πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2020-23901 β€Ό

A User Mode Write AV in Editor+0x5d15 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23894 β€Ό

A User Mode Write AV in ntdll!RtlpCoalesceFreeBlocks+0x268 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23899 β€Ό

A User Mode Write AV in Editor+0x5f91 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23895 β€Ό

A User Mode Write AV in Editor+0x76af of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23889 β€Ό

A User Mode Write AV starting at Editor!TMethodImplementationIntercept+0x4189c6 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted ico file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23872 β€Ό

A NULL pointer dereference in the function TextPage::restoreState of pdf2xml v2.0 allows attackers to cause a denial of service (DoS).

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-23890 β€Ό

A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted JPG file. Related to Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at JPGCodec+0x753648.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months πŸ•΄

Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.

πŸ“– Read

via "Dark Reading".
πŸ•΄ New Application Security Toolkit Uncovers Dependency Confusion Attacks πŸ•΄

The Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally been added to their projects.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-40873 β€Ό

An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66, and uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a client or server. The server process may crash unexpectedly because of a double free, and must be restarted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40871 β€Ό

An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a OPC/UA client. The client process may crash unexpectedly because of a wrong type cast, and must be restarted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40872 β€Ό

An issue was discovered in Softing Industrial Automation uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) or login as an anonymous user (bypassing security checks) by sending crafted messages to a OPC/UA server. The server process may crash unexpectedly because of an invalid type cast, and must be restarted.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33816 β€Ό

The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33618 β€Ό

Dolibarr ERP and CRM 13.0.2 allows XSS via object details, as demonstrated by > and < characters in the onpointermove attribute of a BODY element to the user-management feature.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26558 β€Ό

Deserialization of Untrusted Data vulnerability of Apache ShardingSphere-UI allows an attacker to inject outer link resources. This issue affects Apache ShardingSphere-UI Apache ShardingSphere-UI version 4.1.1 and later versions; Apache ShardingSphere-UI versions prior to 5.0.0.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-25980 β€Ό

In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the Ò€œforgot passwordҀ� functionality to reset the victimÒ€ℒs password and successfully take over their account.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Should Our Security Controls Be More Like North Korea or Norway? πŸ•΄

When the drive for additional visibility and awareness is led by the business rather than just a SOC team, both the business and security can benefit.

πŸ“– Read

via "Dark Reading".
❌ Tiny Font Size Fools Email Filters in BEC Phishing ❌

The One Font BEC campaign targets Microsoft 365 users and uses sophisticated obfuscation tactics to slip past security protections to harvest credentials.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ Dependency Combobulator offers defense against namespace confusion attacks πŸ—“οΈ

Toolkit β€˜tackles common scenarios’ and can evolve to detect emerging attack variants

πŸ“– Read

via "The Daily Swig".
⚠ Patch Tuesday updates the Win 7 updater… for at most 1 more year of updates ⚠

The clock stopped long ago on Windows 7, except for those who paid for overtime. But there won't be any double overtime!

πŸ“– Read

via "Naked Security".
🦿 How cybercriminals use bait attacks to gather info about their intended victims 🦿

With a bait attack, criminals try to obtain the necessary details to plan future attacks against their targets, says Barracuda.

πŸ“– Read

via "Tech Republic".