This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Category Archives: Advisories
ZDI-22-1030: (Pwn2Own) Unified Automation OPC UA C++ Demo Server OpcUa_SecureListener_ProcessSessionCallRequest Improper Update of Reference Count Denial-of-Service Vulnerability
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server. Authentication is not required to exploit this vulnerability.
ZDI-22-1029: (Pwn2Own) Unified Automation OPC UA C++ Demo Server Infinite Loop Denial-of-Service Vulnerability
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server. Authentication is not required to exploit this vulnerability.
ZDI-22-1033: Trend Micro Apex One Security Agent Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-1032: EnterpriseDT CompleteFTP Server HttpFile Directory Traversal Arbitrary File Deletion Vulnerability
This vulnerability allows remote attackers to delete arbitrary files on affected installations of EnterpriseDT CompleteFTP Server. Authentication is not required to exploit this vulnerability.
ZDI-22-1031: OPC Labs QuickOPC Connectivity Explorer Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OPC Labs QuickOPC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
[R1] Tenable.sc 5.22.0 Fixes One Third-Party Vulnerability
[R1] Tenable.sc 5.22.0 Fixes One Third-Party Vulnerability
Arnie Cabral
Wed, 07/27/2022 – 18:26
Out of caution, and in line with best practice, Tenable has upgraded the bundled components to address the potential impact of these issues. Tenable.sc 5.22.0 updates moment.js to version 2.29.4 to address the identified vulnerabilities.
rt-5.0.3-1.fc36
FEDORA-2022-3b84211a66
Packages in this update:
rt-5.0.3-1.fc36
Update description:
Upstream security and bugfix update.
rt-4.4.6-1.fc35
FEDORA-2022-621dca5468
Packages in this update:
rt-4.4.6-1.fc35
Update description:
Upstream security and bugfix update.
grafana-9.0.5-1.fc37
FEDORA-2022-047d3845db
Packages in this update:
grafana-9.0.5-1.fc37
Update description:
Automatic update for grafana-9.0.5-1.fc37.
Changelog
* Wed Jul 27 2022 Andreas Gerstmayr <agerstmayr@redhat.com> 9.0.5-1
– update to 9.0.5 tagged upstream community sources, see CHANGELOG (rhbz#2107413)
– run integration tests in check phase
– remove conditional around go-rpm-macros
– resolve CVE-2022-31107 grafana: OAuth account takeover (rhbz#2107435)
– resolve CVE-2022-31097 grafana: stored XSS vulnerability (rhbz#2107436)