Multiple vulnerabilities have been discovered in Veeam Backup & Replication that could allow for remote code execution. Veeam Backup & Replication is a backup solutions for virtual environments. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of the application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Category Archives: Advisories
USN-5325-1: Zsh vulnerabilities
Sam Foxman discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to regain dropped privileges.
(CVE-2019-20044)
It was discovered that Zsh incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2021-45444)
CVE-2021-24692
The Simple Download Monitor WordPress plugin before 3.9.5 allows users with a role as low as Contributor to download any file on the web server (such as wp-config.php) via a path traversal vector.
CVE-2021-24895
The Cybersoldier WordPress plugin before 1.7.0 does not sanitise and escape the URL settings before outputting it in an attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
CVE-2021-24897
The Add Subtitle WordPress plugin through 1.1.0 does not sanitise or escape the sub-title field (available only with classic editor) when output in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks
CVE-2021-24940
The Persian Woocommerce WordPress plugin through 5.8.0 does not escape the s parameter before outputting it back in an attribute in the admin dashboard, which could lead to a Reflected Cross-Site Scripting issue
CVE-2021-24950
The Insight Core WordPress plugin through 1.0 does not have any authorisation and CSRF checks in the insight_customizer_options_import (available to any authenticated user), does not validate user input before passing it to unserialize(), nor sanitise and escape it before outputting it in the response. As a result, it could allow users with a role as low as Subscriber to perform PHP Object Injection, as well as Stored Cross-Site Scripting attacks
Post Title
Multiple vulnerabilities have been discovered in Schneider Electric APC Smart-UPS that could allow for remote code execution. Schneider Electric APC Smart-UPS are devices that protect equipment and provide emergency backup power for mission-critical assets. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of the application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
dotnet6.0-6.0.103-1.fc34
FEDORA-2022-3b24db8072
Packages in this update:
dotnet6.0-6.0.103-1.fc34
Update description:
This is the March 2022 update for .NET 6: SDK 6.0.103 and Runtime 6.0.3
Release notes:
– SDK: https://github.com/dotnet/core/blob/main/release-notes/6.0/6.0.3/6.0.103.md
– Runtime: https://github.com/dotnet/core/blob/main/release-notes/6.0/6.0.3/6.0.3.md
This includes fixes for CVE-2022-24464 and CVE-2022-24512
dotnet6.0-6.0.103-1.fc35
FEDORA-2022-61d4028014
Packages in this update:
dotnet6.0-6.0.103-1.fc35
Update description:
This is the March 2022 update for .NET 6: SDK 6.0.103 and Runtime 6.0.3
Release notes:
– SDK: https://github.com/dotnet/core/blob/main/release-notes/6.0/6.0.3/6.0.103.md
– Runtime: https://github.com/dotnet/core/blob/main/release-notes/6.0/6.0.3/6.0.3.md
This includes fixes for CVE-2022-24464 and CVE-2022-24512