βΌ CVE-2022-38007 βΌ
π Read
via "National Vulnerability Database".
Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34719 βΌ
π Read
via "National Vulnerability Database".
Windows Distributed File System (DFS) Elevation of Privilege Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39203 βΌ
π Read
via "National Vulnerability Database".
matrix-appservice-irc is an open source Node.js IRC bridge for Matrix. Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel. The vulnerability has been patched in matrix-appservice-irc 0.35.0. As a workaround operators may disable dynamic channel joining via `dynamicChannels.enabled` to prevent users from joining new channels, which prevents any new channels being bridged outside of what is already bridged, and what is specified in the config.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36106 βΌ
π Read
via "National Vulnerability Database".
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default expiry time of two hours has been exceeded. Update to TYPO3 version 10.4.32 or 11.5.16 that fix the problem. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".
β Serious Security: Browser-in-the-browser attacks β watch out for windows that arenβt! β
π Read
via "Naked Security".
It sounds like a scam that could never work: use a picture of browser and convince the user it's a real browser. You might be surprised...π Read
via "Naked Security".
Naked Security
Serious Security: Browser-in-the-browser attacks β watch out for windows that arenβt!
Simple but super-sneaky β use a picture of a browser, and convince people itβs realβ¦
π΄ Microsoft Quashes Actively Exploited Zero-Day, Wormable Critical Bugs π΄
π Read
via "Dark Reading".
In Microsoft's lightest Patch Tuesday update of the year so far, several security vulnerabilities stand out as must-patch, researchers warn.π Read
via "Dark Reading".
Dark Reading
Microsoft Quashes Actively Exploited Zero-Day, Wormable Critical Bugs
In Microsoft's lightest Patch Tuesday update of the year so far, several security vulnerabilities stand out as must-patch, researchers warn.
π1
βΌ CVE-2022-34356 βΌ
π Read
via "National Vulnerability Database".
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to obtain root privileges. IBM X-Force ID: 230502.π Read
via "National Vulnerability Database".
βΌ CVE-2021-0871 βΌ
π Read
via "National Vulnerability Database".
In PVRSRVBridgePMRPDumpSymbolicAddr of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-238921253π Read
via "National Vulnerability Database".
βΌ CVE-2022-20387 βΌ
π Read
via "National Vulnerability Database".
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324π Read
via "National Vulnerability Database".
βΌ CVE-2022-2962 βΌ
π Read
via "National Vulnerability Database".
A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.π Read
via "National Vulnerability Database".
βΌ CVE-2022-20388 βΌ
π Read
via "National Vulnerability Database".
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323π Read
via "National Vulnerability Database".
βΌ CVE-2022-34336 βΌ
π Read
via "National Vulnerability Database".
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229714.π Read
via "National Vulnerability Database".
βΌ CVE-2021-0942 βΌ
π Read
via "National Vulnerability Database".
The path in this case is a little bit convoluted. The end result is that via an ioctl an untrusted app can control the ui32PageIndex offset in the expression:sPA.uiAddr = page_to_phys(psOSPageArrayData->pagearray[ui32PageIndex]);With the current PoC this crashes as an OOB read. However, given that the OOB read value is ending up as the address field of a struct I think i seems plausible that this could lead to an OOB write if the attacker is able to cause the OOB read to pull an interesting kernel address. Regardless if this is a read or write, it is a High severity issue in the kernel.Product: AndroidVersions: Android SoCAndroid ID: A-238904312π Read
via "National Vulnerability Database".
βΌ CVE-2022-20396 βΌ
π Read
via "National Vulnerability Database".
In SettingsActivity.java, there is a possible way to make a device discoverable over Bluetooth, without permission or user interaction, due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-234440688π Read
via "National Vulnerability Database".
βΌ CVE-2022-20398 βΌ
π Read
via "National Vulnerability Database".
In addOrUpdateNetwork of WifiServiceImpl.java, there is a possible way for a guest user to configure Wi-Fi due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-221859734π Read
via "National Vulnerability Database".
βΌ CVE-2022-20395 βΌ
π Read
via "National Vulnerability Database".
In checkAccess of MediaProvider.java, there is a possible file deletion due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-221855295π Read
via "National Vulnerability Database".
βΌ CVE-2022-20389 βΌ
π Read
via "National Vulnerability Database".
Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257004π Read
via "National Vulnerability Database".
βΌ CVE-2022-39819 βΌ
π Read
via "National Vulnerability Database".
In NOKIA 1350 OMS R14.2, multiple OS Command Injection vulnerabilities occur in /cgi-bin/R14.2/log.pl via the cmd HTTP GET parameter and /cgi-bin/R14.2/checkping.pl via the addr HTTP GET parameter. This allows authenticated users to execute commands on the operating system.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40621 βΌ
π Read
via "National Vulnerability Database".
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39816 βΌ
π Read
via "National Vulnerability Database".
In NOKIA 1350 OMS R14.2, Insufficiently Protected Credentials (cleartext password) occur in /cgi-bin/R14.2/cgi-bin/R14.2/host.pl on the edit configuration page. Exploitation requires an authenticated attacker.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39821 βΌ
π Read
via "National Vulnerability Database".
In NOKIA 1350 OMS R14.2, an Insertion of Sensitive Information into an Application Log File vulnerability occurs under /usr/Systems/OTNE_1_14_Master/maintenance/trace/web/.otn.default.log. The web application stores critical information, such as cleartext user credentials, in world-readable files in the filesystem.π Read
via "National Vulnerability Database".