Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Nov 20, 2017By Shaina Raskin

A snapshot look at the breaches and reported vulnerabilities of last week


The Boston based ride-hailing service informed users of a million-customer data breach. The issue was due to a misconfigured Apache Hive database, which was unsecured and exposed on the internet. To read more:

Jewson Direct

The builders merchant confirmed that customer details could have been exposed in a cyberattack this summer. It is not known if the customer information was encrypted. To read more:


Microsoft patched a remote code-execution bug that researchers found in a 17-year-old executable. The vulnerability was not stopped by Windows 10’s security. The tool is used to insert mathematical formulas into Office documents. To read more:

Forever 21

The retailer is investigating a potential data breach, which may have compromised customer information and payment. Encryption and token-based authentication systems were implemented. To read more:

The Pentagon

The Pentagon left an S3 bucket exposed on the internet that contained 1.8 billion documents. The database contained information going back as far as 2009. To read more:

Reported Vulnerabilities

Hidden Cobra

The FBI and DHS have issued an alert that North Korean hackers are targeting the aerospace industry, financial services and critical infrastructure with a remote-access trojan, or RAT. The Hidden Cobra group has been using the FallChill RAT since 2016. To read more:

Airplane hacks

Homeland Security was able to compromise a Boeing 757 via radio-frequency communications. The details of the attack itself are classified. To read more:


Oracle released an emergency patch for two vulnerabilities with top severity ratings. Five bugs were found in the Tuxedo application. The most severe flaw is a memory-leak issue similar to HeartBleed. To read more:

Google Home and Alexa

Google and Amazon have patched their smarthome devices to plug the BlueBorne flaw. The flaw could be used as an entry point to attacking other devices with malware. To read more:

Terdot Banking Trojan

The banking trojan, discovered by researchers, can be used to view and modify traffic on email and social media platforms in addition to collection financial information. The malware derives inspiration from the Zeus banking trojan. To read more:

Amazon Key flaw

Amazon is fixing a flaw in its Key service that allows a hacker to freeze the camera. The attack can be launched within wi-fi range. To read more:


The drone maker left AWS credentials and private SSL keys among other important information open on public forums. For example, the private keys of the HTTPS domain were exposed on GitHub for the last four years. To read more:


Researchers identified seven vulnerabilities in the LibXL C library, which is used to read Excel files. Attackers could perform remote code execution attacks using specially crafted XLS files. To read more:

Want to learn more?

Sign up below and receive weekly breach reports directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.