K87046687: VMware Tools vulnerability CVE-2022-31676

VMware Tools vulnerability CVE-2022-31676 Security Advisory Security Advisory Description VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious ... More info: https://support.f5.com/csp/article/K87046687?utm_source=f5support&utm_medium=RSS

K50343021: Node-vm2 vulnerability CVE-2022-36067

Node-vm2 vulnerability CVE-2022-36067 Security Advisory Security Advisory Description vm2 is a sandbox that can run untrusted code with whitelisted Nodes built-in modules. In versions prior to ... More info: https://support.f5.com/csp/article/K50343021?utm_source=f5support&utm_medium=RSS

K71522481: Java vulnerability CVE-2021-2163

Java vulnerability CVE-2021-2163 Security Advisory Security Advisory Description Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE ( ... More info: https://support.f5.com/csp/article/K71522481?utm_source=f5support&utm_medium=RSS

EmoLoad: Loading Emotet Modules without Emotet

Our latest report exposing Emotet’s supply chain would not have been possible without custom-made tools, tailored to analyze the core Emotet component and the modules distributed by the botnet. One such tool is EmoLoad, a small but practical program to successfully execute Emotet modules in isolation. In light of its convenience, we decided to share … ContinuedThe post EmoLoad: Loading Emotet Modules without Emotet appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/12/emoload-loading-emotet-modules-without-emotet.html?utm_source=rss&utm_medium=rss&utm_campaign=emoload-loading-emotet-modules-without-emotet

K83430580: SAMBA vulnerability CVE-2022-42898

SAMBA vulnerability CVE-2022-42898 Security Advisory Security Advisory Description ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing ... More info: https://support.f5.com/csp/article/K83430580?utm_source=f5support&utm_medium=RSS
Translate »