‼ CVE-2021-42780 ‼
📖 Read
via "National Vulnerability Database".
A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27525 ‼
📖 Read
via "National Vulnerability Database".
A malicious crafted .dwf file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current proces.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-20324 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in WildFly Elytron. A variation to the use of a session fixation exploit when using Undertow was found despite Undertow switching the session ID after authentication.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23976 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to reset all data (posts / pages / media).📖 Read
via "National Vulnerability Database".
👍1
🕴 Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps 🕴
📖 Read
via "Dark Reading".
IT departments must account for the business impact and security risks such applications introduce.📖 Read
via "Dark Reading".
Dark Reading
Why So Many Security Experts Are Concerned About Low-Code/No-Code Apps
IT departments must account for the business impact and security risks such applications introduce.
🕴 Security Lessons From a Payment Fraud Attack 🕴
📖 Read
via "Dark Reading".
Companies need to detect and counteract brute-force and enumeration attacks before fraudsters run away with their customers' funds.📖 Read
via "Dark Reading".
Dark Reading
Security Lessons From a Payment Fraud Attack
Companies need to detect and counteract brute-force and enumeration attacks before fraudsters run away with their customers' funds.
‼ CVE-2022-1091 ‼
📖 Read
via "National Vulnerability Database".
The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1088 ‼
📖 Read
via "National Vulnerability Database".
The Page Security & Membership WordPress plugin through 1.5.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1090 ‼
📖 Read
via "National Vulnerability Database".
The Good & Bad Comments WordPress plugin through 1.0.0 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0780 ‼
📖 Read
via "National Vulnerability Database".
The SearchIQ WordPress plugin before 3.9 contains a flag to disable the verification of CSRF nonces, granting unauthenticated attackers access to the siq_ajax AJAX action and allowing them to perform Cross-Site Scripting attacks due to the lack of sanitisation and escaping in the customCss parameter📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0737 ‼
📖 Read
via "National Vulnerability Database".
The Text Hover WordPress plugin before 4.2 does not sanitize and escape the text to hover, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0785 ‼
📖 Read
via "National Vulnerability Database".
The Daily Prayer Time WordPress plugin before 2022.03.01 does not sanitise and escape the month parameter before using it in a SQL statement via the get_monthly_timetable AJAX action (available to unauthenticated users), leading to an unauthenticated SQL injection📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0765 ‼
📖 Read
via "National Vulnerability Database".
The Loco Translate WordPress plugin before 2.6.1 does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0706 ‼
📖 Read
via "National Vulnerability Database".
The Easy Digital Downloads WordPress plugin before 2.11.6 does not sanitise and escape the Downloadable File Name in the Logs, which could allow high privilege users to perform Cross-Site Scripting attacks when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0707 ‼
📖 Read
via "National Vulnerability Database".
The Easy Digital Downloads WordPress plugin before 2.11.6 does not have CSRF check in place when inserting payment notes, which could allow attackers to make a logged admin insert arbitrary notes via a CSRF attack📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0661 ‼
📖 Read
via "National Vulnerability Database".
The Ad Injection WordPress plugin through 1.2.0.19 does not properly sanitize the body of the adverts injected into the pages, allowing a high privileged user (Admin+) to inject arbitrary HTML or javascript even with unfiltered_html disallowed, leading to a stored cross-site scripting (XSS) vulnerability. Further it is also possible to inject PHP code, leading to a Remote Code execution (RCE) vulnerability, even if the DISALLOW_FILE_EDIT and DISALLOW_FILE_MOD constants are both set.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1112 ‼
📖 Read
via "National Vulnerability Database".
The Autolinks WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, and does not sanitise as well as escape them, which could allow attackers to perform Stored Cross-Site scripting against a logged in admin via a CSRF attack📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0879 ‼
📖 Read
via "National Vulnerability Database".
The Caldera Forms WordPress plugin before 1.9.7 does not validate and escape the cf-api parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1020 ‼
📖 Read
via "National Vulnerability Database".
The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0994 ‼
📖 Read
via "National Vulnerability Database".
The Hummingbird WordPress plugin before 3.3.2 does not sanitise and escape the Config Name, which could allow high privilege users, such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-24863 ‼
📖 Read
via "National Vulnerability Database".
http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the "GET" method as a workaround.📖 Read
via "National Vulnerability Database".