βΌ CVE-2023-35043 βΌ
π Read
via "National Vulnerability Database".
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Neha Goel Recent Posts Slider plugin <=Γ 1.1 versions.π Read
via "National Vulnerability Database".
π jSQL Injection 0.90 π
π Read
via "Packet Storm Security".
jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.π Read
via "Packet Storm Security".
Packetstormsecurity
jSQL Injection 0.90 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2023-39174 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2023.05.2 a ReDoS attack was possible via integration with issue trackersπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34017 βΌ
π Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FiveStarPlugins Five Star Restaurant Reservations plugin <=Γ 2.6.7 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36502 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cththemes Balkon plugin <=Γ 1.3.2 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-34093 βΌ
π Read
via "National Vulnerability Database".
Strapi is an open-source headless content management system. Prior to version 4.10.8, anyone (Strapi developers, users, plugins) can make every attribute of a Content-Type public without knowing it. The vulnerability only affects the handling of content types by Strapi, not the actual content types themselves. Users can use plugins or modify their own content types without realizing that the `privateAttributes` getter is being removed, which can result in any attribute becoming public. This can lead to sensitive information being exposed or the entire system being taken control of by an attacker(having access to password hashes). Anyone can be impacted, depending on how people are using/extending content-types. If the users are mutating the content-type, they will not be affected. Version 4.10.8 contains a patch for this issue.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36501 βΌ
π Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Winkler teachPress plugin <=Γ 9.0.2 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39173 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2023.05.2 a token with limited permissions could be used to gain full account accessπ Read
via "National Vulnerability Database".
βΌ CVE-2023-39175 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2023.05.2 reflected XSS via GitHub integration was possibleπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34369 βΌ
π Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GrandSlambert Login Configurator plugin <=Γ 2.1 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36385 βΌ
π Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wpxpo PostX Γ’β¬β Gutenberg Post Grid Blocks plugin <=Γ 2.9.9 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37895 βΌ
π Read
via "National Vulnerability Database".
Java object deserialization issue in Jackrabbit webapp/standalone on all platforms allows attacker to remotely execute code via RMIVersions up to (including) 2.20.10 (stable branch) and 2.21.17 (unstable branch) use the component "commons-beanutils", which contains a class that can be used for remote code execution over RMI.Users are advised to immediately update to versions 2.20.11 or 2.21.18. Note that earlier stable branches (1.0.x .. 2.18.x) have been EOLd already and do not receive updates anymore.In general, RMI support can expose vulnerabilities by the mere presence of an exploitable class on the classpath. Even if Jackrabbit itself does not contain any code known to be exploitable anymore, adding other components to your server can expose the same type of problem. We therefore recommend to disable RMI access altogether (see further below), and will discuss deprecating RMI support in future Jackrabbit releases.How to check whether RMI support is enabledRMI support can be over an RMI-specific TCP port, and over an HTTP binding. Both are by default enabled in Jackrabbit webapp/standalone.The native RMI protocol by default uses port 1099. To check whether it is enabled, tools like "netstat" can be used to check.RMI-over-HTTP in Jackrabbit by default uses the path "/rmi". So when running standalone on port 8080, check whether an HTTP GET request on localhost:8080/rmi returns 404 (not enabled) or 200 (enabled). Note that the HTTP path may be different when the webapp is deployed in a container as non-root context, in which case the prefix is under the user's control.Turning off RMIFind web.xml (either in JAR/WAR file or in unpacked web application folder), and remove the declaration and the mapping definition for the RemoteBindingServlet:Γ Γ Γ Γ <servlet>Γ Γ Γ Γ Γ Γ <servlet-name>RMI</servlet-name>Γ Γ Γ Γ Γ Γ <servlet-class>org.apache.jackrabbit.servlet.remote.RemoteBindingServlet</servlet-class>Γ Γ Γ Γ </servlet>Γ Γ Γ Γ <servlet-mapping>Γ Γ Γ Γ Γ Γ <servlet-name>RMI</servlet-name>Γ Γ Γ Γ Γ Γ <url-pattern>/rmi</url-pattern>Γ Γ Γ Γ </servlet-mapping>Find the bootstrap.properties file (in $REPOSITORY_HOME), and setΓ Γ Γ Γ rmi.enabled=falseΓ Γ and also removeΓ Γ Γ Γ rmi.hostΓ Γ Γ Γ rmi.portΓ Γ Γ Γ rmi.url-patternΓ If there is no file named bootstrap.properties in $REPOSITORY_HOME, it is located somewhere in the classpath. In this case, place a copy in $REPOSITORY_HOME and modify it as explained.Γ π Read
via "National Vulnerability Database".
βΌ CVE-2023-36503 βΌ
π Read
via "National Vulnerability Database".
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Max Foundry WordPress Button Plugin MaxButtons plugin <=Γ 9.5.3 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3548 βΌ
π Read
via "National Vulnerability Database".
An unauthorized user could gain account access to IQ Wifi 6 versions prior to 2.0.2 by conducting a brute force authentication attack.π Read
via "National Vulnerability Database".
π¦Ώ Get 8 Months of Live Cyber Security Training for Under $500 π¦Ώ
π Read
via "Tech Republic".
If you're new to cyber security or trying to improve your knowledge, Cyber Security Specialist Workshop Live Sessions provides 32 weeks of essential training for under $500.π Read
via "Tech Republic".
TechRepublic
Save $500 on This Unique Web-Based Cybersecurity Training Program
The Cyber Security Specialist Workshop features 16 live training sessions that are scheduled once every 15 days and can be completed in just eight months.
βΌ CVE-2023-3773 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the Linux kernelΓ’β¬β’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3772 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the Linux kernelΓ’β¬β’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38435 βΌ
π Read
via "National Vulnerability Database".
An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Apache Felix Healthcheck Webconsole Plugin version 2.0.2 and prior may allow an attacker to perform a reflected cross-site scripting (XSS) attack.Upgrade to Apache Felix Healthcheck Webconsole Plugin 2.1.0 or higher.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46898 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Path Traversal via the "restore SQL data" filename. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. The filename provided is not properly sanitized and allows for the inclusion of a path-traversal payload that can be used to escape the intended Vocera restoration directory. An attacker could exploit this vulnerability to point to a crafted ZIP archive that contains SQL commands that could be executed against the database.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3944 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in phpscriptpoint Lawyer 1.6 and classified as problematic. Affected by this issue is some unknown functionality of the file page.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235400. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
βΌ CVE-2022-46901 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is an Access Control Violation for Database Operations. The Vocera Report Console contains a websocket interface that allows for the unauthenticated execution of various tasks and database functions. This includes system tasks, and backing up, loading, and clearing of the database.π Read
via "National Vulnerability Database".