🕴 Vinnie Liu Has a Mission: Keeping People Safe Online and Offline 🕴
📖 Read
via "Dark Reading".
Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.📖 Read
via "Dark Reading".
Dark Reading
Vinnie Liu Has a Mission: Keeping People Safe Online and Offline
Security Pro File: The years at the National Security Agency shaped Vinnie Liu's views on security. "We're missionaries, not mercenaries," he says.
🗓️ US retailer PulseTV warns of apparent credit card data breach 🗓️
📖 Read
via "The Daily Swig".
Payment system updated amidst fears 200,000 records may have been exposed📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
US retailer PulseTV warns of apparent credit card data breach
Payment system updated amidst fears 200,000 records may have been exposed
❌ McMenamins Data Breach Affects 12 Years of Employee Info ❌
📖 Read
via "Threat Post".
The Pacific Northwest hospitality stalwart is also still operationally crippled by a Dec. 12 ransomware attack.📖 Read
via "Threat Post".
Threat Post
McMenamins Data Breach Affects 12 Years of Employee Info
The Pacific Northwest hospitality stalwart is also still operationally crippled by a Dec. 12 ransomware attack.
❌ Purple Fox Rootkit Dropped by Malicious Telegram Installers ❌
📖 Read
via "Threat Post".
Multiple malicious installers were delivering the same Purple Fox rootkit version using the same attack chain, possibly distributed via email or phishing sites.📖 Read
via "Threat Post".
Threat Post
Purple Fox Rootkit Dropped by Malicious Telegram Installers
Multiple malicious installers were delivering the same Purple Fox rootkit version using the same attack chain, possibly distributed via email or phishing sites.
‼ CVE-2021-45912 ‼
📖 Read
via "National Vulnerability Database".
An unauthenticated Named Pipe channel in Controlup Real-Time Agent (cuAgent.exe) before 8.5 potentially allows an attacker to run OS commands via the ProcessActionRequest WCF method.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20012 ‼
📖 Read
via "National Vulnerability Database".
In mdp driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05836478; Issue ID: ALPS05836478.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20013 ‼
📖 Read
via "National Vulnerability Database".
In vow driver, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05837742; Issue ID: ALPS05837742.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20016 ‼
📖 Read
via "National Vulnerability Database".
In vow driver, there is a possible memory corruption due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862986; Issue ID: ALPS05862986.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45389 ‼
📖 Read
via "National Vulnerability Database".
StarWind SAN & NAS build 1578 and StarWind Command Center Build 6864 Update Manager allows authentication with JTW token which is signed with any key. An attacker could use self-signed JTW token to bypass authentication resulting in escalation of privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41789 ‼
📖 Read
via "National Vulnerability Database".
In wifi driver, there is a possible system crash due to a missing validation check. This could lead to remote denial of service from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20190426015; Issue ID: GN20190426015.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20020 ‼
📖 Read
via "National Vulnerability Database".
In libvcodecdrv, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05943906; Issue ID: ALPS05943906.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20018 ‼
📖 Read
via "National Vulnerability Database".
In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20019 ‼
📖 Read
via "National Vulnerability Database".
In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20021 ‼
📖 Read
via "National Vulnerability Database".
In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45913 ‼
📖 Read
via "National Vulnerability Database".
A hardcoded key in ControlUp Real-Time Agent (cuAgent.exe) before 8.2.5 may allow a potential attacker to run OS commands via a WCF channel.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20023 ‼
📖 Read
via "National Vulnerability Database".
In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45979 ‼
📖 Read
via "National Vulnerability Database".
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via app.launchURL in the JavaScript API.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20022 ‼
📖 Read
via "National Vulnerability Database".
In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45980 ‼
📖 Read
via "National Vulnerability Database".
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via getURL in the JavaScript API.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45978 ‼
📖 Read
via "National Vulnerability Database".
Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via xfa.host.gotoURL in the XFA API.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3842 ‼
📖 Read
via "National Vulnerability Database".
nltk is vulnerable to Inefficient Regular Expression Complexity📖 Read
via "National Vulnerability Database".