ATENTIONβΌ New - CVE-2016-11051
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with J(4.2) (Qualcomm Wi-Fi chipsets) software. There is a buffer overflow in the Qualcomm WLAN Driver. The Samsung ID is SVE-2016-5326 (February 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11050
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with S3(KK), Note2(KK), S4(L), Note3(L), and S5(L) software. An attacker can rewrite the IMEI by flashing crafted firmware. The Samsung ID is SVE-2016-5562 (March 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11049
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with software through 2016-01-16 (Shannon333/308/310 chipsets). The IMEI may be retrieved and modified because of an error in managing key information. The Samsung ID is SVE-2016-5435 (March 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11048
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) (Spreadtrum or Marvell chipsets) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2016-5421 (March 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11047
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with JBP(4.2) and KK(4.4) (Marvell chipsets) software. The ACIPC-MSOCKET driver allows local privilege escalation via a stack-based buffer overflow. The Samsung ID is SVE-2016-5393 (April 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11046
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with JBP(4.3), KK(4.4), and L(5.0/5.1) software. Because of a misused whitelist, attackers can reach the radio layer (aka RIL or RILD) to place calls or send SMS messages. The Samsung ID is SVE-2016-5733 (May 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11045
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) software. The Gallery library allow memory corruption via a malformed image. The Samsung ID is SVE-2016-5317 (May 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11044
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) (with Fingerprint support) software. The check of an application's signature can be bypassed during installation. The Samsung ID is SVE-2016-5923 (June 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11043
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) software. The S/MIME implementation in EAS uses DES (where 3DES is intended). The Samsung ID is SVE-2016-5871 (June 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11042
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) software. There is a SIM Lock bypass. The Samsung ID is SVE-2016-5381 (June 2016).π Read
via "National Vulnerability Database".
π Cyberattacks on the rise since the start of the coronavirus outbreak π
π Read
via "Security on TechRepublic".
Phishing is the leading threat exploiting COVID-19, followed by malicious websites, according to a survey of IT professionals from Check Point.π Read
via "Security on TechRepublic".
TechRepublic
Cyberattacks on the rise since the start of the coronavirus outbreak
Phishing is the leading threat exploiting COVID-19, followed by malicious websites, according to a survey of IT professionals from Check Point.
ATENTIONβΌ New - CVE-2016-11041
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with KK(4.4) software. Attackers can bypass the lockscreen by sending an AT command over USB. The Samsung ID is SVE-2015-5301 (June 2016).π Read
via "National Vulnerability Database".
π How to install and configure WireGuard VPN on Linux π
π Read
via "Security on TechRepublic".
WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.π Read
via "Security on TechRepublic".
TechRepublic
How to install and configure WireGuard VPN on Linux
WireGuard has yet to arrive in the Linux kernel, but you can still start testing how this new feature will work.
ATENTIONβΌ New - CVE-2017-18692
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) and N(7.0) (MSM8939, MSM8996, MSM8998, Exynos7580, Exynos8890, or Exynos8895 chipsets) software. There is a race condition, with a resultant buffer overflow, in the sec_ts touchscreen sysfs interface. The Samsung ID is SVE-2016-7501 (January 2017).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11040
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with L(5.0/5.1) (with USB OTG MyFile2014_L_ESS support) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2015-5068 (June 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11039
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) (AP + CP MDM9x35, or Qualcomm Onechip) software. There is a NULL pointer dereference issue in the IPC socket code. The Samsung ID is SVE-2016-5980 (July 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11038
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with software through 2016-04-05 (incorporating the Samsung Professional Audio SDK). The Jack audio service doesn't implement access control for shared memory, leading to arbitrary code execution or privilege escalation. The Samsung ID is SVE-2016-5953 (July 2016).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11037
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6604. Reason: This candidate is a reservation duplicate of CVE-2016-6604. Notes: All CVE users should reference CVE-2016-6604 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-11036
π Read
via "National Vulnerability Database".
An issue was discovered on Samsung mobile devices with M(6.0) software. There is a Factory Reset Protection (FRP) bypass. The Samsung ID is SVE-2016-6008 (August 2016).π Read
via "National Vulnerability Database".
π΄ 71% of Security Pros See Threats Jump Since COVID-19 Outbreak π΄
π Read
via "Dark Reading: ".
Phishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks.π Read
via "Dark Reading: ".
Dark Reading
71% of Security Pros See Threats Jump Since COVID-19 Outbreak
Phishing is the top threat, followed by websites offering false information about the pandemic, malware, and ransomware attacks.
β FIN6 and TrickBot Combine Forces in βAnchorβ Attacks β
π Read
via "Threatpost".
FIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware.π Read
via "Threatpost".
Threat Post
FIN6 and TrickBot Combine Forces in βAnchorβ Attacks
FIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware.