‼ CVE-2020-27558 ‼
📖 Read
via "National Vulnerability Database".
Use of an undocumented user in BASETech GE-131 BT-1837836 firmware 20180921 allows remote attackers to view the video stream.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27554 ‼
📖 Read
via "National Vulnerability Database".
Cleartext Transmission of Sensitive Information vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 exists which could leak sensitive information transmitted between the mobile app and the camera device.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27553 ‼
📖 Read
via "National Vulnerability Database".
A directory traversal vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to gain access to sensitive information.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25798 ‼
📖 Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in LimeSurvey before and including 3.21.1 allows authenticated users with correct permissions to inject arbitrary web script or HTML via parameter ParticipantAttributeNamesDropdown of the Attributes on the central participant database page. When the survey attribute being edited or viewed, e.g. by an administrative user, the JavaScript code will be executed in the browser.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13958 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27555 ‼
📖 Read
via "National Vulnerability Database".
Use of default credentials for the telnet server in BASETech GE-131 BT-1837836 firmware 20180921 allows remote attackers to execute arbitrary system commands as the root user.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27556 ‼
📖 Read
via "National Vulnerability Database".
A predictable device ID in BASETech GE-131 BT-1837836 firmware 20180921 allows unauthenticated remote attackers to connect to the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-27557 ‼
📖 Read
via "National Vulnerability Database".
Unprotected Storage of Credentials vulnerability in BASETech GE-131 BT-1837836 firmware 20180921 allows local users to gain access to the video streaming username and password via SQLite files containing plain text credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-21665 ‼
📖 Read
via "National Vulnerability Database".
In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the 'table' parameter passed is not filtered so a malicious parameter can be passed for SQL injection.📖 Read
via "National Vulnerability Database".
❌ Zoom Takes on Zoom-Bombers Following FTC Settlement ❌
📖 Read
via "Threat Post".
The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls.📖 Read
via "Threat Post".
Threat Post
Zoom Takes on Zoom-Bombers Following FTC Settlement
The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls.
🕴 Chart: Undisputed Increase in Paid Claims 🕴
📖 Read
via "Dark Reading".
While the number of enterprises that hold cyber insurance might not have increased significantly over the past year, the number of enterprises that have successfully filed a breach insurance claim has.📖 Read
via "Dark Reading".
Dark Reading
Chart: Undisputed Increase in Paid Claims
While the number of enterprises that hold cyber insurance might not have increased significantly over the past year, the number of enterprises that have successfully filed a breach insurance claim has.
🕴 Researchers Scan for Supply-Side Threats in Open Source 🕴
📖 Read
via "Dark Reading".
A recent project to scan the main Python repository's 268,000 packages found only a few potentially malicious programs, but work earlier this year uncovered hundreds of instances of malware.📖 Read
via "Dark Reading".
Dark Reading
Researchers Scan for Supply-Side Threats in Open Source
A recent project to scan the main Python repository's 268,000 packages found only a few potentially malicious programs, but work earlier this year uncovered hundreds of instances of malware.
🕴 To Pay or Not to Pay: Responding to Ransomware From a Lawyer's Perspective 🕴
📖 Read
via "Dark Reading".
The threat of data extortion adds new layers of risk when determining how to respond to a ransomware attack.📖 Read
via "Dark Reading".
Dark Reading
To Pay or Not to Pay: Responding to Ransomware From a Lawyer's Perspective
The threat of data extortion adds new layers of risk when determining how to respond to a ransomware attack.
‼ CVE-2020-26701 ‼
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in Dashboards section in Kaa IoT Platform v1.2.0 allows remote attackers to inject malicious web scripts or HTML Injection payloads via the Description parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13351 ‼
📖 Read
via "National Vulnerability Database".
Insufficient permission checks in scheduled pipeline API in GitLab CE/EE 13.0+ allows an attacker to read variable names and values for scheduled pipelines on projects visible to the attacker. Affected versions are >=13.0, <13.3.9,>=13.4.0, <13.4.5,>=13.5.0, <13.5.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-25400 ‼
📖 Read
via "National Vulnerability Database".
Cross domain policies in Taskcafe Project Management tool before version 0.1.0 and 0.1.1 allows remote attackers to access sensitive data such as access token.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-13350 ‼
📖 Read
via "National Vulnerability Database".
CSRF in runner administration page in all versions of GitLab CE/EE allows an attacker who's able to target GitLab instance administrators to pause/resume runners. Affected versions are >=13.5.0, <13.5.2,>=13.4.0, <13.4.5,<13.3.9.📖 Read
via "National Vulnerability Database".
❌ COVID-19 Antigen Firm Hit by Malware Attack ❌
📖 Read
via "Threat Post".
Global biotech firm Miltenyi, which supplies key components necessary for COVID-19 treatment research, has been battling a malware attack.📖 Read
via "Threat Post".
Threat Post
COVID-19 Antigen Firm Hit by Malware Attack
Global biotech firm Miltenyi, which supplies key components necessary for COVID-19 treatment research, has been battling a malware attack.
🦿 The team behind the Essential PH-1 is back, and privacy is their focus 🦿
📖 Read
via "Tech Republic".
A key member of the now-defunct Essential company has returned, and privacy is his goal. Jack Wallen digs in to try and make sense of what's to come with OSOM.📖 Read
via "Tech Republic".
TechRepublic
OSOM: The team behind the Essential PH-1 is back, and privacy is their focus
Jason Keats, a key member of the now-defunct Essential company has returned, and privacy is his goal. Jack Wallen interviews the OSOM founder and CEO to learn more.
🔏 Google Fixes Zero Days, NAT Slipstream Attack, in Chrome 🔏
📖 Read
via "Digital Guardian".
Just days after fixing two zero day vulnerabilities, Google has rolled out yet another version of its Chrome browser, resolving a fix for last month's NAT Slipstream attack.📖 Read
via "Digital Guardian".
Digital Guardian
Google Fixes Zero Days, NAT Slipstream Attack, in Chrome
Just days after fixing two zero day vulnerabilities, Google has rolled out yet another version of its Chrome browser, resolving a fix for last month's NAT Slipstream attack.
🦿 Google Authenticator: How to move from one iPhone or Android device to another 🦿
📖 Read
via "Tech Republic".
If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.📖 Read
via "Tech Republic".
TechRepublic
How to move Google Authenticator from one iPhone or Android device to another
If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.