3 December 2020
?
14:26
🛡 Cybersecurity & Privacy news 🛡
❌ DeathStalker APT Spices Things Up with PowerPepper Malware ❌

A raft of obfuscation techniques turn the heat up for the hacking-for-hire operation.

📖 Read

via "Threat Post".
?
15:13
🛡 Cybersecurity & Privacy news 🛡
🕴 Researchers Bypass Next-Generation Endpoint Protection 🕴

Machine learning-based products can be tricked to classify malware as a legitimate file, new findings show.

📖 Read

via "Dark Reading".
15:13
🕴 US Officials Take Action Against 2,300 Money Mules 🕴

Eight federal law enforcement agencies participated in the Money Mule Initiative, a global crackdown on money laundering.

📖 Read

via "Dark Reading".
?
16:13
🛡 Cybersecurity & Privacy news 🛡
🕴 Cloud Security Threats for 2021 🕴

Most of these issues can be remediated, but many users and administrators don't find out about them until it's too late.

📖 Read

via "Dark Reading".
16:26
‼ CVE-2020-13524 ‼

An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-27760 ‼

In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-13542 ‼

A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-27763 ‼

A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-14351 ‼

A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-13525 ‼

The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-23726 ‼

There is a local denial of service vulnerability in Wise Care 365 5.5.4, attackers can cause computer crash (BSOD).

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-23735 ‼

In Saibo Cyber Game Accelerator 3.7.9 there is a local privilege escalation vulnerability. Attackers can use the constructed program to increase user privileges

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-13543 ‼

A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-23727 ‼

There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD).

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-27759 ‼

In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-28251 ‼

NETSCOUT AirMagnet Enterprise 11.1.4 build 37257 and earlier has a sensor escalated privileges vulnerability that can be exploited to provide someone with administrative access to a sensor, with credentials to invoke a command to provide root access to the operating system. The attacker must complete a straightforward password-cracking exercise.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-27783 ‼

A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-27761 ‼

WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-25711 ‼

A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-28923 ‼

An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-27764 ‼

In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-28175 ‼

There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges

📖 Read

via "National Vulnerability Database".
16:26
‼ CVE-2020-25693 ‼

A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.

📖 Read

via "National Vulnerability Database".
16:26
❌ TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions ❌

A new "TrickBoot" module scans for vulnerable firmware and has the ability to read, write and erase it on devices.

📖 Read

via "Threat Post".
16:40
🔏 Phishing Campaign Takes Aim at COVID-19 Vaccine Transportation Chain 🔏

The latest attack on COVID-19 vaccine research is aimed squarely at the supply chain of companies and government organizations working to keep the vaccines refrigerated in transit.

📖 Read

via "Digital Guardian".
?
17:00
🛡 Cybersecurity & Privacy news 🛡
🦿 6 security predictions that will impact healthcare in 2021 🦿

Attacks against COVID-19 vaccine developers will continue, while more reports will surface about patient data leaks in the cloud, says Kaspersky.

📖 Read

via "Tech Republic".
?
18:26
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-23741 ‼

In AnyView (network police) network monitoring software 4.6.0.1, there is a local denial of service vulnerability in AnyView, attackers can use a constructed program to cause a computer crash (BSOD).

📖 Read

via "National Vulnerability Database".
18:26
‼ CVE-2020-17527 ‼

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

📖 Read

via "National Vulnerability Database".
18:26
‼ CVE-2020-23736 ‼

There is a local denial of service vulnerability in DaDa accelerator 5.6.19.816,, attackers can use constructed programs to cause computer crashes (BSOD).

📖 Read

via "National Vulnerability Database".
18:26
‼ CVE-2020-29534 ‼

An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.

📖 Read

via "National Vulnerability Database".
18:26
‼ CVE-2020-23740 ‼

In DriverGenius 9.61.5480.28 there is a local privilege escalation vulnerability in the driver wizard, attackers can use constructed programs to increase user privileges.

📖 Read

via "National Vulnerability Database".
18:26
‼ CVE-2020-29529 ‼

HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.

📖 Read

via "National Vulnerability Database".
18:26
‼ CVE-2020-23738 ‼

There is a local denial of service vulnerability in Advanced SystemCare 13 PRO 13.5.0.174. Attackers can use a constructed program to cause a computer crash (BSOD)

📖 Read

via "National Vulnerability Database".
?
19:00
🛡 Cybersecurity & Privacy news 🛡
🦿 Phishing campaign threatens coronavirus vaccine supply chain 🦿

The emails impersonate a member company of the COVID-19 vaccine supply chain to harvest account credentials, says IBM Security X-Force.

📖 Read

via "Tech Republic".
19:13
🕴 Common Container Manager Is Vulnerable to Dangerous Exploit 🕴

Container manager vulnerability is one of several weaknesses and vulnerabilities recently disclosed for Docker.

📖 Read

via "Dark Reading".
19:27
❌ Kmart, Latest Victim of Egregor Ransomware – Report ❌

The struggling retailer's back-end services have been impacted, according to a report, just in time for the holidays.

📖 Read

via "Threat Post".
?
20:13
🛡 Cybersecurity & Privacy news 🛡
🕴 TrickBot's New Tactic Threatens Firmware 🕴

A newly discovered module checks machines for flaws in the UEFI/BIOS firmware so malware can evade detection and persist on a device.

📖 Read

via "Dark Reading".
20:13
🕴 Researchers Discover New Obfuscation-As-a-Service Platform 🕴

Researchers detail how a Android APK obfuscation service automates detection evasion for highly malicious apps.

📖 Read

via "Dark Reading".
20:26
‼ CVE-2018-21270 ‼

Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).

📖 Read

via "National Vulnerability Database".
20:26
‼ CVE-2020-26248 ‼

In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module.

📖 Read

via "National Vulnerability Database".
?
21:13
🛡 Cybersecurity & Privacy news 🛡
🕴 Potential Nation-State Actor Targets COVID-19 Vaccine Supply Chain 🕴

Companies involved in technologies for keeping vaccines cold enough for safe storage and transportation are being targeted in a sophisticated spear-phishing campaign, IBM says.

📖 Read

via "Dark Reading".
?
22:26
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-16123 ‼

An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by an attacker to expose sensitive information. Fixed in 1:13.99.3-1ubuntu2, 1:13.99.2-1ubuntu2.1, 1:13.99.1-1ubuntu3.8, 1:11.1-1ubuntu7.11, and 1:8.0-0ubuntu3.15.

📖 Read

via "National Vulnerability Database".
4 December 2020
?
03:26
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-27348 ‼

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1.

📖 Read

via "National Vulnerability Database".
?
08:26
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-29561 ‼

An issue was discovered in SonicBOOM riscv-boom 3.0.0. For LR, it does not avoid acquiring a reservation in the case where a load translates successfully but still generates an exception.

📖 Read

via "National Vulnerability Database".
08:26
‼ CVE-2020-5675 ‼

Out-of-bounds read issue in GT21 model of GOT2000 series (GT2107-WTBD all versions, GT2107-WTSD all versions, GT2104-RTBD all versions, GT2104-PMBD all versions, and GT2103-PMBD all versions), GS21 model of GOT series (GS2110-WTBD all versions and GS2107-WTBD all versions), and Tension Controller LE7-40GU-L all versions allows a remote attacker to cause a denial-of-service (DoS) condition by sending a specially crafted packet. As a result, deterioration of communication performance or a denial-of-service (DoS) condition of the TCP communication functions of the products may occur.

📖 Read

via "National Vulnerability Database".
08:26
‼ CVE-2020-29565 ‼

An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and 18.x before 18.3.3, 18.4.x, and 18.5.x. There is a lack of validation of the "next" parameter, which would allow someone to supply a malicious URL in Horizon that can cause an automatic redirect to the provided malicious URL.

📖 Read

via "National Vulnerability Database".
08:26
‼ CVE-2020-28916 ‼

hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.

📖 Read

via "National Vulnerability Database".
08:26
‼ CVE-2020-29562 ‼

The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

📖 Read

via "National Vulnerability Database".
?
11:27
🛡 Cybersecurity & Privacy news 🛡
❌ Vancouver Metro Disrupted by Egregor Ransomware ❌

The attack, which prevented Translink users from using their metro cards or to buy tickets at kiosks, is the second from the prolific threat group just this week.

📖 Read

via "Threat Post".
?
12:13
🛡 Cybersecurity & Privacy news 🛡
🕴 Flash Dies but Warning Signs Persist: A Eulogy for Tech's Terrible Security Precedent 🕴

Flash will be gone by the end of the year, but the ecosystem that allowed it to become a software security serial killer is ready to let it happen again.

📖 Read

via "Dark Reading".
12:13
🛠 Suricata IDPE 6.0.1 🛠

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

📖 Read

via "Packet Storm Security".
?
12:57
🛡 Cybersecurity & Privacy news 🛡
❌ VMware Rolls a Fix for Formerly Critical Zero-Day Bug ❌

VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to "important."

📖 Read

via "Threat Post".
?
14:11
🛡 Cybersecurity & Privacy news 🛡
🔏 Friday Five 12/4 🔏

Trickbot's new tricks, attacking vaccine cold chains, and CFAA in front of the Supreme Court - catch up on all of the week's infosec news with the Friday Five!

📖 Read

via "Digital Guardian".
?
14:27
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-27767 ‼

A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
14:27
‼ CVE-2020-27766 ‼

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.

📖 Read

via "National Vulnerability Database".
14:27
‼ CVE-2020-27765 ‼

A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
14:27
‼ CVE-2020-27771 ‼

In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
14:27
‼ CVE-2020-27408 ‼

OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.

📖 Read

via "National Vulnerability Database".
14:27
‼ CVE-2020-27409 ‼

OpenSIS Community Edition before 7.5 is affected by a cross-site scripting (XSS) vulnerability in SideForStudent.php via the modname parameter.

📖 Read

via "National Vulnerability Database".
14:27
‼ CVE-2020-27770 ‼

Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
?
15:30
🛡 Cybersecurity & Privacy news 🛡
🦿 Most used passwords for 2020: The internet's favorite curse word, name, food, and team 🦿

CyberNews analyzed more than 15 billion passwords; if your favorite one is at the top of the list, it's time to change right now.

📖 Read

via "Tech Republic".
15:43
🕴 Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely 🕴

Homomorphic encryption and federated learning could allow groups to share data and analysis while protecting the actual information.

📖 Read

via "Dark Reading".
?
16:27
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-25461 ‼

Invalid Memory Access in the fxProxyGetter function in moddable/xs/sources/xsProxy.c in Moddable SDK before OS200908 causes a denial of service (SEGV).

📖 Read

via "National Vulnerability Database".
16:27
‼ CVE-2020-25463 ‼

Invalid Memory Access in fxUTF8Decode at moddable/xs/sources/xsCommon.c:916 in Moddable SDK before OS200908 causes a denial of service (SEGV).

