πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2022-37720 β€Ό

Orchardproject Orchard CMS 1.10.3 is vulnerable to Cross Site Scripting (XSS). When a low privileged user such as an author or publisher, injects a crafted html and javascript payload in a blog post, leading to full admin account takeover or privilege escalation when the malicious blog post is loaded in the victim's browser.

πŸ“– Read

via "National Vulnerability Database".
⚠ Voice-scamming site β€œiSpoof” seized, 100s arrested in massive crackdown ⚠

Those numbers or names that pop up when a call comes up? They're OK as a hint of who's calling, but THEY PROVE NOTHING

πŸ“– Read

via "Naked Security".
πŸ‘1
β€Ό CVE-2022-44858 β€Ό

Automotive Shop Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /asms/products/view_product.php.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45208 β€Ό

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41705 β€Ό

Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45210 β€Ό

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45206 β€Ό

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45476 β€Ό

Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45207 β€Ό

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-23044 β€Ό

Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-38813 β€Ό

PHPGurukul Blood Donor Management System 1.0 does not properly restrict access to admin/dashboard.php, which allows attackers to access all data of users, delete the users, add and manage Blood Group, and Submit Report.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45218 β€Ό

Human Resource Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability. This vulnerability is triggered via a crafted payload injected into an authentication error message.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41706 β€Ό

Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43984 β€Ό

Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41958 β€Ό

super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45205 β€Ό

Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-0698 β€Ό

Microweber version 1.3.1 allows an unauthenticated user to perform an account takeover via an XSS on the 'select-file' parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-41712 β€Ό

Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-37721 β€Ό

PyroCMS 3.9 is vulnerable to a stored Cross Site Scripting (XSS_ when a low privileged user such as an author, injects a crafted html and javascript payload in a blog post, leading to full admin account takeover or privilege escalation.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-43983 β€Ό

Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-45475 β€Ό

Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files.

πŸ“– Read

via "National Vulnerability Database".