πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-24649 β€Ό

A remote bytemessageresource transformentity" input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24647 β€Ό

A remote accessmgrservlet classname input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7145 β€Ό

A chooseperfview expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7153 β€Ό

A iccselectdevtype expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-16160 β€Ό

GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_Decompress(). Parsing malicious input can result in a crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24651 β€Ό

A syslogtempletselectwin expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-7159 β€Ό

A customtemplateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Microsoft Tops Q3 List of Most-Impersonated Brands πŸ•΄

The technology sector was also the most likely targeted industry for brand phishing attacks, according to Check Point's latest report on brand phishing.

πŸ“– Read

via "Dark Reading".
πŸ•΄ GravityRAT Spyware Targets Android & MacOS in India πŸ•΄

The Trojan once used in attacks against Windows systems has been transformed into a multiplatform tool targeting macOS and Android.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15262 β€Ό

In webpack-subresource-integrity before version 1.5.1, all dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. This issue is patched in version 1.5.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-9263 β€Ό

HUAWEI Mate 30 versions earlier than 10.1.0.150(C00E136R5P3) and HUAWEI P30 version earlier than 10.1.0.160(C00E160R2P11) have a use after free vulnerability. There is a condition exists that the system would reference memory after it has been freed, the attacker should trick the user into running a crafted application with common privilege, successful exploit could cause code execution.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns πŸ•΄

US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.

πŸ“– Read

via "Dark Reading".
πŸ•΄ NSS Labs Shuttered πŸ•΄

The testing firm's website says it has 'ceased operations' as of Oct. 15.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-15261 β€Ό

On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15256 β€Ό

A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5640 β€Ό

Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors.

πŸ“– Read

via "National Vulnerability Database".
❌ Google’s Waze Can Allow Hackers to Identify and Track Users ❌

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-7748 β€Ό

This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.

πŸ“– Read

via "National Vulnerability Database".
❌ Mobile Browser Bugs Open Safari, Opera Users to Malware ❌

A set of address-spoofing bugs affect users of six different types of mobile browsers, with some remaining unpatched.

πŸ“– Read

via "Threat Post".
πŸ•΄ Trickbot Tenacity Shows Infrastructure Resistant to Takedowns πŸ•΄

Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot -- but with only a short-term impact.

πŸ“– Read

via "Dark Reading".
🦿 Homebrew: How to install reconnaissance tools on macOS 🦿

We'll guide you through the process of using Homebrew package manager to install security tools on macOS to perform reconnaissance, discovery, and fingerprinting of the devices on your network.

πŸ“– Read

via "Tech Republic".