📖 Read

via "National Vulnerability Database".
16:27
‼ CVE-2020-25464 ‼

Heap buffer overflow at moddable/xs/sources/xsDebug.c in Moddable SDK before before 20200903. The top stack frame is only partially initialized because the stack overflowed while creating the frame. This leads to a crash in the code sending the stack frame to the debugger.

📖 Read

via "National Vulnerability Database".
16:27
‼ CVE-2020-25465 ‼

Null Pointer Dereference. in xObjectBindingFromExpression at moddable/xs/sources/xsSyntaxical.c:3419 in Moddable SDK before OS200908 causes a denial of service (SEGV).

📖 Read

via "National Vulnerability Database".
16:27
‼ CVE-2020-25462 ‼

Heap buffer overflow in the fxCheckArrowFunction function at moddable/xs/sources/xsSyntaxical.c:3562 in Moddable SDK before OS200903.

📖 Read

via "National Vulnerability Database".
16:27
❌ Novel Online Shopping Malware Hides in Social-Media Buttons ❌

The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign images.

📖 Read

via "Threat Post".
?
17:44
🛡 Cybersecurity & Privacy news 🛡
🕴 BECs and EACs: What's the Difference? 🕴

Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.

📖 Read

via "Dark Reading".
17:57
❌ High-Severity Chrome Bugs Allow Browser Hacks ❌

Desktop versions of the browser received a total of eight fixes, half rated high-severity.

📖 Read

via "Threat Post".
?
18:27
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-25449 ‼

Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column.

📖 Read

via "National Vulnerability Database".
?
18:44
🛡 Cybersecurity & Privacy news 🛡
🕴 Kmart Hit by Egregor Ransomware 🕴

Egregor is also behind recent attacks on UbiSoft and Barnes & Noble.

📖 Read

via "Dark Reading".
18:58
❌ Making Sense of the Security Sensor Landscape ❌

Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.

📖 Read

via "Threat Post".
?
19:14
🛡 Cybersecurity & Privacy news 🛡
🕴 Microsoft Cloud Security Exec Talks New Tech, WFH, Gamification 🕴

Gunter Ollman explains the benefits of CPSM technology, how IT security teams have evolved, and how the pandemic has shaped security.

📖 Read

via "Dark Reading".
?
20:27
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-27774 ‼

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:27
‼ CVE-2020-27772 ‼

A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:27
‼ CVE-2020-27773 ‼

A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:27
‼ CVE-2020-28950 ‼

The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.

📖 Read

via "National Vulnerability Database".
20:27
‼ CVE-2020-27775 ‼

A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:27
‼ CVE-2020-27776 ‼

A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
7 December 2020
?
11:30
🛡 Cybersecurity & Privacy news 🛡
❌ RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report ❌

The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.

📖 Read

via "Threat Post".
11:34
⚠ Naked Security Live – Home Wi-Fi security tips ⚠

Latest episode - watch now!

📖 Read

via "Naked Security".
?
12:16
🛡 Cybersecurity & Privacy news 🛡
🕴 Avoiding a 1984-Like Future 🕴

We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.

📖 Read

via "Dark Reading".
12:29
‼ CVE-2020-5800 ‼

The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-5799 ‼

The Eat Spray Love mobile app for both iOS and Android contains a backdoor account that, when modified, allowed privileged access to restricted functionality and to other users' data.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-27151 ‼

An issue was discovered in Kata Containers through 1.11.3 and 2.x through 2.0-rc1. The runtime will execute binaries given using annotations without any kind of validation. Someone who is granted access rights to a cluster will be able to have kata-runtime execute arbitrary binaries as root on the worker nodes.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-9247 ‼

There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-5798 ‼

inSync Client installer for macOS versions v6.8.0 and prior could allow an attacker to gain privileges of a root user from a lower privileged user due to improper integrity checks and directory permissions.

📖 Read

via "National Vulnerability Database".
?
13:16
🛡 Cybersecurity & Privacy news 🛡
🕴 Name That Toon: Winter Forecast 🕴

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

📖 Read

via "Dark Reading".
13:30
❌ QNAP High-Severity Flaws Plague NAS Systems ❌

The high-severity cross-site scripting flaws could allow remote-code injection on QNAP NAS systems.

📖 Read

via "Threat Post".
?
13:46
🛡 Cybersecurity & Privacy news 🛡
🕴 Chart: Cyberthreats Follow Workers Home 🕴

The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.

📖 Read

via "Dark Reading".
?
14:16
🛡 Cybersecurity & Privacy news 🛡
🕴 As DNA Synthesis Evolves, Cyber-Physical Attack Worries Grow 🕴

Israeli scientists warn that cybersecurity around DNA synthesis devices needs improvement -- or else the industry risks harmful DNA produced through cyber means.

📖 Read

via "Dark Reading".
14:30
‼ CVE-2020-26513 ‼

An issue was discovered in Intland codeBeamer ALM 10.x through 10.1.SP4. The ReqIF XML data, used by the codebeamer ALM application to import projects, is parsed by insecurely configured software components, which can be abused for XML External Entity Attacks.

📖 Read

via "National Vulnerability Database".
14:30
‼ CVE-2020-26122 ‼

Inspur NF5266M5 through 3.21.2 and other server M5 devices allow remote code execution via administrator privileges. The Baseboard Management Controller (BMC) program of INSPUR server is weak in checking the firmware and lacks the signature verification mechanism, the attacker who obtains the administrator's rights can control the BMC by inserting malicious code into the firmware program and bypassing the current verification mechanism to upgrade the BMC.

📖 Read

via "National Vulnerability Database".
14:30
❌ Chinese Breakthrough in Quantum Computing a Warning for Security Teams ❌

China joins Google in claiming quantum supremacy with new technology, ratcheting up RSA decryption concerns.

📖 Read

via "Threat Post".
14:30
❌ Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times ❌

In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive. Lost in the chaos was IT security.

📖 Read

via "Threat Post".
14:30
❌ Insider Report: Healthcare Security Woes Balloon in COVID-Era ❌

As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses.

📖 Read

via "Threat Post".
?
15:43
🛡 Cybersecurity & Privacy news 🛡
🔏 NSA Urges Orgs Patch Vulnerability Following Russian Exploitation 🔏

Attackers have been actively exploiting a recently uncovered command injection bug in VMware products to access protected data.

📖 Read

via "Digital Guardian".
?
16:02
🛡 Cybersecurity & Privacy news 🛡
🦿 Experian predicts 5 key data breach targets for 2021 🦿

The pandemic warfare will shift to vaccine supply chains, home networks, and data from telemedicine visits in the new year.

📖 Read

via "Tech Republic".
16:16
🕴 NortonLifeLock Acquires Avira for $360M 🕴

The all-cash transaction is expected to broaden NortonLifeLock's international presence and bring a freemium business model into its portfolio.

📖 Read

via "Dark Reading".
?
17:30
🛡 Cybersecurity & Privacy news 🛡
❌ ‘Free’ Cyberpunk 2077 Downloads Lead to Data Harvesting ❌

The hotly anticipated game -- featuring a digital Keanu Reeves as a major character -- is being used as a lure for cyberattacks.

📖 Read

via "Threat Post".
?
18:00
🛡 Cybersecurity & Privacy news 🛡
❌ Europol Warns COVID-19 Vaccine Rollout Vulnerable to Fraud, Theft ❌

With the promise of a widely available COVID-19 vaccine on the horizon, Europol, the European Union’s law-enforcement agency, has issued a warning about the rise of vaccine-related Dark Web activity. The agency joins a chorus of security professionals that have concerns about widespread attacks on the COVID-19 vaccine rollout. The warning comes after Europol discovered […]

📖 Read

via "Threat Post".
18:03
🦿 How cybercrime will cost the world $1 trillion this year 🦿

Including both financial losses and cybersecurity spending, the $1 trillion in costs will represent a 50% increase over 2018, says McAfee.

📖 Read

via "Tech Republic".
18:03
🦿 Malwarebytes: Schools still struggling with connectivity and using last year's antivirus software 🦿

About half of IT decision makers in a new survey say they have not added any cybersecurity training for teachers and students since remote learning started.

📖 Read

via "Tech Republic".
?
18:30
🛡 Cybersecurity & Privacy news 🛡
🕴 NSA Warns of Exploits Targeting Recently Disclosed VMware Vulnerability 🕴

Agency urges organizations to deploy patch as soon as possible since exploit activity is hard to detect.

📖 Read

via "Dark Reading".
18:30
🕴 The Magic Behind the Magic 🕴

And oldie but goodie and still pretty truey.

📖 Read

via "Dark Reading".
18:30
‼ CVE-2020-29595 ‼

PlugIns\IDE_ACDStd.apl in ACDSee Photo Studio Studio Professional 2021 14.0 Build 1705 has a User Mode Write AV starting at IDE_ACDStd!JPEGTransW+0x00000000000031aa.

📖 Read

via "National Vulnerability Database".
18:30
‼ CVE-2020-17521 ‼

Apache Groovy provides extension methods to aid with creating temporary directories. Prior to this fix, Groovy's implementation of those extension methods was using a now superseded Java JDK method call that is potentially not secure on some operating systems in some contexts. Users not using the extension methods mentioned in the advisory are not affected, but may wish to read the advisory for further details. Versions Affected: 2.0 to 2.4.20, 2.5.0 to 2.5.13, 3.0.0 to 3.0.6, and 4.0.0-alpha-1. Fixed in versions 2.4.21, 2.5.14, 3.0.7, 4.0.0-alpha-2.

📖 Read

via "National Vulnerability Database".
18:30
‼ CVE-2020-29597 ‼

IncomCMS 2.0 has a modules/uploader/showcase/script.php insecure file upload vulnerability. This vulnerability allows unauthenticated attackers to upload files into the server.

📖 Read

via "National Vulnerability Database".
18:30
‼ CVE-2020-29600 ‼

In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.

📖 Read

via "National Vulnerability Database".
18:30
‼ CVE-2020-29599 ‼

ImageMagick before 6.9.11-40 and 7.x before 7.0.10-40 mishandles the -authenticate option, which allows setting a password for password-protected PDF files. The user-controlled password was not properly escaped/sanitized and it was therefore possible to inject additional shell commands via coders/pdf.c.

📖 Read

via "National Vulnerability Database".
18:30
‼ CVE-2020-13945 ‼

In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.

📖 Read

via "National Vulnerability Database".
18:33
🦿 How to use an SSH config file on macOS for easier connections to your data center servers 🦿

Jack Wallen shows you how to make SSH connections even easier from your macOS machine.

📖 Read

via "Tech Republic".
?
19:00
🛡 Cybersecurity & Privacy news 🛡
❌ Rana Android Malware Updates Allow WhatsApp, Telegram IM Snooping ❌

The developers behind the Android malware have a new variant that spies on instant messages in WhatsApp, Telegram, Skype and more.

