βΌ CVE-2021-36178 βΌ
π Read
via "National Vulnerability Database".
A insufficiently protected credentials in Fortinet FortiSDNConnector version 1.1.7 and below allows attacker to disclose third-party devices credential information via configuration page lookup.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36175 βΌ
π Read
via "National Vulnerability Database".
An improper neutralization of input vulnerability [CWE-79] in FortiWebManager versions 6.2.3 and below, 6.0.2 and below may allow a remote authenticated attacker to inject malicious script/tags via the name/description/comments parameter of various sections of the device.π Read
via "National Vulnerability Database".
ποΈ Firefox 93 lands with HTTP download blocking, new user privacy features ποΈ
π Read
via "The Daily Swig".
Roadblocks erected against untrusted content and unwanted adsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Firefox 93 lands with HTTP download blocking, new user privacy features
Roadblocks erected against untrusted content and unwanted ads
ποΈ Multiple XSS vulnerabilities in child monitoring app Canopy βcould risk location leakβ ποΈ
π Read
via "The Daily Swig".
Pair of unpatched security bugs are βjust the tip of the icebergβπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Multiple XSS vulnerabilities in child monitoring app Canopy βcould risk location leakβ
Pair of unpatched security bugs are βjust the tip of the icebergβ
π΄ A Culture of Unity Is Key to Solving the Cyber Challenge π΄
π Read
via "Dark Reading".
Lack of unity in vendor solutions and in security teams' culture are detrimental to a successful and productive security strategy.π Read
via "Dark Reading".
Dark Reading
A Culture of Unity Is Key to Solving the Cyber Challenge
Lack of unity in vendor solutions and in security teams' culture are detrimental to a successful and productive security strategy.
βΌ CVE-2020-19003 βΌ
π Read
via "National Vulnerability Database".
An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.π Read
via "National Vulnerability Database".
π¦Ώ How a phishing attack thwarted MFA to steal money from Coinbase customers π¦Ώ
π Read
via "Tech Republic".
A flaw in Coinbase's setup of SMS-based MFA allowed attackers to compromise a large number of accounts.π Read
via "Tech Republic".
TechRepublic
How a phishing attack thwarted MFA to steal money from Coinbase customers
A flaw in Coinbase's setup of SMS-based MFA allowed attackers to compromise a large number of accounts.
π΄ Optiv Rebrands as Cyber Advisory & Solutions Leader π΄
π Read
via "Dark Reading".
Optiv announced it will create a new market category to protect business value and accelerate performance.π Read
via "Dark Reading".
Dark Reading
Optiv Rebrands as Cyber Advisory & Solutions Leader
Optiv announced it will create a new market category to protect business value and accelerate performance.
β Twitch Gets Gutted: All Source Code Leaked β
π Read
via "Threat Post".
An anonymous user posted a link to a 125GB torrent to 4chan yesterday, containing all of Twitch's source code, comments going back to its inception and more.π Read
via "Threat Post".
Threat Post
Twitch Gets Gutted: All Source Code Leaked
An anonymous user posted a link to a 125GB torrent to 4chan yesterday, containing all of Twitch's source code, comments going back to its inception and more.
ποΈ OPPA: Ohio could become the third US state to enact a new consumer privacy law in 2021 ποΈ
π Read
via "The Daily Swig".
Ohio Personal Privacy Act will grant Ohioans an expansive set of new rights, writes US attorney David Oberlyπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
OPPA: Ohio could become the third US state to enact a new consumer privacy law in 2021
Ohio Personal Privacy Act will grant Ohioans an expansive set of new rights, writes US attorney David Oberly
βΌ CVE-2021-0635 βΌ
π Read
via "National Vulnerability Database".
When extracting the incorrectly formatted flv file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion:Android-10Android ID: A-189402477π Read
via "National Vulnerability Database".
βΌ CVE-2021-0693 βΌ
π Read
via "National Vulnerability Database".
In openFile of HeapDumpProvider.java, there is a possible way to retrieve generated heap dumps from debuggable apps due to an unprotected provider. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184046948π Read
via "National Vulnerability Database".
βΌ CVE-2021-28702 βΌ
π Read
via "National Vulnerability Database".
PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption.π Read
via "National Vulnerability Database".
βΌ CVE-2021-0682 βΌ
π Read
via "National Vulnerability Database".
In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555π Read
via "National Vulnerability Database".
βΌ CVE-2021-0695 βΌ
π Read
via "National Vulnerability Database".
In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernelπ Read
via "National Vulnerability Database".
βΌ CVE-2021-0644 βΌ
π Read
via "National Vulnerability Database".
In conditionallyRemoveIdentifiers of SubscriptionController.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-181053462π Read
via "National Vulnerability Database".
βΌ CVE-2021-0598 βΌ
π Read
via "National Vulnerability Database".
In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108π Read
via "National Vulnerability Database".
βΌ CVE-2021-0683 βΌ
π Read
via "National Vulnerability Database".
In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942π Read
via "National Vulnerability Database".
βΌ CVE-2021-0636 βΌ
π Read
via "National Vulnerability Database".
When extracting the incorrectly formatted avi file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion: Android-10Android ID: A-189392423π Read
via "National Vulnerability Database".
βΌ CVE-2021-0681 βΌ
π Read
via "National Vulnerability Database".
In system properties, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-192535337π Read
via "National Vulnerability Database".
βΌ CVE-2021-0684 βΌ
π Read
via "National Vulnerability Database".
In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665π Read
via "National Vulnerability Database".