πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-31762 β€Ό

The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29244 β€Ό

npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30308 β€Ό

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesnΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1657 β€Ό

Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1961 β€Ό

The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1659 β€Ό

Vulnerable versions of the JupiterX Core (<= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in the sub_action parameter. This can be used to view site configuration and logged-in users, modify post conditions, or perform a denial of service attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1654 β€Ό

Jupiter Theme <= 6.10.1 and JupiterX Core Plugin <= 2.0.7 allow any authenticated attacker, including a subscriber or customer-level attacker, to gain administrative privileges via the "abb_uninstall_template" (both) and "jupiterx_core_cp_uninstall_template" (JupiterX Core Only) AJAX actions

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-30311 β€Ό

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesnΓƒΒ’Γ’β€šΒ¬Γ’β€žΒ’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-24077 β€Ό

Naver Cloud Explorer Beta allows the attacker to execute arbitrary code as System privilege via malicious DLL injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-1749 β€Ό

The WPMK Ajax Finder WordPress plugin is vulnerable to Cross-Site Request Forgery via the createplugin_atf_admin_setting_page() function found in the ~/inc/config/create-plugin-config.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46814 β€Ό

The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31763 β€Ό

The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability.

πŸ“– Read

via "National Vulnerability Database".
⚠ You’re invited! Join us for a live walkthrough of the β€œFollina” story… ⚠

Live demo, plain English, no sales pitch, just a chance to watch an attack dissected in safety. Join us if you can!

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-46811 β€Ό

HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23168 β€Ό

The attacker could get access to the database. The SQL injection is in the username parameter at the login panel: username: admin'--

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-41446 β€Ό

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-29455 β€Ό

DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46815 β€Ό

Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-28217 β€Ό

Some part of SAP NetWeaver (EP Web Page Composer) does not sufficiently validate an XML document accepted from an untrusted source, which allows an adversary to exploit unprotected XML parking at endpoints, and a possibility to conduct SSRF attacks that could compromise systemÒ€ℒs Availability by causing system to crash.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-46812 β€Ό

The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-31055 β€Ό

kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.

πŸ“– Read

via "National Vulnerability Database".