📖 Read

via "Threat Post".
19:03
🦿 Multi-factor authentication: 5 reasons not to use SMS 🦿

Using SMS as an additional means to authenticate your password is better than nothing, but it's not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA.

📖 Read

via "Tech Republic".
19:03
🦿 Top 5 reasons not to use SMS for multi-factor authentication 🦿

Using SMS as an additional means to authenticate your password is better than nothing, but it's not the most reliable. Tom Merritt lists five reasons why SMS should not be used for MFA.

📖 Read

via "Tech Republic".
?
19:21
🛡 Cybersecurity & Privacy news 🛡
🕴 Trump Signs IoT Security Bill into Law 🕴

The Internet of Things Cybersecurity Improvement Act of 2020 is now official.

📖 Read

via "Dark Reading".
19:30
❌ NSA Warns: Patched VMware Bug Under Active Exploit ❌

Feds are warning that foreign adversaries are exploiting a weeks-old bug in VMware’s Workspace One Access and VMware Identity Manager products.

📖 Read

via "Threat Post".
?
19:51
🛡 Cybersecurity & Privacy news 🛡
🕴 Phishing Campaign Targets 200M Microsoft 365 Accounts 🕴

A well-organized email spoofing campaign has been seen targeting financial services, insurance, healthcare, manufacturing, utilities, and telecom.

📖 Read

via "Dark Reading".
?
20:30
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-8566 ‼

In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims.

📖 Read

via "National Vulnerability Database".
20:30
‼ CVE-2020-8563 ‼

In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log.

📖 Read

via "National Vulnerability Database".
20:30
‼ CVE-2020-27641 ‼

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-29136. Reason: This candidate is a reservation duplicate of CVE-2020-29136. Notes: All CVE users should reference CVE-2020-29136 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.

📖 Read

via "National Vulnerability Database".
20:30
‼ CVE-2020-28935 ‼

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound/NSD is running on. It requires an attacker having access to the limited permission user Unbound/NSD runs as and point through the symlink to a critical file on the system.

📖 Read

via "National Vulnerability Database".
20:30
‼ CVE-2020-8565 ‼

In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl.

📖 Read

via "National Vulnerability Database".
20:30
‼ CVE-2020-8564 ‼

In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials.

📖 Read

via "National Vulnerability Database".
8 December 2020
?
03:30
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-25692 ‼

A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-26253 ‼

Kirby is a CMS. In Kirby CMS (getkirby/cms) before version 3.3.6, and Kirby Panel before version 2.5.14 there is a vulnerability in which the admin panel may be accessed if hosted on a .dev domain. In order to protect new installations on public servers that don't have an admin account for the Panel yet, we block account registration there by default. This is a security feature, which we implemented years ago in Kirby 2. It helps to avoid that you forget registering your first admin account on a public server. In this case – without our security block – someone else might theoretically be able to find your site, find out it's running on Kirby, find the Panel and then register the account first. It's an unlikely situation, but it's still a certain risk. To be able to register the first Panel account on a public server, you have to enforce the installer via a config setting. This helps to push all users to the best practice of registering your first Panel account on your local machine and upload it together with the rest of the site. This installation block implementation in Kirby versions before 3.3.6 still assumed that .dev domains are local domains, which is no longer true. In the meantime, those domains became publicly available. This means that our installation block is no longer working as expected if you use a .dev domain for your Kirby site. Additionally the local installation check may also fail if your site is behind a reverse proxy. You are only affected if you use a .dev domain or your site is behind a reverse proxy and you have not yet registered your first Panel account on the public server and someone finds your site and tries to login at `yourdomain.dev/panel` before you register your first account. You are not affected if you have already created one or multiple Panel accounts (no matter if on a .dev domain or behind a reverse proxy). The problem has been patched in Kirby 3.3.6. Please upgrade to this or a later version to fix the vulnerability.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-25630 ‼

A vulnerability was found in Moodle where the decompressed size of zip files was not checked against available user quota before unzipping them, which could lead to a denial of service risk. This affects versions 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-27818 ‼

A flaw was found in the check_chunk_name() function of pngcheck-2.4.0. An attacker able to pass a malicious file to be processed by pngcheck could cause a temporary denial of service, posing a low risk to application availability.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-27822 ‼

A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, and 21.0.0.Final. When an application uses the OpenTracing API's java-interceptors, there is a possibility of a memory leak. This flaw allows an attacker to impact the availability of the server. The highest threat from this vulnerability is to system availability.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-25677 ‼

Ceph-ansible 4.0.34.1 creates /etc/ceph/iscsi-gateway.conf with insecure default permissions, allowing any user to read the sensitive information within.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-25629 ‼

A vulnerability was found in Moodle where users with "Log in as" capability in a course context (typically, course managers) may gain access to some site administration capabilities by "logging in as" a System manager. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. This is fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-25631 ‼

A vulnerability was found in Moodle 3.9 to 3.9.1, 3.8 to 3.8.4 and 3.7 to 3.7.7 where it was possible to include JavaScript in a book's chapter title, which was not escaped on the "Add new chapter" page. This is fixed in 3.9.2, 3.8.5 and 3.7.8.

📖 Read

via "National Vulnerability Database".
03:30
‼ CVE-2020-25628 ‼

The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.

📖 Read

via "National Vulnerability Database".
?
12:05
🛡 Cybersecurity & Privacy news 🛡
⚠ Vishing criminals let rip with two scams at once ⚠

It would be funny if it weren't a crime.

📖 Read

via "Naked Security".
?
12:21
🛡 Cybersecurity & Privacy news 🛡
🕴 Attackers Know Microsoft 365 Better Than You Do 🕴

Users have taken to Microsoft Office 365's tools, but many are unaware of free features that come with their accounts -- features that would keep them safe.

📖 Read

via "Dark Reading".
12:30
‼ CVE-2020-29539 ‼

A Cross-Site Scripting (XSS) issue in WebUI Translation in Systran Pure Neural Server before 9.7.0 allows a threat actor to have a remote authenticated user run JavaScript from a malicious site.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-25889 ‼

A SQL injection vulnerability in Online Bus Booking System Project Using PHP/MySQL version 1.0 allows remote attackers to bypass authentication and execute arbitrary SQL commands.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-25955 ‼

There is a cross-site scripting (XSS) vulnerability in SourceCodester Student Management System Project in PHP 1.0 via the 'add subject' tab.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-29540 ‼

API calls in the Translation API feature in Systran Pure Neural Server before 9.7.0 allow a threat actor to use the Systran Pure Neural Server as a Denial-of-Service proxy by sending a large amount of translation requests to a destination host on any given TCP port regardless of whether a web service is running on the destination port.

📖 Read

via "National Vulnerability Database".
12:30
‼ CVE-2020-17531 ‼

A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.

📖 Read

via "National Vulnerability Database".
12:33
🦿 How the coronavirus outbreak will affect cybersecurity in 2021 🦿

Ensuring security for employees working remotely was cited as the biggest challenge going into the new year, says Check Point.

📖 Read

via "Tech Republic".
?
14:18
🛡 Cybersecurity & Privacy news 🛡
❌ Adobe Warns Windows, macOS Users of Critical-Severity Flaws ❌

Adobe fixed three critical-severity flaws in Adobe Prelude, Adobe Experience Manager and Adobe Lightroom.

📖 Read

via "Threat Post".
14:18
🛠 OpenSSL Toolkit 1.1.1i 🛠

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

📖 Read

via "Packet Storm Security".
14:30
‼ CVE-2020-29575 ‼

The official elixir Docker images before 1.8.0-alpine (Alpine specific) contain a blank password for a root user. Systems using the elixir Linux Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-26255 ‼

Kirby is a CMS. In Kirby CMS (getkirby/cms) before version 3.4.5, and Kirby Panel before version 2.5.14 , an editor with full access to the Kirby Panel can upload a PHP .phar file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel access *cannot* use this attack vector. The problem has been patched in Kirby 2.5.14 and Kirby 3.4.5. Please update to one of these or a later version to fix the vulnerability. Note: Kirby 2 reaches end of life on December 31, 2020. We therefore recommend to upgrade your Kirby 2 sites to Kirby 3. If you cannot upgrade, we still recommend to update to Kirby 2.5.14.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29564 ‼

The official Consul Docker images 0.7.1 through 1.4.2 contain a blank password for a root user. System using the Consul Docker container deployed by affected versions of the Docker image may allow a remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29579 ‼

The official Express Gateway Docker images before 1.14.0 contain a blank password for a root user. Systems using the Express Gateway Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29580 ‼

The official storm Docker images before 1.2.1 contain a blank password for a root user. Systems using the Storm Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-1971 ‼

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29601 ‼

The official notary docker images before signer-0.6.1-1 contain a blank password for a root user. System using the notary docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29602 ‼

The official irssi docker images before 1.1-alpine (Alpine specific) contain a blank password for a root user. System using the irssi docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29576 ‼

The official eggdrop Docker images before 1.8.4rc2 contain a blank password for a root user. Systems using the Eggdrop Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29581 ‼

The official spiped docker images before 1.5-alpine contain a blank password for a root user. Systems using the spiped docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-26254 ‼

omniauth-apple is the OmniAuth strategy for "Sign In with Apple" (RubyGem omniauth-apple). In omniauth-apple before version 1.0.1 attackers can fake their email address during authentication. This vulnerability impacts applications using the omniauth-apple strategy of OmniAuth and using the info.email field of OmniAuth's Auth Hash Schema for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users. Applications not using info.email for identification but are instead using the uid field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of info.email is being used for other purposes. Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29578 ‼

The official piwik Docker images before fpm-alpine (Alpine specific) contain a blank password for a root user. Systems using the Piwik Docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access.

📖 Read

via "National Vulnerability Database".
14:31
‼ CVE-2020-29577 ‼

The official znc docker images before 1.7.1-slim contain a blank password for a root user. Systems using the znc docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.

📖 Read

via "National Vulnerability Database".
14:31
❌ Critical, Unpatched Bug Opens GE Radiological Devices to Remote Code Execution ❌

A CISA alert is flagging a critical default credentials issue that affects 100+ types of devices found in hospitals, from MRI machines to surgical imaging.

📖 Read

via "Threat Post".
14:34
🦿 How to protect yourself from gift card scams 🦿

With the holiday season in bloom, watch out for scams that promise free gift cards or offer to check your gift card balance, says Bolster.

📖 Read

via "Tech Republic".
14:34
🦿 Linux Foundation debuts new, secure, open source cloud native access management software platform 🦿

Based on the Gluu server, the Janssen Project prioritizes security and performance and features signing and encryption functionalities.

📖 Read

via "Tech Republic".
?
15:21
🛡 Cybersecurity & Privacy news 🛡
🕴 Keeping Cyber Secure at Christmas 🕴

Sylvain Cortes, Security Evangelist and cybersecurity expert at Alsid, highlights the need for security departments to raise awareness through their organizations over cyber threats this Christmas.

