πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-5424 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26510 β€Ό

Airleader Master <= 6.21 devices have default credentials that can be used to access the exposed Tomcat Manager for deployment of a new .war file, with resultant remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26508 β€Ό

The WebTools component on Canon Oce ColorWave 3500 5.1.1.0 devices allows attackers to retrieve stored SMB credentials via the export feature, even though these are intentionally inaccessible in the UI.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26509 β€Ό

Airleader Master and Easy <= 6.21 devices have default credentials that can be used for a denial of service.

πŸ“– Read

via "National Vulnerability Database".
❌ Attackers Target Porn Site Goers in β€˜Malsmoke’ Zloader Attack ❌

A fake Java update found on various porn sites actually downloads the well-known Zloader malware.

πŸ“– Read

via "Threat Post".
❌ Dating Site Bumble Leaves Swipes Unsecured for 100M Users ❌

An API bug exposed personal information of users like political leanings, astrological signs, education, and even height and weight, and their distance away in miles.

πŸ“– Read

via "Threat Post".
πŸ•΄ Global Pandemic Fuels Cyber-Threat Workload for National Cyber Security Centre, Shows Annual Review πŸ•΄

From securing the Nightingale hospitals to tackling threats to vaccine research and production, a large part of the National Cyber Security Centre's (NCSC) recent work in the UK has been related to the coronavirus pandemic, as Ron Alalouff discovered when reporting on its Annual Review.

πŸ“– Read

via "Dark Reading".
⚠ Cult videogame company Capcom pays a big round $0.00 to ransomware crooks ⚠

Bad news: data stolen, data dumped, customers affected. Good news: crooks got $0. The ransom was $11M, so that's a big deal!

πŸ“– Read

via "Naked Security".
πŸ•΄ Breakdown of a Break-in: A Manufacturer's Ransomware Response πŸ•΄

The analysis of an industrial ransomware attack reveals common tactics and proactive steps that businesses can take to avoid similar incidents.

πŸ“– Read

via "Dark Reading".
🦿 4 ways to keep your company's and customers' data private and build trust 🦿

Implementing appropriate data privacy is critical for company operations and success. Learn some of the challenges and solutions recommended to do the job right.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-26224 β€Ό

In PrestaShop before version 1.7.6.9 an attacker is able to list all the orders placed on the website without being logged by abusing the function that allows a shopping cart to be recreated from an order already placed. The problem is fixed in 1.7.6.9.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27483 β€Ό

Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27485 β€Ό

Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check the index provided when accessing the local variable in the LGETV and LPUTV instructions. This provides the ability to both read and write memory outside the bounds of the TVM context allocation. It can be leveraged to construct a use-after-free scenario, leading to a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28693 β€Ό

An unrestricted file upload issue in HorizontCMS 1.0.0-beta allows an authenticated remote attacker to upload PHP code through a zip file by uploading a theme, and executing the PHP file via an HTTP GET request to /themes/<php_file_name>

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26217 β€Ό

XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27484 β€Ό

Garmin Forerunner 235 before 8.20 is affected by: Integer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check for overflow when allocating the array for the NEWA instruction. This a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27486 β€Ό

Garmin Forerunner 235 before 8.20 is affected by: Buffer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the string length provided in the data section of the PRG file. It allocates memory for the string immediately, and then copies the string into the TVM object by using a function similar to strcpy. This copy can exceed the length of the allocated string data and overwrite heap data. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26225 β€Ό

In PrestaShop Product Comments before version 4.2.0, an attacker could inject malicious web code into the users' web browsers by creating a malicious link. The problem was introduced in version 4.0.0 and is fixed in 4.2.0

πŸ“– Read

via "National Vulnerability Database".
🦿 How to secure your Zoom account with two-factor authentication 🦿

Follow these steps to better protect your Zoom account with a second layer of authentication.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2020-15349 β€Ό

BinaryNights ForkLift 3.x before 3.4 has a local privilege escalation vulnerability because the privileged helper tool implements an XPC interface that allows file operations to any process (copy, move, delete) as root and changing permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25832 β€Ό

Reflected Cross Site scripting vulnerability on Micro Focus Filr product, affecting version 4.2.1. The vulnerability could be exploited to perform Reflected XSS attack.

πŸ“– Read

via "National Vulnerability Database".