<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>HanseSecure GmbH</provider_name><provider_url>https://hansesecure.de/en/</provider_url><title>Vulnerability in monitoring software &#x2013; HanseSecure GmbH</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="fu9k0QhsJG"&gt;&lt;a href="https://hansesecure.de/en/2020/06/vulnerability-in-monitoring-software/"&gt;Vulnerability in monitoring software&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hansesecure.de/en/2020/06/vulnerability-in-monitoring-software/embed/#?secret=fu9k0QhsJG" width="600" height="338" title="&#x201C;Vulnerability in monitoring software&#x201D; &#x2014; HanseSecure GmbH" data-secret="fu9k0QhsJG" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://hansesecure.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://hansesecure.de/wp-content/uploads/2020/06/blog-solarwinds.jpg</thumbnail_url><thumbnail_width>400</thumbnail_width><thumbnail_height>300</thumbnail_height><description>CVE CVE-2020-13912 Vulnerable software SolarWinds &#x201C;Advanced Monitoring Agent&#x201D; before 10.8.9 Vulnerability Insufficient authorization/ rights extension Timeline Description The Advanced Monitoring Agent software up to version 10.8.9 was executed when each user (remote or local) logged in. The corresponding file can be modified by all users on the system. A malicious user could exchange the file [&hellip;]</description></oembed>
