‼ CVE-2022-33047 ‼
📖 Read
via "National Vulnerability Database".
OTFCC v0.10.4 was discovered to contain a heap buffer overflow after free via otfccbuild.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31111 ‼
📖 Read
via "National Vulnerability Database".
Frontier is Substrate's Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier master branch commit fed5e0a9577c10bea021721e8c2c5c378e16bf66 and polkadot-v0.9.22 branch commit e3e427fa2e5d1200a784679f8015d4774cedc934. This vulnerability affects only EVM internal states, but not Substrate balance states or node. You can temporarily pause EVM execution (by setting up a Substrate `CallFilter` that disables `pallet-evm` and `pallet-ethereum` calls before the patch can be applied.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2316 ‼
📖 Read
via "National Vulnerability Database".
HTML injection vulnerability in secure messages of Devolutions Server before 2022.2 allows attackers to alter the rendering of the page or redirect a user to another site.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2318 ‼
📖 Read
via "National Vulnerability Database".
There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31124 ‼
📖 Read
via "National Vulnerability Database".
openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6, which no longer includes the raw field value in the error message. There are no known workarounds for this issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31129 ‼
📖 Read
via "National Vulnerability Database".
moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31131 ‼
📖 Read
via "National Vulnerability Database".
Nextcloud mail is a Mail app for the Nextcloud home server product. Versions of Nextcloud mail prior to 1.12.2 were found to be missing user account ownership checks when performing tasks related to mail attachments. Attachments may have been exposed to incorrect system users. It is recommended that the Nextcloud Mail app is upgraded to 1.12.2. There are no known workarounds for this issue. ### Workarounds No workaround available ### References * [Pull request](https://github.com/nextcloud/mail/pull/6600) * [HackerOne](https://hackerone.com/reports/1579820) ### For more information If you have any questions or comments about this advisory: * Create a post in [nextcloud/security-advisories](https://github.com/nextcloud/security-advisories/discussions) * Customers: Open a support ticket at [support.nextcloud.com](https://support.nextcloud.com)📖 Read
via "National Vulnerability Database".
🕴 Apple Debuts Spyware Protection for State-Sponsored Cyberattacks 🕴
📖 Read
via "Dark Reading".
Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.📖 Read
via "Dark Reading".
Dark Reading
Apple Debuts Spyware Protection for State-Sponsored Cyberattacks
Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.
🕴 North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs 🕴
📖 Read
via "Dark Reading".
US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.📖 Read
via "Dark Reading".
Dark Reading
North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs
US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.
‼ CVE-2022-20752 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a timing attack. This vulnerability is due to insufficient protection of a system password. An attacker could exploit this vulnerability by observing the time it takes the system to respond to various queries. A successful exploit could allow the attacker to determine a sensitive system password.📖 Read
via "National Vulnerability Database".
‼ CVE-2015-3173 ‼
📖 Read
via "National Vulnerability Database".
custom-content-type-manager Wordpress plugin can be used by an administrator to achieve arbitrary PHP remote code execution.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20859 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the Disaster Recovery framework of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to perform certain administrative actions they should not be able to. This vulnerability is due to insufficient access control checks on the affected device. An attacker with read-only privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to perform a set of administrative actions they should not be able to.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4234 ‼
📖 Read
via "National Vulnerability Database".
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20800 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20862 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the operating system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27549 ‼
📖 Read
via "National Vulnerability Database".
HCL Launch may store certain data for recurring activities in a plain text format.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20812 ‼
📖 Read
via "National Vulnerability Database".
Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. For more information about these vulnerabilities, see the Details section of this advisory.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20768 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. This vulnerability is due to the storage of certain unencrypted credentials. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials that they may not normally have access to. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII). Note: To access the logs that are stored in the RoomOS Cloud, an attacker would need valid Administrator-level credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2015-3172 ‼
📖 Read
via "National Vulnerability Database".
EidoGo is susceptible to Cross-Site Scripting (XSS) attacks via maliciously crafted SGF input.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-20791 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability in the database user privileges of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the API to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2014-8164 ‼
📖 Read
via "National Vulnerability Database".
A insecure configuration for certificate verification (http.verify_mode = OpenSSL::SSL::VERIFY_NONE) may lead to verification bypass in Red Hat CloudForms 5.x.📖 Read
via "National Vulnerability Database".