‼ CVE-2022-26148 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23345 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23349 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain a Cross-Site Request Forgery (CSRF).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23350 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain a cross-site scripting (XSS) vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23346 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to contain incorrect access control issues.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23348 ‼
📖 Read
via "National Vulnerability Database".
BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-38745 ‼
📖 Read
via "National Vulnerability Database".
Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40662 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46390 ‼
📖 Read
via "National Vulnerability Database".
An access control issue in the authentication module of Lexar_F35 v1.0.34 allows attackers to access sensitive data and cause a Denial of Service (DoS). An attacker without access to securely protected data on a secure USB flash drive can bypass user authentication without having any information related to the password of the registered user. The secure USB flash drive transmits the password entered by the user to the authentication module in the drive after the user registers a password, and then the input password is compared with the registered password stored in the authentication module. Subsequently, the module returns the comparison result for the authentication decision. Therefore, an attacker can bypass password authentication by analyzing the functions that return the password verification or comparison results and manipulate the authentication result values. Accordingly, even if attackers enter an incorrect password, they can be authenticated as a legitimate user and can therefore exploit functions of the secure USB flash drive by manipulating the authentication result values.📖 Read
via "National Vulnerability Database".
🕴 Binarly Coordinates Patches for 3 Firmware Flaws With Dell 🕴
📖 Read
via "Dark Reading".
The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.📖 Read
via "Dark Reading".
Dark Reading
Binarly Coordinates Patches for 3 Firmware Flaws With Dell
The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.
🛠 Adversary3 1.0 🛠
📖 Read
via "Packet Storm Security".
Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Adversary3 1.0 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
🤔1
❌ Brower-in-the-Browser Attack Makes Phishing Nearly Invisible ❌
📖 Read
via "Threat Post".
Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.📖 Read
via "Threat Post".
Threat Post
Brower-in-the-Browser Attack Makes Phishing Nearly Invisible
Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.
‼ CVE-2022-26283 ‼
📖 Read
via "National Vulnerability Database".
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the view_plan endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-26284 ‼
📖 Read
via "National Vulnerability Database".
Simple Client Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the manage_client endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-26183 ‼
📖 Read
via "National Vulnerability Database".
PNPM v6.15.1 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27607 ‼
📖 Read
via "National Vulnerability Database".
Bento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a related issue to CVE-2018-14531.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27090 ‼
📖 Read
via "National Vulnerability Database".
Cscms Music Portal System v4.2 was discovered to contain a redirection vulnerability via the backurl parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27333 ‼
📖 Read
via "National Vulnerability Database".
idcCMS v1.10 was discovered to contain an issue which allows attackers to arbitrarily delete the install.lock file, resulting in a reset of the CMS settings and data.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2022-26174 ‼
📖 Read
via "National Vulnerability Database".
A remote code execution (RCE) vulnerability in Beekeeper Studio v3.2.0 allows attackers to execute arbitrary code via a crafted payload injected into the display fields.📖 Read
via "National Vulnerability Database".
❤1
‼ CVE-2022-26285 ‼
📖 Read
via "National Vulnerability Database".
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the apply endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.📖 Read
via "National Vulnerability Database".
👏1
‼ CVE-2022-26184 ‼
📖 Read
via "National Vulnerability Database".
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.📖 Read
via "National Vulnerability Database".
❤2