πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ—“οΈ Upcoming β€˜critical’ OpenSSL update prompts feverish speculation πŸ—“οΈ

Is the new Heartbleed or just a bleeding distraction?

πŸ“– Read

via "The Daily Swig".
πŸ‘1
β€Ό CVE-2021-38737 β€Ό

SEMCMS v 1.1 is vulnerable to SQL Injection via Ant_Pro.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3018 β€Ό

An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 9.3 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 allows a project maintainer to access the DataDog integration API key from webhook logs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35388 β€Ό

Hospital Management System v 4.0 is vulnerable to Cross Site Scripting (XSS) via /hospital/hms/admin/patient-search.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37781 β€Ό

Employee Record Management System v 1.2 is vulnerable to Cross Site Scripting (XSS) via editempprofile.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43276 β€Ό

Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the productId parameter at /php_action/fetchSelectedfood.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-37782 β€Ό

Employee Record Management System v 1.2 is vulnerable to SQL Injection via editempprofile.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-2882 β€Ό

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. A malicious maintainer could exfiltrate a GitHub integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38736 β€Ό

SEMCMS Shop V 1.1 is vulnerable to SQL Injection via Ant_Global.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-35387 β€Ό

Hospital Management System v 4.0 is vulnerable to SQL Injection via file:hospital/hms/admin/view-patient.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38734 β€Ό

SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Menu.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43275 β€Ό

Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38730 β€Ό

SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Info.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37425 β€Ό

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43170 β€Ό

A stored cross-site scripting (XSS) vulnerability in the Dashboard Configuration feature (index.php?module=dashboard_configure/index) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add info block".

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43166 β€Ό

A stored cross-site scripting (XSS) vulnerability in the Global Entities feature (/index.php?module=entities/entities) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add New Entity".

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-3697 β€Ό

A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36863 β€Ό

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ExpressTech Quiz And Survey Master plugin <= 7.3.4 on WordPress.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-38731 β€Ό

SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Zekou.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-39367 β€Ό

QTIWorks is a software suite for standards-based assessment delivery. Prior to version 1.0-beta15, the QTIWorks Engine allows users to upload QTI content packages as ZIP files. The ZIP handling code does not sufficiently check the paths of files contained within ZIP files, so can insert files into other locations in the filesystem if they are writable by the process running the QTIWorks Engine. In extreme cases, this could allow anonymous users to change files in arbitrary locations in the filesystem. In normal QTIWorks Engine deployments, the impact is somewhat reduced because the default QTIWorks configuration does not enable the public demo functionality, so ZIP files can only be uploaded by users with "instructor" privileges. This vulnerability is fixed in version 1.0-beta15. There are no database configuration changes required when upgrading to this version. No known workarounds for this issue exist.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37426 β€Ό

Unrestricted Upload of File with Dangerous Type vulnerability in OpenNebula OpenNebula core on Linux allows File Content Injection.

πŸ“– Read

via "National Vulnerability Database".