βΌ CVE-2022-2972 βΌ
π Read
via "National Vulnerability Database".
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40194 βΌ
π Read
via "National Vulnerability Database".
Unauthenticated Sensitive Information Disclosure vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPressπ Read
via "National Vulnerability Database".
βΌ CVE-2022-2025 βΌ
π Read
via "National Vulnerability Database".
an attacker with knowledge of user/pass of Grandstream GSD3710 in its 1.0.11.13 version, could overflow the stack since it doesn't check the param length before use the strcopy instruction. The explotation of this vulnerability may lead an attacker to execute a shell with full access.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40188 βΌ
π Read
via "National Vulnerability Database".
Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38742 βΌ
π Read
via "National Vulnerability Database".
Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based buffer overflow. An attacker could send a specifically crafted TFTP or HTTPS request, causing a heap-based buffer overflow that crashes the ThinServer process. If successfully exploited, this could expose the server to arbitrary remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40628 βΌ
π Read
via "National Vulnerability Database".
This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUAD-35 and EN6200-PRIME QUAD-100 between 19.1.1 to 22.20.1 (inclusive), due to improper control of code generation in the Tacitine Firewall web-based management interface. An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted http request on the targeted device. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary commands on the targeted device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2070 βΌ
π Read
via "National Vulnerability Database".
In Grandstream GSD3710 in its 1.0.11.13 version, it's possible to overflow the stack since it doesn't check the param length before using the sscanf instruction. Because of that, an attacker could create a socket and connect with a remote IP:port by opening a shell and getting full access to the system. The exploit affects daemons dbmng and logsrv that are running on ports 8000 and 8001 by default.π Read
via "National Vulnerability Database".
βΌ CVE-2021-3782 βΌ
π Read
via "National Vulnerability Database".
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2971 βΌ
π Read
via "National Vulnerability Database".
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) accesses a resource using an incompatible type, which could allow an attacker to crash the server with a malicious payload.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45035 βΌ
π Read
via "National Vulnerability Database".
Velneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the userΓΒ΄s credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2973 βΌ
π Read
via "National Vulnerability Database".
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) uses a NULL pointer in certain situations. which could allow an attacker to crash the server.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38134 βΌ
π Read
via "National Vulnerability Database".
Authenticated (subscriber+) Broken Access Control vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-36417 βΌ
π Read
via "National Vulnerability Database".
Multiple Stored Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) vulnerability in 3D Tag Cloud plugin <= 3.8 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38470 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Customer Reviews for WooCommerce plugin <= 5.3.5 at WordPress.π Read
via "National Vulnerability Database".
βοΈ Accused Russian RSOCKS Botmaster Arrested, Requests Extradition to U.S. βοΈ
π Read
via "Krebs on Security".
A 36-year-old Russian man recently identified by KrebsOnSecurity as the likely proprietor of the massive RSOCKS botnet has been arrested in Bulgaria at the request of U.S. authorities. At a court hearing in Bulgaria this month, the accused hacker requested and was granted extradition to the United States, reportedly telling the judge, "America is looking for me because I have enormous information and they need it."π Read
via "Krebs on Security".
Krebs on Security
Accused Russian RSOCKS Botmaster Arrested, Requests Extradition to U.S.
A 36-year-old Russian man recently identified by KrebsOnSecurity as the likely proprietor of the massive RSOCKS botnet has been arrested in Bulgaria at the request of U.S. authorities. At a court hearing in Bulgaria this month, the accused hacker requestedβ¦
βΌ CVE-2022-36340 βΌ
π Read
via "National Vulnerability Database".
Unauthenticated Optin Campaign Cache Deletion vulnerability in MailOptin plugin <= 1.2.49.0 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40103 βΌ
π Read
via "National Vulnerability Database".
Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formSetAutoPing function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35893 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM memory corruption vulnerability in the FvbServicesRuntimeDxe driver allows an attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35247 βΌ
π Read
via "National Vulnerability Database".
A information disclosure vulnerability exists in Rocket.chat <v5, <v4.8.2 and <v4.7.5 where the lack of ACL checks in the getRoomRoles Meteor method leak channel members with special roles to unauthorized clients.π Read
via "National Vulnerability Database".
βΌ CVE-2022-35098 βΌ
π Read
via "National Vulnerability Database".
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via GfxICCBasedColorSpace::getDefaultColor(GfxColor*) at /xpdf/GfxState.cc.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32817 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory.π Read
via "National Vulnerability Database".