📖 Read

via "Dark Reading".
?
15:51
🛡 Cybersecurity & Privacy news 🛡
🕴 Fortinet Purchases Panopta 🕴

The acquisition is intended to improve the visibility and automated response capabilities of Fortinet's Security Fabri.

📖 Read

via "Dark Reading".
?
16:21
🛡 Cybersecurity & Privacy news 🛡
🕴 Gula Tech Foundation to Award $1M in Grants to Infosec Nonprofits 🕴

The first Gula Tech Foundation competitive grant program will focus on increasing African American engagement in cybersecurity.

📖 Read

via "Dark Reading".
16:21
🕴 Why Compliance Is No Longer King for Financial Services Cybersecurity 🕴

Financial services companies' experience in risk management serves them well when it comes to minimizing their cyber-risk.

📖 Read

via "Dark Reading".
16:31
❌ The Remote-Work Transition Shifts Demand for Cyber Skills ❌

According to Cyberseek, an interactive mapping tool that tracks the current state of the security job market, there are more than half a million open cybersecurity positions available in the U.S. alone (522,000).

📖 Read

via "Threat Post".
?
16:51
🛡 Cybersecurity & Privacy news 🛡
🕴 Dragos Nets $110M in Series C Led by Major Global Energy, Manufacturing, Oil & Gas Company Investors 🕴

National Grid Partners, Saudi Aramco Energy Ventures, and Hewlett Packard Enterprise led the latest funding round for the ICS/OT security company.

📖 Read

via "Dark Reading".
?
17:31
🛡 Cybersecurity & Privacy news 🛡
❌ Apple Manufacturer Foxconn Confirms Cyberattack ❌

Manufacturing powerhouse confirmed North American operations impacted by November cyberattack.

📖 Read

via "Threat Post".
17:31
❌ Microsoft Wraps Up a Lighter Patch Tuesday for the Holidays ❌

Nine critical bugs and 58 overall fixes mark the last scheduled security advisory of 2020.

📖 Read

via "Threat Post".
?
18:15
🛡 Cybersecurity & Privacy news 🛡
❌ Divers Pull Rare Surviving WWII Enigma Cipher Machine from Bottom of the Baltic ❌

This sealogged Nazi machine will undergo restoration.

📖 Read

via "Threat Post".
?
18:31
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-10016 ‼

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. An application may be able to execute arbitrary code with kernel privileges.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9954 ‼

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in watchOS 7.0, tvOS 14.0, macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave, iOS 14.0 and iPadOS 14.0. Playing a malicious audio file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10004 ‼

A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2. Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-14205 ‼

The DiveBook plugin 1.1.4 for WordPress is prone to improper access control in the Log Dive form because it fails to perform authorization checks. An attacker may leverage this issue to manipulate the integrity of dive logs.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9974 ‼

A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. A malicious application may be able to determine kernel memory layout.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10009 ‼

A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A sandboxed process may be able to circumvent sandbox restrictions.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-27894 ‼

The issue was addressed with additional user controls. This issue is fixed in macOS Big Sur 11.0.1. Users may be unable to remove metadata indicating where files were downloaded from.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9977 ‼

A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.0 and iPadOS 14.0. A malicious application may be able to determine a user's open tabs in Safari.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10014 ‼

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to break out of its sandbox.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9987 ‼

An inconsistent user interface issue was addressed with improved state management. This issue is fixed in Safari 14.0. Visiting a malicious website may lead to address bar spoofing.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9950 ‼

A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, tvOS 14.0, Safari 14.0, iOS 14.0 and iPadOS 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9999 ‼

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iTunes for Windows 12.10.9. Processing a maliciously crafted text file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10012 ‼

An access issue was addressed with improved access restrictions. This issue is fixed in macOS Big Sur 11.0.1. Processing a maliciously crafted document may lead to a cross site scripting attack.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10013 ‼

A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9945 ‼

A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, Safari 14.0.1. Visiting a malicious website may lead to address bar spoofing.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-28946 ‼

An improper webserver configuration on Plum IK-401 devices with firmware before 1.02 allows an attacker (with network access to the device) to obtain the configuration file, including hashed credential data. Successful exploitation could allow access to hashed credential data with a single unauthenticated GET request.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10010 ‼

A path handling issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. A local attacker may be able to elevate their privileges.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-9989 ‼

The issue was addressed with improved deletion. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0. A local user may be able to discover a user’s deleted messages.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10006 ‼

This issue was addressed with improved entitlements. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to access restricted files.

📖 Read

via "National Vulnerability Database".
18:31
‼ CVE-2020-10007 ‼

A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to determine kernel memory layout.

📖 Read

via "National Vulnerability Database".
18:34
🦿 Standalone 5G is more secure than previous network generations 🦿

Business leaders are spending close to a quarter of their budget on 5G security and will increase that spend in the next 12–18 months, according to a new report.

📖 Read

via "Tech Republic".
18:43
🔏 Healthcare Organization Confirms Ex-Employee Accessed Patient Data 🔏

The news, while familiar, is yet another reminder of the importance of securing critical patient data.

📖 Read

via "Digital Guardian".
?
19:21
🛡 Cybersecurity & Privacy news 🛡
🕴 Microsoft Fixes 58 CVEs for December Patch Tuesday 🕴

The last Patch Tuesday of 2020 brings fixes for Critical vulnerabilities in Microsoft SharePoint and Exchange.

📖 Read

via "Dark Reading".
19:31
❌ FireEye Cyberattack Compromises Red-Team Security Tools ❌

An attacker stole FireEye's Red Team assessment tools that the company uses to test its customers’ security.

📖 Read

via "Threat Post".
?
19:52
🛡 Cybersecurity & Privacy news 🛡
🕴 Nation-State Hackers Breached FireEye, Stole Its Red Team Tools 🕴

"Novel techniques" used by the attackers cheated security tools and forensics, according to FireEye CEO Kevin Mandia.

📖 Read

via "Dark Reading".
20:01
❌ Google Patches Critical Wi-Fi and Audio Bugs in Android Handsets ❌

Google updates its mobile OS, fixing ten critical bugs, including one remote code execution flaw.

📖 Read

via "Threat Post".
?
20:22
🛡 Cybersecurity & Privacy news 🛡
🕴 Open-Source Developers Still Not Interested in Secure Coding 🕴

Security and development are still two different worlds, with open-source developers resistant to spending time finding and fixing vulnerabilities.

📖 Read

via "Dark Reading".
20:31
‼ CVE-2020-27910 ‼

An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27925 ‼

An issue existed in the handling of incoming calls. The issue was addressed with additional state checks. This issue is fixed in iOS 14.2 and iPadOS 14.2. A user may answer two calls simultaneously without indication they have answered a second call.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27821 ‼

A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27917 ‼

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to code execution.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27906 ‼

Multiple integer overflows were addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. A remote attacker may be able to cause unexpected application termination or heap corruption.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27900 ‼

An issue existed in the handling of snapshots. The issue was resolved with improved permissions logic. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to preview files it does not have access to.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-25667 ‼

TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27911 ‼

An integer overflow was addressed through improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27750 ‼

A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27753 ‼

There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27752 ‼

A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27895 ‼

An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-25674 ‼

WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27927 ‼

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted font file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27755 ‼

in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-25675 ‼

In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27757 ‼

A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-25665 ‼

The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-27932 ‼

A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to execute arbitrary code with kernel privileges.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-9991 ‼

This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0, iCloud for Windows 7.21, tvOS 14.0. A remote attacker may be able to cause a denial of service.

📖 Read

via "National Vulnerability Database".
20:36
‼ CVE-2020-10017 ‼

An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
20:46
‼ CVE-2020-26256 ‼

Fast-csv is an npm package for parsing and formatting CSVs or any other delimited value file in node. In fast-cvs before version 4.3.6 there is a possible ReDoS vulnerability (Regular Expression Denial of Service) when using ignoreEmpty option when parsing. This has been patched in `v4.3.6` You will only be affected by this if you use the `ignoreEmpty` parsing option. If you do use this option it is recommended that you upgrade to the latest version `v4.3.6` This vulnerability was found using a CodeQL query which identified `EMPTY_ROW_REGEXP` regular expression as vulnerable.

📖 Read

via "National Vulnerability Database".
20:46
‼ CVE-2020-27751 ‼

A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
?
22:36
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-27556 ‼

A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device.

📖 Read

via "National Vulnerability Database".
22:36
‼ CVE-2020-27557 ‼

Unprotected Storage of Credentials vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 allows local users to gain access to the video streaming username and password via SQLite files containing plain text credentials.

📖 Read

via "National Vulnerability Database".
22:42
‼ CVE-2020-27556 ‼

A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device.

📖 Read

via "National Vulnerability Database".
22:42
‼ CVE-2020-27557 ‼

Unprotected Storage of Credentials vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 allows local users to gain access to the video streaming username and password via SQLite files containing plain text credentials.

📖 Read

via "National Vulnerability Database".
22:42
‼ CVE-2020-21665 ‼

In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the 'table' parameter passed is not filtered so a malicious parameter can be passed for SQL injection.

📖 Read

via "National Vulnerability Database".
22:42
❌ Zoom Takes on Zoom-Bombers Following FTC Settlement ❌

The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls.

📖 Read

via "Threat Post".
22:45
‼ CVE-2020-27556 ‼

A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device.

📖 Read

via "National Vulnerability Database".
22:45
‼ CVE-2020-27557 ‼

Unprotected Storage of Credentials vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 allows local users to gain access to the video streaming username and password via SQLite files containing plain text credentials.

📖 Read

via "National Vulnerability Database".
22:45
‼ CVE-2020-21665 ‼

In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the 'table' parameter passed is not filtered so a malicious parameter can be passed for SQL injection.

📖 Read

via "National Vulnerability Database".
22:45
❌ Zoom Takes on Zoom-Bombers Following FTC Settlement ❌

The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls.

📖 Read

via "Threat Post".
22:45
🕴 Chart: Undisputed Increase in Paid Claims 🕴

While the number of enterprises that hold cyber insurance might not have increased significantly over the past year, the number of enterprises that have successfully filed a breach insurance claim has.

📖 Read

via "Dark Reading".
22:45
🕴 Researchers Scan for Supply-Side Threats in Open Source 🕴

A recent project to scan the main Python repository's 268,000 packages found only a few potentially malicious programs, but work earlier this year uncovered hundreds of instances of malware.

📖 Read

via "Dark Reading".
22:45
🕴 To Pay or Not to Pay: Responding to Ransomware From a Lawyer's Perspective 🕴

The threat of data extortion adds new layers of risk when determining how to respond to a ransomware attack.

