SQL Injection vulnerability exists in version 1.0 of the Resumes Management and Job Application Website application login form by EGavilan Media that allows authentication bypass through login.php.
Category Archives: Advisories
openssl3-3.0.1-41.el8.1
FEDORA-EPEL-2022-3bebee4625
Packages in this update:
openssl3-3.0.1-41.el8.1
Update description:
Sync with CentOS Stream 9’s openssl to pick up CVE fixes
CVE-2021-27854
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
CVE-2021-27861
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)
CVE-2021-27862
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).
CVE-2021-27853
Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
bash-5.1.16-3.fc36
FEDORA-2022-4ff296fe8e
Packages in this update:
bash-5.1.16-3.fc36
Update description:
Add a null check in parameter_brace_transform() function
bash-5.1.8-3.fc35
FEDORA-2022-5b644a935b
Packages in this update:
bash-5.1.8-3.fc35
Update description:
Add a null check in parameter_brace_transform() function
bash-5.1.16-4.fc37
FEDORA-2022-bf387ff344
Packages in this update:
bash-5.1.16-4.fc37
Update description:
Add a null check in parameter_brace_transform() function
Backdoor.Win32.Augudor.b / Remote File Write Code Execution
Posted by malvuln on Sep 27
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/94ccd337cbdd4efbbcc0a6c888abb87d.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Augudor.b
Vulnerability: Remote File Write Code Execution
Description: The malware drops an empty file named “zy.exe” and listens on
TCP port 810. Third-party adversaries who can reach the infected host can…