Security
Headlines
HeadlinesLatestCVEs

Tag

#js

Red Hat Security Advisory 2022-7005-01

Red Hat Security Advisory 2022-7005-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a randomization vulnerability.

Packet Storm
#sql#vulnerability#linux#red_hat#js#java
Red Hat Security Advisory 2022-7009-01

Red Hat Security Advisory 2022-7009-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include buffer overflow and randomization vulnerabilities.

Red Hat Security Advisory 2022-7002-01

Red Hat Security Advisory 2022-7002-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a randomization vulnerability.

Red Hat Security Advisory 2022-7012-01

Red Hat Security Advisory 2022-7012-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include buffer overflow and randomization vulnerabilities.

Red Hat Security Advisory 2022-7044-01

Red Hat Security Advisory 2022-7044-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include HTTP request smuggling and bypass vulnerabilities.

Red Hat Security Advisory 2022-7055-01

Red Hat Security Advisory 2022-7055-01 - An update is now available for Red Hat Openshift distributed tracing 2.6.0. Issues addressed include denial of service and traversal vulnerabilities.

CVE-2022-40084: OpenCRX-CVE/CVE-2022-40084.md at main · ciph0x01/OpenCRX-CVE

OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.

Smartphones of Iran’s protest detainees targeted with spyware

By Waqas The malware has been identified as I3mon, which can perform all kinds of spying operations. This is a post from HackRead.com Read the original post: Smartphones of Iran’s protest detainees targeted with spyware

New PHP-based Ducktail infostealer is now after crypto wallets

Categories: News Categories: Threats Tags: Ducktail Tags: infosteal Tags: information stealer Tags: Zscaler Tags: Trojan Tags: Facebook Business Tags: Facebook API graph Tags: Facebook Ads Manager Tags: PHP malware An information stealer known to go after the Facebook accounts of businesses is now after crypto wallets, too. (Read more...) The post New PHP-based Ducktail infostealer is now after crypto wallets appeared first on Malwarebytes Labs.

CVE-2022-37598: [CVE-2022-37598]/ Prototype pollution found in ast.js · Issue #5699 · mishoo/UglifyJS

Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js.