πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Self-styled β€œCrocodile of Wall Street” arrested with husband over Bitcoin megaheist ⚠

The cops say they've recovered 80% of a $72 million cryptocoin heist... but the recovered funds alone are now worth over $4 billion!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-33115 β€Ό

Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0161 β€Ό

Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33137 β€Ό

Out-of-bounds write in the Intel(R) Kernelflinger project may allow an authenticated user to potentially enable escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33166 β€Ό

Incorrect default permissions for the Intel(R) RXT for Chromebook application, all versions, may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33096 β€Ό

Improper isolation of shared resources in network on chip for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20027 β€Ό

In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06126826; Issue ID: ALPS06126826.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0173 β€Ό

Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0092 β€Ό

Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33147 β€Ό

Improper conditions check in the Intel(R) IPP Crypto library before version 2021.2 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33113 β€Ό

Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0103 β€Ό

Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-22954 β€Ό

A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21133 β€Ό

Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33105 β€Ό

Out-of-bounds read in some Intel(R) Core(TM) processors with Radeon(TM) RX Vega M GL integrated graphics before version 21.10 may allow an authenticated user to potentially enable information disclosure via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-22544 β€Ό

Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unauthorized execution of commands can lead to sensitive information disclosure, loss of system integrity and denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-33061 β€Ό

Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0530 β€Ό

A flaw was found in unzip 6.0. The vulnerability occurs during the conversion of an utf-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-26616 β€Ό

An OS command injection was found in SecuwaySSL, when special characters injection on execute command with runCommand arguments.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-0118 β€Ό

Out-of-bounds read in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-20024 β€Ό

In system service, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219064; Issue ID: ALPS06219064.

πŸ“– Read

via "National Vulnerability Database".