βΌ CVE-2022-38053 βΌ
π Read
via "National Vulnerability Database".
Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41036, CVE-2022-41037, CVE-2022-41038.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38048 βΌ
π Read
via "National Vulnerability Database".
Microsoft Office Remote Code Execution Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37973 βΌ
π Read
via "National Vulnerability Database".
Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38049 βΌ
π Read
via "National Vulnerability Database".
Microsoft Office Graphics Remote Code Execution Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37965 βΌ
π Read
via "National Vulnerability Database".
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41043 βΌ
π Read
via "National Vulnerability Database".
Microsoft Office Information Disclosure Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3453 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /transcation.php. The manipulation of the argument buyer_name leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-210437 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38047 βΌ
π Read
via "National Vulnerability Database".
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-41081.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22035 βΌ
π Read
via "National Vulnerability Database".
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38046 βΌ
π Read
via "National Vulnerability Database".
Web Account Manager Information Disclosure Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34689 βΌ
π Read
via "National Vulnerability Database".
Windows CryptoAPI Spoofing Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37609 βΌ
π Read
via "National Vulnerability Database".
Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37599 βΌ
π Read
via "National Vulnerability Database".
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js.π Read
via "National Vulnerability Database".
βΌ CVE-2022-39296 βΌ
π Read
via "National Vulnerability Database".
MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37983 βΌ
π Read
via "National Vulnerability Database".
Microsoft DWM Core Library Elevation of Privilege Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37975 βΌ
π Read
via "National Vulnerability Database".
Windows Group Policy Elevation of Privilege Vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2022-38041 βΌ
π Read
via "National Vulnerability Database".
Windows Secure Channel Denial of Service Vulnerability.π Read
via "National Vulnerability Database".
βοΈ Microsoft Patch Tuesday, October 2022 Edition βοΈ
π Read
via "Krebs on Security".
Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited. However, noticeably absent from this month's Patch Tuesday are any updates to address a pair of zero-day flaws being exploited this past month in Microsoft Exchange Server.π Read
via "Krebs on Security".
Krebs on Security
Microsoft Patch Tuesday, October 2022 Edition
Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited. However, noticeably absentβ¦
π΄ Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched π΄
π Read
via "Dark Reading".
The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.π Read
via "Dark Reading".
Dark Reading
Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched
The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.
π1
βΌ CVE-2022-41173 βΌ
π Read
via "National Vulnerability Database".
Due to lack of proper memory management, when a victim opens manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41183 βΌ
π Read
via "National Vulnerability Database".
Due to lack of proper memory management, when a victim opens manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.π Read
via "National Vulnerability Database".