Security
Headlines
HeadlinesLatestCVEs

Tag

#google

Google Launches Largest Distributed Database of Open Source Vulnerabilities

Google on Tuesday announced the open source availability of OSV-Scanner, a scanner that aims to offer easy access to vulnerability information about various projects. The Go-based tool, powered by the Open Source Vulnerabilities (OSV) database, is designed to connect "a project's list of dependencies with the vulnerabilities that affect them," Google software engineer Rex Pan in a post shared

The Hacker News
#vulnerability#android#google#linux#debian#nodejs#c++#log4j#The Hacker News
Accelerating Vulnerability Identification and Remediation

Software teams can now fix bugs faster with faster release cycles, but breach pressure is increasing. Using SBOM and automation will help better detect, prevent, and remediate security issues throughout the software development life cycle.

CVE-2021-0934: Android Security Bulletin—December 2022  |  Android Open Source Project

In findAllDeAccounts of AccountsDb.java, there is a possible denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-169762606

Niels Provos Joins Lacework as Head of Security Efficacy

Former Head of Security at Stripe and Distinguished Security Engineer at Google joins cloud security leader to help scale security excellence across customer base.

Google Cloud and Palo Alto Networks Team to Protect the Modern Workforce

Enterprises can now adopt the industry's most comprehensive Zero Trust Network Access 2.0 to secure access to all applications from any device.

CVE-2022-29580: Path Traversal Vulnerability - Google Help

There exists a path traversal vulnerability in the Android Google Search app. This is caused by the incorrect usage of uri.getLastPathSegment. A symbolic encoded string can bypass the path logic to get access to unintended directories. An attacker can manipulate paths that could lead to code execution on the device. We recommend upgrading beyond version 13.41

Hackers Score Nearly $1M at Device-Focused Pwn2Own Contest

Offensive security researchers found 63 previously unreported vulnerabilities in printers, phones, and network-attached storage devices in the Zero Day Initiative's latest hackathon.

Man watches as stolen phone travels from UK to China

Categories: News Tags: London Tags: Shenzen Tags: UK Tags: China Tags: phone Tags: stolen Tags: theft Tags: thief Tags: iPhone Tags: Apple Tags: Find My Ever wondered what happens to your phone when it gets stolen? The answer may surprise you. We're in it for the long haul... (Read more...) The post Man watches as stolen phone travels from UK to China appeared first on Malwarebytes Labs.

CVE-2022-41915: HTTP Response splitting from assigning header value iterator

Netty project is an event-driven asynchronous network application framework. In versions prior to 4.1.86.Final, when calling `DefaultHttpHeadesr.set` with an _iterator_ of values, header value validation was not performed, allowing malicious header values in the iterator to perform HTTP Response Splitting. This issue has been patched in version 4.1.86.Final. Integrators can work around the issue by changing the `DefaultHttpHeaders.set(CharSequence, Iterator<?>)` call, into a `remove()` call, and call `add()` in a loop over the iterator of values.

Pwn2Own – WD, Samsung Galaxy S22, Canon and more Pwned

By Habiba Rashid The Pwn2Own 2023 event will take place in South Beach, Miami, from February 14-16, 2023. This is a post from HackRead.com Read the original post: Pwn2Own – WD, Samsung Galaxy S22, Canon and more Pwned