Vulnerability Updates

National Cyber Awareness System's Weekly Bulletins For The Month

CERT Vulnerability Notes

National Vulnerability Database

  • CVE-2021-40597: The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.
  • CVE-2022-30467: Joy ebike Wolf Manufacturing year 2022 is vulnerable to Denial of service, which allows remote attackers to jam the key fob request via RF.
  • CVE-2022-33061: Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_service.
  • CVE-2022-33060: Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_schedule.
  • CVE-2022-33057: Online Railway Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_reservation.
Symantec Vulnerabilities List An error occurred while parsing your RSS feed. Check that it’s a valid XML file.

Packet Storm’s Apple Vulnerability List

  • Apple Security Advisory 2022-05-16-8: Apple Security Advisory 2022-05-16-8 – Xcode 13.4 addresses a logic issue and a privilege escalation issue.
  • Apple Security Advisory 2022-05-16-7: Apple Security Advisory 2022-05-16-7 – Safari 15.5 addresses code execution and use-after-free vulnerabilities.
  • Apple Security Advisory 2022-05-16-6: Apple Security Advisory 2022-05-16-6 – tvOS 15.5 addresses bypass, code execution, integer overflow, out of bounds access, out of bounds write, and use-after-free vulnerabilities.
  • Apple Security Advisory 2022-05-16-5: Apple Security Advisory 2022-05-16-5 – watchOS 8.6 addresses bypass, code execution, integer overflow, out of bounds access, out of bounds write, and use-after-free vulnerabilities.
  • Apple Security Advisory 2022-05-16-4: Apple Security Advisory 2022-05-16-4 – Security Update 2022-004 Catalina addresses bypass, code execution, denial of service, integer overflow, out of bounds access, out of bounds read, out of bounds …

Packet Storm’s Windows Vulnerability List