‼ CVE-2022-0364 ‼
📖 Read
via "National Vulnerability Database".
The Modern Events Calendar Lite WordPress plugin before 6.4.0 does not sanitize and escape some of the Hourly Schedule parameters which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0591 ‼
📖 Read
via "National Vulnerability Database".
The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24235 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in the management portal of Snapt Aria v12.8 allows attackers to escalate privileges and execute arbitrary code via unspecified vectors.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0590 ‼
📖 Read
via "National Vulnerability Database".
The BulletProof Security WordPress plugin before 5.8 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0687 ‼
📖 Read
via "National Vulnerability Database".
The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24237 ‼
📖 Read
via "National Vulnerability Database".
The snaptPowered2 component of Snapt Aria v12.8 was discovered to contain a command injection vulnerability. This vulnerability allows authenticated attackers to execute arbitrary commands.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0628 ‼
📖 Read
via "National Vulnerability Database".
The Mega Menu WordPress plugin before 3.0.8 does not sanitize and escape the _wpnonce parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0616 ‼
📖 Read
via "National Vulnerability Database".
The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0515 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in GitHub repository crater-invoice/crater prior to 6.0.4.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0640 ‼
📖 Read
via "National Vulnerability Database".
The Pricing Table Builder WordPress plugin before 1.1.5 does not sanitize and escape the postid parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24236 ‼
📖 Read
via "National Vulnerability Database".
An insecure permissions vulnerability in Snapt Aria v12.8 allows unauthenticated attackers to send e-mails from spoofed users' accounts.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24766 ‼
📖 Read
via "National Vulnerability Database".
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless mitmproxy is used to protect an HTTP/1 service, no action is required. The vulnerability has been fixed in mitmproxy 8.0.0 and above. There are currently no known workarounds.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0694 ‼
📖 Read
via "National Vulnerability Database".
The Advanced Booking Calendar WordPress plugin before 1.7.0 does not validate and escape the calendar parameter before using it in a SQL statement via the abc_booking_getSingleCalendar AJAX action (available to both unauthenticated and authenticated users), leading to an unauthenticated SQL injection📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0747 ‼
📖 Read
via "National Vulnerability Database".
The Infographic Maker WordPress plugin before 4.3.8 does not validate and escape the post_id parameter before using it in a SQL statement via the qcld_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0514 ‼
📖 Read
via "National Vulnerability Database".
Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0760 ‼
📖 Read
via "National Vulnerability Database".
The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0229 ‼
📖 Read
via "National Vulnerability Database".
The miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25019 ‼
📖 Read
via "National Vulnerability Database".
The SEO Plugin by Squirrly SEO WordPress plugin before 11.1.12 does not escape the type parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24775 ‼
📖 Read
via "National Vulnerability Database".
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24905 ‼
📖 Read
via "National Vulnerability Database".
The Advanced Contact form 7 DB WordPress plugin before 1.8.7 does not have authorisation nor CSRF checks in the acf7_db_edit_scr_file_delete AJAX action, and does not validate the file to be deleted, allowing any authenticated user to delete arbitrary files on the web server. For example, removing the wp-config.php allows attackers to trigger WordPress setup again, gain administrator privileges and execute arbitrary code or display arbitrary content to the users.📖 Read
via "National Vulnerability Database".
🕴 White House Warns of New Intel on Russia Mulling Cyberattack 'Options' Against US 🕴
📖 Read
via "Dark Reading".
Biden administration doubles down on its previous warnings of possible Russian cyberattacks in the wake of hefty economic sanctions imposed on Russia by the US.📖 Read
via "Dark Reading".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading