πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-25229 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The implemented encryption for communication with affected devices is prone to replay attacks due to the usage of a static key. An attacker could change the password or change the configuration on any affected device if using prepared messages that were generated for another device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-19289 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-19285 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow injections that could lead to XSS attacks if unsuspecting users are tricked into accessing a malicious link.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0466 β€Ό

In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0458 β€Ό

In SPDIFEncoder::writeBurstBufferBytes and related methods of SPDIFEncoder.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-160265164

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-19283 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The application's web server could expose non-sensitive information about the server's architecture. This could allow an attacker to adapt further attacks to the version in place.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-19284 β€Ό

A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow Cross-Site Scripting (XSS) attacks if an attacker is able to modify content of particular web pages, causing the application to behave in unexpected ways for legitimate users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0469 β€Ό

In addEscrowToken of LockSettingsService.java, there is a possible loss of the synthetic password due to logic error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-168692734

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25231 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The encryption of program data for the affected devices uses a static key. An attacker could use this key to extract confidential information from protected program files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25230 β€Ό

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an outdated cipher mode on port 10005/tcp, an attacker could extract the encryption key from a captured communication with the device.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-0465 β€Ό

In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25707 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35470 β€Ό

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35471 β€Ό

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

πŸ“– Read

via "National Vulnerability Database".
⚠ Phishing tricks that really work – and how to avoid them ⚠

Get inside the mindset of your adversaries to increase your chances of spotting a phish.

πŸ“– Read

via "Naked Security".
πŸ•΄ The Private Sector Needs a Cybersecurity Transformation πŸ•΄

Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.

πŸ“– Read

via "Dark Reading".
🦿 How understanding cognitive science can strengthen cybersecurity's weak links 🦿

Learn how applying cognitive science is one way to thwart cybercriminals' abilities to get unsuspecting users to do their bidding.

πŸ“– Read

via "Tech Republic".
πŸ‘1
⚠ Naked Security Live – How to avoid β€œbig brand” email scams ⚠

Here's the latest Naked Security video - watch now (and please share with your friends)!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2020-28203 β€Ό

An issue was discovered in Foxit Reader and PhantomPDF 10.1.0.37527 and earlier. There is a null pointer access/dereference while opening a crafted PDF file, leading the application to crash (denial of service).

πŸ“– Read

via "National Vulnerability Database".
πŸ›  American Fuzzy Lop plus plus 3.0c πŸ› 

Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.

πŸ“– Read

via "Packet Storm Security".
🦿 The lines between corporate and tech strategy continue to blur 🦿

Strategic platforms with advanced analytics, automation, and AI are on tap for 2021, according to Deloitte.

πŸ“– Read

via "Tech Republic".