βΌ CVE-2022-4434 βΌ
π Read
via "National Vulnerability Database".
A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS driver that could allow a local attacker with elevated privileges to cause information disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43844 βΌ
π Read
via "National Vulnerability Database".
IBM Robotic Process Automation for Cloud Pak 20.12 through 21.0.3 is vulnerable to broken access control. A user is not correctly redirected to the platform log out screen when logging out of IBM RPA for Cloud Pak. IBM X-Force ID: 239081.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4435 βΌ
π Read
via "National Vulnerability Database".
A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS LenovoRemoteConfigUpdateDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4432 βΌ
π Read
via "National Vulnerability Database".
A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS PersistenceConfigDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0086 βΌ
π Read
via "National Vulnerability Database".
The JetWidgets for Elementor plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.12. This is due to missing nonce validation on the save() function. This makes it possible for unauthenticated attackers to to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be used to enable SVG uploads that could make Cross-Site Scripting possible.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4433 βΌ
π Read
via "National Vulnerability Database".
A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS LenovoSetupConfigDxe driver that could allow a local attacker with elevated privileges to cause information disclosure.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46168 βΌ
π Read
via "National Vulnerability Database".
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, recipients of a group SMTP email could see the email addresses of all other users inside the group SMTP topic. Most of the time this is not an issue as they are likely already familiar with one another's email addresses. This issue is patched in versions 2.8.14 and 2.9.0.beta15. The fix is that someone sending emails out via group SMTP to non-staged users masks those emails with blind carbon copy (BCC). Staged users are ones that have likely only interacted with the group via email, and will likely include other people who were CC'd on the original email to the group. As a workaround, disable group SMTP for any groups that have it enabled.π Read
via "National Vulnerability Database".
βΌ CVE-2022-41740 βΌ
π Read
via "National Vulnerability Database".
IBM Robotic Process Automation 20.12 through 21.0.6 could allow an attacker with physical access to the system to obtain highly sensitive information from system memory. IBM X-Force ID: 238053.π Read
via "National Vulnerability Database".
π΄ CircleCI: Rotate Stored Secrets ASAP π΄
π Read
via "Dark Reading".
DevOps platform warns customers of a "security incident" under investigation.π Read
via "Dark Reading".
Dark Reading
CircleCI: Rotate Stored Secrets ASAP
DevOps platform warns customers of a "security incident" under investigation.
π΄ Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks π΄
π Read
via "Dark Reading".
π Read
via "Dark Reading".
Dark Reading
Check Point Research Reports a 38% Increase In 2022 Global Cyberattacks
Check Point Research (CPR) releases new data on 2022 cyberattack trends. The data is segmented by global volume, industry and geography. Global cyberattacks increased by 38% in 2022, compared to 2021. These cyberattack numbers were driven by smaller, moreβ¦
π΄ New Survey: One In Four Schools Were Victims Of Cyber Attacks In the Last Year; Administrators To Increase Spending On Privacy and Security π΄
π Read
via "Dark Reading".
In a new survey from Clever, 3 out of 4 school districts say they will increase their spending on security and privacy in the next two to three years; 1 in 4 teachers report that cybersecurity training is missing in their district.π Read
via "Dark Reading".
Dark Reading
New Survey: 1 In 4 Schools Were Victims Of Cyber Attacks In the Last Year; Administrators To Increase Spending On Privacy and Security
In a new survey from Clever, 3 out of 4 school districts say they will increase their spending on security and privacy in the next two to three years; 1 in 4 teachers report that cybersecurity training is missing in their district.
π΄ LogRhythm Enhances Security Analytics With Expanded Security Operations Capabilities π΄
π Read
via "Dark Reading".
New platform features and integrations enable analysts to quickly detect and remediate threats.π Read
via "Dark Reading".
Dark Reading
LogRhythm Enhances Security Analytics With Expanded Security Operations Capabilities
New platform features and integrations enable analysts to quickly detect and remediate threats.
βΌ CVE-2023-0088 βΌ
π Read
via "National Vulnerability Database".
The Swifty Page Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.0.1. This is due to missing or incorrect nonce validation on several AJAX actions handling page creation and deletion among other things. This makes it possible for unauthenticated attackers to invoke those functions, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0087 βΌ
π Read
via "National Vulnerability Database".
The Swifty Page Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Γ’β¬Λspm_plugin_options_page_tree_max_widthΓ’β¬β’ parameter in versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.π Read
via "National Vulnerability Database".
βΌ CVE-2014-125044 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in soshtolsus wing-tight. This affects an unknown part of the file index.php. The manipulation of the argument p leads to file inclusion. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 567bc33e6ed82b0d0179c9add707ac2b257aeaf2. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217515.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22453 βΌ
π Read
via "National Vulnerability Database".
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, the number of times a user posted in an arbitrary topic is exposed to unauthorized users through the `/u/username.json` endpoint. The issue is patched in version 2.8.14 and 3.0.0.beta16. There is no known workaround.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23549 βΌ
π Read
via "National Vulnerability Database".
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta15 on the `beta` and `tests-passed` branches, users can create posts with raw body longer than the `max_length` site setting by including html comments that are not counted toward the character limit. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds.π Read
via "National Vulnerability Database".
βΌ CVE-2014-125043 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, has been found in vicamo NetworkManager. Affected by this issue is the function send_arps of the file src/devices/nm-device.c. The manipulation leads to unchecked return value. The name of the patch is 4da19b89815cbf6e063e39bc33c04fe4b3f789df. It is recommended to apply a patch to fix this issue. VDB-217514 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2017-20163 βΌ
π Read
via "National Vulnerability Database".
A vulnerability has been found in Red Snapper NView and classified as critical. This vulnerability affects the function mutate of the file src/Session.php. The manipulation of the argument session leads to sql injection. The name of the patch is cbd255f55d476b29e5680f66f48c73ddb3d416a8. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217516.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22454 βΌ
π Read
via "National Vulnerability Database".
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, pending post titles can be used for cross-site scripting attacks. Pending posts can be created by unprivileged users when a category has the "require moderator approval of all new topics" setting set. This vulnerability can lead to a full XSS on sites which have modified or disabled DiscourseΓ’β¬β’s default Content Security Policy. A patch is available in versions 2.8.14 and 3.0.0.beta16.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23546 βΌ
π Read
via "National Vulnerability Database".
In version 2.9.0.beta14 of Discourse, an open-source discussion platform, maliciously embedded urls can leak an admin's digest of recent topics, possibly exposing private information. A patch is available for version 2.9.0.beta15. There are no known workarounds for this issue.π Read
via "National Vulnerability Database".