πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-41537 β€Ό

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41538 β€Ό

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41533 β€Ό

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41535 β€Ό

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41534 β€Ό

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41539 β€Ό

A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773).

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Mission accomplished: Security plugin HTTPS Everywhere to be deprecated in 2022 πŸ—“οΈ

Browser extension can be retired as push to encrypt the web is almost complete, says EFF

πŸ“– Read

via "The Daily Swig".
❌ SolarWinds Attackers Hit Active Directory Servers with FoggyWeb Backdoor ❌

Microsoft is warning that the Nobelium APT is compromising single-sign-on servers to install a post-exploitation backdoor that steals data and maintains network persistence.

πŸ“– Read

via "Threat Post".
❌ Working Exploit Is Out for VMware vCenter CVE-2021-22005 Flaw ❌

The unredacted RCE exploit allows unauthenticated, remote attackers to upload files to the vCenter Server analytics service.

πŸ“– Read

via "Threat Post".
πŸ•΄ Notorious Spyware Tool Found Hiding Beneath Four Layers of Obfuscation πŸ•΄

FinFisher (aka FinSpy) surveillance software now goes to extreme lengths to duck analysis and discovery, researchers found in a months-long investigation.

πŸ“– Read

via "Dark Reading".
🦿 OWASP updates top 10 list with decades old security risk in #1 spot 🦿

2021 list shows how far application security has come and how much work is left to do.

πŸ“– Read

via "Tech Republic".
β™ŸοΈ Apple Airtag Bug Enables β€˜Good Samaritan’ Attack β™ŸοΈ

The new $30 Airtag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons to scan it with a mobile phone and discover its owner's phone number if the Airtag has been set to lost mode. But according to new research, this same feature can be abused to redirect the Good Samaritan to an iCloud phishing page -- or to any other malicious website.

πŸ“– Read

via "Krebs on Security".
β€Ό CVE-2021-37104 β€Ό

There is a server-side request forgery vulnerability in HUAWEI P40 versions 10.1.0.118(C00E116R3P3). This vulnerability is due to insufficient validation of parameters while dealing with some messages. A successful exploit could allow the attacker to gain access to certain resource which the attacker are supposed not to do.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22535 β€Ό

Unauthorized information security disclosure vulnerability on Micro Focus Directory and Resource Administrator (DRA) product, affecting all DRA versions prior to 10.1 Patch 1. The vulnerability could lead to unauthorized information disclosure.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37105 β€Ό

There is an improper file upload control vulnerability in FusionCompute 6.5.0, 6.5.1 and 8.0.0. Due to the improper verification of file to be uploaded and does not strictly restrict the file access path, attackers may upload malicious files to the device, resulting in the service abnormal.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38124 β€Ό

Remote Code Execution vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, affecting versions 7.0.2 through 7.5. The vulnerability could be exploited resulting in remote code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-34636 β€Ό

The Countdown and CountUp, WooCommerce Sales Timers WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_theme function found in the ~/includes/admin/coundown_theme_page.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.5.7.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37106 β€Ό

There is a command injection vulnerability in CMA service module of FusionCompute 6.3.0, 6.3.1, 6.5.0 and 8.0.0 when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system.

πŸ“– Read

via "National Vulnerability Database".
⚠ Serious Security: Let’s Encrypt gets ready to go it alone (in a good way!) ⚠

Let's Encrypt is set to become a mainstream, self-certifying web certificate authority - here's why it took so many years.

πŸ“– Read

via "Naked Security".
🦿 3 tips to protect your users against credential phishing attacks 🦿

A new phishing campaign spotted by Armorblox tried to steal user credentials by spoofing a message notification from a company that provides email encryption.

πŸ“– Read

via "Tech Republic".
🦿 New Chrome feature can tell sites and webapps when you're idle 🦿

The new Idle Detection API gives Chrome the ability to register whether a user is active, and has drawn concerns from privacy advocates. Here's how to disable it.

πŸ“– Read

via "Tech Republic".