What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CVE.webp 2022-11-16 20:15:10 CVE-2022-39320 (lien direct) FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch. Guideline
Cybereason.webp 2022-11-16 11:00:00 Holiday, Weekend Ransomware Attacks Continue to Hit Companies Hard (lien direct) impact of holiday weekend ransomware attacks As the holidays approach, security leaders wanting to give their teams some much deserved extra time off may get caught in a bind. After all, ransomware actors love to wreak havoc when organizations' human defenses are trying to sleep in heavenly peace.  Ransomware Guideline
itsecurityguru.webp 2022-11-16 10:05:39 Closed Door Security joins the Cyber Scheme (lien direct) Closed Door Security, a leading provider of attack-driven cybersecurity services, today announced it has joined the Cyber Scheme, reinforcing its position as one of the UK's leading and most widely accredited penetration testers. The Cyber Scheme provides the highest standard of government approved examinations and is essential for technical consultants wishing to gain the NCSC […] Guideline
globalsecuritymag.webp 2022-11-16 08:19:06 Nozomi Networks Names Jared Waterman as Chief Financial Officer (lien direct) Nozomi Networks Names Jared Waterman as Chief Financial Officer Expands Executive Leadership Team with Addition of a Financial Leader with Proven Success in Achieving “Next Level” Growth - Business News Guideline
CVE.webp 2022-11-16 08:15:28 CVE-2022-4015 (lien direct) A vulnerability, which was classified as critical, was found in Sports Club Management System 119. This affects an unknown part of the file admin/make_payments.php. The manipulation of the argument m_id/plan leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213789 was assigned to this vulnerability. Guideline
CVE.webp 2022-11-16 08:15:28 CVE-2022-4014 (lien direct) A vulnerability, which was classified as problematic, has been found in FeehiCMS. Affected by this issue is some unknown functionality of the component Post My Comment Tab. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The identifier of this vulnerability is VDB-213788. Vulnerability Guideline
CVE.webp 2022-11-16 08:15:27 CVE-2022-4013 (lien direct) A vulnerability classified as problematic was found in Hospital Management Center. Affected by this vulnerability is an unknown functionality of the file appointment.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213787. Vulnerability Guideline
CVE.webp 2022-11-16 08:15:27 CVE-2022-4012 (lien direct) A vulnerability classified as critical has been found in Hospital Management Center. Affected is an unknown function of the file patient-info.php. The manipulation of the argument pt_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-213786 is the identifier assigned to this vulnerability. Vulnerability Guideline
CVE.webp 2022-11-16 08:15:23 CVE-2022-4011 (lien direct) A vulnerability was found in Simple History Plugin. It has been rated as critical. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213785 was assigned to this vulnerability. Vulnerability Guideline
Trend.webp 2022-11-16 00:00:00 (Déjà vu) Electricity/Energy Cybersecurity: Trends & Survey Response (lien direct) Based on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into each industry's challenges and present Trend Micro's recommendations. Guideline
CVE.webp 2022-11-15 23:15:28 CVE-2022-41918 (lien direct) OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana. There is an issue with the implementation of fine-grained access control rules (document-level security, field-level security and field masking) where they are not correctly applied to the indices that back data streams potentially leading to incorrect access authorization. OpenSearch 1.3.7 and 2.4.0 contain a fix for this issue. Users are advised to update. There are no known workarounds for this issue. Guideline
CVE.webp 2022-11-15 23:15:14 CVE-2021-4241 (lien direct) A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function setUserLoggedIn of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is bb10a5f3c68527c58073258cb12446782d223bc3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213744. Vulnerability Guideline
CVE.webp 2022-11-15 23:15:10 CVE-2021-4240 (lien direct) A vulnerability, which was classified as problematic, was found in phpservermon. This affects the function generatePasswordResetToken of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is 3daa804d5f56c55b3ae13bfac368bb84ec632193. It is recommended to apply a patch to fix this issue. The identifier VDB-213717 was assigned to this vulnerability. Guideline
