πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-0534 β€Ό

A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file admin/expense_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219603.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-0533 β€Ό

A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this issue is some unknown functionality of the file admin/expense_report.php. The manipulation of the argument from_date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-219602 is the identifier assigned to this vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44029 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 6 of 6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44027 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 4 of 6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44026 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 3 of 6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44298 β€Ό

SiteServer CMS 7.1.3 is vulnerable to SQL Injection.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44717 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 1 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44025 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 2 of 6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44715 β€Ό

Improper File Permissions in NetScout nGeniusONE 6.3.2 build 904 allows authenticated remote users to gain permissions via a crafted payload.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44028 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 5 of 6.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44718 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 build 904. Open Redirection can occur (issue 2 of 2). After successful login, an attacker must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host. The attack vector is Network, and the Attack Complexity required is High. Privileges required are administrator, User Interaction is required, and Scope is unchanged. The user must visit the vulnerable parameter and inject a crafted payload to successfully redirect to an unknown host.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-44024 β€Ό

An issue was discovered in NetScout nGeniusONE 6.3.2 before P10. It allows Reflected Cross-Site Scripting (XSS), issue 1 of 6.

πŸ“– Read

via "National Vulnerability Database".
πŸ—“οΈ Deserialized web security roundup: β€˜Catastrophic cyber events’, another T-Mobile breach, more LastPass problems πŸ—“οΈ

Your fortnightly rundown of AppSec vulnerabilities, new hacking techniques, and other cybersecurity news

πŸ“– Read

via "The Daily Swig".
β€Ό CVE-2022-48071 β€Ό

Phicomm K2 v22.6.534.263 was discovered to store the root and admin passwords in plaintext.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48069 β€Ό

Totolink A830R V4.1.2cu.5182 was discovered to contain a command injection vulnerability via the QUERY_STRING parameter.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48066 β€Ό

An issue in the component global.so of Totolink A830R V4.1.2cu.5182 allows attackers to bypass authentication via a crafted cookie.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48073 β€Ό

Phicomm K2 v22.6.534.263 was discovered to store the root and admin passwords in plaintext.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48067 β€Ό

An information disclosure vulnerability in Totolink A830R V4.1.2cu.5182 allows attackers to obtain the root password via a brute-force attack.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-48072 β€Ό

Phicomm K2G v22.6.3.20 was discovered to contain a command injection vulnerability via the autoUpTime parameter in the automatic upgrade function.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-21395 β€Ό

Magneto LTS (Long Term Support) is a community developed alternative to the Magento CE official releases. Versions prior to 19.4.22 and 20.0.19 are vulnerable to Cross-Site Request Forgery. The password reset form is vulnerable to CSRF between the time the reset password link is clicked and user submits new password. This issue is patched in versions 19.4.22 and 20.0.19. There are no workarounds.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-47632 β€Ό

Razer Synapse before 3.7.0830.081906 allows privilege escalation due to an unsafe installation path, improper privilege management, and improper certificate validation. Attackers can place malicious DLLs into %PROGRAMDATA%\Razer\Synapse3\Service\bin if they do so before the service is installed and if they deny write access for the SYSTEM user. Although the service will not start if the malicious DLLs are unsigned, it suffices to use self-signed DLLs. The validity of the DLL signatures is not checked. As a result, local Windows users can abuse the Razer driver installer to obtain administrative privileges on Windows.

πŸ“– Read

via "National Vulnerability Database".