βΌ CVE-2023-4495 βΌ
π Read
via "National Vulnerability Database".
Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Resume parameter. The XSS is loaded from /register.ghp.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4090 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) reflected vulnerability on WideStand until 5.3.5 version, which generates one of the meta tags directly using the content of the queried URL, which would allow an attacker to inject HTML/Javascript code into the response.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22618 βΌ
π Read
via "National Vulnerability Database".
If Security Hardening guide rules are not followed, then Nokia WaveLite products allow a local user to create new users with administrative privileges by manipulating a web request. This affects (for example) WaveLite Metro 200 and Fan, WaveLite Metro 200 OPS and Fans, WaveLite Metro 200 and F2B fans, WaveLite Metro 200 OPS and F2B fans, WaveLite Metro 200 NE and F2B fans, and WaveLite Metro 200 NE OPS and F2B fans.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4037 βΌ
π Read
via "National Vulnerability Database".
Blind SQL injection vulnerability in the Conacwin 3.7.1.2 web interface, the exploitation of which could allow a local attacker to obtain sensitive data stored in the database by sending a specially crafted SQL query to the xml parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3037 βΌ
π Read
via "National Vulnerability Database".
Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3038 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4132 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).π Read
via "National Vulnerability Database".
βΌ CVE-2023-4493 βΌ
π Read
via "National Vulnerability Database".
Stored Cross-Site Scripting in Easy Address Book Web Server 1.6 version, through the users_admin.ghp file that affects multiple parameters such as (firstname, homephone, lastname, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate, workzip). This vulnerability allows a remote attacker to store a malicious JavaScript payload in the application to be executed when the page is loaded, resulting in an integrity impact.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4494 βΌ
π Read
via "National Vulnerability Database".
Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4492 βΌ
π Read
via "National Vulnerability Database".
Vulnerability in Easy Address Book Web Server 1.6 version, affecting the parameters (firstname, homephone, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate and workzip) of the /addrbook.ghp file, allowing an attacker to inject a JavaScript payload specially designed to run when the application is loadedπ Read
via "National Vulnerability Database".
βΌ CVE-2023-4496 βΌ
π Read
via "National Vulnerability Database".
Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.π Read
via "National Vulnerability Database".
π¦Ώ Appleβs Face ID Cheat Sheet: What It Is and How to Use It π¦Ώ
π Read
via "Tech Republic".
Apple's Face ID is a secure and convenient facial recognition feature that utilizes a TrueDepth camera system for fast, reliable and secure access.π Read
via "Tech Republic".
TechRepublic
Appleβs Face ID Cheat Sheet: What It Is and How to Use It
Apple's Face ID is a secure and convenient facial recognition feature that utilizes TrueDepth cameras for fast, reliable and secure access.
π΄ How to Measure Patching and Remediation Performance π΄
π Read
via "Dark Reading".
Tracking metrics like MTTR, MTTD, MTTP, and MTTC can demonstrate the effectiveness of your patch management process and your value to the business.π Read
via "Dark Reading".
Dark Reading
How to Measure Patching and Remediation Performance
Tracking metrics like MTTR, MTTD, MTTP, and MTTC can demonstrate the effectiveness of your patch management process and your value to the business.
π΄ Patch Confusion for Critical Exim Bug Puts Email Servers at Risk--Again π΄
π Read
via "Dark Reading".
Defenders have been left scrambling after the way patches were released for six flaws in the open source mail server, which is the most popular mail transfer agent on the Internet.π Read
via "Dark Reading".
Dark Reading
Patch Confusion for Critical Exim Bug Puts Email Servers at Risk β Again
Defenders have been left scrambling after the way patches were released for six flaws in the open source mail server, which is the most popular mail transfer agent on the Internet.
π OpenSSH 9.5p1 π
π Read
via "Packet Storm Security".
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.π Read
via "Packet Storm Security".
Packetstormsecurity
OpenSSH 9.5p1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2023-40559 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Dynamic Pricing and Discount Rules for WooCommerce plugin <=Γ 2.4.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25025 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole WP-CopyProtect [Protect your blog posts] plugin <=Γ 3.1.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4380 βΌ
π Read
via "National Vulnerability Database".
A logic flaw exists in Ansible. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-22515 βΌ
π Read
via "National Vulnerability Database".
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. For more details, please review the linked advisory on this CVE.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5374 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241255.π Read
via "National Vulnerability Database".
βΌ CVE-2023-3971 βΌ
π Read
via "National Vulnerability Database".
An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.π Read
via "National Vulnerability Database".