βΌ CVE-2023-1854 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224994 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1852 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as problematic was found in SourceCodester Online Payroll System 1.0. This vulnerability affects unknown code of the file /admin/deduction_edit.php. The manipulation of the argument description leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224992.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26536 βΌ
π Read
via "National Vulnerability Database".
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Jonk @ Follow me Darling Sp*tify Play Button for WordPress plugin <= 2.05 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1848 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/attendance_row.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224988.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1858 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as problematic. This affects an unknown part of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-224997 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1845 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224985 was assigned to this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28069 βΌ
π Read
via "National Vulnerability Database".
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. An attacker with privileges same as a legitimate user can phish the legitimate the user to redirect to malicious website leading to information disclosure and launch of phishing attacks.π Read
via "National Vulnerability Database".
π΄ New GRC Platform TrustRegister Links Risk to Revenue Impact π΄
π Read
via "Dark Reading".
The new TrustRegister application allows companies to proactively surface risks and remediation plans via programmatic risk assessments.π Read
via "Dark Reading".
Dark Reading
New GRC Platform TrustRegister Links Risk to Revenue Impact
The application allows companies to proactively surface risks and remediation plans via programmatic risk assessments.
π΄ 3 Fronts in the Battle for Digital Identity π΄
π Read
via "Dark Reading".
As both digital protection strategies and digital attacks become more sophisticated, organizations that know the terrain have a better chance of navigating it.π Read
via "Dark Reading".
Dark Reading
3 Fronts in the Battle for Digital Identity
As both digital protection strategies and digital attacks become more sophisticated, organizations that know the terrain have a better chance of navigating it.
π1
βΌ CVE-2023-26789 βΌ
π Read
via "National Vulnerability Database".
Veritas NetBackUp OpsCenter Version 9.1.0.1 is vulnerable to Reflected Cross-site scripting (XSS). The Web App fails to adequately sanitize special characters. By leveraging this issue, an attacker is able to cause arbitrary HTML and JavaScript code to be executed in a user's browser.π Read
via "National Vulnerability Database".
βΌ CVE-2013-10022 βΌ
π Read
via "National Vulnerability Database".
A vulnerability, which was classified as problematic, has been found in BestWebSoft Contact Form Plugin 3.51. Affected by this issue is the function cntctfrm_display_form/cntctfrm_check_form of the file contact_form.php. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.52 is able to address this issue. The name of the patch is 642ef1dc1751ab6642ce981fe126325bb574f898. It is recommended to upgrade the affected component. VDB-225002 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
π΄ FBI Seizes Genesis Cybercriminal Marketplace in 'Operation Cookie Monster' π΄
π Read
via "Dark Reading".
The homepage of a widely used Dark Web forum for stolen cookies and other compromised data has been replaced by a seizure notice by the US federal law enforcement agency.π Read
via "Dark Reading".
Dark Reading
FBI Seizes Genesis Cybercriminal Marketplace in 'Operation Cookie Monster'
The homepage of a widely used Dark Web forum for stolen cookies and other compromised data has been replaced by a seizure notice by the US federal law enforcement agency.
π΄ QNAP Zero-Days Leave 80K Devices Vulnerable to Cyberattack π΄
π Read
via "Dark Reading".
Multiple QNAP operating systems are affected, including QTS, QuTS hero, QuTScloud, and QVP Pro appliances, and some don't yet have patches available.π Read
via "Dark Reading".
Dark Reading
QNAP Zero-Days Leave 80K Devices Vulnerable to Cyberattack
Multiple QNAP operating systems are affected, including QTS, QuTS hero, QuTScloud, and QVP Pro appliances, and some don't yet have patches available.
β Einstein tilings β the amazing βHatβ shape that never repeats! β
π Read
via "Naked Security".
Imagine tiling a whole football field using a single shape... yet not being able to produce a repeating pattern, even if you wanted to.π Read
via "Naked Security".
Naked Security
Einstein tilings β the amazing βHatβ shape that never repeats!
Imagine tiling a whole football field using a single shape⦠yet not being able to produce a repeating pattern, even if you wanted to.
π΄ Researcher Tricks ChatGPT into Building Undetectable Steganography Malware π΄
π Read
via "Dark Reading".
Using only ChatGPT prompts, a Forcepoint researcher convinced the AI to create malware for finding and exfiltrating specific documents, despite its directive to refuse malicious requests.π Read
via "Dark Reading".
Dark Reading
Researcher Tricks ChatGPT Into Building Undetectable Steganography Malware
Using only ChatGPT prompts, a Forcepoint researcher convinced the AI to create malware for finding and exfiltrating specific documents, despite its directive to refuse malicious requests.
βΌ CVE-2023-1865 βΌ
π Read
via "National Vulnerability Database".
The YourChannel plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check when resetting plugin settings via the yrc_nuke GET parameter in versions up to, and including, 1.2.3. This makes it possible for unauthenticated attackers to delete YouTube channels from the plugin.π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-1870 βΌ
π Read
via "National Vulnerability Database".
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the saveLang function. This makes it possible for unauthenticated attackers to change the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βΌ CVE-2023-26857 βΌ
π Read
via "National Vulnerability Database".
An arbitrary file upload vulnerability in /admin/ajax.php?action=save_uploads of Dynamic Transaction Queuing System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28632 βΌ
π Read
via "National Vulnerability Database".
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the "forgotten password" feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to `Forgotten password?` event. However, it will not prevent unauthorized modification of any user emails.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1871 βΌ
π Read
via "National Vulnerability Database".
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the deleteLang function. This makes it possible for unauthenticated attackers to reset the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1867 βΌ
π Read
via "National Vulnerability Database".
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.π Read
via "National Vulnerability Database".