‼ CVE-2021-24795 ‼
📖 Read
via "National Vulnerability Database".
The Filter Portfolio Gallery WordPress plugin through 1.5 is lacking Cross-Site Request Forgery (CSRF) check when deleting a Gallery, which could allow attackers to make a logged in admin delete arbitrary Gallery.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24951 ‼
📖 Read
via "National Vulnerability Database".
The LearnPress WordPress plugin before 4.1.4 does not sanitise, validate and escape the id parameter before using it in SQL statements when duplicating course/lesson/quiz/question, leading to SQL Injections issues📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24859 ‼
📖 Read
via "National Vulnerability Database".
The User Meta Shortcodes WordPress plugin through 0.5 registers a shortcode that allows any user with a role as low as contributor to access other users metadata by specifying the user login as a parameter. This makes the WP instance vulnerable to data extrafiltration, including password hashes📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24972 ‼
📖 Read
via "National Vulnerability Database".
The Pixel Cat WordPress plugin before 2.6.3 does not escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24790 ‼
📖 Read
via "National Vulnerability Database".
The Contact Form Advanced Database WordPress plugin through 1.0.8 does not have any authorisation as well as CSRF checks in its delete_cf7_data and export_cf7_data AJAX actions, available to any authenticated users, which could allow users with a role as low as subscriber to call them. The delete_cf7_data would lead to arbitrary metadata deletion, as well as PHP Object Injection if a suitable gadget chain is present in another plugin, as user data is passed to the maybe_unserialize() function without being first validated.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24780 ‼
📖 Read
via "National Vulnerability Database".
The Single Post Exporter WordPress plugin through 1.1.1 does not have CSRF checks when saving its settings, which could allow attackers to make a logged in admin change them via a CSRF attack and give access to the export feature to any role such as subscriber. Subscriber users would then be able to export an arbitrary post/page (such as private and password protected) via a direct URL📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24818 ‼
📖 Read
via "National Vulnerability Database".
The WP Limits WordPress plugin through 1.0 does not have CSRF check when saving its settings, allowing attacker to make a logged in admin change them, which could make the blog unstable by setting low values📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24705 ‼
📖 Read
via "National Vulnerability Database".
The NEX-Forms WordPress plugin through 7.9.4 does not escape some of its settings and form fields before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42546 ‼
📖 Read
via "National Vulnerability Database".
Insufficient Input Validation in the search functionality of Wordpress plugin Use-Your-Drive prior to 1.18.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24932 ‼
📖 Read
via "National Vulnerability Database".
The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.3 does not sanitise and escape the post_id parameter before outputting back in an admin page within a JS block, leading to a Reflected Cross-Site Scripting issue.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24955 ‼
📖 Read
via "National Vulnerability Database".
The User Registration, Login Form, User Profile & Membership WordPress plugin before 3.2.3 does not escape the data parameter of the pp_get_forms_by_builder_type AJAX action before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42547 ‼
📖 Read
via "National Vulnerability Database".
Insufficient Input Validation in the search functionality of Wordpress plugin Out-of-the-Box prior to 1.20.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24817 ‼
📖 Read
via "National Vulnerability Database".
The Ultimate NoFollow WordPress plugin through 1.4.8 does not sanitise and escape the href attribute of its shortcodes, allowing users with a role as low as contributor to perform Cross-Site Scripting attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24857 ‼
📖 Read
via "National Vulnerability Database".
The ToTop Link WordPress plugin through 1.7.1 passes base64 encoded user input to the unserialize() PHP function, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24836 ‼
📖 Read
via "National Vulnerability Database".
The Temporary Login Without Password WordPress plugin before 1.7.1 does not have authorisation and CSRF checks when updating its settings, which could allows any logged-in users, such as subscribers to update them📖 Read
via "National Vulnerability Database".
🗓️ Zero-day vulnerability in Hillrom cardiology devices could allow attackers full control 🗓️
📖 Read
via "The Daily Swig".
Security flaw will be addressed in the next release📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Zero-day vulnerability in Hillrom cardiology devices could allow attackers full control
Security flaw will be addressed in the next release
🕴 Why Cloud Service Providers Are a Single Point of Failure 🕴
📖 Read
via "Dark Reading".
In a matter of days, a large-scale outage of cloud and other online services could cause $15 billion in losses.📖 Read
via "Dark Reading".
Dark Reading
Why Cloud Service Providers Are a Single Point of Failure
In a matter of days, a large-scale outage of cloud and other online services could cause $15 billion in losses.
🕴 Why the Private Sector Is Key to Stopping Russian Hacking Group APT29 🕴
📖 Read
via "Dark Reading".
Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy.📖 Read
via "Dark Reading".
Dark Reading
Why the Private Sector Is Key to Stopping Russian Hacking Group APT29
Left unchecked, these attacks could have devastating effects on government and military secrets and jeopardize the software supply chain and the global economy.
👍1
‼ CVE-2021-36169 ‼
📖 Read
via "National Vulnerability Database".
A Hidden Functionality in Fortinet FortiOS 7.x before 7.0.1, FortiOS 6.4.x before 6.4.7 allows attacker to Execute unauthorized code or commands via specific hex read/write operations.📖 Read
via "National Vulnerability Database".
🛠 Zed Attack Proxy 2.11.1 Cross Platform Package 🛠
📖 Read
via "Packet Storm Security".
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Zed Attack Proxy 2.11.1 Cross Platform Package ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🕴 2 Website Threats to Address for the Holiday Shopping Rush 🕴
📖 Read
via "Dark Reading".
Some tips for effectively combating Web supply chain attacks and customer hijacking via browser extensions.📖 Read
via "Dark Reading".
Dark Reading
2 Website Threats to Address for the Holiday Shopping Rush
Some tips for effectively combating Web supply chain attacks and customer hijacking via browser extensions.
👍1