πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-29883 β€Ό

IBM Standards Processing Engine (IBM Transformation Extender Advanced 9.0 and 10.0) does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 207090.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-27304 β€Ό

The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-14263 β€Ό

"HCL Traveler Companion is vulnerable to an iOS weak cryptographic process vulnerability via the included MobileIron AppConnect SDK"

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29873 β€Ό

IBM Flash System 900 could allow an authenticated attacker to obtain sensitive information and cause a denial of service due to a restricted shell escape vulnerability. IBM X-Force ID: 206229.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-28496 β€Ό

On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.22.x train, 4.23.9 and below releases in the 4.23.x train, 4.24.7 and below releases in the 4.24.x train, 4.25.4 and below releases in the 4.25.x train, 4.26.1 and below releases in the 4.26.x train

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42327 β€Ό

dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.

πŸ“– Read

via "National Vulnerability Database".
πŸ” US Treasury Outlines Compliance Best Practices for Cryptocurrency Companies πŸ”

The newly released guide is designed to emphasize sanctions compliance requirements amid the US government’s efforts to combat ransomware.

πŸ“– Read

via "".
πŸ•΄ Why Should My Organization Consider XDR? πŸ•΄

XDR is a newish industry term addressing a very old problem: security products that don't work together to detect threats.

πŸ“– Read

via "Dark Reading".
❌ TA551 Shifts Tactics to Install Sliver Red-Teaming Tool ❌

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.

πŸ“– Read

via "Threat Post".
❌ U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn ❌

Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.

πŸ“– Read

via "Threat Post".
πŸ•΄ Plurilock to Acquire Assets of CloudCodes Software πŸ•΄

Transaction marks Plurilock’s second acquisition in 2021.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Invicti Security Announces $625 Million Growth Investment Led by Summit Partners πŸ•΄

Web application security provider plans to leverage new investment to continue product expansion and support global growth.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Nearly Three-Quarters of Organizations Victimized by DNS Attacks in Past 12 Months πŸ•΄

Response and recovery have significant impact on 58% of targeted businesses.

πŸ“– Read

via "Dark Reading".
πŸ•΄ Cohesity Announces Disaster Recovery as a Service, Providing Automated Disaster Recovery πŸ•΄

New Offering Can Help Businesses Quickly Recover from Ransomware Attacks, Speed Data Recovery, and Advance Business Continuity

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-41146 β€Ό

qutebrowser is an open source keyboard-focused browser with a minimal GUI. Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers a `qutebrowserurl:` URL handler. With certain applications, opening a specially crafted `qutebrowserurl:...` URL can lead to execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. The issue has been fixed in qutebrowser v2.4.0. The fix also adds additional hardening for potential similar issues on Linux (by adding the new --untrusted-args flag to the .desktop file), though no such vulnerabilities are known.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42716 β€Ό

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42715 β€Ό

An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting crafted HDR files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35225 β€Ό

Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41159 β€Ό

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41160 β€Ό

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35228 β€Ό

This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim.

πŸ“– Read

via "National Vulnerability Database".