βΌ CVE-2022-21195 βΌ
π Read
via "National Vulnerability Database".
All versions of package url-regex are vulnerable to Regular Expression Denial of Service (ReDoS) which can cause the CPU usage to crash.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29434 βΌ
π Read
via "National Vulnerability Database".
Insecure Direct Object References (IDOR) vulnerability in Spiffy Plugins Spiffy Calendar <= 4.9.0 at WordPress allows an attacker to edit or delete events.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29448 βΌ
π Read
via "National Vulnerability Database".
Authenticated (admin or higher user role) Local File Inclusion (LFI) vulnerability in Wow-Company's Herd Effects plugin <= 5.2 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29427 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Aftab Muni's Disable Right Click For WP plugin <= 1.1.6 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29184 βΌ
π Read
via "National Vulnerability Database".
GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existing GoCD administration permissions to either create/edit (`hg`-based) configuration repositories; create/edit pipelines and their (`hg`-based) materials; or, where "pipelines-as-code" configuration repositories are used, to commit malicious configuration to such an external repository which will be automatically parsed into a pipeline configuration and (`hg`) material definition by the GoCD server. This issue is fixed in GoCD 22.1.0. As a workaround, users who do not use/rely upon Mercurial materials can uninstall/remove the `hg`/Mercurial binary from the underlying GoCD Server operating system or Docker image.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29425 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Scripting (XSS) vulnerability in WP Wham's Checkout Files Upload for WooCommerce plugin <= 2.1.2 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29194 βΌ
π Read
via "National Vulnerability Database".
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.DeleteSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2021-36833 βΌ
π Read
via "National Vulnerability Database".
Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in ibericode's MC4WP plugin <= 4.8.6 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29431 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in KubiQ CPT base plugin <= 5.8 at WordPress allows an attacker to delete the CPT base.π Read
via "National Vulnerability Database".
βΌ CVE-2022-28618 βΌ
π Read
via "National Vulnerability Database".
A command injection security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays and HPE Nimble Storage Secondary Flash Arrays that could allow an attacker to execute arbitrary commands on a Nimble appliance. HPE has made the following software updates to resolve the vulnerability in HPE Nimble Storage: 5.0.10.100 or later, 5.2.1.0 or later, 6.0.0.100 or later.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22972 βΌ
π Read
via "National Vulnerability Database".
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain an authentication bypass vulnerability affecting local domain users. A malicious actor with network access to the UI may be able to obtain administrative access without the need to authenticate.π Read
via "National Vulnerability Database".
βΌ CVE-2022-22973 βΌ
π Read
via "National Vulnerability Database".
VMware Workspace ONE Access and Identity Manager contain a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29426 βΌ
π Read
via "National Vulnerability Database".
Authenticated (contributor or higher user role) Reflected Cross-Site Scripting (XSS) vulnerability in 2J Slideshow Team's Slideshow, Image Slider by 2J plugin <= 1.3.54 at WordPress.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29185 βΌ
π Read
via "National Vulnerability Database".
totp-rs is a Rust library that permits the creation of 2FA authentification tokens per time-based one-time password (TOTP). Prior to version 1.1.0, token comparison was not constant time, and could theorically be used to guess value of an TOTP token, and thus reuse it in the same time window. The attacker would have to know the password beforehand nonetheless. Starting with patched version 1.1.0, the library uses constant-time comparison. There are currently no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2022-24434 βΌ
π Read
via "National Vulnerability Database".
This affects all versions of package dicer. A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29428 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Scripting (XSS) vulnerability in Muneeb's WP Slider Plugin <= 1.4.5 at WordPress.π Read
via "National Vulnerability Database".
β Microsoft patches the Patch Tuesday patch that broke authentication β
π Read
via "Naked Security".
Remember the good old days when security patches rarely needed patches? Because security patches themlelves were rare enough anyway?π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Mozilla patches Wednesdayβs Pwn2Own double-exploitβ¦ on Friday! β
π Read
via "Naked Security".
That was quick! 48 hours from exploit report to published patch.π Read
via "Naked Security".
Naked Security
Mozilla patches Wednesdayβs Pwn2Own double-exploitβ¦ on Friday!
That was quick! 48 hours from exploit report to published patch.
βΌ CVE-2022-29204 βΌ
π Read
via "National Vulnerability Database".
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative value would result in a `CHECK`-failure (assertion failure), as per TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29199 βΌ
π Read
via "National Vulnerability Database".
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LoadAndRemapMatrix does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `initializing_values` is a vector but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29197 βΌ
π Read
via "National Vulnerability Database".
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.π Read
via "National Vulnerability Database".