‼ CVE-2022-22786 ‼
📖 Read
via "National Vulnerability Database".
The Zoom Client for Meetings for Windows before version 5.10.0 and Zoom Rooms for Conference Room for Windows before version 5.10.0, fails to properly check the installation version during the update process. This issue could be used in a more sophisticated attack to trick a user into downgrading their Zoom client to a less secure version.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22785 ‼
📖 Read
via "National Vulnerability Database".
The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1767 ‼
📖 Read
via "National Vulnerability Database".
Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1110 ‼
📖 Read
via "National Vulnerability Database".
A buffer overflow vulnerability in Lenovo Smart Standby Driver prior to version 4.1.50.0 could allow a local attacker to cause denial of service.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42852 ‼
📖 Read
via "National Vulnerability Database".
A command injection vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow an authenticated user to execute operating system commands by sending a crafted packet to the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28917 ‼
📖 Read
via "National Vulnerability Database".
Tenda AX12 v22.03.01.21_cn was discovered to contain a stack overflow via the lanIp parameter in /goform/AdvSetLanIp.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42848 ‼
📖 Read
via "National Vulnerability Database".
An information disclosure vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow an unauthenticated user to retrieve device and networking details.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25161 ‼
📖 Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DSS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MR/DS-TS versions prior to 1.270 and Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/z(x=24,40,60, y=T,R, z=ES,ESS) versions prior to 1.030 allows a remote unauthenticated attacker to cause a DoS condition for the product's program execution or communication by sending specially crafted packets. System reset of the product is required for recovery.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22776 ‼
📖 Read
via "National Vulnerability Database".
The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains easily exploitable vulnerabilities that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using these vulnerabilities requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42851 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow an unauthenticated user to create a standard user account.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22778 ‼
📖 Read
via "National Vulnerability Database".
The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to execute Cross-Site Request Forgery (CSRF) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42704 ‼
📖 Read
via "National Vulnerability Database".
Inkscape version 0.19 is vulnerable to an out-of-bounds write, which may allow an attacker to arbitrary execute code.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28924 ‼
📖 Read
via "National Vulnerability Database".
An information disclosure vulnerability in UniverSIS-Students before v1.5.0 allows attackers to obtain sensitive information via a crafted GET request to the endpoint /api/students/me/courses/.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1734 ‼
📖 Read
via "National Vulnerability Database".
A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30105 ‼
📖 Read
via "National Vulnerability Database".
In Belkin N300 Firmware 1.00.08, the script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22777 ‼
📖 Read
via "National Vulnerability Database".
The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow an unauthenticated attacker with network access to execute scripts targeting the affected system or the victim's local system. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-29445 ‼
📖 Read
via "National Vulnerability Database".
Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Popup Box plugin <= 2.1.2 at WordPress.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42850 ‼
📖 Read
via "National Vulnerability Database".
A weak default administrator password for the web interface and serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical or local network access.📖 Read
via "National Vulnerability Database".
🔏 How to Prevent Weak and Exploited Security Controls 🔏
📖 Read
via "".
A new cybersecurity alert is encouraging organizations to strengthen weak security controls commonly used by attackers to gain access to systems.📖 Read
via "".
Fortra
How to Prevent Weak and Exploited Security Controls
A new cybersecurity alert is encouraging organizations to strengthen weak security controls commonly used by attackers to gain access to systems.
🕴 Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments 🕴
📖 Read
via "Dark Reading".
Polygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.📖 Read
via "Dark Reading".
Dark Reading
Lacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments
Polygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.
‼ CVE-2022-30597 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field.📖 Read
via "National Vulnerability Database".