β Follina gets fixed β but itβs not listed in the Patch Tuesday patches! β
π Read
via "Naked Security".
We tried it out to make sure, so you don't have to.π Read
via "Naked Security".
Naked Security
Follina gets fixed β but itβs not listed in the Patch Tuesday patches!
We tried it out to make sure, so you donβt have to.
π2
ποΈ Data breach at US ambulance billing service Comstar exposed patientsβ healthcare information ποΈ
π Read
via "The Daily Swig".
Medical payments company admits network intrusionπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Data breach at US ambulance billing service Comstar exposed patientsβ healthcare information
Medical payments company admits network intrusion
π1
βΌ CVE-2021-40212 βΌ
π Read
via "National Vulnerability Database".
An exploitable out-of-bounds write vulnerability in PotPlayer 1.7.21523 build 210729 may lead to code execution, information disclosure, and denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1958 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in FileCloud. Affected is the NTFS handler which leads to improper access controls. It is possible to launch the attack remotely but it demands some form of authentication. Upgrading to version 21.3.5.18513 is able to address this issue. It is recommended to upgrade the affected component.π Read
via "National Vulnerability Database".
ποΈ Security researcher receives legal threat over patched Powertek data center vulnerabilities ποΈ
π Read
via "The Daily Swig".
Vendor threatened legal action following disclosure and fixes being issued, bug hunter claimsπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Security researcher receives legal threat over patched Powertek data center vulnerabilities
Vendor threatened legal action following disclosure and fixes being issued, bug hunter claims
β Travel-related Cybercrime Takes Off as Industry Rebounds β
π Read
via "Threat Post".
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.π Read
via "Threat Post".
Threat Post
Travel-related Cybercrime Takes Off as Industry Rebounds
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.
β In Cybersecurity, What You Canβt See Can Hurt You β
π Read
via "Threat Post".
The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But whatβs driving these attacks, and what do cybersecurity stakeholders need to do that theyβre not already doing?π Read
via "Threat Post".
Threat Post
In Cybersecurity, What You Canβt See Can Hurt You
Lack of network visibility is overriding deficiency in cybersecurity based on SOC platform provider CYREBROβs report examining SMBs to enterprises.
β DragonForce Gang Unleash Hacks Against Govt. of India β
π Read
via "Threat Post".
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.π Read
via "Threat Post".
Threat Post
DragonForce Gang Unleash Hacks Against Govt. of India
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.
βΌ CVE-2022-20132 βΌ
π Read
via "National Vulnerability Database".
In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernelπ Read
via "National Vulnerability Database".
βΌ CVE-2022-20137 βΌ
π Read
via "National Vulnerability Database".
In onCreateContextMenu of NetworkProviderSettings.java, there is a possible way for non-owner users to change WiFi settings due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-206986392π Read
via "National Vulnerability Database".
βΌ CVE-2021-41413 βΌ
π Read
via "National Vulnerability Database".
ok-file-formats master 2021-9-12 is affected by a buffer overflow in ok_jpg_convert_data_unit_grayscale and ok_jpg_convert_YCbCr_to_RGB.π Read
via "National Vulnerability Database".
βΌ CVE-2021-39691 βΌ
π Read
via "National Vulnerability Database".
In WindowManager, there is a possible tapjacking attack due to an incorrect window flag when processing user input. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-157929241π Read
via "National Vulnerability Database".
βΌ CVE-2022-2086 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, has been found in SourceCodester Bank Management System 1.0. Affected by this issue is login.php. The manipulation of the argument password with the input 1'and 1=2 union select 1,sleep(10),3,4,5 --+ leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20125 βΌ
π Read
via "National Vulnerability Database".
In GBoard, there is a possible way to bypass factory reset protections due to a sandbox escape. This could lead to local escalation of privilege if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-194402515π Read
via "National Vulnerability Database".
βΌ CVE-2022-20135 βΌ
π Read
via "National Vulnerability Database".
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465π Read
via "National Vulnerability Database".
βΌ CVE-2022-20129 βΌ
π Read
via "National Vulnerability Database".
In registerPhoneAccount of PhoneAccountRegistrar.java, there is a possible way to prevent the user from selecting a phone account due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-217934478π Read
via "National Vulnerability Database".
βΌ CVE-2022-20124 βΌ
π Read
via "National Vulnerability Database".
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-170646036π Read
via "National Vulnerability Database".
βΌ CVE-2022-20134 βΌ
π Read
via "National Vulnerability Database".
In readArguments of CallSubjectDialog.java, there is a possible way to trick the user to call the wrong phone number due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-218341397π Read
via "National Vulnerability Database".
βΌ CVE-2022-20133 βΌ
π Read
via "National Vulnerability Database".
In setDiscoverableTimeout of AdapterService.java, there is a possible bypass of user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-206807679π Read
via "National Vulnerability Database".
βΌ CVE-2022-20127 βΌ
π Read
via "National Vulnerability Database".
In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221862119π Read
via "National Vulnerability Database".
βΌ CVE-2022-2087 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in SourceCodester Bank Management System 1.0. This affects the file /mnotice.php?id=2. The manipulation of the argument notice with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".