📖 Read

via "Dark Reading".
22:45
‼ CVE-2020-26701 ‼

Cross-site scripting (XSS) vulnerability in Dashboards section in Kaa IoT Platform v1.2.0 allows remote attackers to inject malicious web scripts or HTML Injection payloads via the Description parameter.

📖 Read

via "National Vulnerability Database".
?
23:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-27556 ‼

A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device.

📖 Read

via "National Vulnerability Database".
23:25
‼ CVE-2020-27557 ‼

Unprotected Storage of Credentials vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 allows local users to gain access to the video streaming username and password via SQLite files containing plain text credentials.

📖 Read

via "National Vulnerability Database".
23:25
‼ CVE-2020-21665 ‼

In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the 'table' parameter passed is not filtered so a malicious parameter can be passed for SQL injection.

📖 Read

via "National Vulnerability Database".
23:25
❌ Zoom Takes on Zoom-Bombers Following FTC Settlement ❌

The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls.

📖 Read

via "Threat Post".
23:25
🕴 Chart: Undisputed Increase in Paid Claims 🕴

While the number of enterprises that hold cyber insurance might not have increased significantly over the past year, the number of enterprises that have successfully filed a breach insurance claim has.

📖 Read

via "Dark Reading".
23:25
🕴 Researchers Scan for Supply-Side Threats in Open Source 🕴

A recent project to scan the main Python repository's 268,000 packages found only a few potentially malicious programs, but work earlier this year uncovered hundreds of instances of malware.

📖 Read

via "Dark Reading".
23:25
🕴 To Pay or Not to Pay: Responding to Ransomware From a Lawyer's Perspective 🕴

The threat of data extortion adds new layers of risk when determining how to respond to a ransomware attack.

📖 Read

via "Dark Reading".
23:25
‼ CVE-2020-26701 ‼

Cross-site scripting (XSS) vulnerability in Dashboards section in Kaa IoT Platform v1.2.0 allows remote attackers to inject malicious web scripts or HTML Injection payloads via the Description parameter.

📖 Read

via "National Vulnerability Database".
23:25
‼ CVE-2020-13351 ‼

Insufficient permission checks in scheduled pipeline API in GitLab CE/EE 13.0+ allows an attacker to read variable names and values for scheduled pipelines on projects visible to the attacker. Affected versions are >=13.0, <13.3.9,>=13.4.0, <13.4.5,>=13.5.0, <13.5.2.

📖 Read

via "National Vulnerability Database".
23:25
‼ CVE-2020-25400 ‼

Cross domain policies in Taskcafe Project Management tool before version 0.1.0 and 0.1.1 allows remote attackers to access sensitive data such as access token.

📖 Read

via "National Vulnerability Database".
23:25
‼ CVE-2020-13350 ‼

CSRF in runner administration page in all versions of GitLab CE/EE allows an attacker who's able to target GitLab instance administrators to pause/resume runners. Affected versions are >=13.5.0, <13.5.2,>=13.4.0, <13.4.5,<13.3.9.

📖 Read

via "National Vulnerability Database".
23:25
❌ COVID-19 Antigen Firm Hit by Malware Attack ❌

Global biotech firm Miltenyi, which supplies key components necessary for COVID-19 treatment research, has been battling a malware attack.

📖 Read

via "Threat Post".
23:25
🦿 The team behind the Essential PH-1 is back, and privacy is their focus 🦿

A key member of the now-defunct Essential company has returned, and privacy is his goal. Jack Wallen digs in to try and make sense of what's to come with OSOM.

📖 Read

via "Tech Republic".
23:25
🔏 Google Fixes Zero Days, NAT Slipstream Attack, in Chrome 🔏

Just days after fixing two zero day vulnerabilities, Google has rolled out yet another version of its Chrome browser, resolving a fix for last month's NAT Slipstream attack.

📖 Read

via "Digital Guardian".
23:25
🦿 Google Authenticator: How to move from one iPhone or Android device to another 🦿

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

📖 Read

via "Tech Republic".
23:25
‼ CVE-2020-25988 ‼

UPNP/Freeciv Service on port 5555 in Genexis Platinum 4410 Router V2.1 has an action 'X_GetAccess' which leaks the credentials of 'admin' account if the attacker is on the same network.

📖 Read

via "National Vulnerability Database".
9 December 2020
?
00:25
🛡 Cybersecurity & Privacy news 🛡
🦿 The team behind the Essential PH-1 is back, and privacy is their focus 🦿

A key member of the now-defunct Essential company has returned, and privacy is his goal. Jack Wallen digs in to try and make sense of what's to come with OSOM.

📖 Read

via "Tech Republic".
00:25
🔏 Google Fixes Zero Days, NAT Slipstream Attack, in Chrome 🔏

Just days after fixing two zero day vulnerabilities, Google has rolled out yet another version of its Chrome browser, resolving a fix for last month's NAT Slipstream attack.

📖 Read

via "Digital Guardian".
00:25
🦿 Google Authenticator: How to move from one iPhone or Android device to another 🦿

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

📖 Read

via "Tech Republic".
00:25
‼ CVE-2020-25988 ‼

UPNP/Freeciv Service on port 5555 in Genexis Platinum 4410 Router V2.1 has an action 'X_GetAccess' which leaks the credentials of 'admin' account if the attacker is on the same network.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-28139 ‼

SourceCodester Online Clothing Store 1.0 is affected by a cross-site scripting (XSS) vulnerability via a Offer Detail field in offer.php.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-13349 ‼

An issue has been discovered in GitLab EE affecting all versions starting from 8.12. A regular expression related to a file path resulted in the Advanced Search feature susceptible to catastrophic backtracking. Affected versions are >=8.12, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-28140 ‼

SourceCodester Online Clothing Store 1.0 is affected by an arbitrary file upload via the image upload feature of Products.php.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-28133 ‼

An issue was discovered in SourceCodester Simple Grocery Store Sales And Inventory System 1.0. There was authentication bypass in web login functionality allows an attacker to gain client privileges via SQL injection in sales_inventory/login.php.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-26405 ‼

Path traversal vulnerability in package upload functionality in GitLab CE/EE starting from 12.8 allows an attacker to save packages in arbitrary locations. Affected versions are >=12.8, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-28138 ‼

SourceCodester Online Clothing Store 1.0 is affected by a SQL Injection via the txtUserName parameter to login.php.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-28136 ‼

An Arbitrary File Upload is discovered in SourceCodester Tourism Management System 1.0 allows the user to conduct remote code execution via admin/create-package.php vulnerable page.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-13348 ‼

An issue has been discovered in GitLab EE affecting all versions starting from 10.2. Required CODEOWNERS approval could be bypassed by targeting a branch without the CODEOWNERS file. Affected versions are >=10.2, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

📖 Read

via "National Vulnerability Database".
00:25
❌ ThreatList: Pharma Mobile Phishing Attacks Turn to Malware ❌

After the breakout of the COVID-19 pandemic, mobile phishing attacks targeting pharmaceutical companies have shifted their focus from credential theft to malware delivery.

📖 Read

via "Threat Post".
00:25
❌ Defining Security Policies to Manage Remote Insider Threats ❌

This is the time to define the new normal; having well-defined policies in place will help businesses maintain its security posture while bolstering the security of the ever-increasing work-from-home population.

📖 Read

via "Threat Post".
00:25
🕴 Vulnerability Prioritization Tops Security Pros' Challenges 🕴

Why vulnerability prioritization has become a top challenge for security professionals and how security and development teams can get it right.

📖 Read

via "Dark Reading".
00:25
❌ Multiple Industrial Control System Vendors Warn of Critical Bugs ❌

Four industrial control system vendors each announced vulnerabilities that ranged from critical to high-severity.

📖 Read

via "Threat Post".
00:25
🕴 EFF, Security Experts Condemn Politicization of Election Security 🕴

Open letter, signed by high-profile security professionals and organizations, urges White House to "reverse course and support election security."

📖 Read

via "Dark Reading".
00:25
‼ CVE-2020-26551 ‼

An issue was discovered in Aviatrix Controller before R5.3.1151. Encrypted key values are stored in a readable file.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-28129 ‼

Stored Cross-site scripting (XSS) vulnerability in SourceCodester Gym Management System 1.0 allows users to inject and store arbitrary JavaScript code in index.php?page=packages via vulnerable fields 'Package Name' and 'Description'.

📖 Read

via "National Vulnerability Database".
00:25
‼ CVE-2020-26549 ‼

An issue was discovered in Aviatrix Controller before R5.4.1290. The htaccess protection mechanism to prevent requests to directories can be bypassed for file downloading.

📖 Read

via "National Vulnerability Database".
?
01:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-28915 ‼

A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.

📖 Read

via "National Vulnerability Database".
01:25
❌ Firing of CISA Chief Christopher Krebs Widely Condemned ❌

President Trump fired US cybersecurity chief over Twitter Tuesday, an act widely condemned within the cybersecurity community.

📖 Read

via "Threat Post".
01:25
🦿 Microsoft's new security chip takes PC protection to a higher level 🦿

Intel, AMD and Qualcomm will use the Microsoft-designed Pluton security processor from Xbox One and Azure Sphere in future SoCs to deliver better protection than a TPM.

📖 Read

via "Tech Republic".
01:25
🦿 Zoom: These new features will prevent trolls and meeting-crashers 🦿

Zoom hosts can now pause a meeting while they remove a disruptive participant, and a new web-scanning tool will seek out compromised meeting links.

📖 Read

via "Tech Republic".
01:25
🦿 "123456" tops list of most common passwords for 2020 🦿

People are still using very simple passwords, with many of them similar to the ones they used in 2019, according to NordPass.

📖 Read

via "Tech Republic".
01:25
🦿 How to improve the security of your public cloud 🦿

Almost all the professionals who responded to a survey from BitGlass were concerned about the security of their public cloud apps and data.

📖 Read

via "Tech Republic".
01:25
🕴 Researchers Say They've Developed Fastest Open Source IDS/IPS 🕴

With a five-processor core, "Pigasus" delivers the same performance as a system with between 100 and 700 cores, according to a team from Carnegie Mellon University's CyLab.

📖 Read

via "Dark Reading".
01:25
⚠ Sophos 2021 Threat Report: Navigating cybersecurity in an uncertain world ⚠

Here's the latest Sophos Threat Report - learn what cybercriminals are up to on Windows, Linux, Android and more

📖 Read

via "Naked Security".
01:25
🕴 How to Identify Cobalt Strike on Your Network 🕴

Common antivirus systems frequently miss Cobalt Strike, a stealthy threat emulation toolkit admired by red teams and attackers alike.

📖 Read

via "Dark Reading".
01:25
🦿 Security experts level criticism at Apple after Big Sur launch issues 🦿

Users took to social media to complain about slow systems with one report pointing to an OCSP responder as the culprit.

