βΌ CVE-2022-28601 βΌ
π Read
via "National Vulnerability Database".
A Two-Factor Authentication (2FA) bypass vulnerability in "Simple 2FA Plugin for Moodle" by LMS Doctor allows remote attackers to overwrite the phone number used for confirmation via the profile.php file. Therefore, allowing them to bypass the phone verification mechanism.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29110 βΌ
π Read
via "National Vulnerability Database".
Microsoft Excel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-29109.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29117 βΌ
π Read
via "National Vulnerability Database".
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-23267, CVE-2022-29145.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29395 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the apcliKey parameter in the function FUN_0041bac4.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29142 βΌ
π Read
via "National Vulnerability Database".
Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-29133.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30130 βΌ
π Read
via "National Vulnerability Database".
.NET Framework Denial of Service Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29394 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macAddress parameter in the function FUN_0041b448.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26932 βΌ
π Read
via "National Vulnerability Database".
Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-26938, CVE-2022-26939.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29399 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the url parameter in the function FUN_00415bf0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29393 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_004192cc.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26938 βΌ
π Read
via "National Vulnerability Database".
Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-26932, CVE-2022-26939.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29396 βΌ
π Read
via "National Vulnerability Database".
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_00418f10.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29134 βΌ
π Read
via "National Vulnerability Database".
Windows Clustered Shared Volume Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29120, CVE-2022-29122, CVE-2022-29123.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29114 βΌ
π Read
via "National Vulnerability Database".
Windows Print Spooler Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-29140.π Read
via "National Vulnerability Database".
βΌ CVE-2022-26935 βΌ
π Read
via "National Vulnerability Database".
Windows WLAN AutoConfig Service Information Disclosure Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23267 βΌ
π Read
via "National Vulnerability Database".
.NET and Visual Studio Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-29117, CVE-2022-29145.π Read
via "National Vulnerability Database".
π΄ What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers π΄
π Read
via "Dark Reading".
Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.π Read
via "Dark Reading".
Dark Reading
What to Patch Now: Actively Exploited Windows Zero-Day Threatens Domain Controllers
Microsoft's May 2022 Patch Tuesday contains several bugs in ubiquitous software that could affect millions of machines, researchers warn.
βοΈ Microsoft Patch Tuesday, May 2022 Edition βοΈ
π Read
via "Krebs on Security".
Microsoft today released updates to fix at least 74 separate security problems in its Windows operating systems and related software. This month's patch batch includes fixes for seven "critical" flaws, as well as a zero-day vulnerability that affects all supported versions of Windows.π Read
via "Krebs on Security".
Krebsonsecurity
Microsoft Patch Tuesday, May 2022 Edition
Microsoft today released updates to fix at least 74 separate security problems in its Windows operating systems and related software. This month's patch batch includes fixes for seven "critical" flaws, as well as a zero-day vulnerability that affects allβ¦
π΄ Novel Nerbian RAT Lurks Behind Faked COVID Safety Emails π΄
π Read
via "Dark Reading".
Malicious emails with macro-enabled Word documents are spreading a never-before-seen remote-access Trojan, researchers say.π Read
via "Dark Reading".
Darkreading
Novel Nerbian RAT Lurks Behind Faked COVID Safety Emails
Malicious emails with macro-enabled Word documents are spreading a never-before-seen remote-access Trojan, researchers say.
π1
βΌ CVE-2022-26116 βΌ
π Read
via "National Vulnerability Database".
Multiple improper neutralization of special elements used in SQL commands ('SQL Injection') vulnerability [CWE-89] in FortiNAC version 8.3.7 and below, 8.5.2 and below, 8.5.4, 8.6.0, 8.6.5 and below, 8.7.6 and below, 8.8.11 and below, 9.1.5 and below, 9.2.2 and below may allow an authenticated attacker to execute unauthorized code or commands via specifically crafted strings parameters.π Read
via "National Vulnerability Database".
ποΈ NIST refreshes software supply chain risk management guidance ποΈ
π Read
via "The Daily Swig".
βA comprehensive tool that can take you from crawl to walk to runβπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
NIST refreshes software supply chain risk management guidance
βA comprehensive tool that can take you from crawl to walk to runβ