βΌ CVE-2022-28999 βΌ
π Read
via "National Vulnerability Database".
Insecure permissions in the install directories and binaries of Dev-CPP v4.9.9.2 allows attackers to execute arbitrary code via overwriting the binary devcpp.exe.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29002 βΌ
π Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) in XXL-Job v2.3.0 allows attackers to arbitrarily create administrator accounts via the component /gaia-job-admin/user/add.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31487 βΌ
π Read
via "National Vulnerability Database".
Inout Blockchain AltExchanger 1.2.1 and Inout Blockchain FiatExchanger 2.2.1 allow Chart/TradingView/chart_content/master.php symbol SQL injection.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1467 βΌ
π Read
via "National Vulnerability Database".
Windows OS can be configured to overlay a Γ’β¬Εlanguage barΓ’β¬οΏ½ on top of any application. When this OS functionality is enabled, the OS language bar UI will be viewable in the browser alongside the AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere applications. It is possible to manipulate the Windows OS language bar to launch an OS command prompt, resulting in a context-escape from application into OS.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31489 βΌ
π Read
via "National Vulnerability Database".
Inout Blockchain AltExchanger 1.2.1 allows index.php/home/about inoutio_language cookie SQL injection.π Read
via "National Vulnerability Database".
βΌ CVE-2022-31488 βΌ
π Read
via "National Vulnerability Database".
Inout Blockchain AltExchanger 1.2.1 allows index.php/coins/update_marketboxslider marketcurrency SQL injection.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29376 βΌ
π Read
via "National Vulnerability Database".
Xampp for Windows v8.1.4 and below was discovered to contain insecure permissions for its install directory, allowing attackers to execute arbitrary code via overwriting binaries located in the directory.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32958 βΌ
π Read
via "National Vulnerability Database".
Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-30015 βΌ
π Read
via "National Vulnerability Database".
In Simple Food Website 1.0, a moderation can put the Cross Site Scripting Payload in any of the fields on http://127.0.0.1:1234/food/admin/all_users.php like Full Username, etc .This causes stored xss.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-31263 βΌ
π Read
via "National Vulnerability Database".
app/models/user.rb in Mastodon before 3.5.0 allows a bypass of e-mail restrictions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29305 βΌ
π Read
via "National Vulnerability Database".
imgurl v2.31 was discovered to contain a Blind SQL injection vulnerability via /upload/localhost.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29377 βΌ
π Read
via "National Vulnerability Database".
Totolink A3600R V4.1.2cu.5182_B20201102 was discovered to contain a stacker overflow in the fread function at infostat.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via the parameter CONTENT_LENGTH.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0734 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting vulnerability was identified in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.35 through 4.70, USG FLEX series firmware versions 4.50 through 5.20, ATP series firmware versions 4.35 through 5.20, and VPN series firmware versions 4.35 through 5.20, that could allow an attacker to obtain some information stored in the user's browser, such as cookies or session tokens, via a malicious script.π Read
via "National Vulnerability Database".
βΌ CVE-2022-29309 βΌ
π Read
via "National Vulnerability Database".
mysiteforme v2.2.1 was discovered to contain a Server-Side Request Forgery.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0910 βΌ
π Read
via "National Vulnerability Database".
A downgrade from two-factor authentication to one-factor authentication vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versions 4.32 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, ATP series firmware versions 4.32 through 5.21, and VPN series firmware versions 4.32 through 5.21, that could allow an authenticated attacker to bypass the second authentication phase to connect the IPsec VPN server even though the two-factor authentication (2FA) was enabled.π Read
via "National Vulnerability Database".
π’ SES GS wins US governmentβs TROJAN contract π’
π Read
via "ITPro".
The five-year deal is aimed at fortifying the countryβs cyber security resilienceπ Read
via "ITPro".
IT PRO
SES GS wins US governmentβs TROJAN contract | IT PRO
The five-year deal is aimed at fortifying the countryβs cyber security resilience
π’ What is data and big data mining? An easy guide π’
π Read
via "ITPro".
You have a lot of data, but how do you find the right data to make a business decision?π Read
via "ITPro".
IT Pro
What is data and big data mining? An easy guide
You have a lot of data, but how do you find the right data to make a business decision?
π’ Ethical hackers handed lifeline in controversial US cyber crime review π’
π Read
via "ITPro".
The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protectedπ Read
via "ITPro".
IT PRO
Ethical hackers handed lifeline in controversial US cyber crime review | IT PRO
The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protected
π’ Ministry of Defence pledges resilience to all known vulnerabilities and cyber attack methods by 2030 π’
π Read
via "ITPro".
New MoD cyber security strategy is underpinned by a 'secure by design' approach that will run across the organisationπ Read
via "ITPro".
IT PRO
Ministry of Defence pledges resilience to all known vulnerabilities and cyber attack methods by 2030 | IT PRO
New MoD cyber security strategy is underpinned by a 'secure by design' approach that will run across the organisation
π’ Ransomware group Conti threatens to overthrow Costa Rican government π’
π Read
via "ITPro".
It has urged citizens to go out onto the streets to demand their government pays the ransomware demandπ Read
via "ITPro".
ITPro
Ransomware group Conti threatens to overthrow Costa Rican government
It has urged citizens to go out onto the streets to demand their government pays the ransomware demand
π’ US security agency issues emergency alert over vulnerable VMware products π’
π Read
via "ITPro".
A string of actively exploited critical vulnerabilities across five popular VMware products has been described as an "unacceptable risk" to government systemsπ Read
via "ITPro".
IT PRO
US security agency issues emergency alert over vulnerable VMware products | IT PRO
A string of actively exploited critical vulnerabilities across five popular VMware products has been described as an "unacceptable risk" to government systems