πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-30330 β€Ό

Possible null pointer dereference due to improper validation of APE clip in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30300 β€Ό

Possible denial of service due to incorrectly decoding hex data for the SIB2 OTA message and assigning a garbage value to choice when processing the SRS configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30285 β€Ό

Improper validation of memory region in Hypervisor can lead to incorrect region mapping in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30314 β€Ό

Lack of validation for third party application accessing the service can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30313 β€Ό

Use after free condition can occur in wired connectivity due to a race condition while creating and deleting folders in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30308 β€Ό

Possible buffer overflow while printing the HARQ memory partition detail due to improper validation of buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30311 β€Ό

Possible heap overflow due to lack of index validation before allocating and writing to heap buffer in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30287 β€Ό

Possible assertion due to improper validation of symbols configured for PDCCH monitoring in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-30353 β€Ό

Improper validation of function pointer type with actual function signature can lead to assertion in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw πŸ•΄

In this Tech Tip, SANS Institute’s Johannes Ullrich suggests using PowerShell to identify Windows systems affected by the newly disclosed vulnerability in http.sys.

πŸ“– Read

via "Dark Reading".
❌ Adobe Cloud Abused to Steal Office 365, Gmail Credentials ❌

Threat actors are creating accounts within the Adobe Cloud suite and sending images and PDFs that appear legitimate to target Office 365 and Gmail users, researchers from Avanan discovered.

πŸ“– Read

via "Threat Post".
πŸ•΄ Microsoft RDP Bug Enables Data Theft, Smart-Card Hijacking πŸ•΄

The vulnerability was patched this week in Microsoft's set of security updates for January 2022.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ Generation cyber: How diversity and ageism can impact the IT workforce πŸ—“οΈ

Report claims generational attitudes can help or hinder the industry

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2021-23514 β€Ό

This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45806 β€Ό

jpress v4.2.0 admin panel provides a function through which attackers can modify the template and inject some malicious code.

πŸ“– Read

via "National Vulnerability Database".
❌ New GootLoader Campaign Targets Accounting, Law Firms ❌

GootLoader hijacks WordPress sites to lure professionals to download malicious sample contract templates.

πŸ“– Read

via "Threat Post".
⚠ S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle [Podcast + Transcript] ⚠

Latest episode -listen to it or read it now!

πŸ“– Read

via "Naked Security".
πŸ•΄ Redefining the CISO-CIO Relationship πŸ•΄

While these roles have different needs, drivers, and objectives, they should complement each other rather than compete with one another.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ GitLab shifts left to patch high-impact vulnerabilities πŸ—“οΈ

HackerOne bug bounty reports triaged

πŸ“– Read

via "The Daily Swig".
πŸ›  Clam AntiVirus Toolkit 0.104.2 πŸ› 

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

πŸ“– Read

via "Packet Storm Security".
β€Ό CVE-2021-23824 β€Ό

This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability.

πŸ“– Read

via "National Vulnerability Database".