Security
Headlines
HeadlinesLatestCVEs

Tag

#ddos

CVE-2020-25685: DNSPOOQ - JSOF

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVE
#vulnerability#web#ios#android#windows#google#microsoft#linux#cisco#red_hat#ddos#dos#js#java#kubernetes#intel#rce#pdf#buffer_overflow#asus#huawei#auth#ssh#xiaomi#ibm#dell#docker#chrome#sap#wifi#ssl
CVE-2020-35896: Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory › RustSec Advisory Database

An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.

CVE-2020-7753: Regular Expression Denial of Service (ReDoS) in org.webjars.npm:trim | CVE-2020-7753 | Snyk

All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().

CVE-2020-12465

An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.

CVE-2020-7616: Snyk Vulnerability Database | Snyk

express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.

CVE-2020-7600: Snyk Vulnerability Database | Snyk

querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.

CVE-2019-10808: Snyk Vulnerability Database | Snyk

utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.

CVE-2020-8516: Deanonymizing Tor Circuits - The Hacker Factor Blog

** DISPUTED ** The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability.

CVE-2020-2106: Jenkins Security Advisory 2020-01-29

Jenkins Code Coverage API Plugin 1.1.2 and earlier does not escape the filename of the coverage report used in its view, resulting in a stored XSS vulnerability exploitable by users able to change job configurations.