ngCERT VMware Tools vulnerability
  • Advisory
  • January 16, 2020

The issue, classified as a race condition flaw that could be exploited by an attacker to access the guest virtual machine to escalate privileges.

ngCERT 2nd Advisory on WannaCry/WCry/WCrypt0 Ransomware Warm and Remote Desktop Protocol (RDP) & Server Message Block (SMB) Protocol Vulnerability
  • Advisory
  • May 15, 2017

RDP is a protocol on Windows Operating systems that allows remote access and control of the Windows Operating System. This protocol is usually used by systems administrators to control computers running windows operating systems remotely. While the SMB protocol is commonly used by servers to communicate with computers on a domain and also used by computers to share files, printers and so on, on a network.

Multiple Security Vulnerabilities on D-LINK Home Routers
  • Advisory
  • June 17, 2020

The vulnerabilities found in the DIR-865L model of D-Link routers increases the likelihood of a malicious attack to run arbitrary commands that could lead to a denial of service attack, sniff web traffic and use the session information to gain access to password-protected portions of the website without knowing the password, and conduct the CSRF attacks.

The following are the listed vulnerabilities that has been discovered in the D-LINK home routers.

  • Improper Neutralization of Special Elements used in a Command (Command Injection)             
  • Cross-Site Request Forgery (CSRF)                        
  • Inadequate Encryption Strength       
  • Predictable seed in Pseudo-Random Number Generator      
  • Cleartext Storage of Sensitive Information                 
  • Cleartext Transmission of Sensitive Information

Local Privilege Escalation Vulnerability for VMware
  • Advisory
  • June 16, 2020

Multiple security vulnerabilities in VMware ESXi, Workstation, Fusion, VMRC and Horizon Client were privately reported to VMware. VMware Fusion, VMRC, ESXi, and Horizon Client contain a local privilege escalation vulnerability due to a Time-of-check Time-of-use (TOC/TOU) bug that still makes it possible for an attacker with low permissions to execute arbitrary code with root privileges. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.3.

Multiple Security Vulnerabilities for Adobe Products
  • Advisory
  • June 18, 2020

The vulnerabilities found in the multiple adobe products affects versions 20.1 and earlier version of adobe classics, 13.0.6 and earlier versions of the Adobe Audition, 1.5.12 and earlier versions of the adobe premiere rush, 14.2 and earlier versions of adobe premiere pro, 24.1.2 and earlier versions of adobe illustrator, and 171 and earlier versions of adobe after effects.

SaltStack FrameWork Vulnerabilities in Cisco Products
  • Advisory
  • June 19, 2020

The vulnerabilities allow an attacker who can connect to the "request server" port to bypass all authentication and authorization controls and publish arbitrary control messages, read and write files anywhere on the "master" server filesystem and steal the secret key used to authenticate to the master as root. The impact is full remote command execution as root on both the master and all minions that connect to it. The vulnerabilities are of two different classes. One being authentication bypass where functionality was unintentionally exposed to unauthenticated network clients, the other being directory traversal where untrusted input (i.e. parameters in network requests) was not sanitized correctly allowing unconstrained access to the entire filesystem of the master server.