📖 Read

via "Tech Republic".
01:25
🦿 66% of companies say it would take 5 or more days to fully recover from a ransomware attack ransom not paid 🦿

Veritas research finds data protection strategies are not keeping pace with the complexity of the attacks enterprises are facing.

📖 Read

via "Tech Republic".
01:25
🦿 How remote working poses security risks for your organization 🦿

Companies are at greater risk due to phishing attacks, password sharing, and unsecured personal devices, says SailPoint.

📖 Read

via "Tech Republic".
01:25
‼ CVE-2020-24723 ‼

Cross Site Scripting (XSS) vulnerability in the Registration page of the admin panel in PHPGurukul User Registration & Login and User Management System With admin panel 2.1.

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-7562 ‼

A CWE-125: Out-of-Bounds Read vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause a segmentation fault or a buffer overflow when uploading a specially crafted file on the controller over FTP.

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-7564 ‼

A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause write access and the execution of commands when uploading a specially crafted file on the controller over FTP.

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-7563 ‼

A CWE-787: Out-of-bounds Write vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause corruption of data, a crash, or code execution when uploading a specially crafted file on the controller over FTP.

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-28361 ‼

Kamailio before 5.4.0, as used in Sip Express Router (SER) in Sippy Softswitch 4.5 through 5.2 and other products, allows a bypass of a header-removal protection mechanism via whitespace characters. This occurs in the remove_hf function in the Kamailio textops module.

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-28005 ‼

httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-25406 ‼

app\admin\controller\sys\Uploads.php in lemocms 1.8.x allows users to upload files to upload executable files.

📖 Read

via "National Vulnerability Database".
01:25
‼ CVE-2020-28724 ‼

Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.

📖 Read

via "National Vulnerability Database".
?
02:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-28578 ‼

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-28572 ‼

A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-28581 ‼

A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-27697 ‼

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-3471 ‼

A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to maintain bidirectional audio despite being expelled from an active Webex session. The vulnerability is due to a synchronization issue between meeting and media services on a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit could allow the attacker to maintain the audio connection of a Webex session despite being expelled.

📖 Read

via "National Vulnerability Database".
02:25
❌ Widespread Scans Underway for RCE Bugs in WordPress Websites ❌

WordPress websites using buggy Epsilon Framework themes are being hunted by hackers.

📖 Read

via "Threat Post".
02:25
🕴 Online Shopping Surge Puts Focus on Consumer Security Habits 🕴

Companies will have to tread a fine line between delivering security and a frictionless shopping experience, security firms say.

📖 Read

via "Dark Reading".
02:25
🕴 Cisco Webex Vulns Let 'Ghost' Attendees Spy on Meetings 🕴

Three vulnerabilities, patched today, could let an attacker snoop on meetings undetected after the host removes them.

📖 Read

via "Dark Reading".
02:25
‼ CVE-2020-26215 ‼

Jupyter Notebook before version 6.1.5 has an Open redirect vulnerability. A maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may appear safe, but ultimately redirect to a spoofed server on the public internet. The issue is patched in version 6.1.5.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-22723 ‼

A cross-site scripting (XSS) vulnerability in Beijing Liangjing Zhicheng Technology Co., Ltd ljcmsshop version 1.14 allows remote attackers to inject arbitrary web script or HTML via user.php by registering an account directly in the user center, and then adding the payload to the delivery address.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-15301 ‼

SuiteCRM through 7.11.13 allows CSV Injection via registration fields in the Accounts, Contacts, Opportunities, and Leads modules. These fields are mishandled during a Download Import File Template operation.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-26226 ‼

In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-14208 ‼

SuiteCRM 7.11.13 is affected by stored Cross-Site Scripting (XSS) in the Documents preview functionality. This vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-15300 ‼

SuiteCRM through 7.11.13 has an Open Redirect in the Documents module via a crafted SVG document.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-13799 ‼

Western Digital iNAND devices through 2020-06-03 allow Authentication Bypass via a capture-replay attack.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-25454 ‼

Cross-site Scripting (XSS) vulnerability in grocy 2.7.1 via the add recipe module, which gets executed when deleting the recipe.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-13356 ‼

An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.8.9. A specially crafted request could bypass Multipart protection and read files in certain specific paths on the server. Affected versions are: >=8.8.9, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2019-12412 ‼

A flaw in the libapreq2 v2.07 to v2.13 multipart parser can deference a null pointer leading to a process crash. A remote attacker could send a request causing a process crash which could lead to a denial of service attack.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-13359 ‼

The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

📖 Read

via "National Vulnerability Database".
02:25
‼ CVE-2020-13355 ‼

An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14. A path traversal is found in LFS Upload that allows attacker to overwrite certain specific paths on the server. Affected versions are: >=8.14, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.

📖 Read

via "National Vulnerability Database".
?
03:25
🛡 Cybersecurity & Privacy news 🛡
🔏 Friday Five 11/20 🔏

IoT legislation, automation in cybersecurity, and privacy rights - catch up on all of the week's infosec news with the Friday Five!

📖 Read

via "Digital Guardian".
03:25
‼ CVE-2020-13671 ‼

Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-19667 ‼

Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-7842 ‼

Improper Input validation vulnerability exists in Netis Korea D'live AP which could cause arbitrary command injection and execution when the time setting (using ntpServerlp1 parameter) for the users. This affects D'live set-top box AP(WF2429TB) v1.1.10.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-28877 ‼

Buffer overflow in in the copy_msg_element function for the devDiscoverHandle server in the TP-Link WR and WDR series, including WDR7400, WDR7500, WDR7660, WDR7800, WDR8400, WDR8500, WDR8600, WDR8620, WDR8640, WDR8660, WR880N, WR886N, WR890N, WR890N, WR882N, and WR708N.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-19668 ‼

Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-25839 ‼

NetIQ Identity Manager 4.8 prior to version 4.8 SP2 HF1 are affected by an injection vulnerability. This vulnerability is fixed in NetIQ IdM 4.8 SP2 HF1.

📖 Read

via "National Vulnerability Database".
03:25
❌ New Grelos Skimmer Variants Siphon Credit Card Data ❌

Domains related to the new variant of the Grelos web skimmer have compromised dozens of websites so far.

📖 Read

via "Threat Post".
03:25
‼ CVE-2020-28974 ‼

A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-26236 ‼

In ScratchVerifier before commit a603769, an attacker can hijack the verification process to log into someone else's account on any site that uses ScratchVerifier for logins. A possible exploitation would follow these steps: 1. User starts login process. 2. Attacker attempts login for user, and is given the same verification code. 3. User comments code as part of their normal login. 4. Before user can, attacker completes the login process now that the code is commented. 5. User gets a failed login and attacker now has control of the account. Since commit a603769 starting a login twice will generate different verification codes, causing both user and attacker login to fail. For clients that rely on a clone of ScratchVerifier not hosted by the developers, their users may attempt to finish the login process as soon as possible after commenting the code. There is no reliable way for the attacker to know before the user can finish the process that the user has commented the code, so this vulnerability only really affects those who comment the code and then take several seconds before finishing the login.

📖 Read

via "National Vulnerability Database".
03:25
🕴 How Industrial IoT Security Can Catch Up With OT/IT Convergence 🕴

Ransomware can easily make a connection between IT and OT already. How can blue teams do the same?

📖 Read

via "Dark Reading".
03:25
🕴 Facebook Messenger Flaw Enabled Spying on Android Callees 🕴

A critical flaw in Facebook Messenger on Android would let someone start an audio or video call without the victim's knowledge.

📖 Read

via "Dark Reading".
03:25
🕴 Security Pros Push for More Pervasive Threat Modeling 🕴

With the release of the "Threat Modeling Manifesto," a group of 16 security professionals hope to prompt more companies to consider the threats to software.

📖 Read

via "Dark Reading".
03:25
🦿 Study finds 31% of third-party vendors could cause significant damage to organizations if breached 🦿

Risk professionals relying on questionnaire-based assessments could be in for a rude awakening, according to Mastercard's RiskRecon and the Cyentia Institute.

📖 Read

via "Tech Republic".
03:25
❌ VMware Fixes Critical Flaw in ESXi Hypervisor ❌

The critical and important-severity flaws were found by a team at the China-based Tiunfu Cup hacking challenge.

📖 Read

via "Threat Post".
03:25
❌ Good Heavens! 10M Impacted in Pray.com Data Exposure ❌

The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists.

📖 Read

via "Threat Post".
03:25
❌ Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns ❌

Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns.

📖 Read

via "Threat Post".
03:25
‼ CVE-2020-4004 ‼

VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-28845 ‼

A CSV injection vulnerability in the Admin portal for Netskope 75.0 allows an unauthenticated user to inject malicious payload in admin's portal thus leads to compromise admin's system.

📖 Read

via "National Vulnerability Database".
03:25
‼ CVE-2020-20739 ‼

im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2019-19878 ‼

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get access to historical data from AprolSqlServer by bypassing authentication, a different vulnerability than CVE-2019-16358.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2020-28921 ‼

An issue was discovered in Devid Espenschied PC Analyser through 4.10. The PCADRVX64.SYS kernel driver exposes IOCTL functionality that allows low-privilege users to read and write to arbitrary Model Specific Registers (MSRs). This could lead to arbitrary Ring-0 code execution and escalation of privileges.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2019-19873 ‼

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get information from the AprolSqlServer DBMS by bypassing authentication, a different vulnerability than CVE-2019-16356 and CVE-2019-9983.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2019-19874 ‼

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. Some web scripts in the web interface allowed injection and execution of arbitrary unintended commands on the web server, a different vulnerability than CVE-2019-16364.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2020-27746 ‼

Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2017-15685 ‼

Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2020-27745 ‼

Slurm before 19.05.8 and 20.x before 20.02.6 has an RPC Buffer Overflow in the PMIx MPI plugin.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2017-15684 ‼

Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2020-7780 ‼

This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2017-15680 ‼

In Crafter CMS Crafter Studio 3.0.1 an IDOR vulnerability exists which allows unauthenticated attackers to view and modify administrative data.

📖 Read

via "National Vulnerability Database".
03:31
‼ CVE-2017-15686 ‼

Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal users’ cookies.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2019-19877 ‼

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get access to sensitive information outside the working directory via Directory Traversal attacks against AprolSqlServer, a different vulnerability than CVE-2019-16357.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2019-19875 ‼

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. Arbitrary commands could be injected (using Python scripts) via the AprolCluster script that is invoked via sudo and thus executes with root privileges, a different vulnerability than CVE-2019-16364.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2017-15681 ‼

In Crafter CMS Crafter Studio 3.0.1 a directory traversal vulnerability exists which allows unauthenticated attackers to overwrite files from the operating system which can lead to RCE.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2020-28922 ‼

An issue was discovered in Devid Espenschied PC Analyser through 4.10. The PCADRVX64.SYS kernel driver exposes IOCTL functionality that allows low-privilege users to read and write arbitrary physical memory. This could lead to arbitrary Ring-0 code execution and escalation of privileges.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2020-25014 ‼

A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2017-15682 ‼

In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2017-15683 ‼

In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2019-19876 ‼

An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An EnMon PHP script was vulnerable to SQL injection, a different vulnerability than CVE-2019-10006.

