βΌ CVE-2022-37710 βΌ
π Read
via "National Vulnerability Database".
Patterson Dental Eaglesoft 21 has AES-256 encryption but there are two ways to obtain a keyfile: (1) keybackup.data > License > Encryption Key or (2) Eaglesoft.Server.Configuration.data > DbEncryptKeyPrimary > Encryption Key. Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3558 βΌ
π Read
via "National Vulnerability Database".
The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files.π Read
via "National Vulnerability Database".
βΌ CVE-2022-3494 βΌ
π Read
via "National Vulnerability Database".
The Complianz WordPress plugin before 6.3.4, and Complianz Premium WordPress plugin before 6.3.6 allow a translators to inject arbitrary SQL through an unsanitized translation. SQL can be injected through an infected translation file, or by a user with a translator role through translation plugins such as Loco Translate or WPML.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2387 βΌ
π Read
via "National Vulnerability Database".
The Easy Digital Downloads WordPress plugin before 3.0 does not have CSRF check in place when deleting payment history, and does not ensure that the post to be deleted is actually a payment history. As a result, attackers could make a logged in admin delete arbitrary post via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3537 βΌ
π Read
via "National Vulnerability Database".
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHPπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3451 βΌ
π Read
via "National Vulnerability Database".
The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary optionsπ Read
via "National Vulnerability Database".
βΌ CVE-2022-3463 βΌ
π Read
via "National Vulnerability Database".
The Contact Form Plugin WordPress plugin before 4.3.13 does not validate and escape fields when exporting form entries as CSV, leading to a CSV injectionπ Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-3481 βΌ
π Read
via "National Vulnerability Database".
The WooCommerce Dropshipping WordPress plugin before 4.4 does not properly sanitise and escape a parameter before using it in a SQL statement via a REST endpoint available to unauthenticated users, leading to a SQL injectionπ Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-42920 βΌ
π Read
via "National Vulnerability Database".
Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42955 βΌ
π Read
via "National Vulnerability Database".
The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain cleartext cached credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2022-37866 βΌ
π Read
via "National Vulnerability Database".
When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivy's local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing ".." sequences and a "normal" repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-42956 βΌ
π Read
via "National Vulnerability Database".
The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain the cleartext master password.π Read
via "National Vulnerability Database".
β Twitter Blue Badge email scams β Donβt fall for them! β
π Read
via "Naked Security".
That was the week that was...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β€1π1
βΌ CVE-2022-43306 βΌ
π Read
via "National Vulnerability Database".
The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-dates package. The affected version of d8s-htm is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43319 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in the component vcs/downloadFiles.php?download=./search.php of Simple E-Learning System v1.0 allows attackers to read arbitrary files.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43352 βΌ
π Read
via "National Vulnerability Database".
Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_quote.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44049 βΌ
π Read
via "National Vulnerability Database".
The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-grammars package. The affected version of d8s-htm is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44052 βΌ
π Read
via "National Vulnerability Database".
The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-timezones package. The affected version of d8s-htm is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-42990 βΌ
π Read
via "National Vulnerability Database".
Food Ordering Management System v1.0 was discovered to contain a SQL injection vulnerability via the component /foms/all-orders.php?status=Cancelled%20by%20Customer.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44050 βΌ
π Read
via "National Vulnerability Database".
The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-json package. The affected version of d8s-htm is 0.1.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43304 βΌ
π Read
via "National Vulnerability Database".
The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.π Read
via "National Vulnerability Database".