πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-1939 β€Ό

Null pointer dereference occurs due to improper validation when the preemption feature enablement is toggled in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1976 β€Ό

A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3811 β€Ό

adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3805 β€Ό

object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3810 β€Ό

code-server is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30261 β€Ό

Possible integer and heap overflow due to lack of input command size validation while handling beacon template update command from HLOS in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3803 β€Ό

nth-check is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
❌ AT&T Phone-Unlocking Malware Ring Costs Carrier $200M ❌

With the help of malicious insiders, a fraudster was able to install malware and remotely divorce iPhones and other handsets from the carrier's U.S. network -- all the way from Pakistan.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Google announces partnership to review security of open source software projects πŸ—“οΈ

Tech giant will lend its support to security reviews of eight projects, including Git, Lodash, and Laravel 

πŸ“– Read

via "The Daily Swig".
❌ Ditch the Alert Cannon: Modernizing IDS is a Security Must-Do ❌

Jeff Costlow, CISO at ExtraHop, makes the case for implementing next-gen intrusion-detection systems (NG-IDS) and retiring those noisy 90s compliance platforms.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Epik hack exposes lax security practices at controversial web host πŸ—“οΈ

ISP guilty of β€˜laziest design possible’, critics allege

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Alaska Department of Health reveals data breach potentially exposing residents’ financial, health information πŸ—“οΈ

Disclosure part of lengthy investigation into sophisticated attack that took place in May

πŸ“– Read

via "The Daily Swig".
🦿 Small businesses need to step up efforts to secure and retain hybrid workers 🦿

Only 31% are shipping laptops to employees and nearly half have spent their own money on a remote workspace, a survey from GetApp finds.

πŸ“– Read

via "Tech Republic".
🦿 Dell study finds most organizations don't think they can recover from a ransomware attack 🦿

Sixty-seven percent lack confidence in their ability to recover business-critical data, which is troubling given that the amount of data businesses manage has grown by more than 10x since 2016.

πŸ“– Read

via "Tech Republic".
πŸ‘1
β€Ό CVE-2021-41315 β€Ό

The Device42 Remote Collector before 17.05.01 does not sanitize user input in its SNMP Connectivity utility. This allows an authenticated attacker (with access to the console application) to execute arbitrary OS commands and escalate privileges.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31844 β€Ό

A buffer overflow vulnerability in McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.200 allows a local attacker to execute arbitrary code with elevated privileges through placing carefully constructed Ami Pro (.sam) files onto the local system and triggering a DLP Endpoint scan through accessing a file. This is caused by the destination buffer being of fixed size and incorrect checks being made on the source size.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39227 β€Ό

ZRender is a lightweight graphic library providing 2d draw for Apache ECharts. In versions prior to 5.2.1, using `merge` and `clone` helper methods in the `src/core/util.ts` module results in prototype pollution. It affects the popular data visualization library Apache ECharts, which uses and exports these two methods directly. The GitHub Security Advisory page for this vulnerability contains a proof of concept. This issue is patched in ZRender version 5.2.1. One workaround is available: Check if there is `__proto__` in the object keys. Omit it before using it as an parameter in these affected methods. Or in `echarts.util.merge` and `setOption` if project is using ECharts.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39228 β€Ό

Tremor is an event processing system for unstructured data. A vulnerability exists between versions 0.7.2 and 0.11.6. This vulnerability is a memory safety Issue when using `patch` or `merge` on `state` and assign the result back to `state`. In this case, affected versions of Tremor and the tremor-script crate maintains references to memory that might have been freed already. And these memory regions can be accessed by retrieving the `state`, e.g. send it over TCP or HTTP. This requires the Tremor server (or any other program using tremor-script) to execute a tremor-script script that uses the mentioned language construct. The issue has been patched in version 0.11.6 by removing the optimization and always cloning the target expression of a Merge or Patch. If an upgrade is not possible, a possible workaround is to avoid the optimization by introducing a temporary variable and not immediately reassigning to `state`.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41316 β€Ό

The Device42 Main Appliance before 17.05.01 does not sanitize user input in its Nmap Discovery utility. An attacker (with permissions to add or edit jobs run by this utility) can inject an extra argument to overwrite arbitrary files as the root user on the Remote Collector.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31843 β€Ό

Improper privileges management vulnerability in McAfee Endpoint Security (ENS) Windows prior to 10.7.0 September 2021 Update allows local users to access files which they would otherwise not have access to via manipulating junction links to redirect McAfee folder operations to an unintended location.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31842 β€Ό

XML Entity Expansion injection vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2021 Update allows a local user to initiate high CPU and memory consumption resulting in a Denial of Service attack through carefully editing the EPDeploy.xml file and then executing the setup process.

πŸ“– Read

via "National Vulnerability Database".