πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-3820 β€Ό

inflect is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0421 β€Ό

In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3822 β€Ό

jsoneditor is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3828 β€Ό

nltk is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0610 β€Ό

In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0422 β€Ό

In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0660 β€Ό

In ccu, there is a possible out of bounds read due to incorrect error handling. This could lead to information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827145; Issue ID: ALPS05827145.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3819 β€Ό

firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23243 β€Ό

In Oppo's battery application, the third-party SDK provides the function of loading a third-party Provider, which can be used.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3818 β€Ό

grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40106 β€Ό

An issue was discovered in Concrete CMS through 8.5.5. There is unauthenticated stored XSS in blog comments via the website field.

πŸ“– Read

via "National Vulnerability Database".
❌ 3.8 Billion Users’ Combined Clubhouse, Facebook Data Up for Sale ❌

Combined cache of data likely to fuel rash of account takeover, smishing attacks, experts warn.  

πŸ“– Read

via "Threat Post".
πŸ—“οΈ OWASP toasts 20th anniversary with revised Top 10 for 2021 πŸ—“οΈ

Non-profit confirms latest iteration of web attack hit list during 24-hour live event

πŸ“– Read

via "The Daily Swig".
πŸ›  OpenSSH 8.8p1 πŸ› 

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

πŸ“– Read

via "Packet Storm Security".
❌ EU: Russia Behind β€˜Ghostwriter’ Campaign Targeting Germany ❌

It's not the first time that the disinformation/spearphishing campaign, which originally smeared NATO, has been linked to Russia.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Google Chrome to incorporate new secure payment feature πŸ—“οΈ

New tech touted as faster and stronger than web-based authentication alternatives

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-34409 β€Ό

User-writable pre and post-install scripts unpacked during the Zoom Client for Meetings for MacOS installation before version 5.2.0 allow for privilege escalation to root.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34416 β€Ό

The network address administrative settings web portal for the Zoom on-premise Meeting Connector before version 4.6.360.20210325, Zoom on-premise Meeting Connector MMR before version 4.6.360.20210325, Zoom on-premise Recording Connector before version 3.8.44.20210326, Zoom on-premise Virtual Room Connector before version 4.4.6752.20210326, and Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 fails to validate input sent in requests to update the network configuration, which could lead to remote command injection on the on-premise image by the web portal administrators.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33907 β€Ό

The Zoom Client for Meetings for Windows in all versions before 5.3.0 fails to properly validate the certificate information used to sign .msi files when performing an update of the client. This could lead to remote code execution in an elevated privileged context.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36218 β€Ό

An issue was discovered in SKALE sgxwallet 1.58.3. sgx_disp_ippsAES_GCMEncrypt allows an out-of-bounds write, resulting in a segfault and compromised enclave. This issue describes a buffer overflow, which was resolved prior to v1.77.0 and not reproducible in latest sgxwallet v1.77.0

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36219 β€Ό

An issue was discovered in SKALE sgxwallet 1.58.3. The provided input for ECALL 14 triggers a branch in trustedEcdsaSign that frees a non-initialized pointer from the stack. An attacker can chain multiple enclave calls to prepare a stack that contains a valid address. This address is then freed, resulting in compromised integrity of the enclave. This was resolved after v1.58.3 and not reproducible in sgxwallet v1.77.0.

πŸ“– Read

via "National Vulnerability Database".