A vulnerability classified as problematic has been found in woo-popup Plugin up to 1.2.2. This affects an unknown part of the file admin/class-woo-popup-admin.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is 7c76ac78f3e16015991b612ff4fa616af4ce9292. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222327.
Monthly Archives: March 2023
manifest-tool-2.0.8-1.fc36
FEDORA-2023-a4baceec07
Packages in this update:
manifest-tool-2.0.8-1.fc36
Update description:
Update to latest upstream release
manifest-tool-2.0.8-1.fc37
FEDORA-2023-11dafed208
Packages in this update:
manifest-tool-2.0.8-1.fc37
Update description:
Update to latest upstream release
manifest-tool-2.0.8-1.fc38
FEDORA-2023-5312f6200c
Packages in this update:
manifest-tool-2.0.8-1.fc38
Update description:
Update to latest upstream release
Almost Half of Industrial Sector Computers Affected By Malware in 2022
Kaspersky said the figures represented a 1.5 increase compared with the second half of 2021
USN-5923-1: LibTIFF vulnerabilities
It was discovered that LibTIFF could be made to read out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service. (CVE-2023-0795, CVE-2023-0796, CVE-2023-0797,
CVE-2023-0798, CVE-2023-0799)
It was discovered that LibTIFF could be made to write out of bounds when
processing certain malformed image files with the tiffcrop tool. If a user
were tricked into opening a specially crafted image file, an attacker
could possibly use this issue to cause tiffcrop to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2023-0800,
CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804)
EPA Calls For Cybersecurity Improvements in Public Water Systems
The memorandum highlights the need for states to include cybersecurity in periodic audits
DoppelPaymer Ransomware Gang Members Busted in Germany, Ukraine
Police also seized electronic equipment and are currently performing forensic examinations
USN-5892-2: NSS vulnerability
USN-5892-1 fixed a vulnerability in NSS. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Christian Holler discovered that NSS incorrectly handled certain PKCS 12
certificated bundles. A remote attacker could use this issue to cause NSS
to crash, leading to a denial of service, or possibly execute arbitrary
code. (CVE-2023-0767)
CVE-2015-10094
A vulnerability was found in Fastly Plugin up to 0.97. It has been rated as problematic. Affected by this issue is the function post of the file lib/api.php. The manipulation of the argument url leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.98 is able to address this issue. The name of the patch is d7fe42538f4d4af500e3af9678b6b06fba731656. It is recommended to upgrade the affected component. VDB-222326 is the identifier assigned to this vulnerability.