Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud.
The coordinated law enforcement effort, dubbed Operation SIMCARTEL, saw 26 searches carried out, resulting in the arrest of seven suspects and the seizure of
A vulnerability, which was classified as critical, was found in MediaComm Zip-n-Go up to 4.94. This issue affects some unknown processing of the component File Handler. The manipulation results in memory corruption.
This vulnerability was named CVE-2018-16302. The attack needs to be approached locally. In addition, an exploit is available.
You should upgrade the affected component.
A vulnerability classified as critical was found in Zahir Accounting Enterprise Plus up to 10b. This vulnerability affects unknown code of the component CSV File Handler. Such manipulation leads to memory corruption.
This vulnerability is traded as CVE-2018-17408. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability marked as critical has been reported in Zoho ManageEngine ADManager Plus up to 6.6. Affected by this issue is some unknown functionality of the component Directory Permission. Performing manipulation results in incorrect permission assignment.
This vulnerability was named CVE-2018-19374. The attack needs to be approached locally. In addition, an exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in WebLog Expert Web Server Enterprise 9.4. Impacted is an unknown function of the file Expert\WebServer\WebServer.cfg of the component Permission. Performing manipulation results in improper access controls.
This vulnerability is cataloged as CVE-2018-7581. The attack must be initiated from a local position. Furthermore, there is an exploit available.
A vulnerability has been found in WindScribe up to 1.81 and classified as critical. This affects an unknown function of the file WindScribeService.exe of the component VPN. The manipulation of the argument lpCommandLine as part of Named Pipe leads to improper input validation.
This vulnerability is uniquely identified as CVE-2018-11479. Local access is required to approach this attack. Moreover, an exploit is present.
A vulnerability marked as problematic has been reported in Cisco Webex Meetings Desktop App on Windows. Affected is an unknown function of the component Update Service. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2018-15442. Local access is required to approach this attack. Moreover, an exploit is present.
It is suggested to upgrade the affected component.
A vulnerability has been found in F5 BIG-IP up to 13.0.0/13.1.0.3 and classified as critical. Affected is an unknown function of the component TMUI. This manipulation causes improper access controls.
This vulnerability appears as CVE-2018-5511. The attack may be initiated remotely. In addition, an exploit is available.
The affected component should be upgraded.
A vulnerability was found in Linux Kernel up to 5.19.3 and classified as critical. Impacted is the function dsa_tree_change_tag_proto of the file /sys/class/net/eno2/dsa/tagging. Executing manipulation can lead to null pointer dereference.
This vulnerability appears as CVE-2022-50063. The attacker needs to be present on the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.19.3 and classified as critical. This impacts the function virtblk_init_hctx. Such manipulation leads to use after free.
This vulnerability is listed as CVE-2022-50064. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.62/5.19.3. It has been declared as critical. Affected is an unknown function of the component octeontx2-af. Such manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2022-50060. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.19.3 and classified as critical. This affects the function of_parse_phandle of the component pinctrl. This manipulation causes improper update of reference count.
This vulnerability is tracked as CVE-2022-50061. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability classified as critical was found in Linux Kernel up to 5.4.210/5.10.137/5.15.62/5.19.3. The impacted element is the function netdev_sent_queue in the library lib/dynamic_queue_limits.c. Executing manipulation can lead to stack-based buffer overflow.
This vulnerability is tracked as CVE-2022-50062. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 5.19.3. It has been classified as critical. This impacts the function vdpa_sim_blk. This manipulation causes null pointer dereference.
This vulnerability appears as CVE-2022-50058. The attacker needs to be present on the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.15.62/5.19.3. The affected element is the function ntfs_fill_super of the component ntfs3. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2022-50057. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 5.19.3. Affected is the function iavf_get_link_ksettings. Executing manipulation can lead to null pointer dereference.
This vulnerability is tracked as CVE-2022-50054. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.