‼ CVE-2022-43020 ‼
📖 Read
via "National Vulnerability Database".
OpenCATS v0.9.6 was discovered to contain a SQL injection vulnerability via the tag_id variable in the Tag update function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1970 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43026 ‼
📖 Read
via "National Vulnerability Database".
Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the endIp parameter at /goform/SetPptpServerCfg.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43018 ‼
📖 Read
via "National Vulnerability Database".
OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the email parameter in the Check Email function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43028 ‼
📖 Read
via "National Vulnerability Database".
Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the timeZone parameter at /goform/SetSysTimeCfg.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1738 ‼
📖 Read
via "National Vulnerability Database".
Fuji Electric D300win prior to version 3.7.1.17 is vulnerable to an out-of-bounds read, which could allow an attacker to leak sensitive data from the process memory.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1414 ‼
📖 Read
via "National Vulnerability Database".
3scale API Management 2 does not perform adequate sanitation for user input in multiple fields. An authenticated user could use this flaw to inject scripts and possibly gain access to sensitive information or conduct further attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43014 ‼
📖 Read
via "National Vulnerability Database".
OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the joborderID parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2013-4253 ‼
📖 Read
via "National Vulnerability Database".
The deployment script in the unsupported "OpenShift Extras" set of add-on scripts, in Red Hat Openshift 1, installs a default public key in the root user's authorized_keys file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40885 ‼
📖 Read
via "National Vulnerability Database".
Bento4 v1.6.0-639 has a memory allocation issue that can cause denial of service.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1523 ‼
📖 Read
via "National Vulnerability Database".
Fuji Electric D300win prior to version 3.7.1.17 is vulnerable to a write-what-where condition, which could allow an attacker to overwrite program memory to manipulate the flow of information.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23241 ‼
📖 Read
via "National Vulnerability Database".
Clustered Data ONTAP versions 9.11.1 through 9.11.1P2 with SnapLock configured FlexGroups are susceptible to a vulnerability which could allow an authenticated remote attacker to arbitrarily modify or delete WORM data prior to the end of the retention period.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43021 ‼
📖 Read
via "National Vulnerability Database".
OpenCATS v0.9.6 was discovered to contain a SQL injection vulnerability via the entriesPerPage variable.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43024 ‼
📖 Read
via "National Vulnerability Database".
Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 was discovered to contain a stack overflow via the list parameter at /goform/SetVirtualServerCfg.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43019 ‼
📖 Read
via "National Vulnerability Database".
OpenCATS v0.9.6 was discovered to contain a remote code execution (RCE) vulnerability via the getDataGridPager's ajax functionality.📖 Read
via "National Vulnerability Database".
🕴 Security Awareness Urged to Grow Beyond Compliance 🕴
📖 Read
via "Dark Reading".
Increasingly vendors are looking for ways to take security awareness beyond checkbox compliance courses to more context-dependent interactions — a "shift left" to the average worker.📖 Read
via "Dark Reading".
Dark Reading
Security Awareness Urged to Grow Beyond Compliance
Increasingly vendors are looking for ways to take security awareness beyond checkbox compliance courses to more context-dependent interactions — a "shift left" to the average worker.
‼ CVE-2022-20424 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.📖 Read
via "National Vulnerability Database".
🕴 Emotional Toll From Cyberattacks Can Linger Among Staff for Years 🕴
📖 Read
via "Dark Reading".
Research shows 1 in 7 employees involved in a cyberattack exhibits clinical trauma symptoms months after the incident.📖 Read
via "Dark Reading".
Dark Reading
Emotional Toll From Cyberattacks Can Linger Among Staff for Years
Research shows 1 in 7 employees involved in a cyberattack exhibits clinical trauma symptoms months after the incident.
‼ CVE-2022-41787 ‼
📖 Read
via "National Vulnerability Database".
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and 13.1.x before 13.1.5.1, when DNS profile is configured on a virtual server with DNS Express enabled, undisclosed DNS queries with DNSSEC can cause TMM to terminate.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-41835 ‼
📖 Read
via "National Vulnerability Database".
In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.5.0, excessive file permissions in F5OS allows an authenticated local attacker to execute limited set of commands in a container and impact the F5OS controller.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-41770 ‼
📖 Read
via "National Vulnerability Database".
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, and BIG-IQ all versions of 8.x and 7.x, an authenticated iControl REST user can cause an increase in memory resource utilization, via undisclosed requests.📖 Read
via "National Vulnerability Database".