ドローンの国家資格レベル4の飛行実現に向けた、ドローンの操縦免許の国家資格がこれから始まります。私も…
橋本環奈「もしかして、まだガラケーですか?」 佐藤二朗の反論に「爆笑した」
デジタル社会は日々進化し、ひと昔前では想像できなかったような新たなガジェットが誕生しています。 あま…
ARメガネNreal に純正 iOS / HDMIアダプタ。iPhoneやニンテンドースイッチ、PS5 / Xbox接続に対応
ARメガネのNrealが、iPhone や HDMI機器とも接続できる純正アクセサリ Nreal ア…
新PS5コントローラDualSense Edge発表。交換式スティックや背面ボタン、プロファイル切替え対応
ソニー・インタラクティブ・エンタテインメント(SIE)が、PlayStation 5用の新型コントロ…
[node-opcua] node-opcua DoS vulnerability via message with memory allocation that exceeds v8’s memory limit
The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit.
References
https://nvd.ni…
[asyncua] Uncontrolled Resource Consumption in asyncua and opcua
All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit …
[opcua] Uncontrolled Resource Consumption in opcua
The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an u…
[ansible-runner] ansible-runner 2.0.0 vulnerable to Race Condition
A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner’s private_data_dir the next time …
[ansible-runner] ansible-runner 2.0.0 default temporary files written to world R/W locations
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansibl…
[org.jenkins-ci.plugins:collabnet] RabbitMQ password stored in plain text by Jenkins CollabNet Plugins Plugin
Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
References
https://…