‼ CVE-2021-3897 ‼
📖 Read
via "National Vulnerability Database".
An authentication bypass vulnerability was discovered in an internal service of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware during an that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3898 ‼
📖 Read
via "National Vulnerability Database".
Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3722 ‼
📖 Read
via "National Vulnerability Database".
A denial of service vulnerability was reported in Lenovo PCManager prior to version 4.0.40.2175 that could allow configuration files to be written to non-standard locations during installation.📖 Read
via "National Vulnerability Database".
🕴 Many Medical Device Makers Skimp on Security Practices 🕴
📖 Read
via "Dark Reading".
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.📖 Read
via "Dark Reading".
Dark Reading
Many Medical Device Makers Skimp on Security Practices
Barely over a quarter of medical device companies surveyed maintain a software bill-of-materials, and less than half set security requirements at the design stage.
👍1
‼ CVE-2022-1427 ‼
📖 Read
via "National Vulnerability Database".
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1444 ‼
📖 Read
via "National Vulnerability Database".
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-1445 ‼
📖 Read
via "National Vulnerability Database".
Stored Cross Site Scripting vulnerability in the checked_out_to parameter in GitHub repository snipe/snipe-it prior to 5.4.3. The vulnerability is capable of stolen the user Cookie.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-29264 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in coreboot 4.13 through 4.16. On APs, arbitrary code execution in SMM may occur.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36628 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-40680. Reason: This candidate is a reservation duplicate of CVE-2021-40680. Notes: All CVE users should reference CVE-2021-40680 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40680 ‼
📖 Read
via "National Vulnerability Database".
There is a Directory Traversal vulnerability in Artica Proxy (4.30.000000 SP206 through SP255, and VMware appliance 4.30.000000 through SP273) via the filename parameter to /cgi-bin/main.cgi.📖 Read
via "National Vulnerability Database".
❌ Lapsus$ Hackers Target T-Mobile ❌
📖 Read
via "Threat Post".
No government and customer data was accessed.📖 Read
via "Threat Post".
Threat Post
Lapsus$ Hackers Target T-Mobile
No government and customer data was accessed.
🕴 Overlapping ICS/OT Mandates Distract From Threat Detection and Response 🕴
📖 Read
via "Dark Reading".
It's time for regulators of critical infrastructure — including industrial control systems and operational technology — to focus more on operational resiliency.📖 Read
via "Dark Reading".
Dark Reading
Overlapping ICS/OT Mandates Distract From Threat Detection and Response
It's time for regulators of critical infrastructure — including industrial control systems and operational technology — to focus more on operational resiliency.
‼ CVE-2022-27135 ‼
📖 Read
via "National Vulnerability Database".
xpdf 4.03 has heap buffer overflow in the function readXRefTable located in XRef.cc. An attacker can exploit this bug to cause a Denial of Service (Segmentation fault) or other unspecified effects by sending a crafted PDF file to the pdftoppm binary.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28506 ‼
📖 Read
via "National Vulnerability Database".
There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RGB() in gif2rgb.c:298:45.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27428 ‼
📖 Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in /index.php/album/add of GalleryCMS v2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the album_name parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28586 ‼
📖 Read
via "National Vulnerability Database".
XSS in edit page of Hoosk 1.8.0 allows attacker to execute javascript code in user browser via edit page with XSS payload bypass filter some special chars.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27103 ‼
📖 Read
via "National Vulnerability Database".
element-plus 2.0.5 is vulnerable to Cross Site Scripting (XSS) via el-table-column.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27429 ‼
📖 Read
via "National Vulnerability Database".
Jizhicms v1.9.5 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability via /admin.php/Plugins/update.html.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27311 ‼
📖 Read
via "National Vulnerability Database".
Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-36460 ‼
📖 Read
via "National Vulnerability Database".
VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally on the device and uses the hash to authenticate in all communication with the backend API, including login, registration and changing of passwords. This allows an attacker in possession of a hash to takeover a user's account, rendering the benefits of storing hashed passwords in the database useless.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28053 ‼
📖 Read
via "National Vulnerability Database".
Typemill v1.5.3 was discovered to contain an arbitrary file upload vulnerability via the upload function. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.📖 Read
via "National Vulnerability Database".