‼ CVE-2022-28802 ‼
📖 Read
via "National Vulnerability Database".
Code by Zapier before 2022-08-17 allowed intra-account privilege escalation that included execution of Python or JavaScript code. In other words, Code by Zapier was providing a customer-controlled general-purpose virtual machine that unintentionally granted full access to all users of a company's account, but was supposed to enforce role-based access control within that company's account. Before 2022-08-17, a customer could have resolved this by (in effect) using a separate virtual machine for an application that held credentials - or other secrets - that weren't supposed to be shared among all of its employees. (Multiple accounts would have been needed to operate these independent virtual machines.)📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38073 ‼
📖 Read
via "National Vulnerability Database".
Multiple Authenticated (custom specific plugin role) Persistent Cross-Site Scripting (XSS) vulnerability in Awesome Support plugin <= 6.0.7 at WordPress.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40217 ‼
📖 Read
via "National Vulnerability Database".
Authenticated (admin+) Arbitrary File Edit/Upload vulnerability in XplodedThemes WPide plugin <= 2.6 at WordPress.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-39224 ‼
📖 Read
via "National Vulnerability Database".
Arr-pm is an RPM reader/writer library written in Ruby. Versions prior to 0.0.12 are subject to OS command injection resulting in shell execution if the RPM contains a malicious "payload compressor" field. This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class of this library. Version 0.0.12 patches these issues. A workaround for this issue is to ensure any RPMs being processed contain valid/known payload compressor values such as gzip, bzip2, xz, zstd, and lzma. The payload compressor field in an rpm can be checked by using the rpm command line tool.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28979 ‼
📖 Read
via "National Vulnerability Database".
Liferay Portal v7.1.0 through v7.4.2 and Liferay DXP v7.3 before service pack 3 was discovered to contain a cross-site scripting (XSS) vulnerability in the Portal Search module's Custom Facet widget. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Custom Parameter Name text field.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28981 ‼
📖 Read
via "National Vulnerability Database".
Path traversal vulnerability in the Hypermedia REST APIs module in Liferay Portal 7.4.0 through 7.4.2 allows remote attackers to access files outside of com.liferay.headless.discovery.web/META-INF/resources via the `parameter` parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28977 ‼
📖 Read
via "National Vulnerability Database".
HtmlUtil.escapeRedirect in Liferay Portal 7.3.1 through 7.4.2, and Liferay DXP 7.0 fix pack 91 through 101, 7.1 fix pack 17 through 25, 7.2 fix pack 5 through 14, and 7.3 before service pack 3 can be circumvented by using multiple forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-35896 ‼
📖 Read
via "National Vulnerability Database".
An issue SMM memory leak vulnerability in SMM driver (SMRAM was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An attacker can dump SMRAM contents via the software SMI provided by the FvbServicesRuntimeDxe driver to read the contents of SMRAM, leading to information disclosure.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40186 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28978 ‼
📖 Read
via "National Vulnerability Database".
Stored cross-site scripting (XSS) vulnerability in the Site module's user membership administration page in Liferay Portal 7.0.1 through 7.4.1, and Liferay DXP 7.0 before fix pack 102, 7.1 before fix pack 26, 7.2 before fix pack 15, and 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the a user's name.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28980 ‼
📖 Read
via "National Vulnerability Database".
Multiple cross-site scripting (XSS) vulnerabilities in Liferay Portal v7.4.3.4 and Liferay DXP v7.4 GA allows attackers to execute arbitrary web scripts or HTML via parameters with the filter_ prefix.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-28982 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Liferay Portal v7.3.3 through v7.4.2 and Liferay DXP v7.3 before service pack 3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name of a tag.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-39197 ‼
📖 Read
via "National Vulnerability Database".
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-39975 ‼
📖 Read
via "National Vulnerability Database".
The Layout module in Liferay Portal v7.3.3 through v7.4.3.34, and Liferay DXP 7.3 before update 10, and 7.4 before update 35 does not check user permission before showing the preview of a "Content Page" type page, allowing attackers to view unpublished "Content Page" pages via URL manipulation.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38512 ‼
📖 Read
via "National Vulnerability Database".
The Translation module in Liferay Portal v7.4.3.12 through v7.4.3.36, and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation, allowing attackers to download a web content page's XLIFF translation file via crafted URL.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3267 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3268 ‼
📖 Read
via "National Vulnerability Database".
Weak Password Requirements in GitHub repository ikus060/minarca prior to 4.2.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3256 ‼
📖 Read
via "National Vulnerability Database".
Use After Free in GitHub repository vim/vim prior to 9.0.0530.📖 Read
via "National Vulnerability Database".
🗓️ Tarfile path traversal bug from 2007 still present in 350k open source repos 🗓️
📖 Read
via "The Daily Swig".
Warning added to Python documentation was deemed preferable to a patch📖 Read
via "The Daily Swig".
The Daily Swig | Cybersecurity news and views
Tarfile path traversal bug from 2007 still present in 350k open source repos
Warning added to Python documentation was deemed preferable to a patch
‼ CVE-2022-40446 ‼
📖 Read
via "National Vulnerability Database".
ZZCMS 2022 was discovered to contain a SQL injection vulnerability via the component /admin/sendmailto.php?tomail=&groupid=.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40443 ‼
📖 Read
via "National Vulnerability Database".
An absolute path traversal vulnerability in ZZCMS 2022 allows attackers to obtain sensitive information via a crafted GET request sent to /one/siteinfo.php.📖 Read
via "National Vulnerability Database".