Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31017PUBLISHED: 2022-06-25
Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the serve...
CVE-2022-31016PUBLISHED: 2022-06-25
Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated A...
CVE-2022-24893PUBLISHED: 2022-06-25
ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can resul...
CVE-2022-29168PUBLISHED: 2022-06-25
Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascript execution via insufficient escaping when rendering `@mentions` in the wire-webapp. If a user receives and views a malicious message, arbitrary code is injected and executed in the context of the victim allowi...
CVE-2019-25071PUBLISHED: 2022-06-25
** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declared as critical. Affected by this vulnerability is Siri. Playing an audio or video file might be able to initiate Siri on the same device which makes it possible to execute commands remotely. Exploit details have...
User Rank: Apprentice
10/30/2015 | 12:53:19 PM
Considering the continuous investment made by China into its cyberspace critical infrastructures, the relevant PLA Units, the mighty Cyberspace Administration of China and the volume of cyberattacks reportedly from Peking as a pipeline of inputs for its civil and military industry, I can't see how China could stop conducting its policy of cyberattacks against the cornucopia of highly sensitive sectorial innovations and global market shares represented by America (and its Western partners).
As a sort of provisional memorandum of agreement, Chinese cyberspying networks might go dormant during a while and would then resurface within a few months because the economic gain is too high as a matter of survival for the hyperpower that China has now become in its partner-competitor relationship with USA, the other hyperpower.
The ThreatConnect-DGI report about the trade in the South China Sea and the deep interest of the Naikon Group in close connection with the region via its intrusion intothe Netherlands-based Permanent Court of Arbitration tribunal provides the reader with some elements of a lucid analysis with regard to current diplomatic, military and economic topics.
Best regards,
Xavier Alfonsi
Analyst in naval and naval aviation affairs and in cyberdefense in Asia-Pacific from original sources in Chinese