βΌ CVE-2020-26510 βΌ
π Read
via "National Vulnerability Database".
Airleader Master <= 6.21 devices have default credentials that can be used to access the exposed Tomcat Manager for deployment of a new .war file, with resultant remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26508 βΌ
π Read
via "National Vulnerability Database".
The WebTools component on Canon Oce ColorWave 3500 5.1.1.0 devices allows attackers to retrieve stored SMB credentials via the export feature, even though these are intentionally inaccessible in the UI.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26509 βΌ
π Read
via "National Vulnerability Database".
Airleader Master and Easy <= 6.21 devices have default credentials that can be used for a denial of service.π Read
via "National Vulnerability Database".
β Attackers Target Porn Site Goers in βMalsmokeβ Zloader Attack β
π Read
via "Threat Post".
A fake Java update found on various porn sites actually downloads the well-known Zloader malware.π Read
via "Threat Post".
Threat Post
Attackers Target Porn Site Goers in βMalsmokeβ Zloader Attack
A fake Java update found on various porn sites actually downloads the well-known Zloader malware.
β Dating Site Bumble Leaves Swipes Unsecured for 100M Users β
π Read
via "Threat Post".
An API bug exposed personal information of users like political leanings, astrological signs, education, and even height and weight, and their distance away in miles.π Read
via "Threat Post".
Threat Post
Dating Site Bumble Leaves Swipes Unsecured for 100M Users
Bumble fumble: An API bug exposed personal information of users like political leanings, astrological signs, education, and even height and weight, and their distance away in miles.
π΄ Global Pandemic Fuels Cyber-Threat Workload for National Cyber Security Centre, Shows Annual Review π΄
π Read
via "Dark Reading".
From securing the Nightingale hospitals to tackling threats to vaccine research and production, a large part of the National Cyber Security Centre's (NCSC) recent work in the UK has been related to the coronavirus pandemic, as Ron Alalouff discovered when reporting on its Annual Review.π Read
via "Dark Reading".
Dark Reading
Global Pandemic Fuels Cyber-Threat Workload for National Cyber Security Centre, Shows Annual Review
From securing the Nightingale hospitals to tackling threats to vaccine research and production, a large part of the National Cyber Security Centre's (NCSC) recent work in the UK has been related to the coronavirus pandemic, as Ron Alalouff discovered whenβ¦
β Cult videogame company Capcom pays a big round $0.00 to ransomware crooks β
π Read
via "Naked Security".
Bad news: data stolen, data dumped, customers affected. Good news: crooks got $0. The ransom was $11M, so that's a big deal!π Read
via "Naked Security".
Naked Security
Cult videogame company Capcom pays a big round $0.00 to ransomware crooks
Bad news: data stolen, data dumped, customers affected. Good news: crooks got $0. The ransom was $11M, so thatβs a big deal!
π΄ Breakdown of a Break-in: A Manufacturer's Ransomware Response π΄
π Read
via "Dark Reading".
The analysis of an industrial ransomware attack reveals common tactics and proactive steps that businesses can take to avoid similar incidents.π Read
via "Dark Reading".
Dark Reading
Breakdown of a Break-in: A Manufacturer's Ransomware Response
The analysis of an industrial ransomware attack reveals common tactics and proactive steps that businesses can take to avoid similar incidents.
π¦Ώ 4 ways to keep your company's and customers' data private and build trust π¦Ώ
π Read
via "Tech Republic".
Implementing appropriate data privacy is critical for company operations and success. Learn some of the challenges and solutions recommended to do the job right.π Read
via "Tech Republic".
TechRepublic
4 ways to keep your company's and customers' data private and build trust
Implementing appropriate data privacy is critical for company operations and success. Learn some of the challenges and solutions recommended to do the job right.
βΌ CVE-2020-26224 βΌ
π Read
via "National Vulnerability Database".
In PrestaShop before version 1.7.6.9 an attacker is able to list all the orders placed on the website without being logged by abusing the function that allows a shopping cart to be recreated from an order already placed. The problem is fixed in 1.7.6.9.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27483 βΌ
π Read
via "National Vulnerability Database".
Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27485 βΌ
π Read
via "National Vulnerability Database".
Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check the index provided when accessing the local variable in the LGETV and LPUTV instructions. This provides the ability to both read and write memory outside the bounds of the TVM context allocation. It can be leveraged to construct a use-after-free scenario, leading to a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28693 βΌ
π Read
via "National Vulnerability Database".
An unrestricted file upload issue in HorizontCMS 1.0.0-beta allows an authenticated remote attacker to upload PHP code through a zip file by uploading a theme, and executing the PHP file via an HTTP GET request to /themes/<php_file_name>π Read
via "National Vulnerability Database".
βΌ CVE-2020-26217 βΌ
π Read
via "National Vulnerability Database".
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27484 βΌ
π Read
via "National Vulnerability Database".
Garmin Forerunner 235 before 8.20 is affected by: Integer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check for overflow when allocating the array for the NEWA instruction. This a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27486 βΌ
π Read
via "National Vulnerability Database".
Garmin Forerunner 235 before 8.20 is affected by: Buffer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the string length provided in the data section of the PRG file. It allocates memory for the string immediately, and then copies the string into the TVM object by using a function similar to strcpy. This copy can exceed the length of the allocated string data and overwrite heap data. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.π Read
via "National Vulnerability Database".
βΌ CVE-2020-26225 βΌ
π Read
via "National Vulnerability Database".
In PrestaShop Product Comments before version 4.2.0, an attacker could inject malicious web code into the users' web browsers by creating a malicious link. The problem was introduced in version 4.0.0 and is fixed in 4.2.0π Read
via "National Vulnerability Database".
π¦Ώ How to secure your Zoom account with two-factor authentication π¦Ώ
π Read
via "Tech Republic".
Follow these steps to better protect your Zoom account with a second layer of authentication.π Read
via "Tech Republic".
TechRepublic
How to secure your Zoom account with two-factor authentication
Follow these steps to better protect your Zoom account with a second layer of authentication.
βΌ CVE-2020-15349 βΌ
π Read
via "National Vulnerability Database".
BinaryNights ForkLift 3.x before 3.4 has a local privilege escalation vulnerability because the privileged helper tool implements an XPC interface that allows file operations to any process (copy, move, delete) as root and changing permissions.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25832 βΌ
π Read
via "National Vulnerability Database".
Reflected Cross Site scripting vulnerability on Micro Focus Filr product, affecting version 4.2.1. The vulnerability could be exploited to perform Reflected XSS attack.π Read
via "National Vulnerability Database".
βΌ CVE-2020-11851 βΌ
π Read
via "National Vulnerability Database".
Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in the execution of arbitrary code.π Read
via "National Vulnerability Database".