‼ CVE-2022-47419 ‼
📖 Read
via "National Vulnerability Database".
An XSS vulnerability was discovered in the Mayan EDMS DMS. Successful XSS exploitation was observed in the in-product tagging system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-47416 ‼
📖 Read
via "National Vulnerability Database".
LogicalDOC Enterprise is vulnerable to a stored (persistent, or "Type II") cross-site scripting (XSS) condition in the in-app chat system.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-46663 ‼
📖 Read
via "National Vulnerability Database".
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0704 ‼
📖 Read
via "National Vulnerability Database".
Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0696 ‼
📖 Read
via "National Vulnerability Database".
Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45768 ‼
📖 Read
via "National Vulnerability Database".
Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-47414 ‼
📖 Read
via "National Vulnerability Database".
If an attacker has access to the console for OpenKM (and is authenticated), a stored XSS vulnerability is reachable in the document "note" functionality.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-23931 ‼
📖 Read
via "National Vulnerability Database".
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0705 ‼
📖 Read
via "National Vulnerability Database".
Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0728 ‼
📖 Read
via "National Vulnerability Database".
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-47413 ‼
📖 Read
via "National Vulnerability Database".
Given a malicious document provided by an attacker, the OpenKM DMS is vulnerable to a stored (persistent, or "Type II") XSS condition.📖 Read
via "National Vulnerability Database".
‼ CVE-2011-10003 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in XpressEngine up to 1.4.4. It has been rated as critical. This issue affects some unknown processing of the component Update Query Handler. The manipulation leads to sql injection. Upgrading to version 1.4.5 is able to address this issue. The name of the patch is c6e94449f21256d6362450b29c7847305e756ad5. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220247.📖 Read
via "National Vulnerability Database".
🕴 Cloud Apps Still Demand Way More Privileges Than They Use 🕴
📖 Read
via "Dark Reading".
Hackers can't steal a credential that doesn't exist.📖 Read
via "Dark Reading".
Dark Reading
Cloud Apps Still Demand Way More Privileges Than They Use
Hackers can't steal a credential that doesn't exist.
‼ CVE-2023-23011 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in InvoicePlane 1.6 via filter_product input to file modal_product_lookups.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0712 ‼
📖 Read
via "National Vulnerability Database".
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_move_object function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0719 ‼
📖 Read
via "National Vulnerability Database".
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_sort_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45190 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can bypass passkey entry in the legacy pairing of the device.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0731 ‼
📖 Read
via "National Vulnerability Database".
The Interactive Geo Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the action content parameter in versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-45191 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a pair confirm message with wrong values.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0730 ‼
📖 Read
via "National Vulnerability Database".
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder_order function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0723 ‼
📖 Read
via "National Vulnerability Database".
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.📖 Read
via "National Vulnerability Database".