πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-35555 β€Ό

An issue was discovered on LG mobile devices with Android OS 10 software. When a dual-screen configuration is supported, the device does not lock upon disconnection of a call with the cover closed. The LG ID is LVE-SMP-200027 (December 2020).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35548 β€Ό

An issue was discovered in Finder on Samsung mobile devices with Q(10.0) software. A call to a non-existent provider allows attackers to cause a denial of service. The Samsung ID is SVE-2020-18629 (December 2020).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25609 β€Ό

The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could allow an authenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to view and modify user data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25610 β€Ό

The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26171 β€Ό

In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27639 β€Ό

The Bluetooth handset of Mitel MiVoice 6873i, 6930, and 6940 SIP phones with firmware before 5.1.0.SP6 could allow an unauthenticated attacker within Bluetooth range to pair a rogue Bluetooth device when a phone handset loses connection, due to an improper pairing mechanism. A successful exploit could allow an attacker to eavesdrop on conversations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-16955 β€Ό

SolarWinds Web Help Desk 12.7.0 allows XSS via an uploaded SVG document in a request.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25612 β€Ό

The NuPoint Messenger of Mitel MiCollab before 9.2 could allow an attacker with escalated privilege to access user files due to insufficient access control. Successful exploit could potentially allow an attacker to gain access to sensitive information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26172 β€Ό

Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35475 β€Ό

In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35479 β€Ό

MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry itself does not escape in all code paths. For example, the return of Language::userTimeAndDate is is always unsafe for HTML in a month value. This affects MediaWiki 1.12.0 and later.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 2021 Cybersecurity Predictions: The Intergalactic Battle Begins πŸ•΄

There's much in store for the future of cybersecurity, and the most interesting things aren't happening on Earth.

πŸ“– Read

via "Dark Reading".
πŸ•΄ 5 Key Takeaways from the SolarWinds Breach πŸ•΄

New details continue to emerge each day, and there may be many more lessons to learn from what could be among the largest cyberattacks ever.

πŸ“– Read

via "Dark Reading".
❌ Insider Threats: What Are They, Really? ❌

"Insider threat" or "human error" shows up a lot as the major cause of data breaches across all types of reports out there. But often it's not defined, or it's not clearly defined, so people conjure up their own definition.

πŸ“– Read

via "Threat Post".
❌ Cyberpunk 2077 Headaches Grow: New Spyware Found in Fake Android Download ❌

Threat actors impersonate Google Play store in scam as Sony pulls the game off the PlayStation store due to myriad performance issues.

πŸ“– Read

via "Threat Post".
🦿 Cybersecurity can use some help from AI and ML 🦿

Howard professor says security must reach all types of networks, including IoT and ad hoc networks.

πŸ“– Read

via "Tech Republic".
🦿 AI, ML can bolster cybersecurity, and vice versa, professor says 🦿

Howard University professor talks about his research in emerging technologies.

πŸ“– Read

via "Tech Republic".
❌ Microsoft Caught Up in SolarWinds Spy Effort, Joining Federal Agencies ❌

The ongoing, growing campaign is β€œeffectively an attack on the United States and its government and other critical institutions,” Microsoft warned.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-4764 β€Ό

IBM Planning Analytics 2.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 188898.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25494 β€Ό

Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-25901 β€Ό

Host Header Injection in Spiceworks 7.5.7.0 allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.

πŸ“– Read

via "National Vulnerability Database".