ATENTIONβΌ New - CVE-2020-13389
π Read
via "National Vulnerability Database".
An issue was discovered on Tenda AC6 V1.0 V15.03.05.19_multi_TD01, AC9 V1.0 V15.03.05.19(6318)_CN, AC9 V3.0 V15.03.06.42_multi, AC15 V1.0 V15.03.05.19_multi_TD01, and AC18 V15.03.05.19(6318_)_CN devices. There is a buffer overflow vulnerability in the router's web server -- httpd. While processing the /goform/openSchedWifi schedStartTime and schedEndTime parameters for a POST request, a value is directly used in a strcpy to a local variable placed on the stack, which overwrites the return address of a function. An attacker can construct a payload to carry out arbitrary code execution attacks.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-13388 (jw.util)
π Read
via "National Vulnerability Database".
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-13384 (monstra)
π Read
via "National Vulnerability Database".
Monstra CMS 3.0.4 allows remote authenticated users to upload and execute arbitrary PHP code via admin/index.php?id=filesmanager because, for example, .php filenames are blocked but .php7 filenames are not, a related issue to CVE-2017-18048.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12397 (thunderbird)
π Read
via "National Vulnerability Database".
By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays. This vulnerability affects Thunderbird < 68.8.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12396
π Read
via "National Vulnerability Database".
Mozilla developers and community members reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 76.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12395
π Read
via "National Vulnerability Database".
Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12394
π Read
via "National Vulnerability Database".
A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12393
π Read
via "National Vulnerability Database".
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12392
π Read
via "National Vulnerability Database".
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12391
π Read
via "National Vulnerability Database".
Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12390
π Read
via "National Vulnerability Database".
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12389
π Read
via "National Vulnerability Database".
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12388
π Read
via "National Vulnerability Database".
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-12387
π Read
via "National Vulnerability Database".
A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-11970
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-10737
π Read
via "National Vulnerability Database".
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the homedir path. This flaw allows an attacker to leverage this issue by creating a symlink point to a target folder, which then has its ownership transferred to the new home directory's unprivileged user.π Read
via "National Vulnerability Database".
β Google may soon add end-to-end encryption for RCS β
π Read
via "Naked Security".
The dogfood version of the recently updated app shows multiple references to encryption for RCS, the feature-rich successor to SMS messaging.π Read
via "Naked Security".
Naked Security
Google may soon add end-to-end encryption for RCS
The dogfood version of the recently updated app shows multiple references to encryption for RCS, the feature-rich successor to SMS messaging.
β Open source libraries a big source of application security flaws β
π Read
via "Naked Security".
How many vulnerabilities lurk inside the open source libraries that todayβs developers happily borrow to build their applications?π Read
via "Naked Security".
Naked Security
Open source libraries a big source of application security flaws
How many vulnerabilities lurk inside the open source libraries that todayβs developers happily borrow to build their applications?
π Security is still an issue, despite success telecommuting during pandemic π
π Read
via "Security on TechRepublic".
A new report from Bitglass examines how businesses adjusted to the shift from offices to working from home; 84% support remote work, but are ill-equipped to keep data secure.π Read
via "Security on TechRepublic".
TechRepublic
Security is still an issue, despite success telecommuting during pandemic
A new report from Bitglass examines how businesses adjusted to the shift from offices to working from home; 84% support remote work, but are ill-equipped to keep data secure.
π Cybercriminals targeting cloud services amid shift to remote working π
π Read
via "Security on TechRepublic".
Attackers are increasingly hitting collaboration services such as Microsoft 365 to access cloud accounts with stolen credentials, says McAfee.π Read
via "Security on TechRepublic".
π΄ Virtual Black Hat USA Offers Unparalleled Access to Expert Security Insights π΄
π Read
via "Dark Reading: ".
Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.π Read
via "Dark Reading: ".
Dark Reading
Virtual Black Hat USA Offers Unparalleled Access to Expert Security Insights
Attendees can look forward to the same high-quality Briefings and Trainings from the comfort of their own desk.