πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ What Kind Of Security Tools Should I Provide My Developers? πŸ•΄

Who says developers don't care about security? Give them the tools to help them build security into their code.

πŸ“– Read

via "Dark Reading".
πŸ•΄ How Should My Security Analyst Use the MITRE ATT&CK Framework? πŸ•΄

As a curated knowledgebase for adversary behavior, the MITRE ATT&CK framework can guide defenders on how to conduct an investigation and the order of things to look for.

πŸ“– Read

via "Dark Reading".
β€Ό CVE-2021-45787 β€Ό

There is a stored Cross Site Scripting (XSS) vulnerability in maccms v10 through adding videos. XSS code can be inserted at parameter positions including name and remarks.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42552 β€Ό

Cross-site Scripting (XSS) vulnerability in ArchivistaBox webclient allows an attacker to craft a malicious link, executing JavaScript in the context of a victim's browser. This issue affects all ArchivistaBox versions prior to 2022/I.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0986 β€Ό

Reflected Cross-site Scripting (XSS) Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.11.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-45786 β€Ό

In maccms v10, an attacker can log in through /index.php/user/login in the "col" and "openid" parameters to gain privileges.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Would 'Cyber Geneva Conventions' Defuse Online Aggression? πŸ•΄

International treaties could force nation-states to police bad actors within their borders to avoid penalties.

πŸ“– Read

via "Dark Reading".
πŸ—“οΈ HackerOne lifts β€˜sanctions’ against Ukrainian hackers πŸ—“οΈ

Platform apologizes for β€˜poor communication’ over bug bounty payouts

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2021-39711 β€Ό

In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40767 β€Ό

Adobe Character Animator version 4.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40787 β€Ό

Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39712 β€Ό

In TBD of TBD, there is a possible user after free vulnerability due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176918884References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39792 β€Ό

In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0811 β€Ό

A flaw was found in CRI-O in the way it set kernel options for a pod. This issue allows anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime to achieve a container escape and arbitrary code execution as root on the cluster node, where the malicious pod was deployed.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39713 β€Ό

Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-42722 β€Ό

Adobe Bridge version 11.1.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39715 β€Ό

In __show_regs of process.c, there is a possible leak of kernel memory and addresses due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178379135References: Upstream kernel

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39725 β€Ό

In gasket_free_coherent_memory_all of gasket_page_table.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151454974References: N/A

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-20257 β€Ό

An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39692 β€Ό

In onCreate of SetupLayoutActivity.java, there is a possible way to setup a work profile bypassing user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209611539

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39720 β€Ό

Product: AndroidVersions: Android kernelAndroid ID: A-207433926References: N/A

πŸ“– Read

via "National Vulnerability Database".