πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-42124 β€Ό

An improper access control vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform a session takeover.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40093 β€Ό

A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via dashboard actions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42125 β€Ό

An unrestricted file upload vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to write dangerous files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42129 β€Ό

A command injection vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform arbitrary command execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42132 β€Ό

A command Injection vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform arbitrary command execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40096 β€Ό

A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via modification of the authorisationUrl in some integration configurations.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40094 β€Ό

A DOM-based XSS vulnerability affects SquaredUp for SCOM 5.2.1.6654. If successfully exploited, this vulnerability may allow attackers to inject malicious code into a user's device.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Defending Against the Use of Deepfakes for Cyber Exploitation πŸ•΄

Deepfakes are increasingly concerning because they use AI to imitate human activities and can be used to augment social engineering attacks.

πŸ“– Read

via "Dark Reading".
🦿 "Hello Quantum World:" New cybersecurity service uses entanglement to generate cryptographic keys 🦿

The new service protects against current and future cyberattacks, according to Quantinuum CEO, and works with existing cybersecurity systems.

πŸ“– Read

via "Tech Republic".
πŸ—“οΈ Critical web security flaws in Kaseya Unitrends backup appliances remediated after researchers’ disclosure πŸ—“οΈ

Two critical flaws addressed in cloud storage patch batch

πŸ“– Read

via "The Daily Swig".
πŸ—“οΈ Drive-by RCE in Windows 10 β€˜can be executed with a single click’ πŸ—“οΈ

Underlying security vulnerability is still present in popular OS, researchers warn

πŸ“– Read

via "The Daily Swig".
🦿 How and why people use password managers 🦿

Password managers provide a more effective way to stay secure online but are still underutilized, says Security.org.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-37046 β€Ό

There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37047 β€Ό

There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37055 β€Ό

There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37038 β€Ό

There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37042 β€Ό

There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37056 β€Ό

There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2020-19611 β€Ό

Cross Site Scripting (XSS) in redirect module of Racktables version 0.21.2, allows an attacker to inject arbitrary web script or HTML via the op parameter.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Flaws in Tonga’s top-level domain left Google, Amazon, Tether web services vulnerable to takeover πŸ—“οΈ

Misaligned incentives are undermining efforts to tackle TLD bugs with β€˜mass-scale impact’

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-37041 β€Ό

There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read.

πŸ“– Read

via "National Vulnerability Database".