🛡 Cybersecurity & Privacy 🛡 - News
26K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
CVE-2021-26901

Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898.

📖 Read

via "National Vulnerability Database".
CVE-2021-27054

Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27053.

📖 Read

via "National Vulnerability Database".
CVE-2021-26893

Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897.

📖 Read

via "National Vulnerability Database".
CVE-2021-26411

Internet Explorer Memory Corruption Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-26900

Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-27077.

📖 Read

via "National Vulnerability Database".
CVE-2021-26864

Windows Virtual Registry Provider Elevation of Privilege Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-26867

Windows Hyper-V Remote Code Execution Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-26862

Windows Installer Elevation of Privilege Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2020-5024

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated attacker to cause a denial of service due a hang in the SSL handshake response. IBM X-Force ID: 193660.

📖 Read

via "National Vulnerability Database".
CVE-2021-27061

HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27062.

📖 Read

via "National Vulnerability Database".
CVE-2021-24089

HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.

📖 Read

via "National Vulnerability Database".
CVE-2021-26898

Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901.

📖 Read

via "National Vulnerability Database".
CVE-2021-27055

Microsoft Visio Security Feature Bypass Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-26880

Storage Spaces Controller Elevation of Privilege Vulnerability

📖 Read

via "National Vulnerability Database".
CVE-2021-27057

Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27059.

📖 Read

via "National Vulnerability Database".
🕴 Actionable Tips for Engaging the Board on Cybersecurity 🕴

Up your game with your company's board of directors to help them understand your cybersecurity priorities.

📖 Read

via "Dark Reading".
Microsoft Exchange Servers Face APT Attack Tsunami

At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount.

📖 Read

via "Threat Post".
🕴 Microsoft Exchange Server Exploit Code Posted to GitHub 🕴

The proof-of-concept tool, which contained exploits for two Exchange Server vulnerabilities, was quickly removed from GitHub.

📖 Read

via "Dark Reading".
NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic

A spam campaign hides a malicious executable behind file archive extensions.

📖 Read

via "Threat Post".
CVE-2021-28144

prog.cgi on D-Link DIR-3060 devices before 1.11b04 HF2 allows remote authenticated users to inject arbitrary commands in an admin or root context because SetVirtualServerSettings calls CheckArpTables, which calls popen unsafely.

📖 Read

via "National Vulnerability Database".
CVE-2021-28141

An issue was discovered in Progress Telerik UI for ASP.NET AJAX 2021.1.224. It allows unauthorized access to MicrosoftAjax.js through the Telerik.Web.UI.WebResource.axd file. This may allow the attacker to gain unauthorized access to the server and execute code. To exploit, one must use the parameter _TSM_HiddenField_ and inject a command at the end of the URI.

📖 Read

via "National Vulnerability Database".