βΌ CVE-2020-27783 βΌ
π Read
via "National Vulnerability Database".
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27761 βΌ
π Read
via "National Vulnerability Database".
WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25711 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28923 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27764 βΌ
π Read
via "National Vulnerability Database".
In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28175 βΌ
π Read
via "National Vulnerability Database".
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privilegesπ Read
via "National Vulnerability Database".
βΌ CVE-2020-25693 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in CImg in versions prior to 2.9.3. Integer overflows leading to heap buffer overflows in load_pnm() can be triggered by a specially crafted input file processed by CImg, which can lead to an impact to application availability or data integrity.π Read
via "National Vulnerability Database".
β TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions β
π Read
via "Threat Post".
A new "TrickBoot" module scans for vulnerable firmware and has the ability to read, write and erase it on devices.π Read
via "Threat Post".
Threat Post
TrickBot Returns with a Vengeance, Sporting Rare Bootkit Functions
A new "TrickBoot" module scans for vulnerable firmware and has the ability to read, write and erase it on devices.
π Phishing Campaign Takes Aim at COVID-19 Vaccine Transportation Chain π
π Read
via "Digital Guardian".
The latest attack on COVID-19 vaccine research is aimed squarely at the supply chain of companies and government organizations working to keep the vaccines refrigerated in transit.π Read
via "Digital Guardian".
Digital Guardian
Phishing Campaign Takes Aim at COVID-19 Vaccine Transportation Chain
The latest attack on COVID-19 vaccine research is aimed squarely at the supply chain of companies and government organizations working to keep the vaccines refrigerated in transit.
π¦Ώ 6 security predictions that will impact healthcare in 2021 π¦Ώ
π Read
via "Tech Republic".
Attacks against COVID-19 vaccine developers will continue, while more reports will surface about patient data leaks in the cloud, says Kaspersky.π Read
via "Tech Republic".
TechRepublic
6 security predictions that will impact healthcare in 2021
Attacks against COVID-19 vaccine developers will continue, while more reports will surface about patient data leaks in the cloud, says Kaspersky.
βΌ CVE-2020-23741 βΌ
π Read
via "National Vulnerability Database".
In AnyView (network police) network monitoring software 4.6.0.1, there is a local denial of service vulnerability in AnyView, attackers can use a constructed program to cause a computer crash (BSOD).π Read
via "National Vulnerability Database".
βΌ CVE-2020-17527 βΌ
π Read
via "National Vulnerability Database".
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23736 βΌ
π Read
via "National Vulnerability Database".
There is a local denial of service vulnerability in DaDa accelerator 5.6.19.816,, attackers can use constructed programs to cause computer crashes (BSOD).π Read
via "National Vulnerability Database".
βΌ CVE-2020-29534 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23740 βΌ
π Read
via "National Vulnerability Database".
In DriverGenius 9.61.5480.28 there is a local privilege escalation vulnerability in the driver wizard, attackers can use constructed programs to increase user privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2020-29529 βΌ
π Read
via "National Vulnerability Database".
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.π Read
via "National Vulnerability Database".
βΌ CVE-2020-23738 βΌ
π Read
via "National Vulnerability Database".
There is a local denial of service vulnerability in Advanced SystemCare 13 PRO 13.5.0.174. Attackers can use a constructed program to cause a computer crash (BSOD)π Read
via "National Vulnerability Database".
π¦Ώ Phishing campaign threatens coronavirus vaccine supply chain π¦Ώ
π Read
via "Tech Republic".
The emails impersonate a member company of the COVID-19 vaccine supply chain to harvest account credentials, says IBM Security X-Force.π Read
via "Tech Republic".
TechRepublic
Phishing campaign threatens coronavirus vaccine supply chain
The emails impersonate a member company of the COVID-19 vaccine supply chain to harvest account credentials, says IBM Security X-Force.
π΄ Common Container Manager Is Vulnerable to Dangerous Exploit π΄
π Read
via "Dark Reading".
Container manager vulnerability is one of several weaknesses and vulnerabilities recently disclosed for Docker.π Read
via "Dark Reading".
Dark Reading
Common Container Manager Is Vulnerable to Dangerous Exploit
Container manager vulnerability is one of several weaknesses and vulnerabilities recently disclosed for Docker.
β Kmart, Latest Victim of Egregor Ransomware β Report β
π Read
via "Threat Post".
The struggling retailer's back-end services have been impacted, according to a report, just in time for the holidays.π Read
via "Threat Post".
Threat Post
Kmart, Latest Victim of Egregor Ransomware β Report
The struggling retailerβs back-end services have been impacted, according to a report, just in time for the holidays.
π΄ TrickBot's New Tactic Threatens Firmware π΄
π Read
via "Dark Reading".
A newly discovered module checks machines for flaws in the UEFI/BIOS firmware so malware can evade detection and persist on a device.π Read
via "Dark Reading".
Dark Reading
TrickBot's New Tactic Threatens Firmware
A newly discovered module checks machines for flaws in the UEFI/BIOS firmware so malware can evade detection and persist on a device.