βΌ CVE-2022-38654 βΌ
π Read
via "National Vulnerability Database".
HCL Domino is susceptible to an information disclosure vulnerability. In some scenarios, local calls made on the server to search the Domino directory will ignore xACL read restrictions. An authenticated attacker could leverage this vulnerability to access attributes from a user's person record.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3868 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in SourceCodester Sanitization Management System. Affected is an unknown function of the file /php-sms/classes/Master.php?f=save_quote. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213012.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3869 βΌ
π Read
via "National Vulnerability Database".
Code Injection in GitHub repository froxlor/froxlor prior to 0.10.38.2.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-42905 βΌ
π Read
via "National Vulnerability Database".
In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)π Read
via "National Vulnerability Database".
βΌ CVE-2022-42919 βΌ
π Read
via "National Vulnerability Database".
Python 3.9.x and 3.10.x through 3.10.8 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.4, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40284 βΌ
π Read
via "National Vulnerability Database".
A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37710 βΌ
π Read
via "National Vulnerability Database".
Patterson Dental Eaglesoft 21 has AES-256 encryption but there are two ways to obtain a keyfile: (1) keybackup.data > License > Encryption Key or (2) Eaglesoft.Server.Configuration.data > DbEncryptKeyPrimary > Encryption Key. Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3558 βΌ
π Read
via "National Vulnerability Database".
The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3494 βΌ
π Read
via "National Vulnerability Database".
The Complianz WordPress plugin before 6.3.4, and Complianz Premium WordPress plugin before 6.3.6 allow a translators to inject arbitrary SQL through an unsanitized translation. SQL can be injected through an infected translation file, or by a user with a translator role through translation plugins such as Loco Translate or WPML.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2387 βΌ
π Read
via "National Vulnerability Database".
The Easy Digital Downloads WordPress plugin before 3.0 does not have CSRF check in place when deleting payment history, and does not ensure that the post to be deleted is actually a payment history. As a result, attackers could make a logged in admin delete arbitrary post via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3537 βΌ
π Read
via "National Vulnerability Database".
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHPπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3451 βΌ
π Read
via "National Vulnerability Database".
The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary optionsπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3463 βΌ
π Read
via "National Vulnerability Database".
The Contact Form Plugin WordPress plugin before 4.3.13 does not validate and escape fields when exporting form entries as CSV, leading to a CSV injectionπ Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-3481 βΌ
π Read
via "National Vulnerability Database".
The WooCommerce Dropshipping WordPress plugin before 4.4 does not properly sanitise and escape a parameter before using it in a SQL statement via a REST endpoint available to unauthenticated users, leading to a SQL injectionπ Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-42920 βΌ
π Read
via "National Vulnerability Database".
Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42955 βΌ
π Read
via "National Vulnerability Database".
The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain cleartext cached credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37866 βΌ
π Read
via "National Vulnerability Database".
When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivy's local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing ".." sequences and a "normal" repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-42956 βΌ
π Read
via "National Vulnerability Database".
The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain the cleartext master password.π Read
via "National Vulnerability Database".
β Twitter Blue Badge email scams β Donβt fall for them! β
π Read
via "Naked Security".
That was the week that was...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β€1π1
βΌ CVE-2022-43306 βΌ
π Read
via "National Vulnerability Database".
The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-dates package. The affected version of d8s-htm is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43319 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in the component vcs/downloadFiles.php?download=./search.php of Simple E-Learning System v1.0 allows attackers to read arbitrary files.π Read
via "National Vulnerability Database".