Plus récents

Microsoft has addressed a chain of critical vulnerabilities found in the Azure Database for PostgreSQL Flexible Server that could let malicious users escalate privileges and gain access to other customers' databases after bypassing authentication.

msrc-blog.microsoft.com/2022/0

CVE-2022-27775 Bad local IPv6 connection reuse. Due to errors in the logic, the config matching function did not take the IPv6 address zone id into account which could lead to libcurl reusing the wrong connection when one transfer uses a zone id and a subsequent transfer uses another (or no) zone id.

curl.se/docs/CVE-2022-27775.ht

CVE-2021-3970, CVE-2021-3971 & CVE-2021-3972 - When « secure » isn't secure at all : High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops

welivesecurity.com/2022/04/19/

CVE-2022-21449 - PoC for a vulnerability in the Java JDKs 15 to 18 allowing to bypass signature checks using ECDSA signatures (based on elliptic curves)

github.com/DataDog/security-la

🚨 CVE-2022-1159 & CVE-2022-1161 in Rockwell PLCs & engineering workstation software that can be exploited to inject malicious code and stealthily modify automation processes.

claroty.com/2022/03/31/blog-re

VMware fixes 8 serious security issues.

🔥 CVE-2022-22954 Server-Side Template Injection in VMware Workspace ONE Access. According to Positive Technologies Offensive Team, successful exploitation could lead to RCE from an unauthenticated user.

vmware.com/security/advisories

Attackers exploit the legitimate VLC Media Player by launching a custom loader via the VLC Exports function, and use the WinVNC tool for remote control of victim machines. APT10 has been linked to espionage-style operations dating back to 2009 and « has a lot of firepower ».

symantec-enterprise-blogs.secu

(VMSA-2022-0010) has released emergency patches to address the « Spring4Shell » Remote Code Execution exploit in the Spring Framework. The company is recommending all users to install these updates.

vmware.com/security/advisories

For the second time in a year, we identified critical code vulnerabilities in a central component of the PHP supply chain. In this article we present 2 bugs, both exploitable for more than 15 years.

blog.sonarsource.com/php-suppl

CVE-2022-22963 - We're unsure if the RCE in Spring Core is exploitable yet (dubbed « Spring4Shell »), while the second RCE in Spring Cloud Function (less widely used) is valid.

lunasec.io/docs/blog/spring-rc

💥 Spring4Shell - Another critical deserialization RCE flaw this time in Java Spring Core that has the potential to be weaponized rather easily.

threatpost.com/critical-rce-bu

CVE-2022-27666, a vulnerability in esp6 module that achieves local privilege escalation.

github.com/plummm/CVE-2022-276

CVE-2018-25032 could potentially allow a Denial-of-Service () attack. This bug was reported by Danilo Ramos of Eideticom, Inc. It has lain in wait 13 years before being found! The « bug » was introduced in zlib 1.2.2.2, with the addition of the Z_FIXED option.

github.com/madler/zlib/commit/

Plus anciens