‼ CVE-2022-1143 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1142 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1144 ‼
📖 Read
via "National Vulnerability Database".
Use after free in WebUI in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via specific input into DevTools.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-36415 ‼
📖 Read
via "National Vulnerability Database".
A DLL hijacking vulnerability exists in the uninstaller in Scooter Beyond Compare 1.8a through 4.4.2 before 4.4.3 when installed via the EXE installer. The uninstaller attempts to load DLLs out of a Windows Temp folder. If a standard user places malicious DLLs in the C:\Windows\Temp\ folder, and then the uninstaller is run as SYSTEM, the DLLs will execute with elevated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-36414 ‼
📖 Read
via "National Vulnerability Database".
There is an elevation of privilege breakout vulnerability in the Windows EXE installer in Scooter Beyond Compare 4.2.0 through 4.4.2 before 4.4.3. Affected versions allow a logged-in user to run applications with elevated privileges via the Clipboard Compare tray app after installation.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1135 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Shopping Cart in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via standard feature user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2018-25045 ‼
📖 Read
via "National Vulnerability Database".
Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1146 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Resource Timing in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1129 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1137 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to leak potentially sensitive information via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1125 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Portals in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1128 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Web Share API in Google Chrome on Windows prior to 100.0.4896.60 allowed an attacker on the local network segment to leak cross-origin data via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1132 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Virtual Keyboard in Google Chrome on Chrome OS prior to 100.0.4896.60 allowed a local attacker to bypass navigation restrictions via physical access to the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1130 ‼
📖 Read
via "National Vulnerability Database".
Insufficient validation of trust input in WebOTP in Google Chrome on Android prior to 100.0.4896.60 allowed a remote attacker to send arbitrary intents from any app via a malicious app.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1138 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Web Cursor in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who had compromised the renderer process to obscure the contents of the Omnibox (URL bar) via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1096 ‼
📖 Read
via "National Vulnerability Database".
Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1139 ‼
📖 Read
via "National Vulnerability Database".
Inappropriate implementation in Background Fetch API in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to leak cross-origin data via a crafted HTML page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1136 ‼
📖 Read
via "National Vulnerability Database".
Use after free in Tab Strip in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific set of user gestures.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1127 ‼
📖 Read
via "National Vulnerability Database".
Use after free in QR Code Generator in Google Chrome prior to 100.0.4896.60 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1133 ‼
📖 Read
via "National Vulnerability Database".
Use after free in WebRTC Perf in Google Chrome prior to 100.0.4896.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.📖 Read
via "National Vulnerability Database".
📢 Russian cyber attacks on Ukraine: What we know so far 📢
📖 Read
via "ITPro".
The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on handling simultaneous cyber and kinetic warfare📖 Read
via "ITPro".
IT Pro
Russian cyber attacks on Ukraine: What we know so far
The conflict between Russia and Ukraine has set the tone for all future wars, and the cyber attacks observed throughout will provide a how-to guide on handling simultaneous cyber and kinetic warfare