‼ CVE-2020-14110 ‼
📖 Read
via "National Vulnerability Database".
AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0232 ‼
📖 Read
via "National Vulnerability Database".
The User Registration, Login & Landing Pages WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the loader_text parameter found in the ~/includes/templates/landing-page.php file which allows attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.2.7. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0093 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab allows a user with an expired password to access sensitive information through RSS feeds.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34406 ‼
📖 Read
via "National Vulnerability Database".
NVIDIA Tegra kernel driver contains a vulnerability in NVHost, where a specific race condition can lead to a null pointer dereference, which may lead to a system reboot.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46005 ‼
📖 Read
via "National Vulnerability Database".
Sourcecodester Car Rental Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via vehicalorcview parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-34401 ‼
📖 Read
via "National Vulnerability Database".
NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVGPU_IOCTL_CHANNEL_SET_ERROR_NOTIFIER, where improper access control may lead to code execution, compromised integrity, or denial of service.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41809 ‼
📖 Read
via "National Vulnerability Database".
SSRF vulnerability in M-Files Server products with versions before 22.1.11017.1, in a preview function allowed making queries from the server with certain document types referencing external entities.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0090 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab is configured in a way that it doesn't ignore replacement references with git sub-commands, allowing a malicious user to spoof the contents of their commits in the UI.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0172 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.3. Under certain conditions it was possible to bypass the IP restriction for public projects through GraphQL allowing unauthorised users to read titles of issues, merge requests and milestones.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46012 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0236 ‼
📖 Read
via "National Vulnerability Database".
The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4083 ‼
📖 Read
via "National Vulnerability Database".
A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0151 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not correctly handling requests to delete existing packages which could result in a Denial of Service under specific conditions.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0210 ‼
📖 Read
via "National Vulnerability Database".
The Random Banner WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the category parameter found in the ~/include/models/model.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 4.1.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22690 ‼
📖 Read
via "National Vulnerability Database".
Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22691 ‼
📖 Read
via "National Vulnerability Database".
The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-43353 ‼
📖 Read
via "National Vulnerability Database".
The Crisp Live Chat WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the crisp_plugin_settings_page function found in the ~/crisp.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 0.31.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0244 ‼
📖 Read
via "National Vulnerability Database".
An issue has been discovered in GitLab CE/EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group was due to incorrect handling of file.📖 Read
via "National Vulnerability Database".
❌ Cybercriminals Actively Target VMware vSphere with Cryptominers ❌
📖 Read
via "Threat Post".
VMware's container-based application development environment has become attractive to cyberattackers.📖 Read
via "Threat Post".
Threat Post
Cybercriminals Actively Target VMware vSphere with Cryptominers
VMware's container-based application development environment has become attractive to cyberattackers.
🕴 Europol Shuts Down Popular Cybercriminal VPN Service 🕴
📖 Read
via "Dark Reading".
VPNLab was used to support criminal activity, including ransomware campaigns and other attacks, Europol officials report.📖 Read
via "Dark Reading".
Dark Reading
Europol Shuts Down Popular Cybercriminal VPN Service
VPNLab was used to support criminal activity, including ransomware campaigns and other attacks, Europol officials report.
🦿 5 tools helping companies more effectively manage cybersecurity in 2022 🦿
📖 Read
via "Tech Republic".
As more companies focus on digital adoption goals in 2022, finding security tools to detect malicious activity is top-of-mind for executives.📖 Read
via "Tech Republic".
TechRepublic
5 tools helping companies more effectively manage cybersecurity in 2022
As more companies focus on digital adoption goals in 2022, finding security tools to detect malicious activity is top-of-mind for executives.