βΌ CVE-2022-2207 βΌ
π Read
via "National Vulnerability Database".
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.π Read
via "National Vulnerability Database".
π΄ Thrive Acquires DSM π΄
π Read
via "Dark Reading".
DSM is now the third acquisition by Thrive in Florida in the past six months.π Read
via "Dark Reading".
Dark Reading
Thrive Acquires DSM
DSM is now the third acquisition by Thrive in Florida in the past six months.
β FTC warns of LGBTQ+ extortion scams β be aware before you share! β
π Read
via "Naked Security".
It's a simple jingle and it's solid advice: "If in doubt, don't give it out!"π Read
via "Naked Security".
Naked Security
FTC warns of LGBTQ+ extortion scams β be aware before you share!
Itβs a simple jingle and itβs solid advice: βIf in doubt, donβt give it out!β
ποΈ Untrusted types: Researcher demos trick to beat Trusted Types protection in Google Chrome ποΈ
π Read
via "The Daily Swig".
Flaws in protection mechanism leaves websites more exposed to DOM XSS-based attacksπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Untrusted types: Researcher demos trick to beat Trusted Types protection in Google Chrome
Flaws in protection mechanism leaves websites more exposed to DOM XSS-based attacks
βΌ CVE-2017-20101 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.π Read
via "National Vulnerability Database".
βΌ CVE-2017-20100 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in Air Transfer 1.0.14/1.2.1. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
βΌ CVE-2020-21161 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0.π Read
via "National Vulnerability Database".
βΌ CVE-2017-20102 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in Album Lock 4.0 and classified as critical. Affected by this issue is some unknown functionality of the file /getImage. The manipulation of the argument filePaht leads to path traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.π Read
via "National Vulnerability Database".
ποΈ Researchers crack MEGAβs βprivacy by designβ storage, encryption ποΈ
π Read
via "The Daily Swig".
ETH Zurich finds flaws in the firmβs cryptographic infrastructureπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Researchers crack MEGAβs βprivacy by designβ storage, encryption
ETH Zurich finds flaws in the firmβs cryptographic infrastructure
β Harmony blockchain loses nearly $100M due to hacked private keys β
π Read
via "Naked Security".
The crooks needed at least two private keys, each stored in two parts... but they got them anyway.π Read
via "Naked Security".
Naked Security
Harmony blockchain loses nearly $100M due to hacked private keys
The crooks needed at least two private keys, each stored in two parts⦠but they got them anyway.
βΌ CVE-2022-2140 βΌ
π Read
via "National Vulnerability Database".
Elcomplus SmartICS v2.3.4.0 does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33650 βΌ
π Read
via "National Vulnerability Database".
When performing the inference shape operation of the SparseToDense operator, if the number of inputs is less than three, it will access data outside of bounds of inputs which allocated from heap buffers.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2106 βΌ
π Read
via "National Vulnerability Database".
Elcomplus SmartICS v2.3.4.0 does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33651 βΌ
π Read
via "National Vulnerability Database".
When performing the analytical operation of the DepthwiseConv2D operator, if the attribute depth_multiplier is 0, it will cause a division by 0 exception.π Read
via "National Vulnerability Database".
βΌ CVE-2013-2084 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-2069. Reason: This candidate is a reservation duplicate of CVE-2013-2069. Notes: All CVE users should reference CVE-2013-2069 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2088 βΌ
π Read
via "National Vulnerability Database".
An authenticated user with admin privileges may be able to terminate any process on the system running Elcomplus SmartICS v2.3.4.0.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33654 βΌ
π Read
via "National Vulnerability Database".
When performing the initialization operation of the Split operator, if a dimension in the input shape is 0, it will cause a division by 0 exception.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33653 βΌ
π Read
via "National Vulnerability Database".
When performing the derivation shape operation of the SpaceToBatch operator, if there is a value of 0 in the parameter block_shape element, it will cause a division by 0 exception.π Read
via "National Vulnerability Database".
βΌ CVE-2013-2216 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2021-33648 βΌ
π Read
via "National Vulnerability Database".
When performing the inference shape operation of Affine, Concat, MatMul, ArgMinMax, EmbeddingLookup, and Gather operators, if the input shape size is 0, it will access data outside of bounds of shape which allocated from heap buffers.π Read
via "National Vulnerability Database".
βΌ CVE-2013-2180 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".