‼ CVE-2021-39045 ‼
📖 Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a local attacker to obtain information due to the autocomplete feature on password input fields. IBM X-Force ID: 214345.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-36583 ‼
📖 Read
via "National Vulnerability Database".
DedeCMS V5.7.97 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at /dede/co_do.php via the dopost, rpok, and aid parameters.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35530 ‼
📖 Read
via "National Vulnerability Database".
In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34372 ‼
📖 Read
via "National Vulnerability Database".
Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality📖 Read
via "National Vulnerability Database".
‼ CVE-2020-4301 ‼
📖 Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 176609.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35534 ‼
📖 Read
via "National Vulnerability Database".
In LibRaw, there is a memory corruption vulnerability within the "crxFreeSubbandData()" function (libraw\src\decoders\crx.cpp) when processing cr3 files.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35525 ‼
📖 Read
via "National Vulnerability Database".
In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-2996 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35535 ‼
📖 Read
via "National Vulnerability Database".
In LibRaw, there is an out-of-bounds read vulnerability within the "LibRaw::parseSonySRF()" function (libraw\src\metadata\sony.cpp) when processing srf files.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3061 ‼
📖 Read
via "National Vulnerability Database".
Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-45027 ‼
📖 Read
via "National Vulnerability Database".
An arbitrary file download vulnerability in Oliver v5 Library Server Versions < 5.00.008.053 via the FileServlet function allows for arbitrary file download by an attacker using unsanitized user supplied input.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35529 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-39009 ‼
📖 Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 213554.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35527 ‼
📖 Read
via "National Vulnerability Database".
In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34379 ‼
📖 Read
via "National Vulnerability Database".
Dell EMC CloudLink 7.1.2 and all prior versions contain an Authentication Bypass Vulnerability. A remote attacker, with the knowledge of the active directory usernames, could potentially exploit this vulnerability to gain unauthorized access to the system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30614 ‼
📖 Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to a denial of service via email flooding caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume all available CPU resources. IBM X-Force ID: 227591.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35528 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29823 ‼
📖 Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 204465.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-36773 ‼
📖 Read
via "National Vulnerability Database".
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 233571.📖 Read
via "National Vulnerability Database".
🕴 Threat Actor Phishing PyPI Users Identified 🕴
📖 Read
via "Dark Reading".
"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.📖 Read
via "Dark Reading".
Dark Reading
Threat Actor Phishing PyPI Users Identified
"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.
🕴 Neopets Hackers Had Network Access for 18 Months 🕴
📖 Read
via "Dark Reading".
Neopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.📖 Read
via "Dark Reading".
Dark Reading
Neopets Hackers Had Network Access for 18 Months
Neopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.