βΌ CVE-2023-33756 βΌ
π Read
via "National Vulnerability Database".
An issue in the SpreadSheetPlugin component of Foswiki v2.1.7 and below allows attackers to execute a directory traversal.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36306 βΌ
π Read
via "National Vulnerability Database".
A Cross Site Scripting (XSS) vulnerability in Adiscon Aiscon LogAnalyzer through 4.1.13 allows a remote attacker to execute arbitrary code via the asktheoracle.php, details.php, index.php, search.php, export.php, reports.php, and statistics.php components.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3652 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Reflected XSS.This issue affects E-Commerce Software: before 11.π Read
via "National Vulnerability Database".
βΌ CVE-2023-36136 βΌ
π Read
via "National Vulnerability Database".
PHPJabbers Class Scheduling System 1.0 lacks encryption on the password when editing a user account (update user page) allowing an attacker to capture all user names and passwords in clear text.π Read
via "National Vulnerability Database".
π¦Ώ Australiaβs Banking Industry Mulls Better Cross-Collaboration to Defeat Scam Epidemic π¦Ώ
π Read
via "Tech Republic".
The ACCC has given the green light for cross-banking collaboration to address scams. Hereβs how IT pros in Australia can and should address the current regulatory environment.π Read
via "Tech Republic".
TechRepublic
Australia's Banking Sector Can Embrace Cross-Collaboration to Combat Scams
The ACCC has given the green light for cross-banking collaboration to address scams. Here's how IT pros in financial services can take advantage of this opportunity.
βοΈ Meet the Brains Behind the Malware-Friendly AI Chat Service βWormGPTβ βοΈ
π Read
via "Krebs on Security".
WormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to help write malicious software without all the pesky prohibitions on such activity enforced by ChatGPT and Google Bard, has started adding restrictions on how the service can be used. Faced with customers trying to use WormGPT to create ransomware and phishing scams, the 23-year-old Portuguese programmer who created the project now says his service is slowly morphing into βa more controlled environment.βThe large language models (LLMs) made by ChatGPT parent OpenAI or Google or Microsoft all have various safety measures designed to prevent people from abusing them for nefarious purposes β such as creating malware or hate speech. In contrast, WormGPT has promoted itself as a new LLM that was created specifically for cybercrime activities.π Read
via "Krebs on Security".
Krebs on Security
Meet the Brains Behind the Malware-Friendly AI Chat Service βWormGPTβ
WormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to help write malicious software without all the pesky prohibitions on such activity enforced by ChatGPT and Google Bard, has started adding restrictions on howβ¦
βΌ CVE-2023-37646 βΌ
π Read
via "National Vulnerability Database".
An issue in the CAB file extraction function of Bitberry File Opener v23.0 allows attackers to execute a directory traversal.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38763 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the FundRaiserID parameter within the /FundRaiserEditor.php endpoint.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38770 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the group parameter within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38765 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the membermonth parameter within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38773 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp1 and volopp2 parameters within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38759 βΌ
π Read
via "National Vulnerability Database".
Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3522 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38762 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the friendmonths parameter within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38768 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the PropertyID parameter within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38769 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the searchstring and searchwhat parameters within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-39532 βΌ
π Read
via "National Vulnerability Database".
SES is a JavaScript environment that allows safe execution of arbitrary programs in Compartments. In version 0.18.0 prior to 0.18.7, 0.17.0 prior to 0.17.1, 0.16.0 prior to 0.16.1, 0.15.0 prior to 0.15.24, 0.14.0 prior to 0.14.5, an 0.13.0 prior to 0.13.5, there is a hole in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host.Guest program running inside a Compartment with as few as no endowments can gain access to the surrounding hostΓ’β¬β’s dynamic import by using dynamic import after the spread operator, like `{...import(arbitraryModuleSpecifier)}`.On the web or in web extensions, a Content-Security-Policy following ordinary best practices likely mitigates both the risk of exfiltration and execution of arbitrary code, at least limiting the modules that the attacker can import to those that are already part of the application. However, without a Content-Security-Policy, dynamic import can be used to issue HTTP requests for either communication through the URL or for the execution of code reachable from that origin.Within an XS worker, an attacker can use the hostΓ’β¬β’s module system to the extent that the host has been configured. This typically only allows access to module code on the hostΓ’β¬β’s file system and is of limited use to an attacker.Within Node.js, the attacker gains access to Node.jsΓ’β¬β’s module system. Importing the powerful builtins is not useful except insofar as there are side-effects and tempered because dynamic import returns a promise. Spreading a promise into an object renders the promises useless. However, Node.js allows importing data URLs, so this is a clear path to arbitrary execution.Versions 0.18.7, 0.17.1, 0.16.1, 0.15.24, 0.14.5, and 0.13.5 contain a patch for this issue. Some workarounds are available. On the web, providing a suitably constrained Content-Security-Policy mitigates most of the threat. With XS, building a binary that lacks the ability to load modules at runtime mitigates the entirety of the threat. That will look like an implementation of `fxFindModule` in a file like `xsPlatform.c` that calls `fxRejectModuleFile`.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38764 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the birthmonth and percls parameters within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38758 βΌ
π Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the license_author field in the add-ingredient function in the templates/ingredients/view.html, models/ingredients.py, and views/ingredients.py components.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38771 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp parameter within the /QueryView.php.π Read
via "National Vulnerability Database".
βΌ CVE-2023-38767 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the 'value' and 'custom' parameters within the /QueryView.php.π Read
via "National Vulnerability Database".