📖 Read

via "National Vulnerability Database".
03:32
‼ CVE-2020-10772 ‼

An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020:2414. Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fix for CVE-2020-12662, and it does not affect upstream versions of Unbound.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-27895 ‼

An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-25674 ‼

WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-27927 ‼

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted font file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-27755 ‼

in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-25675 ‼

In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-27757 ‼

A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-25665 ‼

The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-27932 ‼

A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to execute arbitrary code with kernel privileges.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-9991 ‼

This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0, iCloud for Windows 7.21, tvOS 14.0. A remote attacker may be able to cause a denial of service.

📖 Read

via "National Vulnerability Database".
03:34
‼ CVE-2020-10017 ‼

An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26256 ‼

Fast-csv is an npm package for parsing and formatting CSVs or any other delimited value file in node. In fast-cvs before version 4.3.6 there is a possible ReDoS vulnerability (Regular Expression Denial of Service) when using ignoreEmpty option when parsing. This has been patched in `v4.3.6` You will only be affected by this if you use the `ignoreEmpty` parsing option. If you do use this option it is recommended that you upgrade to the latest version `v4.3.6` This vulnerability was found using a CodeQL query which identified `EMPTY_ROW_REGEXP` regular expression as vulnerable.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-27751 ‼

A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-27614 ‼

AnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26234 ‼

Opencast before versions 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. This problem is fixed in Opencast 7.9 and Opencast 8.8 Please be aware that fixing the problem means that Opencast will not simply accept any self-signed certificates any longer without properly importing them. If you need those, please make sure to import them into the Java key store. Better yet, get a valid certificate.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26249 ‼

Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Redbot. In Red Discord Bot before version 0.1.7a an RCE exploit has been discovered. This exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This high severity exploit has been fixed on version 0.1.7a. There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26967 ‼

When listening for page changes with a Mutation Observer, a malicious web page could confuse Firefox Screenshots into interacting with elements other than those that it injected into the page. This would lead to internal errors and unexpected behavior in the Screenshots code. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26957 ‼

OneCRL was non-functional in the new Firefox for Android due to a missing service initialization. This could result in a failure to enforce some certificate revocations. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26954 ‼

When accepting a malicious intent from other installed apps, Firefox for Android accepted manifests from arbitrary file paths and allowed declaring webapp manifests for other origins. This could be used to gain fullscreen access for UI spoofing and could also lead to cross-origin attacks on targeted websites. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26952 ‼

Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
03:35
‼ CVE-2020-26969 ‼

Mozilla developers reported memory safety bugs present in Firefox 82. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
?
04:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26970 ‼

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-10146 ‼

The Microsoft Teams online service contains a stored cross-site scripting vulnerability in the displayName parameter that can be exploited on Teams clients to obtain sensitive information such as authentication tokens and to possibly execute arbitrary commands. This vulnerability was fixed for all Teams users in the online service on or around October 2020.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-27349 ‼

Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26951 ‼

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26960 ‼

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
04:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
?
05:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26970 ‼

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-10146 ‼

The Microsoft Teams online service contains a stored cross-site scripting vulnerability in the displayName parameter that can be exploited on Teams clients to obtain sensitive information such as authentication tokens and to possibly execute arbitrary commands. This vulnerability was fixed for all Teams users in the online service on or around October 2020.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-27349 ‼

Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26951 ‼

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26960 ‼

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
05:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
?
06:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26970 ‼

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-10146 ‼

The Microsoft Teams online service contains a stored cross-site scripting vulnerability in the displayName parameter that can be exploited on Teams clients to obtain sensitive information such as authentication tokens and to possibly execute arbitrary commands. This vulnerability was fixed for all Teams users in the online service on or around October 2020.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-27349 ‼

Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26951 ‼

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26960 ‼

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
06:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
?
07:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26970 ‼

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-10146 ‼

The Microsoft Teams online service contains a stored cross-site scripting vulnerability in the displayName parameter that can be exploited on Teams clients to obtain sensitive information such as authentication tokens and to possibly execute arbitrary commands. This vulnerability was fixed for all Teams users in the online service on or around October 2020.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-27349 ‼

Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26951 ‼

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26960 ‼

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
07:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
?
08:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26970 ‼

When reading SMTP server status codes, Thunderbird writes an integer value to a position on the stack that is intended to contain just one byte. Depending on processor architecture and stack layout, this leads to stack corruption that may be exploitable. This vulnerability affects Thunderbird < 78.5.1.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-10146 ‼

The Microsoft Teams online service contains a stored cross-site scripting vulnerability in the displayName parameter that can be exploited on Teams clients to obtain sensitive information such as authentication tokens and to possibly execute arbitrary commands. This vulnerability was fixed for all Teams users in the online service on or around October 2020.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-27349 ‼

Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26951 ‼

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26960 ‼

If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
08:32
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:32
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
08:32
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
08:32
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
08:40
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:40
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:40
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:40
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
08:41
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
08:41
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
08:41
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
?
09:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
09:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
09:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
09:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
?
10:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26961 ‼

When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26965 ‼

Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
10:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
10:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
10:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
?
11:22
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:22
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
11:22
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
11:22
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
11:22
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
11:22
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
11:25
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
11:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
11:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
11:25
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
11:25
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
11:31
‼ CVE-2020-26953 ‼

It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
11:31
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
11:31
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
11:31
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
11:31
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
11:31
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
?
12:02
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26968 ‼

Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:02
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
12:02
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
12:02
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
12:02
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
12:02
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
12:02
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
12:05
‼ CVE-2020-26964 ‼

If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:05
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
12:05
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
12:05
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
12:05
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
12:05
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
12:05
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
12:05
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
?
12:22
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:22
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
12:22
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
12:22
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
12:22
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
12:22
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
12:22
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
12:22
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
12:22
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
12:25
‼ CVE-2020-26950 ‼

In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
12:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
12:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
12:25
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
12:25
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
12:25
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
12:25
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
12:25
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
12:33
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
12:33
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
12:33
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
12:33
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
12:33
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
12:34
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
12:34
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
12:34
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
12:34
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
12:34
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
?
13:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26956 ‼

In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
13:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
13:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
13:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
13:25
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
13:25
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
13:25
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
13:25
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
13:25
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
13:25
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
?
14:02
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26955 ‼

When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:02
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
14:02
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
14:02
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
14:02
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
14:02
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
14:02
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
14:02
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
14:02
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
14:02
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
14:02
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
14:05
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:05
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
14:05
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
14:05
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
14:05
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
14:05
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
14:05
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
14:05
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
14:05
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
14:05
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
14:05
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
14:05
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
?
14:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-25627 ‼

The moodlenetprofile user profile field required extra sanitizing to prevent a stored XSS risk. This affects versions 3.9 to 3.9.1. Fixed in 3.9.2.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
14:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
14:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
14:25
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
14:25
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
14:25
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
14:25
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
14:25
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
14:25
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
14:25
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
14:25
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
14:32
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
14:32
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
14:32
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
14:32
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
14:32
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
14:32
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
14:32
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
14:32
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
14:32
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
14:32
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
14:32
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
14:32
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
14:32
‼ CVE-2020-23520 ‼

imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.

📖 Read

via "National Vulnerability Database".
?
15:25
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26962 ‼

Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox < 83.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
15:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
15:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
15:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
15:25
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
15:25
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
15:25
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
15:25
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
15:25
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
15:25
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
15:25
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
15:25
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
15:25
‼ CVE-2020-23520 ‼

imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-16128 ‼

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
15:33
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
15:33
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
15:33
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
15:33
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
15:33
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
15:33
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
15:33
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
15:34
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
15:34
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
15:34
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
15:34
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
15:34
‼ CVE-2020-23520 ‼

imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.

📖 Read

via "National Vulnerability Database".
15:34
🦿 Phishing emails: More than 25% of American workers fall for them 🦿

A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.

📖 Read

via "Tech Republic".
?
16:22
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
16:22
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
16:22
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
16:22
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
16:22
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
16:22
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
16:22
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
16:22
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
16:22
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
16:22
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
16:22
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
16:22
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
16:22
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
16:22
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
16:23
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
16:23
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
16:23
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
16:23
‼ CVE-2020-23520 ‼

imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.

📖 Read

via "National Vulnerability Database".
16:23
🦿 Phishing emails: More than 25% of American workers fall for them 🦿

A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.

📖 Read

via "Tech Republic".
16:23
🕴 The Holiday Shopping Season: A Prime Opportunity for Triangulation Fraud 🕴

As e-commerce sales increase, so does the risk of hard-to-detect online fraud.

📖 Read

via "Dark Reading".
16:25
‼ CVE-2020-26959 ‼

During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
16:25
‼ CVE-2020-26958 ‼

Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
16:25
‼ CVE-2020-26966 ‼

Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

📖 Read

via "National Vulnerability Database".
16:25
🦿 WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS 🦿

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.

📖 Read

via "Tech Republic".
16:25
‼ CVE-2020-29656 ‼

An information disclosure vulnerability exists in RT-AC88U Download Master before 3.1.0.108. A direct access to /downloadmaster/dm_apply.cgi?action_mode=initial&download_type=General&special_cgi=get_language makes it possible to reach "unknown functionality" in a "known to be easy" manner via an unspecified "public exploit."

📖 Read

via "National Vulnerability Database".
16:25
‼ CVE-2020-7337 ‼

Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.

📖 Read

via "National Vulnerability Database".
16:25
‼ CVE-2020-29655 ‼

An injection vulnerability exists in RT-AC88U Download Master before 3.1.0.108. Accessing Main_Login.asp?flag=1&productname=FOOBAR&url=/downloadmaster/task.asp will redirect to the login site, which will show the value of the parameter productname within the title. An attacker might be able to influence the appearance of the login page, aka text injection.

📖 Read

via "National Vulnerability Database".
16:25
‼ CVE-2020-29657 ‼

In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.

📖 Read

via "National Vulnerability Database".
16:25
‼ CVE-2020-29651 ‼

A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.

📖 Read

via "National Vulnerability Database".
16:25
🕴 Global Cybercrime Losses Cross $1 Trillion Mark 🕴

A shift from attackers targeting individual systems to entire organizations is pushing up cost of cyberattacks sharply, McAfee says.

📖 Read

via "Dark Reading".
16:25
🕴 Black Hat Europe: Dark Reading Video News Desk Coverage 🕴

Coming to you from virtual backgrounds and beautifully curated bookcases around the world, Dark Reading brings you video interviews with the leading researchers speaking at this week's Black Hat Europe.

📖 Read

via "Dark Reading".
16:25
❌ D-Link Routers at Risk for Remote Takeover from Zero-Day Flaws ❌

Critical vulnerabilities discovered by Digital Defense can allow attackers to gain root access and take over devices running same firmware.

