πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-1975 β€Ό

Possible heap overflow due to improper length check of domain while parsing the DNS response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1924 β€Ό

Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1981 β€Ό

Possible buffer over read due to improper IE size check of Bearer capability IE in MT setup request from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30265 β€Ό

Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1982 β€Ό

Possible denial of service scenario due to improper input validation of received NAS OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30321 β€Ό

Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30284 β€Ό

Possible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1973 β€Ό

A FTM Diag command can allow an arbitrary write into modem OS space in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Driftwood debuts: New open source tool hunts for leaked public-private key pairs πŸ—“οΈ

The tool will help security professionals find compromised TLS keys and sensitive keys tied to GitHub accounts

πŸ“– Read

via "The Daily Swig".
πŸ•΄ In Appreciation: Alan Paller πŸ•΄

Alan Paller, founder of the famed SANS Institute, passed away on Nov. 9.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3934 β€Ό

ohmyzsh is vulnerable to Improper Neutralization of Special Elements used in an OS Command

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43576 β€Ό

Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43578 β€Ό

Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21699 β€Ό

Jenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21701 β€Ό

Jenkins Performance Plugin 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43577 β€Ό

Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21700 β€Ό

Jenkins Scriptler Plugin 3.3 and earlier does not escape the name of scripts on the UI when asking to confirm their deletion, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by exploitable by attackers able to create Scriptler scripts.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Alan Paller: Infosec world pays homage after SANS founder and infosec luminary dies πŸ—“οΈ

β€˜His vision has changed the lives of hundreds of thousands of security practitioners’

πŸ“– Read

via "The Daily Swig".
❌ Millions of Routers, IoT Devices at Risk from New Open-Source Malware ❌

BotenaGo, written in Google’s Golang programming language, can exploit more than 30 different vulnerabilities.

πŸ“– Read

via "Threat Post".
πŸ—“οΈ HTML smuggling: Fresh attack technique is being used to increasingly target banking sector πŸ—“οΈ

Evasive malware is being spread via email in campaigns similar to those of nation-state actors

πŸ“– Read

via "The Daily Swig".
πŸ•΄ How to Hire ο»Ώβ€” and Retain ο»Ώβ€”ο»Ώ Effective Threat Hunters πŸ•΄

Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.

πŸ“– Read

via "Dark Reading".