‼ CVE-2023-26145 ‼
📖 Read
via "National Vulnerability Database".
This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.**Note:**The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5232 ‼
📖 Read
via "National Vulnerability Database".
The Font Awesome More Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'icon' shortcode in versions up to, and including, 3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-26149 ‼
📖 Read
via "National Vulnerability Database".
Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function. **Note:**If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5233 ‼
📖 Read
via "National Vulnerability Database".
The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".
📢 Life after the cookie has crumbled 📢
📖 Read
via "ITPro".
With cookies expected to be phased out in the next few years, businesses will be seeking new avenues to gain first-party data 📖 Read
via "ITPro".
ITPro
Life after the cookie has crumbled
With cookies expected to be phased out in the next few years, businesses will be seeking new avenues to gain first-party data
📢 ICO warns against Excel spreadsheets to curb public sector data breaches 📢
📖 Read
via "ITPro".
The ICO's advisory follows a spate of data protection blunders at UK police forces in recent months 📖 Read
via "ITPro".
ITPro
ICO warns against Excel spreadsheets to curb public sector data breaches
The ICO's advisory follows a spate of data protection blunders at UK police forces in recent months
🕴 Supply Chain Attackers Escalate With GitHub Dependabot Impersonation 🕴
📖 Read
via "Dark Reading".
Armed with stolen developer passcodes, attackers have checked in changes to repositories under the automation feature's name in an attempt to escape notice.📖 Read
via "Dark Reading".
Dark Reading
Supply Chain Attackers Escalate With GitHub Dependabot Impersonation
Armed with stolen developer passcodes, attackers have checked in changes to repositories under the automation feature's name in an attempt to escape notice.
🕴 4 Legal Surprises You May Encounter After a Cybersecurity Incident 🕴
📖 Read
via "Dark Reading".
Many organizations are not prepared to respond to all the constituencies that come knocking after a breach or ransomware incident.📖 Read
via "Dark Reading".
Dark Reading
4 Legal Surprises You May Encounter After a Cybersecurity Incident
Many organizations are not prepared to respond to all the constituencies that come knocking after a breach or ransomware incident.
‼ CVE-2023-43869 ‼
📖 Read
via "National Vulnerability Database".
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 Function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43861 ‼
📖 Read
via "National Vulnerability Database".
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanPPPoE function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43860 ‼
📖 Read
via "National Vulnerability Database".
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanNonLogin function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43876 ‼
📖 Read
via "National Vulnerability Database".
A Cross-Site Scripting (XSS) vulnerability in installation of October v.3.4.16 allows an attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost field.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43878 ‼
📖 Read
via "National Vulnerability Database".
Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a crafted payload into the Main Menu Items in the Administration Menu.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-47187 ‼
📖 Read
via "National Vulnerability Database".
There is a file upload XSS vulnerability in Generex CS141 below 2.06 version. The web application allows file uploading, making it possible to upload a file with HTML content. When HTML files are allowed, XSS payload can be injected into the uploaded file.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-43868 ‼
📖 Read
via "National Vulnerability Database".
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40307 ‼
📖 Read
via "National Vulnerability Database".
An attacker with standard privileges on macOS when requesting administrator privileges from the application can submit input which causes a buffer overflow resulting in a crash of the application. This could make the application unavailable and allow reading or modification of data.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43873 ‼
📖 Read
via "National Vulnerability Database".
A Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Name filed in the Manage Menu.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43871 ‼
📖 Read
via "National Vulnerability Database".
A File upload vulnerability in WBCE v.1.6.1 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43866 ‼
📖 Read
via "National Vulnerability Database".
D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard7 function.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43872 ‼
📖 Read
via "National Vulnerability Database".
A File upload vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43874 ‼
📖 Read
via "National Vulnerability Database".
Multiple Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Copyright and Author fields in the Meta & Custom Tags Menu.📖 Read
via "National Vulnerability Database".