πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-32946 β€Ό

An improper check for unusual or exceptional conditions issue exists within the parsing DGN files from Drawings SDK (Version 2022.4 and prior) resulting from the lack of proper validation of the user-supplied data. This may result in several of out-of-bounds problems and allow attackers to cause a denial-of-service condition or execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32938 β€Ό

Drawings SDK (All versions prior to 2022.4) are vulnerable to an out-of-bounds read due to parsing of DWG files resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of service condition or read sensitive information from memory.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32950 β€Ό

An out-of-bounds read issue exists within the parsing of DXF files in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of-service condition or read sensitive information from memory locations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32944 β€Ό

A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service condition or execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32952 β€Ό

An out-of-bounds write issue exists in the DGN file-reading procedure in the Drawings SDK (Version 2022.4 and prior) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-32936 β€Ό

An out-of-bounds write issue exists in the DXF file-recovering procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context of the current process.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34825 β€Ό

Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31818 β€Ό

Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isnÒ€ℒt parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.

πŸ“– Read

via "National Vulnerability Database".
❌ CVS Health Records for 1.1 Billion Customers Exposed ❌

A vendor exposed the records, which were accessible with no password or other authentication, likely because of a cloud-storage misconfiguration.

πŸ“– Read

via "Threat Post".
❌ Geek Squad Vishing Attack Bypasses Email Security to Hit 25K Mailboxes ❌

An email campaign asking victims to call a bogus number to suspend supposedly fraudulent subscriptions got right past Microsoft's native email controls.

πŸ“– Read

via "Threat Post".
πŸ•΄ Cyberattacks Are Tailored to Employees ... Why Isn't Security Training? πŸ•΄

Consider four factors and behaviors that impact a particular employee's risk, and how security training should take them into account.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-23396 β€Ό

All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2013-20002 β€Ό

Elemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.

πŸ“– Read

via "National Vulnerability Database".
πŸ” What is Data Classification? A Data Classification Definition πŸ”

Learn about the different types of classification and how to effectively classify your data in Data Protection 101, our series on the fundamentals of data security.

πŸ“– Read

via "".
❌ Cisco Smart Switches Riddled with Severe Security Holes ❌

The intro-level networking gear for SMBs could allow remote attacks designed to steal information, drop malware and disrupt operations.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-32575 β€Ό

HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33557 β€Ό

An XSS issue was discovered in manage_custom_field_edit_page.php in MantisBT before 2.25.2. Unescaped output of the return parameter allows an attacker to inject code into a hidden input field.

πŸ“– Read

via "National Vulnerability Database".
❌ Clop Raid: A Big Win in the War on Ransomware? ❌

Cops arrest six, seize cars and cash in splashy raid, and experts are applauding.

πŸ“– Read

via "Threat Post".
πŸ•΄ Google Launches SLSA, A New Framework for Supply Chain Integrity πŸ•΄

The 'Supply chain Levels for Software Artifacts' aims to ensure the integrity of components throughout the software supply chain.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Carnival Cruise Line Reports Security Breach πŸ•΄

The cruise ship operator says the incident affected employee and guest data.

πŸ“– Read

via "Dark Reading".
πŸ•΄ One in Five Manufacturing Firms Targeted by Cyberattacks πŸ•΄

Information-stealing malware makes up about a third of attacks, a study finds, but companies worry most about ransomware shutting down production.

πŸ“– Read

via "Dark Reading".