lateral Movement technique. Reading that post spurred me to make my own DCOM based lateral...

7.5AI Score

2021-11-03 06:53 AM
12
ics
ics

WECON PI Studio (Update A)

EXECUTIVE SUMMARY --------- Begin Update A Part 1 of 4 --------- CVSS v3 7.8 ATTENTION: Low attack complexity --------- End Update A Part 1 of 4 --------- Vendor: WECON Technology Co., Ltd. (WECON) Equipment: PI Studio Vulnerabilities: Stack-based Buffer Overflow, Out-of-bounds Write,...

9.8CVSS

7.9AI Score

0.017EPSS

2021-11-02 12:00 PM
514
openvas
openvas

Fedora: Security Advisory for jdom (FEDORA-2021-f88d2dcc47)

The remote host is missing an update for...

7.5CVSS

7.7AI Score

0.005EPSS

2021-10-30 12:00 AM
2
fedora
fedora

[SECURITY] Fedora 35 Update: jdom-1.1.3-27.fc35

JDOM is, quite simply, a Java representation of an XML document. JDOM provides a way to represent that document for easy and efficient reading, manipulation, and writing. It has a straightforward API, is a lightweight and fast, and is optimized for the Java programmer. It's an alternative to DOM...

7.5CVSS

1.8AI Score

0.005EPSS

2021-10-29 11:26 PM
12
thn
thn

Russian TrickBot Gang Hacker Extradited to U.S. Charged with Cybercrime

A Russian national, who was arrested in South Korea last month and extradited to the U.S. on October 20, appeared in a federal court in the state of Ohio on Thursday to face charges for his alleged role as a member of the infamous TrickBot group. Court documents showed that Vladimir Dunaev, 38,...

1.4AI Score

2021-10-29 07:33 AM
19
hackread
hackread

Facebook sues Ukrainian man for scraping and selling 178m users’ data

By Deeba Ahmed Facebook tracked down the programmer after he mistakenly used the same username and contact information on email and job portals. This is a post from HackRead.com Read the original post: Facebook sues Ukrainian man for scraping and selling 178m users'...

2.8AI Score

2021-10-25 03:24 PM
14
d0znpp
d0znpp

Credential Stuffing Attack: ❗️ Definition and Protection

Introducing A new SecureAuth study discovered that 53% of shoppers reuse similar secret phrase for various accounts. When login credentials are presented to programmers, even once, they can be utilized to get to a large number of records, regardless of whether it is an email account, medical...

-0.1AI Score

2021-10-20 06:52 PM
40
threatpost
threatpost

A Guide to Doing Cyberintelligence on a Restricted Budget

For those in the industry, it comes as no surprise that many cybersecurity programs have been impacted by loss of revenue during the pandemic. From cutting tooling and feed budgets to reduction in staff, it’s been challenging at best. In a recent SANS 2021 survey, “Threat Hunting In Uncertain...

-0.5AI Score

2021-10-19 03:12 PM
21
googleprojectzero
googleprojectzero

How a simple Linux kernel memory corruption bug can lead to complete system compromise

An analysis of current and potential kernel security mitigations Posted by Jann Horn, Project Zero Introduction This blog post describes a straightforward Linux kernel locking bug and how I exploited it against Debian Buster's 4.19.0-13-amd64 kernel. Based on that, it explores options for security....

7.5CVSS

8.6AI Score

0.004EPSS

2021-10-19 12:00 AM
66
openvas
openvas

Fedora: Security Advisory for libssh (FEDORA-2021-f2a020a065)

The remote host is missing an update for...

6.5CVSS

6.9AI Score

0.006EPSS

2021-10-08 12:00 AM
4
fedora
fedora

[SECURITY] Fedora 33 Update: libssh-0.9.6-1.fc33

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, trans fer files, use a secure and transparent tunnel for your remote...

