βΌ CVE-2022-33971 βΌ
π Read
via "National Vulnerability Database".
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.π Read
via "National Vulnerability Database".
βΌ CVE-2022-32284 βΌ
π Read
via "National Vulnerability Database".
Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-33948 βΌ
π Read
via "National Vulnerability Database".
HOME SPOT CUBE2 V102 contains an OS command injection vulnerability due to improper processing of data received from DHCP server. An adjacent attacker may execute an arbitrary OS command on the product if a malicious DHCP server is placed on the WAN side of the product.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34151 βΌ
π Read
via "National Vulnerability Database".
Use of hard-coded credentials vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who successfully obtained the user credentials by analyzing the affected product to access the controller.π Read
via "National Vulnerability Database".
βΌ CVE-2022-33208 βΌ
π Read
via "National Vulnerability Database".
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NJ series all models V 1.48 and earlier, Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, Automation software 'Sysmac Studio' all models V1.49 and earlier, and Programmable Terminal (PT) NA series NA5-15W/NA5-12W/NA5-9W/NA5-7W models Runtime V1.15 and earlier, which may allow a remote attacker who can analyze the communication between the affected controller and automation software 'Sysmac Studio' and/or a Programmable Terminal (PT) to access the controller.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2300 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2301 βΌ
π Read
via "National Vulnerability Database".
Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.π Read
via "National Vulnerability Database".
βΌ CVE-2022-0250 βΌ
π Read
via "National Vulnerability Database".
The Redirection for Contact Form 7 WordPress plugin before 2.5.0 does not escape a link generated before outputting it in an attribute, leading to a Reflected Cross-Site Scriptingπ Read
via "National Vulnerability Database".
βΌ CVE-2022-1946 βΌ
π Read
via "National Vulnerability Database".
The Gallery WordPress plugin before 2.0.0 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issueπ Read
via "National Vulnerability Database".
βΌ CVE-2022-1301 βΌ
π Read
via "National Vulnerability Database".
The WP Contact Slider WordPress plugin before 2.4.7 does not sanitize and escape the Text to Display settings of sliders, which could allow high privileged users such as editor and above to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowedπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25066 βΌ
π Read
via "National Vulnerability Database".
The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitize and escape some imported data, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.π Read
via "National Vulnerability Database".
βΌ CVE-2022-1967 βΌ
π Read
via "National Vulnerability Database".
The WP Championship WordPress plugin before 9.3 is lacking CSRF checks in various places, allowing attackers to make a logged in admin perform unwanted actions, such as create and delete arbitrary teams as well as update the plugin's settings. Due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issuesπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25056 βΌ
π Read
via "National Vulnerability Database".
The Ninja Forms Contact Form WordPress plugin before 3.6.10 does not sanitise and escape field labels, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2268 βΌ
π Read
via "National Vulnerability Database".
The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCEπ Read
via "National Vulnerability Database".
β Canadian cybercriminal pleads guilty to βNetWalkerβ attacks in US β
π Read
via "Naked Security".
Bust in Canada, now bust in the USA as well.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Global Socket 1.4.37 π
π Read
via "Packet Storm Security".
Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.π Read
via "Packet Storm Security".
Packetstormsecurity
Global Socket 1.4.37 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Bash / Netcat Reverse Shells π
π Read
via "Packet Storm Security".
This script is a great tool for pentesters needing to create reverse shells using either bash or netcat.π Read
via "Packet Storm Security".
Packetstormsecurity
Bash / Netcat Reverse Shells β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Australiaβs Monash University launches public bug bounty program ποΈ
π Read
via "The Daily Swig".
Education institution will pay up to $2,500 for valid vulnerabilitiesπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Australiaβs Monash University launches public bug bounty program
Education institution will pay up to $2,500 for valid vulnerabilities
ποΈ βDoes anybody like CAPTCHAs?β β Cloudflare CTO John Graham-Cumming envisages a frictionless future for website Turing tests ποΈ
π Read
via "The Daily Swig".
British software engineer also talks HTTP/3, zero trust, and lava lamp-powered cryptographyπ Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
βDoes anybody like CAPTCHAs?β β Cloudflare CTO John Graham-Cumming envisages a frictionless future for website Turing tests
British software engineer also talks HTTP/3, zero trust, and lava lamp-powered cryptography
βΌ CVE-2022-33171 βΌ
π Read
via "National Vulnerability Database".
** DISPUTED ** The findOne function in TypeORM before 0.3.0 can either be supplied with a string or a FindOneOptions object. When input to the function is a user-controlled parsed JSON object, supplying a crafted FindOneOptions instead of an id string leads to SQL injection. NOTE: the vendor's position is that the user's application is responsible for input validation.π Read
via "National Vulnerability Database".
βΌ CVE-2022-34265 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.π Read
via "National Vulnerability Database".
π₯1