‼ CVE-2020-19165 ‼
📖 Read
via "National Vulnerability Database".
PHPSHE 1.7 has SQL injection via the admin.php?mod=user&userlevel_id=1 userlevel_id[] parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26420 ‼
📖 Read
via "National Vulnerability Database".
Memory leak in RTPS protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.📖 Read
via "National Vulnerability Database".
🕴 FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning 🕴
📖 Read
via "Dark Reading".
Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.📖 Read
via "Dark Reading".
Dark Reading
FBI, CISA, MS-ISAC: Cybercriminals Increasingly Attacking K-12 Distance Learning
Ransomware attacks reported against US K-12 schools jumped from 28% in January through July to 57% in August and September.
‼ CVE-2020-13986 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-15375 ‼
📖 Read
via "National Vulnerability Database".
Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13984 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13988 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13985 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-15376 ‼
📖 Read
via "National Vulnerability Database".
Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13987 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.📖 Read
via "National Vulnerability Database".
🦿 Security moves from blocker to driver of open source adoption 🦿
📖 Read
via "Tech Republic".
Commentary: Companies used to look to open source to lower costs. That's still true, but an even bigger driver is security, according to a new developer survey.📖 Read
via "Tech Republic".
TechRepublic
Security moves from blocker to driver of open source adoption
Commentary: Companies used to look to open source to lower costs. That's still true, but an even bigger driver is security, according to a new developer survey.
‼ CVE-2020-17467 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in FNET through 4.6.4. The code for processing the hostname from an LLMNR request doesn't check for '\0' termination. Therefore, the deduced length of the hostname doesn't reflect the correct length of the actual data. This may lead to Information Disclosure in _fnet_llmnr_poll in fnet_llmnr.c during a response to a malicious request of the DNS class IN.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17441 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35175 ‼
📖 Read
via "National Vulnerability Database".
Frappe Framework 12 and 13 does not properly validate the HTTP method for the frappe.client API.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25111 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35176 ‼
📖 Read
via "National Vulnerability Database".
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17437 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24336 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17468 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-24338 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in picoTCP through 1.7.0. The DNS domain name record decompression functionality in pico_dns_decompress_name() in pico_dns_common.c does not validate the compression pointer offset values with respect to the actual data present in a DNS response packet, causing out-of-bounds writes that lead to Denial-of-Service and Remote Code Execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-17442 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in picoTCP 1.7.0. The code for parsing the hop-by-hop IPv6 extension headers does not validate the bounds of the extension header length value, which may result in Integer Wraparound. Therefore, a crafted extension header length value may cause Denial-of-Service because it affects the loop in which the extension headers are parsed in pico_ipv6_process_hopbyhop() in pico_ipv6.c.📖 Read
via "National Vulnerability Database".