πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-20020 β€Ό

In libvcodecdrv, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05943906; Issue ID: ALPS05943906.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20018 β€Ό

In seninf driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863018; Issue ID: ALPS05863018.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20019 β€Ό

In libMtkOmxGsmDec, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917620; Issue ID: ALPS05917620.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20021 β€Ό

In Bluetooth, there is a possible application crash due to bluetooth does not properly handle the reception of multiple LMP_host_connection_req. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198513; Issue ID: ALPS06198513.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45913 β€Ό

A hardcoded key in ControlUp Real-Time Agent (cuAgent.exe) before 8.2.5 may allow a potential attacker to run OS commands via a WCF channel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20023 β€Ό

In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45979 β€Ό

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via app.launchURL in the JavaScript API.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20022 β€Ό

In Bluetooth, there is a possible link disconnection due to bluetooth does not properly handle a connection attempt from a host with the same BD address as the currently connected BT host. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198578; Issue ID: ALPS06198578.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45980 β€Ό

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via getURL in the JavaScript API.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45978 β€Ό

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via xfa.host.gotoURL in the XFA API.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-3842 β€Ό

nltk is vulnerable to Inefficient Regular Expression Complexity

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20014 β€Ό

In vow driver, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05857308; Issue ID: ALPS05857308.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20015 β€Ό

In kd_camera_hw driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862966; Issue ID: ALPS05862966.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40148 β€Ό

In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.

πŸ“– Read

via "National Vulnerability Database".
⚠ Apple Home software bug could lock you out of your iPhone ⚠

The finder of this bug insists it "poses a serious risk". We're not so sure, but we recommend you take steps to avoid it anyway.

πŸ“– Read

via "Naked Security".
πŸ•΄ Mobile Application Security: 2021's Breaches πŸ•΄

Many of last year's largest app breaches could have been prevented with testing, training, and the will to take app security seriously.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-3845 β€Ό

ws-scrcpy is vulnerable to External Control of File Name or Path

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0086 β€Ό

uppy is vulnerable to Server-Side Request Forgery (SSRF)

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39143 β€Ό

Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.

πŸ“– Read

via "National Vulnerability Database".
❌ Data Skimmer Hits 100+ Sotheby’s Real-Estate Websites ❌

The campaign was an opportunistic supply-chain attack abusing a weaponized cloud video player.

πŸ“– Read

via "Threat Post".
❌ SEGA’s Sloppy Security Confession: Exposed AWS S3 Bucket Offers Up Steam API Access & More ❌

SEGA's disclosure underscores a common, potentially catastrophic, flub β€” misconfigured Amazon Web Services (AWS) S3 buckets.

πŸ“– Read

via "Threat Post".