βΌ CVE-2023-35646 βΌ
π Read
via "National Vulnerability Database".
In TBD of TBD, there is a possible stack buffer overflow due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35649 βΌ
π Read
via "National Vulnerability Database".
In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45132 βΌ
π Read
via "National Vulnerability Database".
NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-42298 βΌ
π Read
via "National Vulnerability Database".
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1943 βΌ
π Read
via "National Vulnerability Database".
Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.π Read
via "National Vulnerability Database".
π2
π΄ Pan-African Financial Apps Leak Encryption, Authentication Keys π΄
π Read
via "Dark Reading".
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.π Read
via "Dark Reading".
Dark Reading
Pan-African Financial Apps Leak Encryption, Authentication Keys
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.
π΄ New California Delete Act Tightens Rules for Data Brokers π΄
π Read
via "Dark Reading".
Companies with customers in California need to prepare for a new process for demanding deletion of personal data.π Read
via "Dark Reading".
Dark Reading
New California Delete Act Tightens Rules for Data Brokers
Companies with customers in California need to prepare for a new process for demanding deletion of personal data.
π΄ How to Scan Your Environment for Vulnerable Versions of Curl π΄
π Read
via "Dark Reading".
This Tech Tip outlines how enterprise defenders can mitigate the risks of the curl and libcurl vulnerabilities in their environment.π Read
via "Dark Reading".
Dark Reading
How to Scan Your Environment for Vulnerable Versions of Curl
This Tech Tip outlines how enterprise defenders can mitigate the risks of the curl and libcurl vulnerabilities in their environments.
βΌ CVE-2023-45058 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in KaizenCoders Short URL plugin <=Γ 1.6.8 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-43789 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23737 βΌ
π Read
via "National Vulnerability Database".
Unauth. SQL Injection (SQLi) vulnerability in MainWP MainWP Broken Links Checker Extension plugin <=Γ 4.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5045 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Kayisi allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Kayisi: before 1286.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45048 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin <=Γ 5.00 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-23651 βΌ
π Read
via "National Vulnerability Database".
Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP Google Analytics ExtensionΓ plugin <= 4.0.4 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45052 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in dan009 WP Bing Map Pro plugin <Γ 5.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45063 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <=Γ 1.1.5 versions.π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-45011 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Igor Buyanov WP Power Stats plugin <=Γ 2.2.3 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45060 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com Interactive World Map plugin <=Γ 3.2.0 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-5046 βΌ
π Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Procost allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Procost: before 1390.π Read
via "National Vulnerability Database".
βΌ CVE-2023-44998 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom Category Meta plugin plugin <=Γ 1.2.8 versions.π Read
via "National Vulnerability Database".
βΌ CVE-2023-45068 βΌ
π Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Contact Form by Supsystic plugin <=Γ 1.7.27 versions.π Read
via "National Vulnerability Database".