6.5CVSS

7.1AI Score

0.006EPSS

2021-10-07 05:08 PM
11
cve
cve

CVE-2021-38396

The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted...

6.8CVSS

6.5AI Score

0.001EPSS

2021-10-04 06:15 PM
21
nvd
nvd

CVE-2021-38396

The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted...

6.8CVSS

0.001EPSS

2021-10-04 06:15 PM
1
prion
prion

Design/Logic Flaw

The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted...

6.8CVSS

6.6AI Score

0.001EPSS

2021-10-04 06:15 PM
3
openvas
openvas

Fedora: Security Advisory for libssh (FEDORA-2021-288925ac19)

The remote host is missing an update for...

6.5CVSS

6.9AI Score

0.006EPSS

2021-10-02 12:00 AM
3
openvas
openvas

Fedora: Security Advisory for libssh (FEDORA-2021-ec797b6a96)

The remote host is missing an update for...

6.5CVSS

6.9AI Score

0.006EPSS

2021-10-02 12:00 AM
3
thn
thn

Incentivizing Developers is the Key to Better Security Practices

Professional developers want to embrace DevSecOps and write secure code, but their organizations need to support this seachange if they want that effort to grow. The cyber threat landscape is becoming more complex by the day. Attackers are constantly scanning networks for vulnerable applications,.....

-0.6AI Score

2021-09-30 01:32 PM
17
ics
ics

Boston Scientific Zoom Latitude

EXECUTIVE SUMMARY CVSS v3 6.9 ATTENTION: Low attack complexity Vendor: Boston Scientific Equipment: ZOOM LATITUDE Programmer/Recorder/Monitor Model 3120 Vulnerabilities: Use of Password Hash with Insufficient Computational Effort, Missing Protection Against Hardware Reverse Engineering Using...

7.6CVSS

7.3AI Score

0.001EPSS

2021-09-30 12:00 PM
36
cvelist
cvelist

CVE-2021-38396 Missing Support Integrity Check for Boston Scientific Zoom Latitude

The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted...

6.5CVSS

6.7AI Score

0.001EPSS

2021-09-30 12:00 AM
fedora
fedora

[SECURITY] Fedora 34 Update: libssh-0.9.6-1.fc34

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, trans fer files, use a secure and transparent tunnel for your remote...

6.5CVSS

7.1AI Score

0.006EPSS

2021-09-29 01:10 AM
12
fedora
fedora

[SECURITY] Fedora 35 Update: libssh-0.9.6-1.fc35

The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, trans fer files, use a secure and transparent tunnel for your remote...

6.5CVSS

7.1AI Score

0.006EPSS

2021-09-29 12:20 AM
12
securelist
securelist

Wake me up till SAS summit ends

What do cyberthreats, Kubernetes and donuts have in common – except that all three end in "ts", that is? All these topics will be mentioned during the new SAS@Home online conference, scheduled for September 28th-29th, 2021. To be more specific, there will be a workshop titled, "Prevent & Detect...

6.8AI Score

2021-09-23 08:00 AM
14
trellix
trellix

BlackMatter Ransomware Analysis; The Dark Side Returns

ARCHIVED STORY BlackMatter Ransomware Analysis; The Dark Side Returns By Alexandre Mundo and Marc Elias · September 22, 2021 BlackMatter is a new ransomware threat discovered at the end of July 2021. This malware started with a strong group of attacks and some advertising from its developers that.....

7AI Score

2021-09-22 12:00 AM
3
trellix
trellix

BlackMatter Ransomware Analysis; The Dark Side Returns

ARCHIVED STORY BlackMatter Ransomware Analysis; The Dark Side Returns By Alexandre Mundo and Marc Elias · September 22, 2021 BlackMatter is a new ransomware threat discovered at the end of July 2021. This malware started with a strong group of attacks and some advertising from its developers that.....

7AI Score

2021-09-22 12:00 AM
10
Total number of security vulnerabilities1358