‼ CVE-2022-32101 ‼
📖 Read
via "National Vulnerability Database".
kkcms v1.3.7 was discovered to contain a SQL injection vulnerability via the cid parameter at /template/wapian/vlist.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32156 ‼
📖 Read
via "National Vulnerability Database".
In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, connections from misconfigured nodes without valid certificates did not fail by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI) to enable the remediation.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32301 ‼
📖 Read
via "National Vulnerability Database".
YoudianCMS v9.5.0 was discovered to contain a SQL injection vulnerability via the IdList parameter at /App/Lib/Action/Home/ApiAction.class.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-4575 ‼
📖 Read
via "National Vulnerability Database".
IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.2.0 through 3.2.9 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 166801.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-40940 ‼
📖 Read
via "National Vulnerability Database".
Monstra 3.0.4 does not filter the case of php, which leads to an unrestricted file upload vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32154 ‼
📖 Read
via "National Vulnerability Database".
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32299 ‼
📖 Read
via "National Vulnerability Database".
YoudianCMS v9.5.0 was discovered to contain a SQL injection vulnerability via the id parameter at /App/Lib/Action/Admin/SiteAction.class.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32152 ‼
📖 Read
via "National Vulnerability Database".
Splunk Enterprise peers in Splunk Enterprise versions before 9.0 and Splunk Cloud Platform versions before 8.2.2203 did not validate the TLS certificates during Splunk-to-Splunk communications by default. Splunk peer communications configured properly with valid certificates were not vulnerable. However, an attacker with administrator credentials could add a peer without a valid certificate and connections from misconfigured nodes without valid certificates did not fail by default. For Splunk Enterprise, update to Splunk Enterprise version 9.0 and Configure TLS host name validation for Splunk-to-Splunk communications (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation) to enable the remediation.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-29453 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in API KEY for Google Maps plugin <= 1.2.1 at WordPress leading to Google Maps API key update.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42732 ‼
📖 Read
via "National Vulnerability Database".
Access of Memory Location After End of Buffer (CWE-788)📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32302 ‼
📖 Read
via "National Vulnerability Database".
Theme Park Ticketing System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at edit_ticket.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1342 ‼
📖 Read
via "National Vulnerability Database".
A lack of password masking in Devolutions Remote Desktop Manager allows physically proximate attackers to observe sensitive data. A caching issue can cause sensitive fields to sometimes stay revealed when closing and reopening a panel, which could lead to involuntarily disclosing sensitive information. This issue affects: Devolutions Remote Desktop Manager 2022.1.24 version and prior versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-41672 ‼
📖 Read
via "National Vulnerability Database".
PEEL Shopping CMS 9.4.0 is vulnerable to authenticated SQL injection in utilisateurs.php. A user that belongs to the administrator group can inject a malicious SQL query in order to affect the execution logic of the application and retrive information from the database.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32157 ‼
📖 Read
via "National Vulnerability Database".
Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation.📖 Read
via "National Vulnerability Database".
🔏 5 Virtual Private Network (VPN) Best Practices for 2022 🔏
📖 Read
via "".
Learn about VPNs, why organizations are using them so much more, and what IT leaders can do to help ensure their security.
📖 Read
via "".
Digital Guardian
5 Virtual Private Network (VPN) Best Practices for 2022
Learn about VPNs, why organizations are using them so much more, and what IT leaders can do to help ensure their security.
‼ CVE-2022-28846 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 12.0.1 (and earlier versions) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30648 ‼
📖 Read
via "National Vulnerability Database".
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28848 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 12.0.1 (and earlier versions) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28839 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 12.0.1 (and earlier versions) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-30647 ‼
📖 Read
via "National Vulnerability Database".
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28849 ‼
📖 Read
via "National Vulnerability Database".
Adobe Bridge version 12.0.1 (and earlier versions) is affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.📖 Read
via "National Vulnerability Database".