CVE.webp 2022-11-15 22:15:19 CVE-2022-4006 (lien direct) A vulnerability, which was classified as problematic, has been found in WBCE CMS. Affected by this issue is the function increase_attempts of the file wbce/framework/class.login.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The name of the patch is d394ba39a7bfeb31eda797b6195fd90ef74b2e75. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213716. Vulnerability Guideline
CVE.webp 2022-11-15 22:15:10 CVE-2022-29276 (lien direct) SMI functions in AhciBusDxe use untrusted inputs leading to corruption of SMRAM. SMI functions in AhciBusDxe use untrusted inputs leading to corruption of SMRAM. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.18 Kernel 5.1: version 05.17.18 Kernel 5.2: version 05.27.18 Kernel 5.3: version 05.36.18 Kernel 5.4: version 05.44.18 Kernel 5.5: version 05.52.18 https://www.insyde.com/security-pledge/SA-2022059 Guideline
ArsTechnica.webp 2022-11-15 21:24:22 Right-wing doctor group led by anti-vaccine insurrectionist implodes in scandal (lien direct) Simone Gold used charity funds to buy $3.6M house, group leaders claim. Guideline
CVE.webp 2022-11-15 21:15:38 CVE-2022-40753 (lien direct) IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236688. Vulnerability Guideline
CVE.webp 2022-11-15 21:15:37 CVE-2022-3377 (lien direct) Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read. Guideline
CVE.webp 2022-11-15 21:15:36 CVE-2022-30283 (lien direct) In UsbCoreDxe, tampering with the contents of the USB working buffer using DMA while certain USB transactions are in process leads to a TOCTOU problem that could be used by an attacker to cause SMRAM corruption and escalation of privileges The UsbCoreDxe module creates a working buffer for USB transactions outside of SMRAM. The code which uses can be inside of SMM, making the working buffer untrusted input. The buffer can be corrupted by DMA transfers. The SMM code code attempts to sanitize pointers to ensure all pointers refer to the working buffer, but when a pointer is not found in the list of pointers to sanitize, the current action is not aborted, leading to undefined behavior. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in: Kernel 5.0: Version 05.09. 21 Kernel 5.1: Version 05.17.21 Kernel 5.2: Version 05.27.21 Kernel 5.3: Version 05.36.21 Kernel 5.4: Version 05.44.21 Kernel 5.5: Version 05.52.21 https://www.insyde.com/security-pledge/SA-2022063 Guideline
CVE.webp 2022-11-15 21:15:36 CVE-2022-29275 (lien direct) In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.21 Kernel 5.1: version 05.17.21 Kernel 5.2: version 05.27.21 Kernel 5.3: version 05.36.21 Kernel 5.4: version 05.44.21 Kernel 5.5: version 05.52.21 https://www.insyde.com/security-pledge/SA-2022058 Guideline
CVE.webp 2022-11-15 21:15:36 CVE-2022-30771 (lien direct) Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions. This issue was discovered by Insyde engineering during a security review. Fixed in: Kernel 5.1: Version 05.17.25 Kernel 5.2: Version 05.27.25 Kernel 5.3: Version 05.36.25 Kernel 5.4: Version 05.44.25 Kernel 5.5: Version 05.52.25 https://www.insyde.com/security-pledge/SA-2022064 Guideline
Fortinet.webp 2022-11-15 18:55:38 Path Traversal Vulnerability (CVE-2022-0902) in ABB Flow Computer and Remote Controllers (lien direct) FortiGuard Labs is aware a path-traversal vulnerability (CVE-2022-0902) that affects ABB Totalflow flow computers and remote controllers widely used by oil and gas utility companies. Successfully exploiting the vulnerability allows an attacker to inject and execute arbitrary code. The vulnerability is a path-traversal vulnerability in ABB Totalflow flow computers and remote controllers.Why is this Significant?This is significant because the new vulnerability (CVE-2022-0902) affects ABB TotalFlow flow computers and remote controllers widely used by oil and gas utility companies. ABB TotalFlow is used to calculate oil and gas volume and flow rates and is also used for billing and other purposes.By successfully exploiting the vulnerability, an attacker may be able to hinder affected oil and gas companies' abilities to correctly measure oil and gas flow, which may lead to safety issues and interruption of business.What is CVE-2022-0902?CVE-2022-0902 is a path-traversal vulnerability (CVE-2022-0902) in ABB TotalFlow flow computers