โผ CVE-2023-31862 โผ
๐ Read
via "National Vulnerability Database".
jizhicms v2.4.6 is vulnerable to Cross Site Scripting (XSS). The content of the article published in the front end is only filtered in the front end, without being filtered in the background, which allows attackers to publish an article containing malicious JavaScript scripts by modifying the request package.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-22878 โผ
๐ Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 244373.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-28529 โผ
๐ Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 251213.๐ Read
via "National Vulnerability Database".
โผ CVE-2022-47984 โผ
๐ Read
via "National Vulnerability Database".
IBM InfoSphere Information Server 11.7 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 243163.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2814 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability classified as problematic has been found in SourceCodester Class Scheduling System 1.0. Affected is an unknown function of the file /admin/save_teacher.php of the component POST Parameter Handler. The manipulation of the argument Academic_Rank leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229428.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2815 โผ
๐ Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in SourceCodester Online Jewelry Store 1.0. Affected by this vulnerability is an unknown functionality of the file supplier.php of the component POST Parameter Handler. The manipulation of the argument suppid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229429 was assigned to this vulnerability.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-28950 โผ
๐ Read
via "National Vulnerability Database".
IBM MQ 8.0, 9.0, 9.1, 9.2, and 9.3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X-Force ID: 251358.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-1996 โผ
๐ Read
via "National Vulnerability Database".
A reflected Cross-site Scripting (XSS) vulnerability in 3DEXPERIENCE R2018x through R2023x allows an attacker to execute arbitrary script code.๐ Read
via "National Vulnerability Database".
๐ด Data Siloes: Overcoming the Greatest Challenge in SecOps ๐ด
๐ Read
via "Dark Reading".
It's not lack of data that's the problem, but the inability to piece that together to truly understand and reduce risk.๐ Read
via "Dark Reading".
Dark Reading
Data Siloes: Overcoming the Greatest Challenge in SecOps
It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.
๐ด Apple Patches 3 Zero-Days Possibly Already Exploited ๐ด
๐ Read
via "Dark Reading".
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.๐ Read
via "Dark Reading".
Dark Reading
Apple Patches 3 Zero-Days Possibly Already Exploited
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.
๐ด 3 Common Initial Attack Vectors Account for Most Ransomware Campaigns ๐ด
๐ Read
via "Dark Reading".
The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.๐ Read
via "Dark Reading".
Dark Reading
3 Common Initial Attack Vectors Account for Most Ransomware Campaigns
The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.
โผ CVE-2023-32675 โผ
๐ Read
via "National Vulnerability Database".
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In contracts with more than one regular nonpayable function, it is possible to send funds to the default function, even if the default function is marked `nonpayable`. This applies to contracts compiled with vyper versions prior to 0.3.8. This issue was fixed by the removal of the global `calldatasize` check in commit `02339dfda`. Users are advised to upgrade to version 0.3.8. Users unable to upgrade should avoid use of nonpayable default functions.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-32679 โผ
๐ Read
via "National Vulnerability Database".
Craft CMS is an open source content management system. In affected versions of Craft CMS an unrestricted file extension may lead to Remote Code Execution. If the name parameter value is not empty string('') in the View.php's doesTemplateExist() -> resolveTemplate() -> _resolveTemplateInternal() -> _resolveTemplate() function, it returns directly without extension verification, so that arbitrary extension files are rendered as twig templates. When attacker with admin privileges on a DEV or an improperly configured STG or PROD environment, they can exploit this vulnerability to remote code execution. Code execution may grant the attacker access to the host operating system. This issue has been addressed in version 4.4.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-32677 โผ
๐ Read
via "National Vulnerability Database".
Zulip is an open-source team collaboration tool with unique topic-based threading. Zulip administrators can configure Zulip to limit who can add users to streams, and separately to limit who can invite users to the organization. In Zulip Server 6.1 and below, the UI which allows a user to invite a new user also allows them to set the streams that the new user is invited to -- even if the inviting user would not have permissions to add an existing user to streams. While such a configuration is likely rare in practice, the behavior does violate security-related controls. This does not let a user invite new users to streams they cannot see, or would not be able to add users to if they had that general permission. This issue has been addressed in version 6.2. Users are advised to upgrade. Users unable to upgrade may limit sending of invitations down to users who also have the permission to add users to streams.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-28623 โผ
๐ Read
via "National Vulnerability Database".
Zulip is an open-source team collaboration tool with unique topic-based threading. In the event that 1: `ZulipLDAPAuthBackend` and an external authentication backend (any aside of `ZulipLDAPAuthBackend` and `EmailAuthBackend`) are the only ones enabled in `AUTHENTICATION_BACKENDS` in `/etc/zulip/settings.py` and 2: The organization permissions don't require invitations to join. An attacker can create a new account in the organization with an arbitrary email address in their control that's not in the organization's LDAP directory. The impact is limited to installations which have this specific combination of authentication backends as described above in addition to having `Invitations are required for joining this organization` organization permission disabled. This issue has been addressed in version 6.2. Users are advised to upgrade. Users unable to upgrade may enable the `Invitations are required for joining this organization` organization permission to prevent this issue.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2716 โผ
๐ Read
via "National Vulnerability Database".
The Groundhogg plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'ajax_upload_file' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload a file to the contact, and then lists all the other uploaded files related to the contact.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2735 โผ
๐ Read
via "National Vulnerability Database".
The Groundhogg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gh_form' shortcode in versions up to, and including, 2.7.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Please note this only works with legacy contact forms.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2715 โผ
๐ Read
via "National Vulnerability Database".
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'submit_ticket' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers to create a support ticket that sends the website's data to the plugin developer, and it is also possible to create an admin access with an auto login link that is also sent to the plugin developer with the ticket. It only works if the plugin is activated with a valid license.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2736 โผ
๐ Read
via "National Vulnerability Database".
The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation in the 'ajax_edit_contact' function. This makes it possible for authenticated attackers to receive the auto login link via shortcode and then modify the assigned user to the auto login link to elevate verified user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2276 โผ
๐ Read
via "National Vulnerability Database".
The WCFM Membership รขโฌโ WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-2714 โผ
๐ Read
via "National Vulnerability Database".
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_license' functions in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the license key and support license key, but it can only be changed to a valid license key.๐ Read
via "National Vulnerability Database".