🛡 Cybersecurity & Privacy 🛡 - News
25.8K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2022-43276 ‼

Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the productId parameter at /php_action/fetchSelectedfood.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-37782 ‼

Employee Record Management System v 1.2 is vulnerable to SQL Injection via editempprofile.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-2882 ‼

An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. A malicious maintainer could exfiltrate a GitHub integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38736 ‼

SEMCMS Shop V 1.1 is vulnerable to SQL Injection via Ant_Global.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-35387 ‼

Hospital Management System v 4.0 is vulnerable to SQL Injection via file:hospital/hms/admin/view-patient.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38734 ‼

SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Menu.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-43275 ‼

Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /youthappam/php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38730 ‼

SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Info.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-37425 ‼

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in OpenNebula OpenNebula core on Linux allows Remote Code Inclusion.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-43170 ‼

A stored cross-site scripting (XSS) vulnerability in the Dashboard Configuration feature (index.php?module=dashboard_configure/index) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add info block".

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-43166 ‼

A stored cross-site scripting (XSS) vulnerability in the Global Entities feature (/index.php?module=entities/entities) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter after clicking "Add New Entity".

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-3697 ‼

A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-36863 ‼

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ExpressTech Quiz And Survey Master plugin <= 7.3.4 on WordPress.

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38731 ‼

SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Zekou.php.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-39367 ‼

QTIWorks is a software suite for standards-based assessment delivery. Prior to version 1.0-beta15, the QTIWorks Engine allows users to upload QTI content packages as ZIP files. The ZIP handling code does not sufficiently check the paths of files contained within ZIP files, so can insert files into other locations in the filesystem if they are writable by the process running the QTIWorks Engine. In extreme cases, this could allow anonymous users to change files in arbitrary locations in the filesystem. In normal QTIWorks Engine deployments, the impact is somewhat reduced because the default QTIWorks configuration does not enable the public demo functionality, so ZIP files can only be uploaded by users with "instructor" privileges. This vulnerability is fixed in version 1.0-beta15. There are no database configuration changes required when upgrading to this version. No known workarounds for this issue exist.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-37426 ‼

Unrestricted Upload of File with Dangerous Type vulnerability in OpenNebula OpenNebula core on Linux allows File Content Injection.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-43168 ‼

Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the reports_id parameter.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-37424 ‼

Files or Directories Accessible to External Parties vulnerability in OpenNebula on Linux allows File Discovery.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-3400 ‼

The Bricks theme for WordPress is vulnerable to authorization bypass due to a missing capability check on the bricks_save_post AJAX action in versions 1.0 to 1.5.3. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to edit any page, post, or template on the vulnerable WordPress website.

📖 Read

via "National Vulnerability Database".
‼ CVE-2022-43165 ‼

A stored cross-site scripting (XSS) vulnerability in the Global Variables feature (/index.php?module=global_vars/vars) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Value parameter after clicking "Create".

📖 Read

via "National Vulnerability Database".
‼ CVE-2021-38217 ‼

SEMCMS v 1.2 is vulnerable to SQL Injection via SEMCMS_User.php.

📖 Read

via "National Vulnerability Database".