‼ CVE-2022-45012 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in the Modify Page module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Source field.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2022-38148 ‼
📖 Read
via "National Vulnerability Database".
Silverstripe silverstripe/framework through 4.11 allows SQL Injection.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45016 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Footer field.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40129 ‼
📖 Read
via "National Vulnerability Database".
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing Optional Content Group API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44167 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38097 ‼
📖 Read
via "National Vulnerability Database".
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-40470 ‼
📖 Read
via "National Vulnerability Database".
Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45015 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Footer field.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4096 ‼
📖 Read
via "National Vulnerability Database".
Server-Side Request Forgery (SSRF) in GitHub repository appsmithorg/appsmith prior to 1.8.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38146 ‼
📖 Read
via "National Vulnerability Database".
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44158 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via function via set_device_name.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44156 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC15 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetIpMacBind.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45013 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in the Show Advanced Option module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Section Header field.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44169 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function formSetVirtualSer.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-37332 ‼
📖 Read
via "National Vulnerability Database".
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing media player API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44168 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function fromSetRouteStatic..📖 Read
via "National Vulnerability Database".
‼ CVE-2022-32774 ‼
📖 Read
via "National Vulnerability Database".
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely deleting objects associated with pages, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45470 ‼
📖 Read
via "National Vulnerability Database".
** UNSUPPORTED WHEN ASSIGNED ** missing input validation in Apache Hama may cause information disclosure through path traversal and XSS. Since Apache Hama is EOL, we do not expect these issues to be fixed.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-44163 ‼
📖 Read
via "National Vulnerability Database".
Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via function formSetMacFilterCfg.📖 Read
via "National Vulnerability Database".
🕴 MIT Research Documents Effectiveness of Consensus Cyber Risk Oversight Principles 🕴
📖 Read
via "Dark Reading".
Organizations that use the consensus principles can significantly improve their cyber resilience without raising costs, MIT research shows.📖 Read
via "Dark Reading".
Dark Reading
MIT Research Documents Effectiveness of Consensus Cyber Risk Oversight Principles
Organizations that use the consensus principles can significantly improve their cyber resilience without raising costs, MIT research shows.
👍2
🕴 Time to Get Kids Hacking: Our 2022 Holiday Gift Guide 🕴
📖 Read
via "Dark Reading".
Check out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.📖 Read
via "Dark Reading".
Dark Reading
Time to Get Kids Hacking: Our 2022 Holiday Gift Guide
Check out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.
👍1