Twitter Says Biz Users Were Vulnerable to Data Breach

Twitter Says Biz Users Were Vulnerable to Data Breach
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-11068PUBLISHED: 2020-06-23

In LoRaMac-node before 4.4.4, a reception buffer overflow can happen due to the received buffer size not being checked. This has been fixed in 4.4.4.

CVE-2020-9438PUBLISHED: 2020-06-23

Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized. In other words, door-access revocation is mishandled.

CVE-2020-14965PUBLISHED: 2020-06-23

On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a...

CVE-2020-14971PUBLISHED: 2020-06-23

Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz...

CVE-2020-4028PUBLISHED: 2020-06-23

Versions before 8.9.1, Various resources in Jira responded with a 404 instead of redirecting unauthenticated users to the login page, in some situations this may ..

Support the originator by clicking the read the rest link below.