πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-28550 β€Ό

Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22789 β€Ό

A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability that could cause a Denial of Service on the Modicon PLC controller / simulator when updating the controller application with a specially crafted project file exists in Modicon M580 CPU (part numbers BMEP* and BMEH*, all versions), Modicon M340 CPU (part numbers BMXP34*, all versions), Modicon MC80 (part numbers BMKC80*, all versions), Modicon Momentum Ethernet CPU (part numbers 171CBU*, all versions), PLC Simulator for EcoStruxureΓ‚Βͺ Control Expert, including all Unity Pro versions (former name of EcoStruxureΓ‚Βͺ Control Expert, all versions), PLC Simulator for EcoStruxureΓ‚Βͺ Process Expert including all HDCS versions (former name of EcoStruxureΓ‚Βͺ Process Expert, all versions), Modicon Quantum CPU (part numbers 140CPU*, all versions), Modicon Premium CPU (part numbers TSXP5*, all versions).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-13929 β€Ό

Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28558 β€Ό

Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Heap-based buffer overflow vulnerability in the PDFLibTool component. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
❌ Bluetooth Bugs Open Billions of Devices to DoS, Code Execution ❌

The BrakTooth set of security vulnerabilities impacts at least 11 vendors' chipsets.

πŸ“– Read

via "Threat Post".
❌ SpyFone & CEO Banned From Stalkerware Biz ❌

The FTC's first spyware ban nixes a company whose "slipshod" security practices led to exposure of thousands of victims' illegally collected personal data.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2020-18048 β€Ό

An issue in craigms/main.php of CraigMS 1.0 allows attackers to execute arbitrary commands via a crafted input entered into the DB Name field.

πŸ“– Read

via "National Vulnerability Database".
❌ NFT Collector Tricked into Buying Fake Banksy  ❌

An attacker breached the site of famed street artist Banksy to host a fraudulent NFT auction but then gave back the money.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-34436 β€Ό

In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38641 β€Ό

Microsoft Edge for Android Spoofing Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38642 β€Ό

Microsoft Edge for iOS Spoofing Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26439 β€Ό

Microsoft Edge for Android Information Disclosure Vulnerability

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26436 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36930.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36930 β€Ό

Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26436.

πŸ“– Read

via "National Vulnerability Database".
❌ Brute-Force Attacks Target Inboxes for Gift Card Data ❌

Cybercriminal enterprise is mass testing millions of usernames and passwords per day in a hunt for loyalty card data.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep48: Cryptographic bugs, cryptocurrency nightmares, and lots of phishing [Podcast] ⚠

Latest episode - listen now!

πŸ“– Read

via "Naked Security".
⚠ Pwned! The home security system that can be hacked with your email address ⚠

The alarm system that can be turned off with your email address.

πŸ“– Read

via "Naked Security".
πŸ” Friday Five 9/3 πŸ”

How not to get hacked, a $9 million ransomware attack, and the FTC cracks down on a spyware app - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
πŸ›  Clam AntiVirus Toolkit 0.104.0 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
πŸ›  SQLMAP - Automatic SQL Injection Tool 1.5.9 πŸ› 

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

πŸ“– Read

via "Packet Storm Security".
πŸ›  nfstream 6.3.4 πŸ› 

nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.

πŸ“– Read

via "Packet Storm Security".