Apache mod_proxy vulnerability CVE-2020-13950 Security Advisory Security Advisory Description Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer ...
More info:
https://support.f5.com/csp/article/K87323016?utm_source=f5support&utm_medium=RSS
Linux Kernel vulnerability CVE-2020-35519 Security Advisory Security Advisory Description An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel ...
More info:
https://support.f5.com/csp/article/K12092991?utm_source=f5support&utm_medium=RSS
Linux kernel Vulnerability CVE-2020-25670 Security Advisory Security Advisory Description A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free ...
More info:
https://support.f5.com/csp/article/K14594844?utm_source=f5support&utm_medium=RSS
Linux kernel Vulnerability CVE-2021-31440 Security Advisory Security Advisory Description This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel ...
More info:
https://support.f5.com/csp/article/K43232343?utm_source=f5support&utm_medium=RSS
This article was authored by Oleg Boyarchuk, Stefano Ortolani, Jason Zhang. For the last three weeks, security researchers have been noticing Emotet migrating to new 64-bit modules https://twitter.com/Cryptolaemus1/status/1516261512372965383. While the change initially affected Epoch 4, by the second week of May both Epoch 4 and Epoch 5 had been fully migrated. Figure 1 shows one … ContinuedThe post Emotet Moves to 64 bit and Updates its Loader appeared first on VMware Security Blog.
More info:
https://blogs.vmware.com/security/2022/05/emotet-moves-to-64-bit-and-updates-its-loader.html?utm_source=rss&utm_medium=rss&utm_campaign=emotet-moves-to-64-bit-and-updates-its-loader
Linux kernel Vulnerability CVE-2020-25672 Security Advisory Security Advisory Description A memory leak vulnerability was found in Linux kernel in llcp_sock_connect (CVE-2020-25672) Impact There ...
More info:
https://support.f5.com/csp/article/K23702520?utm_source=f5support&utm_medium=RSS
Linux kernel Vulnerability CVE-2021-3483 Security Advisory Security Advisory Description A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice ...
More info:
https://support.f5.com/csp/article/K32805465?utm_source=f5support&utm_medium=RSS
by Michael Hawkins. The description user field was not hidden when being set as a hidden user field.Severity/Risk:MinorVersions affected:4.0, 3.11 to 3.11.6, 3.10 to 3.10.10, 3.9 to 3.9.13 and earlier unsupported versionsVersions fixed:4.0.1, 3.11.7, 3.10.11 and 3.9.14Reported by:Bo FoghtCVE identifier:CVE-2022-30597Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74318Tracker issue:MDL-74318 Description field hidden by user policies
More info:
https://moodle.org/mod/forum/discuss.php?d=434579&parent=1748723
by Michael Hawkins. ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk.Severity/Risk:MinorVersions affected:4.0, 3.11 to 3.11.6, 3.10 to 3.10.10, 3.9 to 3.9.13 and earlier unsupported versionsVersions fixed:4.0.1, 3.11.7, 3.10.11 and 3.9.14Reported by:Paul HoldenCVE identifier:CVE-2022-30596Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204Tracker issue:MDL-74204
More info:
https://moodle.org/mod/forum/discuss.php?d=434578&parent=1748722
by Michael Hawkins. Global search results could include author information on some activities where a user may not otherwise have access to it.Severity/Risk:MinorVersions affected:4.0, 3.11 to 3.11.6, 3.10 to 3.10.10, 3.9 to 3.9.13 and earlier unsupported versionsVersions fixed:4.0.1, 3.11.7, 3.10.11 and 3.9.14Reported by:CatalinaCVE identifier:CVE-2022-30598Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71623Tracker issue:MDL-71623 Global
More info:
https://moodle.org/mod/forum/discuss.php?d=434580&parent=1748724