Security
Headlines
HeadlinesLatestCVEs

Search

lenovo warranty check/lookup | check warranty status | lenovo support us

Found 10000 results in 61 ms.

CVE-2021-40908: CVE-nu11secur1ty/vendors/oretnom23/CVE-nu11-09 at main · nu11secur1ty/CVE-nu11secur1ty

SQL injection vulnerability in Login.php in Sourcecodester Purchase Order Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter.

CVE
#sql#vulnerability#js#git
CVE-2022-0332: 2043661 – (CVE-2022-0332, MSA-22-0001) CVE-2022-0332 moodle: SQL injection risk in code fetching h5p activity user attempts

A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.

Signal is testing usernames so you don’t have to share your phone number

The Signal messaging service is testing support for usernames as a replacement for phone numbers to serve as user identities

GHSA-9x4h-8wgm-8xfg: Malformed CAR panics and excessive memory usage

### Impact **Versions impacted** * `<=` [email protected] * `<=` [email protected] **Description** Decoding CAR data from untrusted user input can cause: - Panics: - Out of bound memory access - Out of memory - Divide by zero - Excessive memory usage Such panics can be triggered by intentionally malformed CARv1 data, including CARv1 data within a CARv2 container; and also CARv2 data with excessively large indexes. These vulnerabilities are not known to be exploited in the wild and were discovered primarily with the use of code fuzzing tooling. **Details** **Out of bound memory access** (OOB), **out of memory** (OOM) panics or **excessive memory usage** can be triggered by decode of malformed CARv1 headers, malformed CARv1 sections, and malformed CIDv0 data used in CARv1 sections. This also applies to CARv1 data within a CARv2 container. Additionally, we wish to use this security advisory to make clear to consumers of CARv2 format data that **loading CARv2 indexes from untrus...

CVE-2022-4410: Changeset 2833667 for permalink-manager – WordPress Plugin Repository

The Permalink Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including 2.2.20.3 due to improper output escaping on post/page/media titles. This makes it possible for attackers to inject arbitrary web scripts on the permalink-manager page if another plugin or theme is installed on the site that allows lower privileged users with unfiltered_html the ability to modify post/page titles with malicious web scripts.

CVE-2021-41487

NOKIA VitalSuite SPM 2020 is affected by SQL injection through UserName'.

CVE-2023-23907: TALOS-2023-1702 || Cisco Talos Intelligence Group

A directory traversal vulnerability exists in the server.js start functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability.

CVE-2021-3929: hw/nvme: fix CVE-2021-3929 (736b0164) · Commits · QEMU / QEMU · GitLab

A DMA reentrancy issue was found in the NVM Express Controller (NVME) emulation in QEMU. This CVE is similar to CVE-2021-3750 and, just like it, when the reentrancy write triggers the reset function nvme_ctrl_reset(), data structs will be freed leading to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition or, potentially, executing arbitrary code within the context of the QEMU process on the host.

Beware Twitter Messages claiming “Your blue badge Twitter account has been reviewed as spam”

Scammers are targeting high-value verified accounts using sneaky Messages from other verified accounts, and realistic phishing sites. The post Beware Twitter Messages claiming “Your blue badge Twitter account has been reviewed as spam” appeared first on Malwarebytes Labs.

CVE-2005-2224: 404 Error

aspnet_wp.exe in Microsoft ASP.NET web services allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a crafted SOAP message to an RPC/Encoded method.