βΌ CVE-2020-15295 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15736 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15738 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15740 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15753 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15755 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15765 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15762 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15288 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27291 βΌ
π Read
via "National Vulnerability Database".
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8111 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
βΌ CVE-2020-15766 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** Unused CVE for 2020.π Read
via "National Vulnerability Database".
π TOR Virtual Network Tunneling Tool 0.4.5.7 π
π Read
via "Packet Storm Security".
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).π Read
via "Packet Storm Security".
Packetstormsecurity
TOR Virtual Network Tunneling Tool 0.4.5.7 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π¦Ώ How to protect your Microsoft Office 365 environment from cyber threats π¦Ώ
π Read
via "Tech Republic".
A quick shift toward Microsoft Office 365 and Azure AD in the cloud has expanded the attack surface for many organizations, says Vectra AI.π Read
via "Tech Republic".
β State-sponsored Threat Groups Target Telcos, Steal 5G Secrets β
π Read
via "Threat Post".
Researchers say China-linked APTs lure victims with bogus Huawei career pages in what they dub βOperation DiΓ nxΓΉnβ.π Read
via "Threat Post".
Threat Post
State-sponsored Threat Groups Target Telcos, Steal 5G Secrets
Researchers say China-linked APTs lure victims with bogus Huawei career pages in what they dub βOperation DiΓ nxΓΉnβ.
βΌ CVE-2020-14358 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35456 βΌ
π Read
via "National Vulnerability Database".
The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to view private chat messages and media files via logcat because of excessive logging.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35455 βΌ
π Read
via "National Vulnerability Database".
The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from Shared Preferences and the SQLite database because of insecure data storage.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28660 βΌ
π Read
via "National Vulnerability Database".
rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.π Read
via "National Vulnerability Database".
βΌ CVE-2020-35454 βΌ
π Read
via "National Vulnerability Database".
The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from an Android backup because of insecure application configuration.π Read
via "National Vulnerability Database".
βΌ CVE-2021-20200 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".