and remote controllers. The vulnerability allows an attacker to gain access to restricted directories in ABB flow computers leading to arbitrary code execution in an affected system node.CVE-2022-0902 has a CVSS score of 8.1.What Products are Affected by the Vulnerability?According to the advisory issued by ABB, the following products are affected by the vulnerability:• RMC-100• RMC100L ITE• XIO• XFCG5• XRCG5• uFLOG5• UDCAll versions of the products without the latest update are vulnerable to CVE-2022-0902.Is CVE-2022-0902 being Exploited in the Wild?FortiGuard Labs is not aware that CVE-2022-0902 is exploited in the wild.Has the Vendor Released an Advisory?Yes. Please see the Appendix for a link to "ABB Flow Computer and Remote Controllers Path Traversal Vulnerability in Totalflow TCP protocol can lead to root access CVE ID: CVE-2022-0902".Has the Vendor Released a Patch?Yes, the vendor released a firmware update.What is the Status of Protection?FortiGuard Labs is currently investigating protection for CVE-2022-0902. We will update this Threat Signal when protection becomes available.Any Suggested Mitigation?The advisory issued by ABB includes mitigation and workarounds information. See the Appendix for a link to "ABB Flow Computer and Remote Controllers Path Traversal Vulnerability in Totalflow TCP protocol can lead to root access CVE ID: CVE-2022-0902". Vulnerability Threat Guideline
CVE.webp 2022-11-15 17:15:11 CVE-2022-3998 (lien direct) A vulnerability, which was classified as critical, was found in MonikaBrzica scm. This affects an unknown part of the file uredi_korisnika.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213699. Vulnerability Guideline
CVE.webp 2022-11-15 17:15:10 CVE-2022-3997 (lien direct) A vulnerability, which was classified as critical, has been found in MonikaBrzica scm. Affected by this issue is some unknown functionality of the file upis_u_bazu.php. The manipulation of the argument email/lozinka/ime/id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-213698 is the identifier assigned to this vulnerability. Guideline
globalsecuritymag.webp 2022-11-15 17:03:32 The Emergence of the Zero Trust Consumer: 92% of Consumers Believe Online Security Threats Will Continue to Outpace Security Technology (lien direct) The Emergence of the Zero Trust Consumer: 92% of Consumers Believe Online Security Threats Will Continue to Outpace Security Technology New Report Finds Increase in Consumer Fintech Use Leads to Higher Stakes for Online Security November 15, 2022 10:00 AM Eastern Standard Time - Special Reports Guideline
Chercheur.webp 2022-11-15 15:38:20 Top Zeus Botnet Suspect “Tank” Arrested in Geneva (lien direct) Vyacheslav “Tank” Penchukov, the accused 40-year-old Ukrainian leader of a prolific cybercriminal group that stole tens of millions of dollars from small to mid-sized businesses in the United States and Europe, has been arrested in Switzerland, according to multiple sources. Guideline
globalsecuritymag.webp 2022-11-15 14:41:33 Cohesity Announces New Data Security Alliance with Industry Heavyweights in Security and Services (lien direct) Cohesity Announces New Data Security Alliance with Industry Heavyweights in Security and Services to Collectively Help Enterprises Win the War Against Cyberattacks Alliance Ushers in New Era in Security, Combining Best-in-Class Innovations from Security and Data Management Leaders - Business News Guideline
globalsecuritymag.webp 2022-11-15 14:35:11 Odaseva Launches Managed Services Provider Partner Program Following Surge in Demand (lien direct) Odaseva Launches Managed Services Provider Partner Program Following Surge in Demand Leading enterprise data protection platform enables organizations to excel at Salesforce data management. - Business News Guideline
globalsecuritymag.webp 2022-11-15 14:13:03 Cohesity annonce une nouvelle alliance pour la sécurité des données (lien direct) Cohesity annonce une nouvelle alliance pour la sécurité des données, regroupant des partenaires de choix à travers l'industrie tech, et destinée à aider collectivement les entreprises dans la guerre contre les attaques cyber L'alliance ouvre une nouvelle ère en matière de sécurité, en combinant les meilleures innovations des leaders de la sécurité et de la gestion des données. - Business Guideline
