πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-12485 β€Ό

The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28267 β€Ό

Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4704 β€Ό

IBM Content Navigator 3.0CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187189.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-4568 β€Ό

IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13927 β€Ό

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

πŸ“– Read

via "National Vulnerability Database".
❌ Apple to Deliver β€˜Privacy Labels’ for Apps, Revealing Data-Sharing Details ❌

Developers will have to reveal how data is shared with any β€œthird-party partners,” which include analytics tools, advertising networks, third-party SDKs or other external vendors.

πŸ“– Read

via "Threat Post".
πŸ•΄ The Double-Edged Sword of Cybersecurity Insurance πŸ•΄

With ransomware on the rise, more organizations are opting to purchase cyber insurance -- tipping off criminals about how much to demand for access back to pilfered systems and data.

πŸ“– Read

via "Dark Reading".
🦿 Phishing, deepfakes, and ramsomware: How coronavirus-related cyberthreats will persist in 2021 🦿

The pandemic and 5G speed create wider attack capabilities. Phishing emails and other threats will continue to exploit COVID-19 and its side effects, says Check Point Research.

πŸ“– Read

via "Tech Republic".
⚠ Naked Security Live – Shop safe online (you know why!) ⚠

Here's the latest Naked Security Live video - enjoy (and please share with your friends)!

πŸ“– Read

via "Naked Security".
⚠ Smishing attack tells you β€œmobile payment problem” – don’t fall for it! ⚠

Don't be fooled by a website that looks OK - it's easy for crooks to make an exact copy. (This time, they got just one letter wrong.)

πŸ“– Read

via "Naked Security".
πŸ•΄ Overlooked Security Risks of the M&A Rebound πŸ•΄

Successful technology integration, post-merger, is tricky in any market, and never more so than with today's remote work environments and distributed IT infrastructure.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-26811 β€Ό

SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26807 β€Ό

SAP ERP Client for E-Bilanz, version - 1.0, installation sets Incorrect default filesystem permissions are set in its installation folder which allows anyone to modify the files in the folder.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26824 β€Ό

SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26820 β€Ό

SAP NetWeaver AS JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26823 β€Ό

SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28055 β€Ό

A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27146 β€Ό

The Core component of TIBCO Software Inc.'s TIBCO iProcess Workspace (Browser) contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a Cross Site Request Forgery (CSRF) attack on the affected system. A successful attack using this vulnerability requires human interaction from an authenticated user other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO iProcess Workspace (Browser): versions 11.6.0 and below.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26810 β€Ό

SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-6316 β€Ό

SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26808 β€Ό

SAP AS ABAP(DMIS), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA(DMIS), versions - 101, 102, 103, 104, 105, allows an authenticated attacker to inject arbitrary code into function module leading to code injection that can be executed in the application which affects the confidentiality, availability and integrity of the application.

πŸ“– Read

via "National Vulnerability Database".