📖 Read

via "Threat Post".
16:25
🦿 Security firm FireEye hit by state-sponsored cyberattack 🦿

The hackers stole the firm's Red Team tools, which are used to help organizations counter cyberattacks.

📖 Read

via "Tech Republic".
16:25
🕴 Navigating the Security Maze in a New Era of Cyberthreats 🕴

Multiple, dynamic threats have reshaped the cyber-risk landscape; ignore them at your peril.

📖 Read

via "Dark Reading".
16:25
🦿 Open source developers say securing their code is a soul-withering waste of time 🦿

A survey of nearly 1,200 FOSS contributors found security to be low on developers' list of priorities.

📖 Read

via "Tech Republic".
16:25
❌ COVID-19 Vaccine Cyberattacks Steal Credentials, Spread Zebrocy Malware ❌

Cybercriminals are leveraging the recent rollout of the COVID-19 vaccines globally in various cyberattacks - from stealing email passwords to distributing the Zebrocy malware.

📖 Read

via "Threat Post".
16:25
🦿 How ID fraud has surged in the wake of COVID-19 🦿

Fraudulent activity tends to rise during periods of crisis as attackers understand just how to exploit the situation, says Onfido.

📖 Read

via "Tech Republic".
16:25
‼ CVE-2020-23520 ‼

imcat 5.2 allows an authenticated file upload and consequently remote code execution via the picture functionality.

📖 Read

via "National Vulnerability Database".
16:25
🦿 Phishing emails: More than 25% of American workers fall for them 🦿

A new global report on phishing attempts shows how the workforce has responded to security threats since COVID-19, and the new vulnerabilities that have resulted from the remote work landscape.

📖 Read

via "Tech Republic".
16:25
🕴 The Holiday Shopping Season: A Prime Opportunity for Triangulation Fraud 🕴

As e-commerce sales increase, so does the risk of hard-to-detect online fraud.

📖 Read

via "Dark Reading".
16:32
‼ CVE-2020-26832 ‼

SAP AS ABAP (SAP Landscape Transformation), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA (SAP Landscape Transformation), versions - 101, 102, 103, 104, 105, allows a high privileged user to execute a RFC function module to which access should be restricted, however due to missing authorization an attacker can get access to some sensitive internal information of vulnerable SAP system or to make vulnerable SAP systems completely unavailable.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-17528 ‼

Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26831 ‼

SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request Forgery (SSRF) and denial-of-service (DoS).

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26816 ‼

SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-17529 ‼

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26837 ‼

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-2020 ‼

An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-29660 ‼

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26261 ‼

jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26838 ‼

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-29661 ‼

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-7787 ‼

This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-29659 ‼

A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26835 ‼

SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26836 ‼

SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26834 ‼

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26829 ‼

SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-21009 ‼

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26260 ‼

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

📖 Read

via "National Vulnerability Database".
16:32
‼ CVE-2020-26828 ‼

SAP Disclosure Management, version - 10.1, provides capabilities for authorized users to upload and download content of specific file type. In some file types it is possible to enter formulas which can call external applications or execute scripts. The execution of a payload (script) on target machine could be used to steal and modify the data available in the spreadsheet

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26832 ‼

SAP AS ABAP (SAP Landscape Transformation), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA (SAP Landscape Transformation), versions - 101, 102, 103, 104, 105, allows a high privileged user to execute a RFC function module to which access should be restricted, however due to missing authorization an attacker can get access to some sensitive internal information of vulnerable SAP system or to make vulnerable SAP systems completely unavailable.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-17528 ‼

Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26831 ‼

SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request Forgery (SSRF) and denial-of-service (DoS).

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26816 ‼

SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-17529 ‼

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26837 ‼

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-2020 ‼

An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-29660 ‼

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26261 ‼

jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26838 ‼

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-29661 ‼

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-7787 ‼

This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-29659 ‼

A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26835 ‼

SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26836 ‼

SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26834 ‼

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26829 ‼

SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-21009 ‼

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26260 ‼

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

📖 Read

via "National Vulnerability Database".
16:35
‼ CVE-2020-26828 ‼

SAP Disclosure Management, version - 10.1, provides capabilities for authorized users to upload and download content of specific file type. In some file types it is possible to enter formulas which can call external applications or execute scripts. The execution of a payload (script) on target machine could be used to steal and modify the data available in the spreadsheet

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-17528 ‼

Out-of-bounds Write vulnerability in TCP stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying arbitrary urgent data pointer offsets within TCP packets including beyond the length of the packet.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26831 ‼

SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request Forgery (SSRF) and denial-of-service (DoS).

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26816 ‼

SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-17529 ‼

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26837 ‼

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-2020 ‼

An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-29660 ‼

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26261 ‼

jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26838 ‼

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-29661 ‼

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-7787 ‼

This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-29659 ‼

A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26835 ‼

SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26836 ‼

SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26834 ‼

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26829 ‼

SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-21009 ‼

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26260 ‼

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

📖 Read

via "National Vulnerability Database".
16:44
‼ CVE-2020-26828 ‼

SAP Disclosure Management, version - 10.1, provides capabilities for authorized users to upload and download content of specific file type. In some file types it is possible to enter formulas which can call external applications or execute scripts. The execution of a payload (script) on target machine could be used to steal and modify the data available in the spreadsheet

📖 Read

via "National Vulnerability Database".
16:44
🔏 50 Cloud-Based Security Selection Tips 🔏

With more and more companies making the move to the cloud, security remains an utmost concern. Reviewing a cloud security solution? Ask yourself these 50 questions.

📖 Read

via "Digital Guardian".
?
17:02
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26831 ‼

SAP BusinessObjects BI Platform (Crystal Report), versions - 4.1, 4.2, 4.3, does not sufficiently validate uploaded XML entities during crystal report generation due to missing XML validation, An attacker with basic privileges can inject some arbitrary XML entities leading to internal file disclosure, internal directories disclosure, Server-Side Request Forgery (SSRF) and denial-of-service (DoS).

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26816 ‼

SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-17529 ‼

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26837 ‼

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-2020 ‼

An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-29660 ‼

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26261 ‼

jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26838 ‼

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-29661 ‼

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-7787 ‼

This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-29659 ‼

A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26835 ‼

SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26836 ‼

SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26834 ‼

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26829 ‼

SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-21009 ‼

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26260 ‼

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

📖 Read

via "National Vulnerability Database".
17:02
‼ CVE-2020-26828 ‼

SAP Disclosure Management, version - 10.1, provides capabilities for authorized users to upload and download content of specific file type. In some file types it is possible to enter formulas which can call external applications or execute scripts. The execution of a payload (script) on target machine could be used to steal and modify the data available in the spreadsheet

📖 Read

via "National Vulnerability Database".
17:02
🔏 50 Cloud-Based Security Selection Tips 🔏

With more and more companies making the move to the cloud, security remains an utmost concern. Reviewing a cloud security solution? Ask yourself these 50 questions.

📖 Read

via "Digital Guardian".
17:02
❌ SideWinder APT Targets Nepal, Afghanistan in Wide-Ranging Spy Campaign ❌

Convincing email-credentials phishing, emailed backdoors and mobile apps are all part of the groups latest effort against military and government targets.

📖 Read

via "Threat Post".
?
17:22
🛡 Cybersecurity & Privacy news 🛡
‼ CVE-2020-26816 ‼

SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-17529 ‼

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-26837 ‼

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-2020 ‼

An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-29660 ‼

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-26261 ‼

jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-26838 ‼

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-29661 ‼

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-7787 ‼

This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-29659 ‼

A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.

📖 Read

via "National Vulnerability Database".
17:22
‼ CVE-2020-26835 ‼

SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".
17:23
‼ CVE-2020-26836 ‼

SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.

📖 Read

via "National Vulnerability Database".
17:23
‼ CVE-2020-26834 ‼

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

📖 Read

via "National Vulnerability Database".
17:23
‼ CVE-2020-26829 ‼

SAP NetWeaver AS JAVA (P2P Cluster Communication), versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows arbitrary connections from processes because of missing authentication check, that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely.

📖 Read

via "National Vulnerability Database".
17:23
‼ CVE-2020-21009 ‼

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

📖 Read

via "National Vulnerability Database".
17:23
‼ CVE-2020-26260 ‼

BookStack is a platform for storing and organising information and documentation. In BookStack before version 0.30.5, a user with permissions to edit a page could set certain image URL's to manipulate functionality in the exporting system, which would allow them to make server side requests and/or have access to a wider scope of files within the BookStack file storage locations. The issue was addressed in BookStack v0.30.5. As a workaround, page edit permissions could be limited to only those that are trusted until you can upgrade.

📖 Read

via "National Vulnerability Database".
17:23
‼ CVE-2020-26828 ‼

SAP Disclosure Management, version - 10.1, provides capabilities for authorized users to upload and download content of specific file type. In some file types it is possible to enter formulas which can call external applications or execute scripts. The execution of a payload (script) on target machine could be used to steal and modify the data available in the spreadsheet

📖 Read

via "National Vulnerability Database".
17:23
🔏 50 Cloud-Based Security Selection Tips 🔏

With more and more companies making the move to the cloud, security remains an utmost concern. Reviewing a cloud security solution? Ask yourself these 50 questions.

📖 Read

via "Digital Guardian".
17:23
❌ SideWinder APT Targets Nepal, Afghanistan in Wide-Ranging Spy Campaign ❌

Convincing email-credentials phishing, emailed backdoors and mobile apps are all part of the groups latest effort against military and government targets.

📖 Read

via "Threat Post".
17:23
🕴 Former Microsoft Cloud Security Leads Unveil New Startup 🕴

Wiz has raised $100 million since its January launch and plans to help businesses with visibility into cloud security threats.

📖 Read

via "Dark Reading".
17:25
‼ CVE-2020-26816 ‼

SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-17529 ‼

Out-of-bounds Write vulnerability in TCP Stack of Apache NuttX (incubating) versions up to and including 9.1.0 and 10.0.0 allows attacker to corrupt memory by supplying and invalid fragmentation offset value specified in the IP header. This is only impacts builds with both CONFIG_EXPERIMENTAL and CONFIG_NET_TCP_REASSEMBLY build flags enabled.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-26837 ‼

SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-2020 ‼

An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-29660 ‼

A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-26261 ‼

jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-26838 ‼

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-29661 ‼

A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-7787 ‼

This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-29659 ‼

A buffer overflow in the web server of Flexense DupScout Enterprise 10.0.18 allows a remote anonymous attacker to execute code as SYSTEM by overflowing the sid parameter via a GET /settings&sid= attack.

📖 Read

via "National Vulnerability Database".
17:25
‼ CVE-2020-26835 ‼

SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

📖 Read

via "National Vulnerability Database".