‼ CVE-2021-0688 ‼
📖 Read
via "National Vulnerability Database".
In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0691 ‼
📖 Read
via "National Vulnerability Database".
In the SELinux policy configured in system_app.te, there is a possible way for system_app to gain code execution in other processes due to an overly-permissive SELinux policy. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-188554048📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0692 ‼
📖 Read
via "National Vulnerability Database".
In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0687 ‼
📖 Read
via "National Vulnerability Database".
In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0686 ‼
📖 Read
via "National Vulnerability Database".
In getDefaultSmsPackage of RoleManagerService.java, there is a possible way to get information about the default sms app of a different device user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-177927831📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0690 ‼
📖 Read
via "National Vulnerability Database".
In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0595 ‼
📖 Read
via "National Vulnerability Database".
In lockAllProfileTasks of RootWindowContainer.java, there is a possible way to access the work profile without the profile PIN, after logging in. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-177457096📖 Read
via "National Vulnerability Database".
‼ CVE-2021-0689 ‼
📖 Read
via "National Vulnerability Database".
In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264📖 Read
via "National Vulnerability Database".
🦿 How to encrypt specific sections of Google Docs with the DocSecrets add-on 🦿
📖 Read
via "Tech Republic".
Anyone who needs to hide away sections of text in Google Documents should give this handy add-on a try.📖 Read
via "Tech Republic".
TechRepublic
How to encrypt specific sections of Google Docs with the DocSecrets add-on
Anyone who needs to hide away sections of text in Google Documents should give this handy add-on a try.
⚠ Europol announces two more ransomware busts in Ukraine ⚠
📖 Read
via "Naked Security".
"Two in custody," as they say. Cars, cash and cryptocoins nabbed as well.📖 Read
via "Naked Security".
Naked Security
Europol announces two more ransomware busts in Ukraine
“Two in custody,” as they say. Cars, cash and cryptocoins nabbed as well.
⚠ Apache web server zero-day bug is easy to exploit – patch now! ⚠
📖 Read
via "Naked Security".
Some of us have Apache as our primary web server. But lots of us may have Apache without knowing it, as part of another product.📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
🕴 Why Not Sharing Is Caring When It Comes to Cybersecurity 🕴
📖 Read
via "Dark Reading".
Three key tips to help ensure your employees keep vital information safe.📖 Read
via "Dark Reading".
Dark Reading
Why Not Sharing Is Caring When It Comes to Cybersecurity
Three key tips to help ensure your employees keep vital information safe.
🕴 Amazon's Twitch Streaming Service Hacked, Sensitive Data Leaked 🕴
📖 Read
via "Dark Reading".
Attackers claim to have dumped Twitch source code, payment information, and unreleased gaming product plan online.📖 Read
via "Dark Reading".
Dark Reading
Amazon's Twitch Streaming Service Hacked, Sensitive Data Leaked
Attackers claim to have dumped Twitch source code, payment information, and unreleased gaming product plan online.
❌ ESPecter Bootkit Malware Haunts Victims with Persistent Espionage ❌
📖 Read
via "Threat Post".
The rare UEFI bootkit drops a fully featured backdoor on PCs and gains the ultimate persistence by modifying the Windows Boot Manager.📖 Read
via "Threat Post".
Threat Post
ESPecter Bootkit Malware Haunts Victims with Persistent Espionage
The rare UEFI bootkit drops a fully featured backdoor on PCs and gains the ultimate persistence by modifying the Windows Boot Manager.
‼ CVE-2021-29760 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to download unauthorized files through the dashboard user interface. IBM X-Force ID: 202213.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29855 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 205684.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-20264 ‼
📖 Read
via "National Vulnerability Database".
An insecure modification flaw in the /etc/passwd file was found in the openjdk-1.8 and openjdk-11 containers. This flaw allows an attacker with access to the container to modify the /etc/passwd and escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29761 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 could allow an authenticated user to obtain sensitive information from the dashboard that they should not have access to. IBM X-Force ID: 202265.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29798 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 203734.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-38925 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29764 ‼
📖 Read
via "National Vulnerability Database".
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.📖 Read
via "National Vulnerability Database".