‼ CVE-2020-26979 ‼
📖 Read
via "National Vulnerability Database".
When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26978 ‼
📖 Read
via "National Vulnerability Database".
Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26768 ‼
📖 Read
via "National Vulnerability Database".
Formstone <=1.4.16 is vulnerable to a Reflected Cross-Site Scripting (XSS) vulnerability caused by improper validation of user supplied input in the upload-target.php and upload-chunked.php files. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site once the URL is clicked or visited. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials, force malware execution, user redirection and others.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35112 ‼
📖 Read
via "National Vulnerability Database".
If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.📖 Read
via "National Vulnerability Database".
🛠 Lynis Auditing Tool 3.0.3 🛠
📖 Read
via "Packet Storm Security".
Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Lynis Auditing Tool 3.0.3 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
‼ CVE-2020-28672 ‼
📖 Read
via "National Vulnerability Database".
MonoCMS Blog 1.0 is affected by incorrect access control that can lead to remote arbitrary code execution. At monofiles/category.php:27, user input can be saved to category/[foldername]/index.php causing RCE.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-26773 ‼
📖 Read
via "National Vulnerability Database".
Restaurant Reservation System 1.0 suffers from an authenticated SQL injection vulnerability, which allows a remote, authenticated attacker to execute arbitrary SQL commands via the date parameter in includes/reservation.inc.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3011 ‼
📖 Read
via "National Vulnerability Database".
An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF).📖 Read
via "National Vulnerability Database".
❌ New Year, New Ransomware: Babuk Locker Targets Large Corporations ❌
📖 Read
via "Threat Post".
Despite being a mostly run-of-the-mill ransomware strain, Babuk Locker's encryption mechanisms and abuse of Windows Restart Manager sets it apart.📖 Read
via "Threat Post".
Threat Post
New Year, New Ransomware: Babuk Locker Targets Large Corporations
Despite being a mostly run-of-the-mill ransomware strain, Babuk Locker's encryption mechanisms and abuse of Windows Restart Manager sets it apart.
❌ Threatpost Poll: Weigh in on Ransomware Security ❌
📖 Read
via "Threat Post".
Provide your views on ransomware and how to deal with it in our anonymous Threatpost poll.📖 Read
via "Threat Post".
Threat Post
Threatpost Poll: Weigh in on Ransomware Security
Provide your views on ransomware and how to deal with it in our anonymous Threatpost poll.
‼ CVE-2020-4893 ‼
📖 Read
via "National Vulnerability Database".
IBM Emptoris Strategic Supply Management 10.1.0, 10.1.1, and 10.1.3 transmits sensitive information in HTTP GET request parameters. This may lead to information disclosure via man in the middle methods. IBM X-Force ID: 190984.📖 Read
via "National Vulnerability Database".
‼ CVE-2018-20314 ‼
📖 Read
via "National Vulnerability Database".
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyCheckLicence race condition that can cause a stack-based buffer overflow or an out-of-bounds read.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6655 ‼
📖 Read
via "National Vulnerability Database".
The Eaton's easySoft software v7.20 and prior are susceptible to Out-of-bounds remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user to upload the malformed .E70 file in the application. The vulnerability arises due to improper validation and parsing of the E70 file content by the application.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13573 ‼
📖 Read
via "National Vulnerability Database".
A denial-of-service vulnerability exists in the Ethernet/IP server functionality of Rockwell Automation RSLinx Classic 2.57.00.14 CPR 9 SR 3. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6656 ‼
📖 Read
via "National Vulnerability Database".
Eaton's easySoft software v7.20 and prior are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion.📖 Read
via "National Vulnerability Database".
‼ CVE-2018-19418 ‼
📖 Read
via "National Vulnerability Database".
Foxit PDF ActiveX before 5.5.1 allows remote code execution via command injection because of the lack of a security permission control.📖 Read
via "National Vulnerability Database".
‼ CVE-2018-18689 ‼
📖 Read
via "National Vulnerability Database".
The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Architect 6, PDF Editor 6 Pro, PDF Experte 9 Ultimate, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, PDF-XChange Editor and Viewer, Perfect PDF 10 Premium, Perfect PDF Reader, Soda PDF, and Soda PDF Desktop.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-4892 ‼
📖 Read
via "National Vulnerability Database".
IBM Emptoris Contract Management 10.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190979.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-4898 ‼
📖 Read
via "National Vulnerability Database".
IBM Emptoris Strategic Supply Management 10.1.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 190989.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27835 ‼
📖 Read
via "National Vulnerability Database".
A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.📖 Read
via "National Vulnerability Database".
‼ CVE-2018-20315 ‼
📖 Read
via "National Vulnerability Database".
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a race condition that can cause a stack-based buffer overflow or an out-of-bounds read.📖 Read
via "National Vulnerability Database".