πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-23267 β€Ό

An issue was discovered in gpac 0.8.0. The gf_hinter_track_process function in isom_hinter_track_process.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23269 β€Ό

An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ New iCloud Private Relay service leaks users’ true IP addresses, researcher claims πŸ—“οΈ

De-anonymizing users of VPN-like service, launched with iOS 15 yesterday, is β€˜easily accomplished’

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-39339 β€Ό

The Telefication WordPress plugin is vulnerable to Open Proxy and Server-Side Request Forgery via the ~/bypass.php file due to a user-supplied URL request value that gets called by a curl requests. This affects versions up to, and including, 1.8.0.

πŸ“– Read

via "National Vulnerability Database".
⚠ VMware patch bulletin warns: β€œThis needs your immediate attention.” ⚠

"It is a matter of time before working exploits are available," warns VMware.

πŸ“– Read

via "Naked Security".
πŸ—“οΈ APT focus: β€˜Noisy’ Russian hacking crews are among the world’s most sophisticated πŸ—“οΈ

Unpacking the Matryoshka dolls behind Kremlin-backed cybercrime campaigns

πŸ“– Read

via "The Daily Swig".
🦿 Study to become a CompTIA security infrastructure expert 🦿

IT professionals who want to move up into elite cybersecurity positions can now boost their career trajectories instead of taking years to advance up the hierarchy.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ VMware security warning: Multiple vulnerabilities in vCenter Server could allow remote network access πŸ—“οΈ

Several issues including one critical bug have been remedied in latest patch cycle

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-3583 β€Ό

A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36260 β€Ό

A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39404 β€Ό

MaianAffiliate v1.0 allows an authenticated administrative user to save an XSS to the database.

πŸ“– Read

via "National Vulnerability Database".
❌ Feds Sanctions SUEX Cryptocurrency Exchange for Laundering Ransomware Payouts ❌

The action is the first of its kind in the U.S., as the government increases efforts to get a handle on cybercrime.

πŸ“– Read

via "Threat Post".
❌ TikTok, GitHub, Facebook Join Open-Source Bug Bounty ❌

The initiative, run by HackerOne, aims to uncover dangerous code repository bugs that end up going viral across the application supply-chain.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Device β€˜breakage’ concerns surface days before Let’s Encrypt root cert expiry πŸ—“οΈ

Many devices and systems may not be ready for the switchover

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-41011 β€Ό

LINE client for iOS before 11.15.0 might expose authentication information for a certain service to external entities under certain conditions. This is usually impossible, but in combination with a server-side bug, attackers could get this information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40875 β€Ό

Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37927 β€Ό

Zoho ManageEngine ADManager Plus version 7110 and prior allows account takeover via SSO.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37925 β€Ό

Zoho ManageEngine ADManager Plus version 7110 and prior has a Post-Auth OS command injection vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31836 β€Ό

Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to gain access to sensitive information. The utility was able to be run from any location on the file system and by a low privileged user.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31847 β€Ό

Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-31841 β€Ό

A DLL sideloading vulnerability in McAfee Agent for Windows prior to 5.7.4 could allow a local user to perform a DLL sideloading attack with an unsigned DLL with a specific name and in a specific location. This would result in the user gaining elevated permissions and the ability to execute arbitrary code as the system user, through not checking the DLL signature.

πŸ“– Read

via "National Vulnerability Database".