‼ CVE-2022-38935 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in NiterForum version 2.5.0-beta in /src/main/java/cn/niter/forum/api/SsoApi.java and /src/main/java/cn/niter/forum/controller/AdminController.java, allows attackers to gain escalated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-21120 ‼
📖 Read
via "National Vulnerability Database".
SQL Injection vulnerability in file home\controls\cart.class.php in UQCMS 2.1.3, allows attackers execute arbitrary commands via the cookie_cart parameter to /index.php/cart/num.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-19825 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability in kevinpapst kimai2 1.30.0 in /src/Twig/Runtime/MarkdownExtension.php, allows attackers to gain escalated privileges.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33925 ‼
📖 Read
via "National Vulnerability Database".
SQL Injection vulnerability in nitinparashar30 cms-corephp through commit bdabe52ef282846823bda102728a35506d0ec8f9 (May 19, 2021) allows unauthenticated attackers to gain escilated privledges via a crafted login.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-38239 ‼
📖 Read
via "National Vulnerability Database".
SQL Injection vulnerability in dataease before 1.2.0, allows attackers to gain sensitive information via the orders parameter to /api/sys_msg/list/1/10.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-33304 ‼
📖 Read
via "National Vulnerability Database".
Double Free vulnerability in virtualsquare picoTCP v1.7.0 and picoTCP-NG v2.1 in modules/pico_fragments.c in function pico_fragments_reassemble, allows attackers to execute arbitrary code.📖 Read
via "National Vulnerability Database".
🕴 Oligo Security Takes Aim at Open Source Vulnerabilities 🕴
📖 Read
via "Dark Reading".
The startup's software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable.📖 Read
via "Dark Reading".
Dark Reading
Oligo Security Takes Aim at Open Source Vulnerabilities
The startup's software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable.
🕴 Descope Handles Authentication So Developers Don't Have To 🕴
📖 Read
via "Dark Reading".
Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.📖 Read
via "Dark Reading".
Dark Reading
Descope Handles Authentication So Developers Don't Have To
Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.
‼ CVE-2023-0860 ‼
📖 Read
via "National Vulnerability Database".
Improper Restriction of Excessive Authentication Attempts in GitHub repository modoboa/modoboa-installer prior to 2.0.4.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0861 ‼
📖 Read
via "National Vulnerability Database".
NetModule NSRW web administration interface executes an OS command constructed with unsanitized user input. A successful exploit could allow an authenticated user to execute arbitrary commands with elevated privileges. This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103. The issue affects NSRW packaged by Phoenix Contact routers: from 4.6.72.0 before 4.6.72.101, from 4.6.73.0 before 4.6.73.101.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0568 ‼
📖 Read
via "National Vulnerability Database".
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0862 ‼
📖 Read
via "National Vulnerability Database".
The NetModule NSRW web administration interface is vulnerable to path traversals, which could lead to arbitrary file uploads and deletion. By uploading malicious files to the web root directory, authenticated users could gain remote command execution with elevated privileges. This issue affects NSRW: from 4.3.0.0 before 4.3.0.119, from 4.4.0.0 before 4.4.0.118, from 4.6.0.0 before 4.6.0.105, from 4.7.0.0 before 4.7.0.103. The issue affects NSRW packaged by Phoenix Contact routers: from 4.6.72.0 before 4.6.72.101, from 4.6.73.0 before 4.6.73.101.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-0662 ‼
📖 Read
via "National Vulnerability Database".
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43969 ‼
📖 Read
via "National Vulnerability Database".
Ricoh mp_c4504ex devices with firmware 1.06 mishandle credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-38731 ‼
📖 Read
via "National Vulnerability Database".
Qaelum DOSE 18.08 through 21.1 before 21.2 allows Directory Traversal via the loadimages name parameter. It allows a user to specify an arbitrary location on the server's filesystem from which to load an image. (Only images are displayed to the attacker. All other files are loaded but not displayed.) The Content-Type response header reflects the actual content type of the file being requested. This allows an attacker to enumerate files on the local system. Additionally, remote resources can be requested via a UNC path, allowing an attacker to coerce authentication out from the server to the attackers machine.📖 Read
via "National Vulnerability Database".
🕴 Simplify to Survive: How Organizations Can Navigate Cyber-Risk 🕴
📖 Read
via "Dark Reading".
Simplification can result in efficiencies, reduced overhead, and the ability to respond to cyber threats more quickly.📖 Read
via "Dark Reading".
Dark Reading
Simplify to Survive: How Organizations Can Navigate Cyber-Risk
Simplification can result in efficiencies, reduced overhead, and the ability to respond to cyber threats more quickly.
🗓️ Read all about it: Introducing our new newsletter, Daily Swig Deserialized 🗓️
📖 Read
via "The Daily Swig".
Free fortnightly roundup and exclusive content for subscribers only📖 Read
via "The Daily Swig".
🕴 SideWinder APT Spotted Stealing Crypto 🕴
📖 Read
via "Dark Reading".
The nation-state threat group has been attacking a wider range of victims and regions than previously thought.📖 Read
via "Dark Reading".
Dark Reading
SideWinder APT Spotted Targeting Crypto
The nation-state threat group has been attacking a wider range of victims and regions than previously thought.
🕴 Window Snyder's Start-up Launches Security Platform for IoT Device Makers 🕴
📖 Read
via "Dark Reading".
Thistle's technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says.📖 Read
via "Dark Reading".
Dark Reading
Window Snyder's Startup Launches Security Platform for IoT Device Makers
Thistle's technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says.
‼ CVE-2022-48306 ‼
📖 Read
via "National Vulnerability Database".
Improper Validation of Certificate with Host Mismatch vulnerability in Gotham Chat IRC helper of Palantir Gotham allows A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. This issue affects: Palantir Palantir Gotham Chat IRC helper versions prior to 30221005.210011.9242.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-23558 ‼
📖 Read
via "National Vulnerability Database".
In Eternal Terminal 6.2.1, TelemetryService uses fixed paths in /tmp. For example, a local attacker can create /tmp/.sentry-native-etserver with mode 0777 before the etserver process is started. The attacker can choose to read sensitive information from that file, or modify the information in that file.📖 Read
via "National Vulnerability Database".