New vulnerabilities from the NVD: CVE-2020-11095 | | In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2. Published at: June 23, 2020 at 01:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-11068 | | In LoRaMac-node before 4.4.4, a reception buffer overflow can happen due to the received buffer size not being checked. This has been fixed in 4.4.4. Published at: June 23, 2020 at 08:15PM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10740 | | A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly. Published at: June 22, 2020 at 09:15PM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10736 | | An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks. Published at: June 22, 2020 at 09:15PM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10561 | | An issue was discovered on Xiaomi Mi Jia ink-jet printer < 3.4.6_0138. Injecting parameters to ippserver through the web management background, resulting in command execution vulnerabilities. Published at: June 24, 2020 at 08:15PM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10280 | | The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard. Published at: June 24, 2020 at 09:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10279 | | MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race conditions, insecure home directory configurations and defaults that facilitate Denial of Service (DoS) attacks. Published at: June 24, 2020 at 09:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10278 | | The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10277 | | There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10276 | | The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not affected (thus it is hard to detect before something happens) though the laser scanner configuration can also be affected altering further the safety of the device. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10275 | | The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10274 | | The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10273 | | MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed intellectual property and data. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10272 | | MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10271 | | MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS). Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10270 | | Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. This flaw allows cyber attackers to take control of the robot remotely and make use of the default user interfaces MiR has created, lowering the complexity of attacks and making them available to entry-level attackers. More elaborated attacks can also be established by clearing authentication and sending network requests directly. We have confirmed this flaw in MiR100 and MiR200 but according to the vendor, it might also apply to MiR250, MiR500 and MiR1000. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10269 | | One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. We have confirmed this flaw in MiR100 and MiR200 but it might also apply to MiR250, MiR500 and MiR1000. Published at: June 24, 2020 at 08:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-3865 | | A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name. Published at: June 22, 2020 at 10:15PM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-20409 | | The way in which velocity templates were used in Atlassian Jira Server and Data Center prior to version 8.8.0 allowed remote attackers to gain remote code execution if they were able to exploit a server side template injection vulnerability. Published at: June 23, 2020 at 09:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-14894 | | A flaw was found in the CloudForms management engine version 5.10 and CloudForms management version 5.11, which triggered remote code execution through NFS schedule backup. An attacker logged into the management console could use this flaw to execute arbitrary shell commands on the CloudForms server as root. Published at: June 22, 2020 at 09:15PM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-14094 | | Integer overflow in diag command handler when user inputs a large value for number of tasks field in the request packet in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8053, APQ8096AU, APQ8098, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QM215, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 Published at: June 22, 2020 at 10:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-14092 (mdm9206_firmware, mdm9207c_firmware, mdm9607_firmware, rennell_firmware, saipan_firmware, sm8150_firmware, sm8250_firmware, sxr2130_firmware) | | System Services exports services without permission protect and can lead to information exposure in Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9207C, MDM9607, Rennell, Saipan, SM8150, SM8250, SXR2130 Published at: June 22, 2020 at 10:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-14091 (mdm9607_firmware, qcs405_firmware, rennell_firmware, saipan_firmware, sc8180x_firmware, sdx55_firmware, sm8150_firmware, sm8250_firmware, sxr2130_firmware) | | Double free issue in NPU due to lack of resource locking mechanism to avoid race condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9607, QCS405, Rennell, Saipan, SC8180X, SDX55, SM8150, SM8250, SXR2130 Published at: June 22, 2020 at 10:15AM View on website June 25, 2020 at 08:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-20892 | | net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release. Published at: June 25, 2020 at 01:15PM View on website June 25, 2020 at 03:36PM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2018-21268 | | The traceroute (aka node-traceroute) package through 1.0.0 for Node.js allows remote command injection via the host parameter. This occurs because the Child.exec() method, which is considered to be not entirely safe, is used. In particular, an OS command can be placed after a newline character. Published at: June 25, 2020 at 08:15PM View on website June 25, 2020 at 09:36PM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10379 | | In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c. Published at: June 25, 2020 at 10:15PM View on website June 25, 2020 at 11:36PM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10378 | | In libImaging/PcxDecode.c in Pillow before 6.2.3 and 7.x before 7.0.1, an out-of-bounds read can occur when reading PCX files where state->shuffle is instructed to read beyond state->buffer. Published at: June 25, 2020 at 10:15PM View on website June 25, 2020 at 11:36PM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2020-10177 | | Pillow before 6.2.3 and 7.x before 7.0.1 has multiple out-of-bounds reads in libImaging/FliDecode.c. Published at: June 25, 2020 at 10:15PM View on website June 25, 2020 at 11:36PM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-19506 | | Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the "homeplugd" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot. Published at: June 25, 2020 at 11:15PM View on website June 26, 2020 at 01:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-19505 | | Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the "Wireless" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. Published at: June 25, 2020 at 11:15PM View on website June 26, 2020 at 01:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-16213 | | Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges. Published at: June 25, 2020 at 11:15PM View on website June 26, 2020 at 01:36AM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2019-4650 | | IBM Maximo Asset Management 7.6.1.1 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 170961. Published at: June 26, 2020 at 05:15PM View on website June 26, 2020 at 07:36PM via National Vulnerability Database | New vulnerabilities from the NVD: CVE-2013-7489 | | The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution. Published at: June 26, 2020 at 11:15PM View on website June 27, 2020 at 01:36AM via National Vulnerability Database | |
| | |
Няма коментари:
Публикуване на коментар