Apple Security Advisory 2020-11-13-5 - Safari 14.0 addresses code execution, cross site scripting, out of bounds write, spoofing, and use-after-free vulnerabilities.
811b88f1e5b3d14923a4580f754ecc56118d06fe6387db59e96f29a0e239ef45
Apple Security Advisory 2020-11-13-2 - Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave addresses a code execution vulnerability.
7677a262b9c7d7d157973bdebf049b67ee3fd6e1026eef5ea2cbe44b1bb0b737
Apple Security Advisory 2020-11-13-4 - tvOS 14.0 addresses buffer overflow, code execution, cross site scripting, denial of service, information leakage, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
666bacc553628fd20f69243b0b028286a17b1810726bb43edf4360c86392749c
Apple Security Advisory 2020-11-13-3 - Updates for iOS 14.0 and iPadOS 14.0 address buffer overflow, code execution, cross site scripting, denial of service, information leakage, out of bounds read, out of bounds write, spoofing, and use-after-free vulnerabilities.
c81b3c771086e19928398506df7470dbd4262700ea21eebb45cfac57931704f0
Advanced System Care Service version 13 suffers from an unquoted service path vulnerability.
d01f2678736b868a97232f9345513ae15d0aebc44beb257334c4056196477a24
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
5f154c155803adf5c89e87cab53017b6908c5ebe50c65839e8cf4fbd2abe1fdc
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.
ebe27dfe2b55d7e02bf520e926606c48b76b22facb483256b13ab38e018e1e6c
There is an out-of bounds read vulnerability in WindowsCodecsRaw.dll while processing a malformed Canon raw image. This can potentially lead to disclosing the memory of the affected process. All applications that use Windows Image Codecs for image parsing are potentially affected. The vulnerability has been confirmed on Windows 10 v2004 with the most recent patches applied.
449ae24e2e05dd0778a7ef251c34dfe7a3baf77ef865a69c498ccb7a059d82e3
Ubuntu Security Notice 4607-2 - USN-4607-1 fixed vulnerabilities and added features in OpenJDK. Unfortunately, that update introduced a regression that could cause TLS connections with client certificate authentication to fail in some situations. This update fixes the problem. Various other issues were also addressed.
a4ab5ec1473aaa2e937ca91b1369ed77b0d8855bcf12d9abe9aa9c3165a01e67
This Metasploit module exploits a code execution vulnerability within the ASUS TM-AC1900 router as an authenticated user. The vulnerability is due to a failure filter out percent encoded newline characters within the HTTP argument SystemCmd when invoking /apply.cgi which bypasses the patch for CVE-2018-9285.
ffe065bd21f5291ffd2dce01466f14f19a9e8833bf6d4dc92c47a3e0d3858343
This Metasploit module performs an authentication brute forcing attack against the panel in Bludit version 3.9.2.
928cdffa4a05fe84712529c35407c5d41b2df004f63f924f0f27c011e6938ebd
This Metasploit module exploits a local file inclusion vulnerability in Citrix ADC Netscaler.
70dc89253162a6b119c3d606f6c3f8993ac2cf75090d967905fead6d2ddd4d90
This Metasploit module exploits an arbitrary file upload vulnerability in HorizontCMS 1.0.0-beta in order to execute arbitrary commands. The module first attempts to authenticate to HorizontCMS. It then tries to upload a malicious PHP file via an HTTP POST request to /admin/file-manager/fileupload. The server will rename this file to a random string. The module will therefore attempt to change the filename back to the original name via an HTTP POST request to /admin/file-manager/rename. For the php target, the payload is embedded in the uploaded file and the module attempts to execute the payload via an HTTP GET request to /storage/file_name.
e997f50b11c87b368375253d60b4bf43687e4ac08d4e9534ce9af91d93c1cefe
ReadyTalk Avian JVM versions 1.2.0 before 27th October 2020 suffer from a FileOutputStream.write() integer overflow vulnerability.
6900d0810f32c7a4085388df479ec9c677eafb362f0ace4123fc2d63eacfd040
Atheros Coex Service Application version 8.0.0.255 suffers from an unquoted service path vulnerability.
208e76bdd863609dfe47737eb343c278174506d8ecb000d55e364ef8c865e554
Anuko Time Tracker version 1.19.23.5311 suffers from an implementation flaw where password reset emails can be continuously triggered against unsuspecting users.
53a06dece5305c8f45af55dd108f90c79e6cdcff7555fcad73ca428828be3450
Anuko Time Tracker version 1.19.23.5311 suffers from an implementation flaw where the password reset link can be replayed.
4814d2e98509d3300a5052ea61c3a644befcfbce98883d446a80778f9f94b4c8
Whitepaper that discusses bypassing SSL pinning. Written in Turkish.
8e4b24e390ce31c897804f6427429f08f9ebbc7266dada92a0e4ce6c62427667