πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-29447 β€Ό

Affected versions of Atlassian Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the file upload request feature of code reviews. The affected versions are before version 4.7.4, and from version 4.8.0 before 4.8.5.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35590 β€Ό

LimitLoginAttempts.php in the limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows a bypass of (per IP address) rate limits because the X-Forwarded-For header can be forged. When the plugin is configured to accept an arbitrary header for the client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does not ever reach the maximum allowed retries.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35589 β€Ό

The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.

πŸ“– Read

via "National Vulnerability Database".
⚠ Naked Security Live – Watch out for Messenger scams ⚠

Here's the latest Naked Security video talk - watch now! (And please share with your friends...)

πŸ“– Read

via "Naked Security".
❌ Telemed Poll Uncovers Biggest Risks and Best Practices ❌

What are the riskiest links in the virtual healthcare chain? Threatpost readers weigh in as part of an exclusive telemed poll.

πŸ“– Read

via "Threat Post".
πŸ•΄ We Have a National Cybersecurity Emergency -- Here's How We Can Respond πŸ•΄

Let's prioritize bipartisan strategic actions that can ensure our national security and strengthen the economy. Here are five ideas for how to do that.

πŸ“– Read

via "Dark Reading".
🦿 6 modern data stack trends to look for in 2021 🦿

TechRepublic spoke with dozens of experts who said the influx of companies interested in doing more with their data is only increasing.

πŸ“– Read

via "Tech Republic".
πŸ” What's the Most Important Thing to Keep in Mind About MDR Costs? πŸ”

In this group interview, we asked 21 experts and business leaders what the most important thing for companies to keep in mind about managed detection and response costs is.

πŸ“– Read

via "Digital Guardian".
❌ Hacker Dumps Crypto Wallet Customer Data; Active Attacks Follow ❌

Customer data from a June attack against cryptocurrency wallet firm Ledger is now public and actively being used in attacks.

πŸ“– Read

via "Threat Post".
❌ Critical Bugs in Dell Wyse Thin Clients Allow Code Execution, Client Takeovers ❌

The bugs rate 10 out of 10 on the vulnerability-severity scale, thanks to the ease of exploitation.

πŸ“– Read

via "Threat Post".
❌ Simplifying Proactive Defense With Threat Playbooks ❌

Fortinet's Derek Manky talks about how threat playbooks can equip defense teams with the tools they need to fight back against evolving attacker TTPs.

πŸ“– Read

via "Threat Post".
❌ Dark Web Pricing Skyrockets for Microsoft RDP Servers, Payment-Card Data ❌

Underground marketplace pricing on RDP server access, compromised payment card data and DDoS-For-Hire services are surging.

πŸ“– Read

via "Threat Post".
πŸ›  Erlang Bytecode String Converter πŸ› 

estr2bc is a python script to convert arbitrary string input to Erlang bytecode.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2020-3999 β€Ό

VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27846 β€Ό

A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2019-16959 β€Ό

SolarWinds Web Help Desk 12.7.0 allows CSV Injection, also known as Formula Injection, via a file attached to a ticket.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26049 β€Ό

Nifty-PM CPE 2.3 is affected by stored HTML injection. The impact is remote arbitrary code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35274 β€Ό

DotCMS Add Template with admin panel 20.11 is affected by cross-site Scripting (XSS) to gain remote privileges. An attacker could compromise the security of a website or web application through a stored XSS attack and stealing cookies using XSS.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35276 β€Ό

EgavilanMedia ECM Address Book 1.0 is affected by SQL injection. An attacker can bypass the Admin Login panel through SQLi and get Admin access and add or remove any user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35275 β€Ό

Coastercms v5.8.18 is affected by cross-site Scripting (XSS). A user can steal a cookie and make the user redirect to any malicious website because it is trigged on the main home page of the product/application.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35273 β€Ό

EgavilanMedia User Registration & Login System with Admin Panel 1.0 is affected by Cross Site Request Forgery (CSRF) to remotely gain privileges in the User Profile panel. An attacker can update any user's account.

πŸ“– Read

via "National Vulnerability Database".