πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-35604 β€Ό

An XXE attack can occur in Kronos WebTA 5.0.4 when SAML is used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21378 β€Ό

SQL injection vulnerability in SeaCMS 10.1 (2020.02.08) via the id parameter in an edit action to admin_members_group.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35605 β€Ό

The Graphics Protocol feature in graphics.c in kitty before 0.19.3 allows remote attackers to execute arbitrary code because a filename containing special characters can be included in an error message.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-21377 β€Ό

SQL injection vulnerability in yunyecms V2.0.1 via the selcart parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35606 β€Ό

Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.

πŸ“– Read

via "National Vulnerability Database".
❌ Nosy Ex-Partners Armed with Instagram Passwords Pose a Serious Threat ❌

A survey of single people found almost a third are still logging into their ex’s social-media accounts, some for revenge.

πŸ“– Read

via "Threat Post".
🦿 Cybersecurity pros: Are humans really the weakest link? 🦿

Some experts argue that users might actually be the most vital link when it comes to certain types of cyberattacks.

πŸ“– Read

via "Tech Republic".
πŸ•΄ Cisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report πŸ•΄

The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-8995 β€Ό

Programi Bilanc Build 007 Release 014 31.01.2020 supplies a .exe file containing several hardcoded credentials to different servers that allow remote attackers to gain access to the complete infrastructure including the website, update server, and external issue tracking tools.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-11717 β€Ό

An issue was discovered in Programi 014 31.01.2020. It has multiple SQL injection vulnerabilities.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-7580 β€Ό

Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26281 β€Ό

async-h1 is an asynchronous HTTP/1.1 parser for Rust (crates.io). There is a request smuggling vulnerability in async-h1 before version 2.3.0. This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications. If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body. One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request. Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary. This has been addressed in async-h1 2.3.0 and previous versions have been yanked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35151 β€Ό

The Online Marriage Registration System 1.0 post parameter "searchdata" in the user/search.php request is vulnerable to Time Based Sql Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-26277 β€Ό

DBdeployer is a tool that deploys MySQL database servers easily. In DBdeployer before version 1.58.2, users unpacking a tarball may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defenses. For the attack to succeed, the following factors need to contribute: 1) The user is logged in as root. While dbdeployer is usable as root, it was designed to run as unprivileged user. 2) The user has taken a tarball from a non secure source, without testing the checksum. When the tarball is retrieved through dbdeployer, the checksum is compared before attempting to unpack. This has been fixed in version 1.58.2.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-29596 β€Ό

MiniWeb HTTP server 0.8.19 allows remote attackers to cause a denial of service (daemon crash) via a long name for the first parameter in a POST request.

πŸ“– Read

via "National Vulnerability Database".
❌ Patrick Wardle on Hackers Leveraging β€˜Powerful’ iOS Bugs in High-Level Attacks ❌

Noted Apple security expert Patrick Wardle discusses how cybercriminals are stepping up their game in targeting Apple users with new techniques and cyberattacks.

πŸ“– Read

via "Threat Post".
πŸ” What is NIST CSF? πŸ”

The National Institute of Standards and Technology's Cybersecurity Framework is designed to help organizations manage their security risk; in this blog we'll go over its requirements, penalties for failing to comply with it, and best practices.

πŸ“– Read

via "Digital Guardian".
🦿 How to combat future cyberattacks following the SolarWinds breach 🦿

How can and should governments respond to and better protect themselves from serious cyberattacks from hostile nations?

πŸ“– Read

via "Tech Republic".
πŸ•΄ Security as Code: How Repeatable Policy-Driven Deployment Improves Security πŸ•΄

The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2020-28460 β€Ό

This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-28448 β€Ό

This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.

πŸ“– Read

via "National Vulnerability Database".