Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google Patches a quick vulnerability that allows the silent translation of the files without consent
Global Security

Google Patches a quick vulnerability that allows the silent translation of the files without consent

AdminBy AdminApril 3, 2025No Comments2 Mins Read
Google Patches Quick Share Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


03 April 2025Red LakshmananPrivacy / vulnerability of data

Google Patches fast vulnerability share

Cybersecurity researchers disclosed Details of the new vulnerability that affects the short Google data utility for Windows, which can be used to achieve service (DOS) or send arbitrary files to the target device without approval.

The downside, tracked as Cve-2014-10668 (CVSS assessment: 5.9), this is bypass for two of the 10 deficiencies that were originally revealed by Safebreach Labs in August 2024 Quickshell. It was considered in the fast share for the Windows version 1.0.2002.2 after a responsible disclosure in August 2024.

Cybersecurity

The investigation of these 10 vulnerabilities, which are collectively monitored as the CVE-2024-38271 (CVSS: 5,9) and Cve-2014-38272 (CVSS: 7.1), they could be made into the operational chain for obtaining an arbitrary code on the leading Windows.

Fast Fate (previously closest share) – this Utility for joint file sharing It looks like Apple Airdrop, which allows users to transfer files, photos, videos and other documents between Android devices, Chromebook and work tables and Windows laptops in close physical intimacy.

https://www.youtube.com/watch?v=kaqfg3antje

The following cybersecurity analysis showed that the two vulnerabilities were not corrected correctly, which once again made the application for a break or bypass the recipient’s request to accept file transfer, directly transferring the file to the device.

In particular, the DOS error can be triggered by using a file name that starts with another invalid UTF8 byte (eg, “\ XC5 \ XFF”) instead of the file name that begins with zero terminator (“\ X00”).

On the other hand, the initial correction for an unauthorized vulnerability file with the mark of such transferred files as “unknown” and removed them from the disk after completing the file transfer session.

Cybersecurity

This, according to the SafeBreach or Yair researcher, can be bypassed by sending two different files in the same session with the same “useful load”, causing the application to remove only one of them, leaving the second in the loading folder.

“Although this study is characteristic of a quick stock, we believe that the consequences are relevant to the software industry as a whole and believe that even if the code is difficult, suppliers should always resolve the true root cause of the vulnerabilities they correct,” Yair said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.