‼ CVE-2022-0760 ‼
📖 Read
via "National Vulnerability Database".
The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0229 ‼
📖 Read
via "National Vulnerability Database".
The miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25019 ‼
📖 Read
via "National Vulnerability Database".
The SEO Plugin by Squirrly SEO WordPress plugin before 11.1.12 does not escape the type parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24775 ‼
📖 Read
via "National Vulnerability Database".
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-24905 ‼
📖 Read
via "National Vulnerability Database".
The Advanced Contact form 7 DB WordPress plugin before 1.8.7 does not have authorisation nor CSRF checks in the acf7_db_edit_scr_file_delete AJAX action, and does not validate the file to be deleted, allowing any authenticated user to delete arbitrary files on the web server. For example, removing the wp-config.php allows attackers to trigger WordPress setup again, gain administrator privileges and execute arbitrary code or display arbitrary content to the users.📖 Read
via "National Vulnerability Database".
🕴 White House Warns of New Intel on Russia Mulling Cyberattack 'Options' Against US 🕴
📖 Read
via "Dark Reading".
Biden administration doubles down on its previous warnings of possible Russian cyberattacks in the wake of hefty economic sanctions imposed on Russia by the US.📖 Read
via "Dark Reading".
Dark Reading
Cyber Risk recent news | Dark Reading
Explore the latest news and expert commentary on Cyber Risk, brought to you by the editors of Dark Reading
🕴 'Unique Attack Chain' Drops Backdoor in New Phishing Campaign 🕴
📖 Read
via "Dark Reading".
A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.📖 Read
via "Dark Reading".
Dark Reading
'Unique Attack Chain' Drops Backdoor in New Phishing Campaign
A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.
‼ CVE-2022-23347 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23352 ‼
📖 Read
via "National Vulnerability Database".
An issue in BigAnt Software BigAnt Server v5.6.06 can lead to a Denial of Service (DoS).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-26148 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23345 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23349 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain a Cross-Site Request Forgery (CSRF).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23350 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23346 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control issues.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23348 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-38745 ‼
📖 Read
via "National Vulnerability Database".
Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40662 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46390 ‼
📖 Read
via "National Vulnerability Database".
An access control issue in the authentication module of Lexar_F35 v1.0.34 allows attackers to access sensitive data and cause a Denial of Service (DoS). An attacker without access to securely protected data on a secure USB flash drive can bypass user authentication without having any information related to the password of the registered user. The secure USB flash drive transmits the password entered by the user to the authentication module in the drive after the user registers a password, and then the input password is compared with the registered password stored in the authentication module. Subsequently, the module returns the comparison result for the authentication decision. Therefore, an attacker can bypass password authentication by analyzing the functions that return the password verification or comparison results and manipulate the authentication result values. Accordingly, even if attackers enter an incorrect password, they can be authenticated as a legitimate user and can therefore exploit functions of the secure USB flash drive by manipulating the authentication result values.📖 Read
via "National Vulnerability Database".
🕴 Binarly Coordinates Patches for 3 Firmware Flaws With Dell 🕴
📖 Read
via "Dark Reading".
The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.📖 Read
via "Dark Reading".
Dark Reading
Binarly Coordinates Patches for 3 Firmware Flaws With Dell
The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.
🛠 Adversary3 1.0 🛠
📖 Read
via "Packet Storm Security".
Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Adversary3 1.0 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🤔1
❌ Brower-in-the-Browser Attack Makes Phishing Nearly Invisible ❌
📖 Read
via "Threat Post".
Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.📖 Read
via "Threat Post".
Threat Post
Brower-in-the-Browser Attack Makes Phishing Nearly Invisible
Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.