βΌ CVE-2022-24757 βΌ
π Read
via "National Vulnerability Database".
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter Server version 1.15.4 contains a patch for this issue. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1030 βΌ
π Read
via "National Vulnerability Database".
Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22951 βΌ
π Read
via "National Vulnerability Database".
VMware Carbon Black App Control (8.5.x prior to 8.5.14, 8.6.x prior to 8.6.6, 8.7.x prior to 8.7.4 and 8.8.x prior to 8.8.2) contains an OS command injection vulnerability. An authenticated, high privileged malicious actor with network access to the VMware App Control administration interface may be able to execute commands on the server due to improper input validation leading to remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25222 βΌ
π Read
via "National Vulnerability Database".
Money Transfer Management System Version 1.0 allows an unauthenticated user to inject SQL queries in 'admin/maintenance/manage_branch.php' and 'admin/maintenance/manage_fee.php' via the 'id' parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22952 βΌ
π Read
via "National Vulnerability Database".
VMware Carbon Black App Control (8.5.x prior to 8.5.14, 8.6.x prior to 8.6.6, 8.7.x prior to 8.7.4 and 8.8.x prior to 8.8.2) contains a file upload vulnerability. A malicious actor with administrative access to the VMware App Control administration interface may be able to execute code on the Windows instance where AppC Server is installed by uploading a specially crafted file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23880 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in the File Management function module of taoCMS v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4150 βΌ
π Read
via "National Vulnerability Database".
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27426 βΌ
π Read
via "National Vulnerability Database".
GE UR IED firmware versions prior to version 8.1x with Γ’β¬ΕBasicΓ’β¬οΏ½ security variant does not allow the disabling of the Γ’β¬ΕFactory Mode,Γ’β¬οΏ½ which is used for servicing the IED by a Γ’β¬ΕFactoryΓ’β¬οΏ½ user.π Read
via "National Vulnerability Database".
βΌ CVE-2021-28278 βΌ
π Read
via "National Vulnerability Database".
A Heap-based Buffer Overflow vulnerability exists in jhead 3.04 and 3.05 via the RemoveSectionType function in jpgfile.c.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25609 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-Site Scripting (XSS) in Yoo Slider Γ’β¬β Image Slider & Video Slider (WordPress plugin) allows attackers with contributor or higher user role to inject the malicious code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4180 βΌ
π Read
via "National Vulnerability Database".
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the www_authenticate_uri parameter (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. This flaw affects openstack-tripleo-heat-templates versions prior to 11.6.1.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24731 βΌ
π Read
via "National Vulnerability Database".
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.5.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal vulnerability, allowing a malicious user with read/write access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `create` or `update` access to Applications can leak the contents of any text file on the repo-server. By crafting a malicious Helm chart and using it in an Application, the attacker can retrieve the sensitive file's contents either as part of the generated manifests or in an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from another Application's source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The problem can be mitigated by avoiding storing secrets in git, avoiding mounting secrets as files on the repo-server, avoiding decrypting secrets into files on the repo-server, and carefully limiting who can `create` or `update` Applications.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0996 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.π Read
via "National Vulnerability Database".
βΌ CVE-2022-25608 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in Yoo Slider Γ’β¬β Image Slider & Video Slider (WordPress plugin) allows attackers to trick authenticated users into unwanted slider duplicate or delete action.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0854 βΌ
π Read
via "National Vulnerability Database".
A memory leak flaw was found in the Linux kernelΓ’β¬β’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24730 βΌ
π Read
via "National Vulnerability Database".
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Argo CD starting with version 1.3.0 but before versions 2.1.11, 2.2.6, and 2.3.0 is vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted `get` access for a repository containing a Helm chart can craft an API request to the `/api/v1/repositories/{repo_url}/appdetails` endpoint to leak the contents of out-of-bounds files from the repo-server. The malicious payload would reference an out-of-bounds file, and the contents of that file would be returned as part of the response. Contents from a non-YAML file may be returned as part of an error message. The attacker would have to know or guess the location of the target file. Sensitive files which could be leaked include files from other Applications' source repositories or any secrets which have been mounted as files on the repo-server. This vulnerability is patched in Argo CD versions 2.1.11, 2.2.6, and 2.3.0. The patches prevent path traversal and limit access to users who either A) have been granted Application `create` privileges or B) have been granted Application `get` privileges and are requesting details for a `repo_url` that has already been used for the given Application. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24293 βΌ
π Read
via "National Vulnerability Database".
Certain HP Print devices may be vulnerable to potential information disclosure, denial of service, or remote code execution.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2021-28276 βΌ
π Read
via "National Vulnerability Database".
A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a wild address read in the ProcessCanonMakerNoteDir function in makernote.c.π Read
via "National Vulnerability Database".
β Serious Security: DEADBOLT β the ransomware that goes straight for your backups β
π Read
via "Naked Security".
Some tips on how to keep your network safe - even (or perhaps especially!) if you think you're safe already.π Read
via "Naked Security".
Naked Security
Serious Security: DEADBOLT β the ransomware that goes straight for your backups
Some tips on how to keep your network safe β even (or perhaps especially!) if you think youβre safe already.
βΌ CVE-2022-24934 βΌ
π Read
via "National Vulnerability Database".
wpsupdater.exe in Kingsoft WPS Office through 11.2.0.10382 allows remote code execution by modifying HKEY_CURRENT_USER in the registry.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24768 βΌ
π Read
via "National Vulnerability Database".
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All unpatched versions of Argo CD starting with 1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. Versions starting with 0.8.0 and 0.5.0 contain limited versions of this issue. To perform exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` and `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges. A patch for this vulnerability has been released in Argo CD versions 2.3.2, 2.2.8, and 2.1.14. Some mitigation measures are available but do not serve as a substitute for upgrading. To avoid privilege escalation, limit who has push access to Application source repositories or `sync` + `override` access to Applications; and limit which repositories are available in projects where users have `update` access to Applications. To avoid unauthorized resource inspection/tampering, limit who has `delete`, `get`, or `action` access to Applications.π Read
via "National Vulnerability Database".