article thumbnail

CVE-2020-12271: Zero-Day SQL Injection Vulnerability in Sophos XG Firewall Exploited in the Wild

Tenable

On April 22, Sophos published a knowledge base entry on the Sophos Community regarding the discovery of a zero-day vulnerability in the Sophos XG Firewall that was exploited in the wild. CVE-2020-12271 is a pre-authentication SQL injection vulnerability that exists in the Sophos XG Firewall/Sophos Firewall Operating System (SFOS).

Firewall 101
article thumbnail

CVE-2023-20864: VMware Aria Operations for Logs Deserialization Vulnerability

Tenable

An unauthenticated, remote attacker capable of accessing VMware Aria Operations for Logs could exploit this vulnerability in order to gain arbitrary code execution with root privileges. CVE-2023-20865 is an operating system (OS) command injection vulnerability in VMware Aria Operations for Logs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2021-34527: Microsoft Releases Out-of-Band Patch for PrintNightmare Vulnerability in Windows Print Spooler

Tenable

CVE-2021-34527 is an RCE vulnerability in the Windows Print Spooler Service , which is available across desktop and server versions of Windows operating systems. The vulnerability exists because the service does not handle privileged file operations properly. Knowledge Base Article. Affected Version. 5004953.

Windows 101
article thumbnail

Anomaly Detection Policies for Unusual Workload Credential Usage

Prisma Clud

Unwanted data movements between cloud services or accounts appear only in cloud-native logs like AWS CloudTrail or AWS Config and not in network or operating system logs. These policies are classified under the MITRE ATT&CK framework, a globally recognized knowledge base of adversary tactics and techniques.

article thumbnail

Ivanti Product Update, April 2022

Ivanti

Those offerings are now known as the following: Ivanti Neurons for Risk-Based Vulnerability Management (RBVM). Ivanti Neurons for Vulnerability Knowledge Base (VULN KB). Ivanti ZSO is a passwordless authentication solution. Modern operating systems put a drain on resources and a drag on user experience.

article thumbnail

Top 13 GitHub Alternatives in 2020 [Free and Paid]

Codegiant

Based on the Acceptable Use Policy , Microsoft Windows operating systems are not permitted with GitLab. If you have a legitimate business need to use a Windows operating system, you should refer to the Exception Process. You can create API documentation, status pages, knowledge bases, product roadmaps, etc.

article thumbnail

Data Integrity: Types, Threats, and Countermeasures

Altexsoft

For instance, you can set up a knowledge base dedicated to integrity practices. Data transfer protocol regulates how exactly the information can be sent from one device, server, or cloud to another, including security and authentication measures. Protocols standartize the actions with data. Configuration management.

Data 59