{"vulnerability": "CVE-2020-1108", "sightings": [{"uuid": "d9d8fd01-5cc3-4c0a-bf88-1119b35018ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1108", "type": "seen", "source": "https://t.me/information_security_channel/38516", "content": "Microsoft Releases Update for DoS Flaw in .NET Core\nhttps://www.darkreading.com/vulnerabilities---threats/microsoft-releases-update-for-dos-flaw-in-net-core-/d/d-id/1338089?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\n\nCustomers are advised to install the latest version of PowerShell to fully address CVE-2020-1108.", "creation_timestamp": "2020-06-15T21:15:54.000000Z"}, {"uuid": "76fdedbd-cb50-4dc9-a95f-a568c21a4f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1108", "type": "seen", "source": "https://t.me/cibsecurity/12745", "content": "\ud83d\udd74 Microsoft Releases Update for DoS Flaw in .NET Core \ud83d\udd74\n\nCustomers are advised to install the latest version of PowerShell to fully address CVE-2020-1108.\n\n\ud83d\udcd6 Read\n\nvia \"Dark Reading: \".", "creation_timestamp": "2020-06-15T20:34:16.000000Z"}, {"uuid": "84d205e1-a649-4e00-9874-f3101036679a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11089", "type": "seen", "source": "https://t.me/cibsecurity/12419", "content": "ATENTION\u203c New - CVE-2020-11089\n\nIn FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-30T00:55:25.000000Z"}, {"uuid": "fef19ccf-b3f6-440c-91b9-7966eaf2a6b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11088", "type": "seen", "source": "https://t.me/cibsecurity/12420", "content": "ATENTION\u203c New - CVE-2020-11088\n\nIn FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-30T00:55:26.000000Z"}, {"uuid": "1ecbd047-7a2d-4387-bdd4-634a45ae9cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11087", "type": "seen", "source": "https://t.me/cibsecurity/12421", "content": "ATENTION\u203c New - CVE-2020-11087\n\nIn FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-30T00:55:27.000000Z"}, {"uuid": "f251e4af-21f5-406f-9055-67d0016a91a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11086", "type": "seen", "source": "https://t.me/cibsecurity/12422", "content": "ATENTION\u203c New - CVE-2020-11086\n\nIn FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-30T00:55:28.000000Z"}, {"uuid": "277dda47-d28e-4ee0-af74-58cfcbc6e3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11085", "type": "seen", "source": "https://t.me/cibsecurity/12423", "content": "ATENTION\u203c New - CVE-2020-11085\n\nIn FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-30T00:55:29.000000Z"}, {"uuid": "34f6b1ce-af8e-4206-96ea-06d60df1764b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11082", "type": "seen", "source": "https://t.me/cibsecurity/12386", "content": "ATENTION\u203c New - CVE-2020-11082\n\nIn Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-29T00:55:10.000000Z"}]}