Trojan.Win32.Cosmu.abix MVID-2022-0494 Insecure Permissions
Trojan.Win32.Cosmu.abix malware suffers from an insecure permissions vulnerability.
View ArticleUbuntu Security Notice USN-5293-1
Ubuntu Security Notice 5293-1 - Aaron Massey discovered that c3p0 could be made to crash when parsing certain input. An attacker able to modify the application's XML configuration file could cause a...
View ArticleRed Hat Security Advisory 2022-0585-01
Red Hat Security Advisory 2022-0585-01 - Service Telemetry Framework provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes....
View ArticleAir Cargo Management System 1.0 SQL Injection
Air Cargo Management System version 1.0 suffers from a remote SQL injection vulnerability.
View ArticleUbuntu Security Notice USN-5288-1
Ubuntu Security Notice 5288-1 - It was discovered that Expat incorrectly handled certain files. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
View ArticleRed Hat Security Advisory 2022-0587-01
Red Hat Security Advisory 2022-0587-01 - Service Telemetry Framework provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes....
View ArticleUbuntu Security Notice USN-5295-2
Ubuntu Security Notice 5295-2 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a...
View ArticleWordPress 99robots Header Footer Code Manager 1.1.16 Cross Site Scripting
WordPress 99robots Header Footer Code Manager plugin versions 1.1.16 and below suffer from a cross site scripting vulnerability.
View ArticleUbuntu Security Notice USN-5297-1
Ubuntu Security Notice 5297-1 - Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to...
View ArticleRed Hat Security Advisory 2022-0589-01
Red Hat Security Advisory 2022-0589-01 - This release of Red Hat build of Quarkus 2.2.5 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed...
View ArticleBackdoor.Win32.Agent.baol MVID-2022-0495 Insecure Permissions
Backdoor.Win32.Agent.baol malware suffers from an insecure permissions vulnerability.
View ArticleUbuntu Security Notice USN-5294-2
Ubuntu Security Notice 5294-2 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a...
View ArticleAgirhnet 1.0 Cross Site Scripting
Agirhnet version 1.0 suffers from a cross site scripting vulnerability.
View ArticleRed Hat Security Advisory 2022-0590-01
Red Hat Security Advisory 2022-0590-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include...
View ArticleI2P 1.7.0
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is...
View ArticleUbuntu Security Notice USN-5298-1
Ubuntu Security Notice 5298-1 - It was discovered that the Packet network protocol implementation in the Linux kernel contained a double-free vulnerability. A local attacker could use this to cause a...
View ArticleBackdoor.Win32.Dsocks.10 MVID-2022-0496 Hardcoded Password
Backdoor.Win32.Dsocks.10 malware suffers from a hardcoded cleartext password vulnerability.
View ArticleUbuntu Security Notice USN-5299-1
Ubuntu Security Notice 5299-1 - Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could...
View ArticleRed Hat Security Advisory 2022-0592-01
Red Hat Security Advisory 2022-0592-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include...
View ArticleICL ScadaFlex II SCADA Controllers SC-1/SC-2 1.03.07 Remote File Modification
ICL ScadaFlex II SCADA Controllers SC-1/SC-2 version 1.03.07 is vulnerable to unauthenticated file write/overwrite and deletion. This allows an attacker to execute critical file CRUD operations on the...
View Article