‼ CVE-2022-24226 ‼
📖 Read
via "National Vulnerability Database".
Hospital Management System v4.0 was discovered to contain a blind SQL injection vulnerability via the register function in func2.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24590 ‼
📖 Read
via "National Vulnerability Database".
A stored cross-site scripting (XSS) vulnerability in the Add Link function of BackdropCMS v1.21.1 allows attackers to execute arbitrary web scripts or HTML.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24588 ‼
📖 Read
via "National Vulnerability Database".
Flatpress v1.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability in the Upload SVG File function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-21698 ‼
📖 Read
via "National Vulnerability Database".
client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23604 ‼
📖 Read
via "National Vulnerability Database".
x26-Cogs is a repository of cogs made by Twentysix for the Red Discord bot. Among these cogs is the Defender cog, a tool for Discord server moderation. A vulnerability in the Defender cog prior to version 1.10.0 allows users with admin privileges to issue commands as other users who share the same server. If a bot owner shares the same server as the attacker, it is possible for the attacker to issue bot-owner restricted commands. The issue has been patched in version 1.10.0. One may unload the Defender cog as a workaround.📖 Read
via "National Vulnerability Database".
🕴 3 Critical Software Development Security Trends and Best Practices 🕴
📖 Read
via "Dark Reading".
Organizations should focus on proactive, development-based approaches to security.📖 Read
via "Dark Reading".
Dark Reading
3 Critical Software Development Security Trends and Best Practices
Organizations should focus on proactive, development-based approaches to security.
❌ Chrome Zero-Day Under Active Attack: Patch ASAP ❌
📖 Read
via "Threat Post".
The year's 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems.📖 Read
via "Threat Post".
Threat Post
Chrome Zero-Day Under Active Attack: Patch ASAP
The year's 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems.
🕴 The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability 🕴
📖 Read
via "Dark Reading".
A rogue help-desk employee could gain access to user accounts through unauthorized password resets. It's time to bring zero trust to the help desk.📖 Read
via "Dark Reading".
Dark Reading
The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability
A rogue help-desk employee could gain access to user accounts through unauthorized password resets. It's time to bring zero trust to the help desk.
‼ CVE-2022-25200 ‼
📖 Read
via "National Vulnerability Database".
A cross-site request forgery (CSRF) vulnerability in Jenkins Checkmarx Plugin 2022.1.2 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25195 ‼
📖 Read
via "National Vulnerability Database".
A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-22770 ‼
📖 Read
via "National Vulnerability Database".
The Web Server component of TIBCO Software Inc.'s TIBCO AuditSafe contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to execute API methods on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO AuditSafe: versions 1.1.0 and below.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25208 ‼
📖 Read
via "National Vulnerability Database".
A missing permission check in Jenkins Chef Sinatra Plugin 1.20 and earlier allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse an XML response.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25191 ‼
📖 Read
via "National Vulnerability Database".
Jenkins Agent Server Parameter Plugin 1.0 and earlier does not escape parameter names of agent server parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25210 ‼
📖 Read
via "National Vulnerability Database".
Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25197 ‼
📖 Read
via "National Vulnerability Database".
Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25196 ‼
📖 Read
via "National Vulnerability Database".
Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP Referer header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25178 ‼
📖 Read
via "National Vulnerability Database".
Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25198 ‼
📖 Read
via "National Vulnerability Database".
A cross-site request forgery (CSRF) vulnerability in Jenkins SCP publisher Plugin 1.8 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25187 ‼
📖 Read
via "National Vulnerability Database".
Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25211 ‼
📖 Read
via "National Vulnerability Database".
A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server using attacker-specified credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25179 ‼
📖 Read
via "National Vulnerability Database".
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.📖 Read
via "National Vulnerability Database".