‼ CVE-2022-31861 ‼
📖 Read
via "National Vulnerability Database".
Cross site Scripting (XSS) in ThingsBoard IoT Platform through 3.3.4.1 via a crafted value being sent to the audit logs.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38768 ‼
📖 Read
via "National Vulnerability Database".
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to bypass authorization.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31322 ‼
📖 Read
via "National Vulnerability Database".
Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-37190 ‼
📖 Read
via "National Vulnerability Database".
CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34101 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can place a malicious DLL in a certain path to execute code and preform a privilege escalation attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38633 ‼
📖 Read
via "National Vulnerability Database".
Genymotion Desktop v3.2.1 was discovered to contain a DLL hijacking vulnerability which allows attackers to escalate privileges and execute arbitrary code via a crafted binary.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38771 ‼
📖 Read
via "National Vulnerability Database".
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to send SCRIPT tags as injected input to the API request.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-37191 ‼
📖 Read
via "National Vulnerability Database".
The component "cuppa/api/index.php" of CuppaCMS v1.0 is Vulnerable to LFI. An authenticated user can read system files via crafted POST request using [function] parameter value as LFI payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38770 ‼
📖 Read
via "National Vulnerability Database".
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch other users' data upon a successful login request.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-31324 ‼
📖 Read
via "National Vulnerability Database".
An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38305 ‼
📖 Read
via "National Vulnerability Database".
AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vulnerability via the component /admin/profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35413 ‼
📖 Read
via "National Vulnerability Database".
WAPPLES through 6.0 has a hardcoded systemi account accessible via db/wp.no1 (as configured in the /opt/penta/wapples/script/wcc_auto_scaling.py file). A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38769 ‼
📖 Read
via "National Vulnerability Database".
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch cleartext passwords upon a successful login request.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35582 ‼
📖 Read
via "National Vulnerability Database".
Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-34102 ‼
📖 Read
via "National Vulnerability Database".
Insufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM level command prompt.📖 Read
via "National Vulnerability Database".
♟️ Wormable Flaw, 0days Lead Sept. 2022 Patch Tuesday ♟️
📖 Read
via "Krebs on Security".
This month's Patch Tuesday offers a little something for everyone, including security updates for a zero-day flaw in Microsoft Windows that is under active attack, and another Windows weakness experts say could be used to power a fast-spreading computer worm. Also, Apple has also quashed a pair of zero-day bugs affecting certain macOS and iOS users, and released iOS 16, which includes a nifty new privacy and security feature called "Lockdown Mode." And Adobe axed 63 vulnerabilities in a range of products.📖 Read
via "Krebs on Security".
Krebs on Security
Wormable Flaw, 0days Lead Sept. 2022 Patch Tuesday
This month's Patch Tuesday offers a little something for everyone, including security updates for a zero-day flaw in Microsoft Windows that is under active attack, and another Windows weakness experts say could be used to power a fast-spreading computer worm.…
🕴 Key Takeaways From the Twitter Whistleblower's Testimony 🕴
📖 Read
via "Dark Reading".
Twitter did not know what data it had nor who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.📖 Read
via "Dark Reading".
Dark Reading
Key Takeaways From the Twitter Whistleblower's Testimony
Twitter did not know what data it had or who had access to it, Peiter "Mudge" Zatko told Congressional lawmakers during a Senate panel hearing.
‼ CVE-2022-36667 ‼
📖 Read
via "National Vulnerability Database".
Garage Management System 1.0 is vulnerable to the Remote Code Execution (RCE) due to the lack of filtering from the file upload function. The vulnerability exist during adding parts and from the upload function, the attacker can upload PHP Reverse Shell straight away to gain RCE.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-37138 ‼
📖 Read
via "National Vulnerability Database".
Loan Management System 1.0 is vulnerable to SQL Injection at the login page, which allows unauthorized users to login as Administrator after injecting username form.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-19587 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in configMap parameters in Yellowfin Business Intelligence 7.3 allows remote attackers to run arbitrary code via MIAdminStyles.i4 Admin UI.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-19586 ‼
📖 Read
via "National Vulnerability Database".
Incorrect Access Control issue in Yellowfin Business Intelligence 7.3 allows remote attackers to escalate privilege via MIAdminStyles.i4 Admin UI.📖 Read
via "National Vulnerability Database".