Multiple Vulnerabilities in Nagios XI Network Monitoring #cyber #vuln #networks #threats #informatique
Microsoft has addressed a chain of critical vulnerabilities found in the Azure Database for PostgreSQL Flexible Server that could let malicious users escalate privileges and gain access to other customers' databases after bypassing authentication. #microsoft #azure #vuln #cyber #cloud #threats #informatique
CVE-2022-29799 | CVE-2022-29800 - Vulnerabilities in the Linux systemd networkd-dispatcher component. #linux #vuln #cyber #threats #informatique
CVE-2022-27775 Bad local IPv6 connection reuse. Due to errors in the logic, the config matching function did not take the IPv6 address zone id into account which could lead to libcurl reusing the wrong connection when one transfer uses a zone id and a subsequent transfer uses another (or no) zone id. #vuln #networks #cyber #threats #informatique
CVE-2022-26809 explained #windows #vuln #informatique
CVE-2022-29464 - WSO2 RCE exploit and writeup #vuln #informatique
CVE-2022-21449 - PoC for a vulnerability in the Java JDKs 15 to 18 allowing to bypass signature checks using ECDSA signatures (based on elliptic curves) #java #vuln #informatique
🚨 CVE-2022-1159 & CVE-2022-1161 in Rockwell PLCs & engineering workstation software that can be exploited to inject malicious code and stealthily modify automation processes. #vuln #cyber #software #devices #malware #isc #threats #databreach #informatique
https://claroty.com/2022/03/31/blog-research-hiding-code-on-rockwell-automation-plcs
VMware fixes 8 serious security issues.
🔥 CVE-2022-22954 Server-Side Template Injection in VMware Workspace ONE Access. According to Positive Technologies Offensive Team, successful exploitation could lead to RCE from an unauthenticated user.
https://www.vmware.com/security/advisories/VMSA-2022-0011.html
Attackers exploit the legitimate VLC Media Player by launching a custom loader via the VLC Exports function, and use the WinVNC tool for remote control of victim machines. APT10 has been linked to espionage-style operations dating back to 2009 and « has a lot of firepower ». #vuln #cyber #espionage #windows #malware #threats #informatique
(VMSA-2022-0010) #VMware has released emergency patches to address the « Spring4Shell » Remote Code Execution exploit in the Spring Framework. The company is recommending all users to install these updates. #vuln #cyber #threats #informatique
https://www.vmware.com/security/advisories/VMSA-2022-0010.html
For the second time in a year, we identified critical code vulnerabilities in a central component of the PHP supply chain. In this article we present 2 bugs, both exploitable for more than 15 years. #vuln #php #cyber #web #threats #informatique
https://blog.sonarsource.com/php-supply-chain-attack-on-pear
CVE-2022-22963 - We're unsure if the RCE in Spring Core is exploitable yet (dubbed « Spring4Shell »), while the second RCE in Spring Cloud Function (less widely used) is valid. #vuln #cyber #java #threats #informatique
https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/
La communauté vx-underground a archivé le PoC Spring4Shell #vuln #cyber #java #threats #informatique
💥 Spring4Shell - Another critical deserialization RCE flaw this time in Java Spring Core that has the potential to be weaponized rather easily. #vuln #cyber #java #threats #informatique
https://threatpost.com/critical-rce-bug-spring-log4shell/179173/
CVE-2022-27666, a vulnerability in #Linux esp6 #crypto module that achieves local privilege escalation. #vuln #informatique
CVE-2018-25032 could potentially allow a Denial-of-Service (#DoS) attack. This bug was reported by Danilo Ramos of Eideticom, Inc. It has lain in wait 13 years before being found! The « bug » was introduced in zlib 1.2.2.2, with the addition of the Z_FIXED option. #vuln #informatique
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
sc(r)apy | full metal packets
> We Are the Borg
> You Will be Assimilated
> Resistance is Futile