βΌ CVE-2022-23805 βΌ
π Read
via "National Vulnerability Database".
A security out-of-bounds read information disclosure vulnerability in Trend Micro Worry-Free Business Security Server could allow a local attacker to send garbage data to a specific named pipe and crash the server. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23582 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that `TensorByteSize` would trigger `CHECK` failures. `TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an `int`. The `PartialTensorShape` constructor instead does not cause a `CHECK`-abort if the shape is partial, which is exactly what this function needs to be able to return `-1`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21961 βΌ
π Read
via "National Vulnerability Database".
A stack-based buffer overflow vulnerability exists in the NBNS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23590 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering a `StatusOr` value that is an error and forcibly extracting the value from it. We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21971 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in the URL_decode functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to an out-of-bounds write. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22150 βΌ
π Read
via "National Vulnerability Database".
A memory corruption vulnerability exists in the JavaScript engine of Foxit SoftwareΓ’β¬β’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23565 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23558 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23379 βΌ
π Read
via "National Vulnerability Database".
Emlog v6.0 was discovered to contain a SQL injection vulnerability via the $TagID parameter of getblogidsfromtagid().π Read
via "National Vulnerability Database".
βΌ CVE-2022-22804 βΌ
π Read
via "National Vulnerability Database".
A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could allow an authenticated attacker to view data, change settings, or impact availability of the software when the user visits a page containing the injected payload. Affected Product: EcoStruxure Power Monitoring Expert (Versions 2020 and prior)π Read
via "National Vulnerability Database".
βΌ CVE-2022-23586 βΌ
π Read
via "National Vulnerability Database".
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22723 βΌ
π Read
via "National Vulnerability Database".
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)π Read
via "National Vulnerability Database".
βΌ CVE-2022-0472 βΌ
π Read
via "National Vulnerability Database".
Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21969 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write vulnerability exists in the HandleSeaCloudMessage functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. The HandleIncomingSeaCloudMessage function uses at [4] the json_object_get_string to populate the p_payload global variable. The p_payload is only 0x100 bytes long, and the total MQTT message could be up to 0x201 bytes. Because the function json_object_get_string will fill str based on the length of the jsonΓ’β¬β’s value and not the actual str size, this would result in a possible out-of-bounds write.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22689 βΌ
π Read
via "National Vulnerability Database".
CA Harvest Software Change Manager versions 13.0.3, 13.0.4, 14.0.0, and 14.0.1, contain a vulnerability in the CSV export functionality, due to insufficient input validation, that can allow a privileged user to potentially execute arbitrary code or commands.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23614 βΌ
π Read
via "National Vulnerability Database".
Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrade.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0218 βΌ
π Read
via "National Vulnerability Database".
The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22724 βΌ
π Read
via "National Vulnerability Database".
A CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause a denial of service on ports 80 (HTTP) and 502 (Modbus), when sending a large number of TCP RST or FIN packets to any open TCP port of the PLC. Affected Product: Modicon M340 CPUs: BMXP34 (All Versions)π Read
via "National Vulnerability Database".
βΌ CVE-2021-44204 βΌ
π Read
via "National Vulnerability Database".
Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287π Read
via "National Vulnerability Database".
βΌ CVE-2020-12891 βΌ
π Read
via "National Vulnerability Database".
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.π Read
via "National Vulnerability Database".
π’ Meta says Apple's iOS privacy changes will cost it $10 billion in 2022 π’
π Read
via "ITPro".
The company's CFO suggests Google "faces a different set of restrictions" because it pays Apple to remain the default iOS search engineπ Read
via "ITPro".
IT PRO
Meta says Apple's iOS privacy changes will cost it $10 billion in 2022 | IT PRO
The company's CFO suggests Google "faces a different set of restrictions" because it pays Apple to remain the default iOS search engine