βΌ CVE-2023-1028 βΌ
π Read
via "National Vulnerability Database".
The WP Meta SEO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.3. This is due to missing or incorrect nonce validation on the setIgnore function. This makes it possible for unauthenticated attackers to update plugin options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βΌ CVE-2023-24419 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Form Builder Team Formidable Forms plugin <= 5.5.6 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2022-43459 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Forms by CaptainForm Γ’β¬β Form Builder for WordPress plugin <= 2.5.3 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23992 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in AutomatorWP plugin <= 2.5.0 leads to object delete.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1026 βΌ
π Read
via "National Vulnerability Database".
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the listPostsCategory function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to get post listings by category as long as those posts are published. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1027 βΌ
π Read
via "National Vulnerability Database".
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized sitemap generation due to a missing capability check on the checkAllCategoryInSitemap function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to obtain post categories. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1022 βΌ
π Read
via "National Vulnerability Database".
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized options update due to a missing capability check on the wpmsGGSaveInformation function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to update google analytics options maintained by the plugin. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1024 βΌ
π Read
via "National Vulnerability Database".
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized sitemap generation due to a missing capability check on the regenerateSitemaps function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to generate sitemaps. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1080 βΌ
π Read
via "National Vulnerability Database".
The GN Publisher plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the Γ’β¬ΛtabΓ’β¬β’ parameter in versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βοΈ Hackers Claim They Breached T-Mobile More Than 100 Times in 2022 βοΈ
π Read
via "Krebs on Security".
Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employees for access to internal company tools, and then convert that access into a cybercrime service that could be hired to divert any T-Mobile user's text messages and phone calls to another device.π Read
via "Krebs on Security".
Krebs on Security
Hackers Claim They Breached T-Mobile More Than 100 Times in 2022
Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate incidents throughout 2022, new data suggests. In each case, the goal of the attackers was the same: Phish T-Mobile employeesβ¦
π΄ China's BlackFly Targets Materials Sector in 'Relentless' Quest for IP π΄
π Read
via "Dark Reading".
Separate attacks on two subsidiaries of an Asian conglomerate reflect a surge of cyber-espionage activity in the region in the last 12 months.π Read
via "Dark Reading".
Dark Reading
China's BlackFly Targets Materials Sector in 'Relentless' Quest for IP
Separate attacks on two subsidiaries of an Asian conglomerate reflect a surge of cyber-espionage activity in the region in the last 12 months.
βΌ CVE-2023-23983 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Responsive Vertical Icon Menu plugin <= 1.5.8 can lead to theme deletion.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25807 βΌ
π Read
via "National Vulnerability Database".
DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25266 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).π Read
via "National Vulnerability Database".
βΌ CVE-2023-25265 βΌ
π Read
via "National Vulnerability Database".
Docmosis Tornado <= 2.9.4 is vulnerable to Directory Traversal leading to the disclosure of arbitrary content on the file system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26255 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26256 βΌ
π Read
via "National Vulnerability Database".
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0461 βΌ
π Read
via "National Vulnerability Database".
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307cπ Read
via "National Vulnerability Database".
βΌ CVE-2022-47612 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <= 2.4.5 leads to list column update.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25264 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Docmosis Tornado prior to version 2.9.5. An unauthenticated attacker can bypass the authentication check filter completely by introducing a specially crafted request with relative path segments.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23865 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Checkout Plugins Stripe Payments For WooCommerce plugin <= 1.4.10 leads to settings change.π Read
via "National Vulnerability Database".