πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-15295 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15736 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15738 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15740 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15753 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15755 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15765 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15762 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15288 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-27291 β€Ό

In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-8111 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-15766 β€Ό

** REJECT ** Unused CVE for 2020.

πŸ“– Read

via "National Vulnerability Database".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.5.7 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

πŸ“– Read

via "Packet Storm Security".
🦿 How to protect your Microsoft Office 365 environment from cyber threats 🦿

A quick shift toward Microsoft Office 365 and Azure AD in the cloud has expanded the attack surface for many organizations, says Vectra AI.

πŸ“– Read

via "Tech Republic".
❌ State-sponsored Threat Groups Target Telcos, Steal 5G Secrets ❌

Researchers say China-linked APTs lure victims with bogus Huawei career pages in what they dub β€˜Operation DiΓ nxΓΉn’.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-14358 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35456 β€Ό

The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to view private chat messages and media files via logcat because of excessive logging.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35455 β€Ό

The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from Shared Preferences and the SQLite database because of insecure data storage.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28660 β€Ό

rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the ->ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-35454 β€Ό

The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from an Android backup because of insecure application configuration.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20200 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".