globalsecuritymag.webp 2022-11-15 13:37:47 Cybersecurity leaders gather at KuppingerCole\'s Cybersecurity Leadership Summit to shape the future of cybersecurity (lien direct) Cybersecurity leaders gather at KuppingerCole's Cybersecurity Leadership Summit to shape the future of cybersecurity International leaders exchanged on current industry trends - Opinion Guideline
CVE.webp 2022-11-15 11:15:10 CVE-2022-3461 (lien direct) In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Guideline
globalsecuritymag.webp 2022-11-15 10:25:32 LiveAction Appoints Carlos Ferro As Senior Vice President and General Manager (lien direct) LiveAction Appoints Carlos Ferro As Senior Vice President and General Manager Carlos Ferro joins LiveAction as Senior Vice President and General Manager to lead go-to-market for the International Region - Market News Guideline
SecurityAffairs.webp 2022-11-15 10:16:53 Google to Pay a record $391M fine for misleading users about the collection of location data (lien direct) >Google is going to pay $391.5 million to settle with 40 states in the U.S. for secretly collecting personal location data. Google has agreed to pay $391.5 million to settle with 40 US states for misleading users about the collection of personal location data. The settlement is the largest attorney general-led consumer privacy settlement ever, […] Guideline
SecurityAffairs.webp 2022-11-15 08:46:34 Previously undetected Earth Longzhi APT group is a subgroup of APT41 (lien direct) >Trend Micro reported that the Earth Longzhi group, a previously undocumented subgroup of APT41, targets Ukraine and Asian Countries. Early this year, Trend Micro investigated a security breach suffered by a company in Taiwan. Threat actors employed a custom Cobalt Strike loader in the attack. Further analysis, revealed that the same threat actor targeted multiple regions […] Threat Guideline APT 41 ★★★★
CVE.webp 2022-11-15 02:15:09 CVE-2022-40843 (lien direct) The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account. Guideline
CSO.webp 2022-11-15 02:00:00 Build a mature approach for better cybersecurity vendor evaluation (lien direct) Seasoned CISO Mike Manrod knows the value of a good cybersecurity vendor evaluation. He recalls that in a past job he inherited some very expensive vaporware under a long-term services agreement. His predecessor had purchased an “innovative” beta identity and access management platform but hadn't done any analysis on the product, simply accepting the vendor's claims of its efficacy. It was a dud.Inversely, as CISO at his current company Grand Canyon Education, Manrod set his team up to evaluate an allegedly “brilliant” web application security product only to discover through testing that its client-side validation was easy to bypass and thus subvert the product. That basic test saved them from making an expensive mistake. “Startups are trysforming, and sometimes they go back to the drawing board. Nothing wrong there, but if we as security leaders purchase something that's not ready yet, that's on us,” he says.To read this article in full, please click here Guideline
CVE.webp 2022-11-15 00:15:12 CVE-2022-33986 (lien direct) DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056 Guideline
CVE.webp 2022-11-14 23:15:12 CVE-2022-43689 (lien direct) Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XXE based DNS requests leading to IP disclosure. Guideline
CVE.webp 2022-11-14 23:15:11 CVE-2022-33982 (lien direct) DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367 Guideline
CVE.webp 2022-11-14 22:15:13 CVE-2022-32266 (lien direct) DMA attacks on the parameter buffer used by a software SMI handler used by the driver PcdSmmDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of other ACPI fields and adjacent memory fields. DMA attacks on the parameter buffer used by a software SMI handler used by the driver PcdSmmDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of other ACPI fields and adjacent memory fields. The attack would require detailed knowledge of the PCD database contents on the current platform. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23, Kernel 5.5: 05.52.23. Kernel 5.2 is unaffected. CWE-787 An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the parameter buffer that is used by a software SMI handler (used by the PcdSmmDxe driver) could lead to a TOCTOU race-condition attack on the SMI handler, and lead to corruption of other ACPI fields and adjacent memory fields. The attack would require detailed knowledge of the PCD database contents on the current platform. Guideline
