What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CVE.webp 2022-12-06 07:15:23 CVE-2022-42770 (lien direct) In wlan driver, there is a race condition, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:22 CVE-2022-42763 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:22 CVE-2022-42765 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:22 CVE-2022-42762 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:22 CVE-2022-42761 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:22 CVE-2022-42764 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:21 CVE-2022-42758 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:21 CVE-2022-42759 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:21 CVE-2022-42760 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:21 CVE-2022-42756 (lien direct) In sensor driver, there is a possible buffer overflow due to a missing bounds check. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:21 CVE-2022-42757 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:20 CVE-2022-42754 (lien direct) In npu driver, there is a memory corruption due to a use after free. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:20 CVE-2022-42755 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:20 CVE-2022-39134 (lien direct) In audio driver, there is a use after free due to a race condition. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:19 CVE-2022-39131 (lien direct) In camera driver, there is a possible memory corruption due to improper locking. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:19 CVE-2022-39132 (lien direct) In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:19 CVE-2022-39133 (lien direct) In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. Guideline
CVE.webp 2022-12-06 07:15:18 CVE-2022-39106 (lien direct) In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:18 CVE-2022-39129 (lien direct) In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:18 CVE-2022-39130 (lien direct) In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. Guideline
CVE.webp 2022-12-06 07:15:18 CVE-2022-39102 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:17 CVE-2022-39098 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:17 CVE-2022-39100 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:17 CVE-2022-39101 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:17 CVE-2022-39099 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:16 CVE-2022-39096 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:16 CVE-2022-39097 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:16 CVE-2022-39095 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:16 CVE-2022-39094 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:15 CVE-2022-39093 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:15 CVE-2022-39092 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:15 CVE-2022-39091 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 07:15:12 CVE-2022-39090 (lien direct) In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. Guideline
CVE.webp 2022-12-06 00:15:10 CVE-2022-44009 (lien direct) Improper access control in Key-Value RBAC in StackStorm version 3.7.0 didn't check the permissions in Jinja filters, allowing attackers to access K/V pairs of other users, potentially leading to the exposure of sensitive Information. Guideline
CVE.webp 2022-12-05 21:15:10 CVE-2022-46169 (lien direct) Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: `. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch. Vulnerability Guideline
The_Hackers_News.webp 2022-12-05 19:32:00 New BMC Supply Chain Vulnerabilities Affect Servers from Dozens of Manufacturers (lien direct) Three different security flaws have been disclosed in American Megatrends (AMI) MegaRAC Baseboard Management Controller (BMC) software that could lead to remote code execution on vulnerable servers. "The impact of exploiting these vulnerabilities include remote control of compromised servers, remote deployment of malware, ransomware and firmware implants, and server physical damage (bricking)," Ransomware Guideline ★★
SecurityWeek.webp 2022-12-05 17:45:25 SIM Swapper Who Stole $20 Million Sentenced to Prison (lien direct) Nicholas Truglia, of Florida, was sentenced to 18 months in prison last week for stealing more than $20 million in a SIM swapping scheme. According to the indictment, in January 2018, Truglia, now aged 25, participated in a scheme to hack into online accounts in an effort to steal cryptocurrency. He pleaded guilty in late 2021. Hack Guideline ★★
CVE.webp 2022-12-05 17:15:10 CVE-2022-3858 (lien direct) The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin. Guideline
CVE.webp 2022-12-05 17:15:10 CVE-2022-3856 (lien direct) The Comic Book Management System WordPress plugin before 2.2.0 does not sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin. Guideline
CVE.webp 2022-12-05 17:15:09 CVE-2022-1540 (lien direct) The PostmagThemes Demo Import WordPress plugin through 1.0.7 does not validate the imported file, allowing high-privilege users such as admin to upload arbitrary files (such as PHP) leading to RCE. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32633 (lien direct) In Wi-Fi, there is a possible memory access violation due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441637; Issue ID: ALPS07441637. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32634 (lien direct) In ccci, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138646; Issue ID: ALPS07138646. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32625 (lien direct) In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326216; Issue ID: ALPS07326216. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32630 (lien direct) In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405966; Issue ID: ALPS07405966. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32628 (lien direct) In isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310780; Issue ID: ALPS07310780. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32626 (lien direct) In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326239; Issue ID: ALPS07326239. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32631 (lien direct) In Wi-Fi, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453613; Issue ID: ALPS07453613. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32624 (lien direct) In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405923; Issue ID: ALPS07405923. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32629 (lien direct) In isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310774; Issue ID: ALPS07310774. Guideline
CVE.webp 2022-12-05 15:15:18 CVE-2022-32622 (lien direct) In gz, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363786; Issue ID: ALPS07363786. Guideline
Last update at: 2024-07-21 21:07:58
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter