This vulnerability allows remote attackers to execute arbitrary code on affected installations of LibreOffice. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Category Archives: Advisories
ZDI-22-1455: (Pwn2Own) Kepware KEPServerEX Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX. Authentication is not required to exploit this vulnerability.
ZDI-22-1454: (Pwn2Own) Kepware KEPServerEX Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX. Authentication is not required to exploit this vulnerability.
ZDI-22-1453: Delta Industrial Automation DIAEnergie Use Of Hard-Coded Credentials Authentication Bypass Vulnerability
This vulnerability allows remote attackers to bypass authentication on affected installations of Delta Industrial Automation DIAEnergie. Authentication is not required to exploit this vulnerability.
moby-engine-20.10.20-1.fc37
FEDORA-2022-2c33bba286
Packages in this update:
moby-engine-20.10.20-1.fc37
Update description:
Update to 20.10.20.
Mitigates CVE-2022-39253
moby-engine-20.10.20-1.fc36
FEDORA-2022-12790ca71a
Packages in this update:
moby-engine-20.10.20-1.fc36
Update description:
Update to 20.10.20.
Mitigates CVE-2022-39253
Multiple Vulnerabilities in Mozilla Firefox and Firefox ESR Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox ESR, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Backdoor.Win32.Redkod.d / Weak Hardcoded Credentials
Posted by malvuln on Oct 20
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/bb309bdd071d5733efefe940a89fcbe8.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Redkod.d
Vulnerability: Weak Hardcoded Credentials
Description: The malware listens on TCP port 4820. Authentication is
required, however the password “redkod” is weak and hardcoded in cleartext
within the PE…
RRX IOB LP v1.0 – DNS Cache Snooping Vulnerability
Posted by info () vulnerability-lab com on Oct 20
Document Title:
===============
RRX IOB LP v1.0 – DNS Cache Snooping Vulnerability
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2261
Release Date:
=============
2022-10-11
Vulnerability Laboratory ID (VL-ID):
====================================
2261
Common…
MapTool v1.11.5 – Cross Site Scripting Vulnerabilities
Posted by info () vulnerability-lab com on Oct 20
Document Title:
===============
MapTool v1.11.5 – Cross Site Scripting Vulnerabilities
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2319
Release Date:
=============
2022-10-11
Vulnerability Laboratory ID (VL-ID):
====================================
2319
Common Vulnerability Scoring System:
====================================
5.6
Vulnerability Class:
====================
Cross Site Scripting…