Fortinet.webp 2022-11-14 21:30:35 Emotet Distributed Through U.S. Election Themed Link Files (lien direct) FortiGuard Labs has discovered that Emotet was recently delivered through an archive file that has a file name targeting those interested in the U.S. midterm elections. The archive file is "US midterm elections The six races that could decide the US Senate.zip" that has a link file with the same name, which leads to Emotet.Why is this Significant?This is significant because Emotet is trying to leverage the interest of the U.S. midterm elections for infection. While FortiGuard Labs has not observed the infection vector, the file name "US midterm elections The six races that could decide the US Senate.zip" was likely distributed via emails. "The six races" likely refers to Arizona, Georgia, Michigan, Nevada, Pennsylvania, and Wisconsin where Democrats and Republican are expected to have close race in the elections, which gives better chance that recipients will open the archive contents. Emotets' modus operandi includes distribution via malicious spam campaigns and thread hijacking of emails.What's in "US midterm elections The six races that could decide the US Senate.zip"?The zip file contains a link file named "US midterm elections The six races that could decide the US Senate.lnk". When the link file is executed, it drops a further script in %tmp% that will attempt to cycle through several URLs to download a Emotet DLL.The downloaded Emotet connects to C2 server and will likely deliver additional malware.FortiGuard Labs discovered that the same script is present in other link files "New York Election news and updates....lnk" and "Amazon warns of slower sales as economy weakens.lnk" that were submitted to VirusTotal at the end of October and beginning of November respectively.What is the Status of Protection?FortiGuard Labs provides the following AV signatures for the archive and link file involved in the attack:• LNK/Agent.AMY!tr.dldr• PossibleThreat.PALLAS.HC2 address is blocked by FortiGuard Webfiltering Client. Spam Guideline
CVE.webp 2022-11-14 20:15:10 CVE-2022-34317 (lien direct) IBM CICS TX 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229459. Vulnerability Guideline
CVE.webp 2022-11-14 19:15:12 CVE-2022-34315 (lien direct) IBM CICS TX 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229451. Vulnerability Guideline
The_Hackers_News.webp 2022-11-14 18:33:00 New "Earth Longzhi" APT Targets Ukraine and Asian Countries with Custom Cobalt Strike Loaders (lien direct) Entities located in East and Southeast Asia as well as Ukraine have been targeted at least since 2020 by a previously undocumented subgroup of APT41, a prolific Chinese advanced persistent threat (APT). Cybersecurity firm Trend Micro, which christened the espionage crew Earth Longzhi, said the actor's long-running campaign can be split into two based on the toolset deployed to attack its victims Threat Guideline APT 41 ★★
CVE.webp 2022-11-14 18:15:16 CVE-2022-24938 (lien direct) A malformed packet causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error. Guideline
CVE.webp 2022-11-14 17:15:10 CVE-2022-3992 (lien direct) A vulnerability classified as problematic was found in SourceCodester Sanitization Management System. Affected by this vulnerability is an unknown functionality of the file admin/?page=system_info of the component Banner Image Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-213571. Vulnerability Guideline
CVE.webp 2022-11-14 17:15:09 CVE-2022-0324 (lien direct) There is a vulnerability in DHCPv6 packet parsing code that could be explored by remote attacker to craft a packet that could cause buffer overflow in a memcpy call, leading to out-of-bounds memory write that would cause dhcp6relay to crash. Dhcp6relay is a critical process and could cause dhcp relay docker to shutdown. Discovered by Eugene Lim of GovTech Singapore. Vulnerability Guideline
CVE.webp 2022-11-14 15:15:52 CVE-2022-3574 (lien direct) The WPForms Pro WordPress plugin before 1.7.7 does not validate its form data when generating the exported CSV, which could lead to CSV injection. Guideline
CVE.webp 2022-11-14 15:15:52 CVE-2022-3578 (lien direct) The ProfileGrid WordPress plugin before 5.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting Guideline
CVE.webp 2022-11-14 15:15:49 CVE-2022-3484 (lien direct) The WPB Show Core WordPress plugin through TODO does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting Guideline
Last update at: 2024-07-02 19:08:25
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter