πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-22407 β€Ό

There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22405 β€Ό

There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22452 β€Ό

A component of the HarmonyOS has a Improper Input Validation vulnerability. Local attackers may exploit this vulnerability to read at any address.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36991 β€Ό

There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22402 β€Ό

There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22451 β€Ό

A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22406 β€Ό

There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Critical flaw in GoCD provides platform for supply chain attacks πŸ—“οΈ

Vulnerability in software used by Fortune 500 firms raises fears of SolarWinds-like impact

πŸ“– Read

via "The Daily Swig".
🦿 How to prepare your team to address a significant security issue 🦿

As you work to resolve a security issue, technical knowledge is necessaryβ€”and a team with a broad base of expertise is invaluable.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ WordPress plugin vulnerability opened up one million sites to remote takeover πŸ—“οΈ

Gaping OptinMonster security hole patched

πŸ“– Read

via "The Daily Swig".
πŸ›  TOR Virtual Network Tunneling Tool 0.4.6.8 πŸ› 

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

πŸ“– Read

via "Packet Storm Security".
❌ EU’s Green Pass Vaccination ID Private Key Leaked ❌

The private key used to sign the vaccine passports was leaked and is being passed around to create fake passes for the likes of Mickey Mouse and Adolf Hitler.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-3823 β€Ό

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects: Bitdefender GravityZone versions prior to 3.3.8.249.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-22312 β€Ό

A cross-site scripting (XSS) vulnerability was discovered in the OJ/admin-tool /cal_scores.php function of HZNUOJ v1.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-1105 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3576 β€Ό

Execution with Unnecessary Privileges vulnerability in Bitdefender Endpoint Security Tools, Total Security allows a local attacker to elevate to 'NT AUTHORITY\System. Impersonation enables the server thread to perform actions on behalf of the client but within the limits of the client's security context. This issue affects: Bitdefender Endpoint Security Tools versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 25.0.26.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37254 β€Ό

In M-Files Web product with versions before 20.10.9524.1 and 20.10.9445.0, a remote attacker could use a flaw to obtain unauthenticated access to 3rd party component license key information on server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41728 β€Ό

Cross Site Scripting (XSS) vulnerability exists in Sourcecodester News247 CMS 1.0 via the search function in articles.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3579 β€Ό

Incorrect Default Permissions vulnerability in the bdservicehost.exe and Vulnerability.Scan.exe components as used in Bitdefender Endpoint Security Tools for Windows, Total Security allows a local attacker to elevate privileges to NT AUTHORITY\SYSTEM This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 7.2.1.65.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2018-14640 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 3 Security Lessons Learned From the Kaseya Ransomware Attack πŸ•΄

Organizations can better prepare themselves and their customers for these attacks with some strategies to identify threats before they become a widespread issue.

πŸ“– Read

via "Dark Reading".