🛠Samhain File Integrity Checker 4.4.8 ðŸ›
📖 Read
via "Packet Storm Security".
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.📖 Read
via "Packet Storm Security".
Packetstormsecurity
Samhain File Integrity Checker 4.4.8 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
‼ CVE-2022-28054 ‼
📖 Read
via "National Vulnerability Database".
Improper sanitization of trigger action scripts in VanDyke Software VShell for Windows v4.6.2 allows attackers to execute arbitrary code via a crafted value.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28056 ‼
📖 Read
via "National Vulnerability Database".
ShopXO v2.2.5 and below was discovered to contain a system re-install vulnerability via the Add function in app/install/controller/Index.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27466 ‼
📖 Read
via "National Vulnerability Database".
MCMS v5.2.27 was discovered to contain a SQL injection vulnerability in the orderBy parameter at /dict/list.do.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28573 ‼
📖 Read
via "National Vulnerability Database".
D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetNTPserverSeting. This vulnerability allows attackers to execute arbitrary commands via the system_time_timezone parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-32500 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27982 ‼
📖 Read
via "National Vulnerability Database".
RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain a remote code execution (RCE) vulnerability via the fileName parameter at /guest_auth/cfg/upLoadCfg.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27983 ‼
📖 Read
via "National Vulnerability Database".
RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain an arbitrary file read vulnerability via the url parameter in check.php.📖 Read
via "National Vulnerability Database".
🕴 Name That Edge Toon: Flower Power 🕴
📖 Read
via "Dark Reading".
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.📖 Read
via "Dark Reading".
Dark Reading
Name That Edge Toon: Flower Power
Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
🕴 6 Best Practices to Ensure Kubernetes Security Meets Compliance Regulations 🕴
📖 Read
via "Dark Reading".
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.📖 Read
via "Dark Reading".
Dark Reading
6 Best Practices to Ensure Kubernetes Security Meets Compliance Regulations
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
‼ CVE-2021-25102 ‼
📖 Read
via "National Vulnerability Database".
The All In One WP Security & Firewall WordPress plugin before 4.4.11 does not validate, sanitise and escape the redirect_to parameter before using it to redirect user, either via a Location header, or meta url attribute, when the Rename Login Page is active, which could lead to an Arbitrary Redirect as well as Cross-Site Scripting issue. Exploitation of this issue requires the Login Page URL value to be known, which should be hard to guess, reducing the risk📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0783 ‼
📖 Read
via "National Vulnerability Database".
The Multiple Shipping Address Woocommerce WordPress plugin before 2.0 does not properly sanitise and escape numerous parameters before using them in SQL statements via some AJAX actions available to unauthenticated users, leading to unauthenticated SQL injections📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1250 ‼
📖 Read
via "National Vulnerability Database".
The LifterLMS PayPal WordPress plugin before 1.4.0 does not sanitise and escape some parameters from the payment confirmation page before outputting them back in the page, leading to a Reflected Cross-Site Scripting issue📖 Read
via "National Vulnerability Database".
‼ CVE-2021-29859 ‼
📖 Read
via "National Vulnerability Database".
IBM ICP4A - User Management System Component (IBM Cloud Pak for Business Automation V21.0.3 through V21.0.3-IF008, V21.0.2 through V21.0.2-IF009, and V21.0.1 through V21.0.1-IF007) could allow a user with physical access to the system to perform unauthorized actions or obtain sensitive information due to insufficient validation and recvocation another user logouting out. IBM X-Force ID: 206081.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-25002 ‼
📖 Read
via "National Vulnerability Database".
The Tipsacarrier WordPress plugin through 1.4.4.2 does not have any authorisation check in place some functions, which could allow unauthenticated users to access Orders data which could be used to retrieve the client full address, name and phone via tracking URL📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0649 ‼
📖 Read
via "National Vulnerability Database".
The AdRotate WordPress plugin before 5.8.23 does not escape Group Names, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0418 ‼
📖 Read
via "National Vulnerability Database".
The Event List WordPress plugin before 0.8.8 does not sanitise and escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks against other admin even when the unfiltered_html is disallowed📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1239 ‼
📖 Read
via "National Vulnerability Database".
The HubSpot WordPress plugin before 8.8.15 does not validate the proxy URL given to the proxy REST endpoint, which could allow users with the edit_posts capability (by default contributor and above) to perform SSRF attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1282 ‼
📖 Read
via "National Vulnerability Database".
The Photo Gallery by 10Web WordPress plugin before 1.6.3 does not properly sanitize the $_GET['image_url'] variable, which is reflected back to the users when executing the editimage_bwg AJAX action.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0771 ‼
📖 Read
via "National Vulnerability Database".
The SiteSuperCharger WordPress plugin before 5.2.0 does not validate, sanitise and escape various user inputs before using them in SQL statements via AJAX actions (available to both unauthenticated and authenticated users), leading to Unauthenticated SQL Injections📖 Read
via "National Vulnerability Database".
‼ CVE-2022-0662 ‼
📖 Read
via "National Vulnerability Database".
The AdRotate WordPress plugin before 5.8.23 does not sanitise and escape Advert Names which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed📖 Read
via "National Vulnerability Database".