‼ CVE-2021-3503 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3624 ‼
📖 Read
via "National Vulnerability Database".
There is an integer overflow vulnerability in dcraw. When the victim runs dcraw with a maliciously crafted X3F input image, arbitrary code may be executed in the victim's system.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28635 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sedge() seh->facet().📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3681 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42780 ‼
📖 Read
via "National Vulnerability Database".
A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27525 ‼
📖 Read
via "National Vulnerability Database".
A malicious crafted .dwf file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current proces.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-20324 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in WildFly Elytron. A variation to the use of a session fixation exploit when using Undertow was found despite Undertow switching the session ID after authentication.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23976 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media).📖 Read
via "National Vulnerability Database".
👍1
🕴 Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps 🕴
📖 Read
via "Dark Reading".
IT departments must account for the business impact and security risks such applications introduce.📖 Read
via "Dark Reading".
Dark Reading
Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps
IT departments must account for the business impact and security risks such applications introduce.
🕴 Security Lessons From a Payment Fraud Attack 🕴
📖 Read
via "Dark Reading".
Companies need to detect and counteract brute-force and enumeration attacks before fraudsters run away with their customers' funds.📖 Read
via "Dark Reading".
Dark Reading
Security Lessons From a Payment Fraud Attack
Companies need to detect and counteract brute-force and enumeration attacks before fraudsters run away with their customers' funds.
‼ CVE-2022-1091 ‼
📖 Read
via "National Vulnerability Database".
The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1088 ‼
📖 Read
via "National Vulnerability Database".
The Page Security & Membership WordPress plugin through 1.5.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1090 ‼
📖 Read
via "National Vulnerability Database".
The Good & Bad Comments WordPress plugin through 1.0.0 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0780 ‼
📖 Read
via "National Vulnerability Database".
The SearchIQ WordPress plugin before 3.9 contains a flag to disable the verification of CSRF nonces, granting unauthenticated attackers access to the siq_ajax AJAX action and allowing them to perform Cross-Site Scripting attacks due to the lack of sanitisation and escaping in the customCss parameter📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0737 ‼
📖 Read
via "National Vulnerability Database".
The Text Hover WordPress plugin before 4.2 does not sanitize and escape the text to hover, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0785 ‼
📖 Read
via "National Vulnerability Database".
The Daily Prayer Time WordPress plugin before 2022.03.01 does not sanitise and escape the month parameter before using it in a SQL statement via the get_monthly_timetable AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0765 ‼
📖 Read
via "National Vulnerability Database".
The Loco Translate WordPress plugin before 2.6.1 does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0706 ‼
📖 Read
via "National Vulnerability Database".
The Easy Digital Downloads WordPress plugin before 2.11.6 does not sanitise and escape the Downloadable File Name in the Logs, which could allow high privilege users to perform Cross-Site Scripting attacks when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0707 ‼
📖 Read
via "National Vulnerability Database".
The Easy Digital Downloads WordPress plugin before 2.11.6 does not have CSRF check in place when inserting payment notes, which could allow attackers to make a logged admin insert arbitrary notes via a CSRF attack📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0661 ‼
📖 Read
via "National Vulnerability Database".
The Ad Injection WordPress plugin through 1.2.0.19 does not properly sanitize the body of the adverts injected into the pages, allowing a high privileged user (Admin+) to inject arbitrary HTML or javascript even with unfiltered_html disallowed, leading to a stored cross-site scripting (XSS) vulnerability. Further it is also possible to inject PHP code, leading to a Remote Code execution (RCE) vulnerability, even if the DISALLOW_FILE_EDIT and DISALLOW_FILE_MOD constants are both set.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1112 ‼
📖 Read
via "National Vulnerability Database".
The Autolinks WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, and does not sanitise as well as escape them, which could allow attackers to perform Stored Cross-Site scripting against a logged in admin via a CSRF attack📖 Read
via "National Vulnerability Database".