‼ CVE-2023-45805 ‼
📖 Read
via "National Vulnerability Database".
pdm is a Python package and dependency manager supporting the latest PEP standards. It's possible to craft a malicious `pdm.lock` file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project. A project `foo` can be targeted by creating the project `foo-2` and uploading the file `foo-2-2.tar.gz` to pypi.org. PyPI will see this as project `foo-2` version `2`, while PDM will see this as project `foo` version `2-2`. The version must only be `parseable as a version` and the filename must be a prefix of the project name, but it's not verified to match the version being installed. Version `2-2` is also not a valid normalized version per PEP 440. Matching the project name exactly (not just prefix) would fix the issue. When installing dependencies with PDM, what's actually installed could differ from what's listed in `pyproject.toml` (including arbitrary code execution on install). It could also be used for downgrade attacks by only changing the version. This issue has been addressed in commit `6853e2642df` which is included in release version `2.9.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-46117 ‼
📖 Read
via "National Vulnerability Database".
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities. A vulnerability has been identified in reconftw where inadequate validation of retrieved subdomains may lead to a Remote Code Execution (RCE) attack. An attacker can exploit this vulnerability by crafting a malicious CSP entry on it's own domain. Successful exploitation can lead to the execution of arbitrary code within the context of the application, potentially compromising the system. This issue has been addressed in version 2.7.1.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.📖 Read
via "National Vulnerability Database".
👍1
🕴 Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover 🕴
📖 Read
via "Dark Reading".
SolarWinds' access controls contain five high and three critical-severity security vulnerabilities that need to be patched yesterday.📖 Read
via "Dark Reading".
Dark Reading
Critical SolarWinds RCE Bugs Enable Unauthorized Network Takeover
SolarWinds' access controls contain five high-severity and three critical-severity security vulnerabilities that need to be patched yesterday.
🦿 Five Eyes Release Guidelines for Business Leaders on Securing Intellectual Property 🦿
📖 Read
via "Tech Republic".
The Five Eyes coalition's principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors.📖 Read
via "Tech Republic".
TechRepublic
Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
The Five Eyes coalition's principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors.
🕴 From Snooze to Enthuse: Security Awareness Training That Sticks 🕴
📖 Read
via "Dark Reading".
Most companies offer some kind of awareness training these days. But how much of those lessons are employees actually retaining?📖 Read
via "Dark Reading".
Dark Reading
From Snooze to Enthuse: Making Security Awareness Training 'Sticky'
Most companies offer some kind of awareness training these days. But how much of those lessons are employees actually retaining?
🕴 More Okta Customers Hacked 🕴
📖 Read
via "Dark Reading".
Attackers compromised customer support files containing cookies and session tokens, which could result in malicious impersonation of valid Okta users. 📖 Read
via "Dark Reading".
Dark Reading
More Okta Customers Hacked
Attackers compromised customer support files containing cookies and session tokens, which could result in malicious impersonation of valid Okta users.
‼ CVE-2023-5682 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/training/record/delete.php. The manipulation of the argument RECORD_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-243058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5681 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_addr_fwresource_ip.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243057 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-37824 ‼
📖 Read
via "National Vulnerability Database".
Sitolog sitologapplicationconnect v7.8.a and before was discovered to contain a SQL injection vulnerability via the component /activate_hook.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43353 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the extra parameter in the news menu component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32785 ‼
📖 Read
via "National Vulnerability Database".
In Langchain through 0.0.155, prompt injection allows execution of arbitrary code against the SQL service provided by the chain.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38191 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43354 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profiles parameter in the Extensions -MicroTiny WYSIWYG editor component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43357 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32786 ‼
📖 Read
via "National Vulnerability Database".
In Langchain through 0.0.155, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43356 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata parameter in the Global Settings Menu component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43346 ‼
📖 Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43355 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again parameters in the My Preferences - Add user component.📖 Read
via "National Vulnerability Database".
👍2
‼ CVE-2023-5205 ‼
📖 Read
via "National Vulnerability Database".
The Add Custom Body Class plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'add_custom_body_class' value in versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-5684 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231012. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /importexport.php. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243061 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-4635 ‼
📖 Read
via "National Vulnerability Database".
The EventON plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.📖 Read
via "National Vulnerability Database".