πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-0442 β€Ό

In Message and toBundle of Notification.java, there is a possible UI slowdown or crash due to improper input validation. This could lead to remote denial of service if a malicious contact file is received, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-147358092

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0424 β€Ό

In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0450 β€Ό

In rw_i93_sm_format of rw_i93.cc, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-157650336

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-24384 β€Ό

A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0418 β€Ό

In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0445 β€Ό

There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264527

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0437 β€Ό

In CellBroadcastReceiver's intent handlers, there is a possible denial of service due to a missing permission check. This could lead to local denial of service of emergency alerts with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-162741784

πŸ“– Read

via "National Vulnerability Database".
πŸ›  Falco 0.26.2 πŸ› 

Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.

πŸ“– Read

via "Packet Storm Security".
🦿 DDoS attacks: How to combat the latest tactics 🦿

With DDoS-as-a-Service, criminals with a little know-how can launch denial of service attacks for just a few dollars, says Digital Shadows.

πŸ“– Read

via "Tech Republic".
❌ Ghimob Android Banking Trojan Targets 153 Mobile Apps ❌

A banking trojan is targeting mobile app users in Brazil - and researchers warn that its operator has big plans to expand abroad.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-7766 β€Ό

This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-5388 β€Ό

Dell Inspiron 15 7579 2-in-1 BIOS versions prior to 1.31.0 contain an Improper SMM communication buffer verification vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4760 β€Ό

IBM Content Navigator 3.0CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188737.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-12485 β€Ό

The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28267 β€Ό

Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4704 β€Ό

IBM Content Navigator 3.0CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187189.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4568 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13927 β€Ό

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

πŸ“– Read

via "National Vulnerability Database".
❌ Apple to Deliver β€˜Privacy Labels’ for Apps, Revealing Data-Sharing Details ❌

Developers will have to reveal how data is shared with any β€œthird-party partners,” which include analytics tools, advertising networks, third-party SDKs or other external vendors.

πŸ“– Read

via "Threat Post".
πŸ•΄ The Double-Edged Sword of Cybersecurity Insurance πŸ•΄

With ransomware on the rise, more organizations are opting to purchase cyber insurance -- tipping off criminals about how much to demand for access back to pilfered systems and data.

πŸ“– Read

via "Dark Reading".
🦿 Phishing, deepfakes, and ramsomware: How coronavirus-related cyberthreats will persist in 2021 🦿

The pandemic and 5G speed create wider attack capabilities. Phishing emails and other threats will continue to exploit COVID-19 and its side effects, says Check Point Research.

πŸ“– Read

via "Tech Republic".