APSB22-02 - Adobe Illustrator : This update resolves an important and a moderate vulnerability that could lead to privilege escalation. #adobe #vuln #software #cyber #threats #informatique
https://helpx.adobe.com/security/products/illustrator/apsb22-02.html
APSB22-05 - Adobe InDesign : Successful exploitation could lead to arbitrary code execution and privilege escalation. #adobe #vuln #software #cyber #threats #informatique
https://helpx.adobe.com/security/products/indesign/apsb22-05.html
💥 High severity flaw in the KCodes NetUSB kernel module used by a large number of network device vendors and affecting millions of end user router devices. Attackers could remotely exploit this vulnerability to execute code in the kernel. #vuln #networks #devices #firmware #cyber #threats #informatique
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/
8 different security vulnerabilities arising from inconsistencies among 16 different URL parsing libraries could allow denial-of-service (DoS) conditions, information leaks and remote code execution (RCE) in various web applications, researchers are warning #vuln #web #software #cyber #threats #informatique
https://threatpost.com/url-parsing-bugs-dos-rce-spoofing/177493/
WordPress 5.8.3 Security Release This security release features four (4) security fixes. (CVE-2022-21661, CVE-2022-21662, CVE-2022-21663, CVE-2022-21664) #vuln #wordpress #informatique
https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
CVE-2021-38674 - Reflected XSS Vulnerability in TFTP Server (QTS, QuTS hero, QuTScloud) #vuln #qnap #network #storage #informatique
CVE-2021-44228 - Affected Vendor & Software List #vuln #informatique
https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md
CVE-2021-42392 : The JNDI Strikes Back – Unauthenticated RCE in H2 Database Console. H2 is a very popular open-source Java SQL database. Notes: newer versions of Java contain the trustURLCodebase
mitigation that will not allow remote codebases to be loaded naively via JNDI. However, this mitigation is not bulletproof.. #vuln #software #java #storage #sql #database #cyber #threats #informatique
https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/
A Romanian vulnerability researcher has discovered more than 70 cache poisoning vulnerabilities in combinations of cloud applications and content delivery networks (CDNs) that could be used for denial-of-service attacks on the applications. #vuln #ddos #cloud #software #applications #cyber #threats #informatique
WordPress 5.8.3 - Security Release #vuln #software #cms #blog #wordpress #informatique
https://wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
How Log4j vulnerabilities affect a lot of devices or properties embedded in or used for connected cars, specifically chargers, in-vehicle infotainment systems, and digital remotes for opening cars. #vuln #cyber #threats #informatique
#cyber #iot #threats #cloud #ransomware #vuln #report #supply #informatique
Log4Shell - Scanning: Lessons learned #vuln #cyber #threats #informatique
L'agence fédérale américaine du commerce (FTC) gonfle ses muscles afin de créer un rapport de force en menaçant d'utiliser toute son autorité légale pour poursuivre en justice les entreprises qui ne protégent pas les données des consommateurs contre l'exposition à des vulnérabilités connues #usa #government #vuln #cyber #threats #informatique
Google Chrome - This update includes 37 security fixes. #vuln #google #chrome #internet #browser #software #informatique
https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
Security patch for the HarmonyOS #vuln #huawei #phones #software #informatique
https://www.huaweicentral.com/january-2022-harmonyos-mobile-security-patch-details-released/
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile