โผ CVE-2023-5211 โผ
๐ Read
via "National Vulnerability Database".
The Fattura24 WordPress plugin before 6.2.8 does not sanitize or escape the 'id' parameter before outputting it back in the page, leading to a reflected Cross-Site Scripting vulnerability.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-42658 โผ
๐ Read
via "National Vulnerability Database".
Archive, check and export commands in Chef InSpecprior to 4.56.58 and 5.22.29 allow local command execution via maliciouslycrafted profile.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-25047 โผ
๐ Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 9.9.3.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-5307 โผ
๐ Read
via "National Vulnerability Database".
The Photos and Files Contest Gallery WordPress plugin before 21.2.8.1 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks via certain headers.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-46237 โผ
๐ Read
via "National Vulnerability Database".
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10, an endpoint intended to offer limited enumeration abilities to authenticated users was accessible to unauthenticated users. This enabled unauthenticated users to discover files and their respective paths that were visible to the Apache user group. Version 1.5.10 contains a patch for this issue.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-4836 โผ
๐ Read
via "National Vulnerability Database".
The WordPress File Sharing Plugin WordPress plugin before 2.0.5 does not check authorization before displaying files and folders, allowing users to gain access to those filed by manipulating IDs which can easily be brute forced๐ Read
via "National Vulnerability Database".
โผ CVE-2023-28777 โผ
๐ Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LearnDash LearnDash LMS allows SQL Injection.This issue affects LearnDash LMS: from n/a through 4.5.3.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-24000 โผ
๐ Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GamiPress gamipress allows SQL Injection.This issue affects GamiPress: from n/a through 2.5.7.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-5229 โผ
๐ Read
via "National Vulnerability Database".
The E2Pdf WordPress plugin before 1.20.20 does not sanitize and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed๐ Read
via "National Vulnerability Database".
โผ CVE-2023-5098 โผ
๐ Read
via "National Vulnerability Database".
The Campaign Monitor Forms by Optin Cat WordPress plugin before 2.5.6 does not prevent users with low privileges (like subscribers) from overwriting any options on a site with the string "true", which could lead to a variety of outcomes, including DoS.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-24410 โผ
๐ Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Contact Form - WPManageNinja LLC Contact Form Plugin รขโฌโ Fastest Contact Form Builder Plugin for WordPress by Fluent Forms fluentform allows SQL Injection.This issue affects Contact Form Plugin รขโฌโ Fastest Contact Form Builder Plugin for WordPress by Fluent Forms: from n/a through 4.3.25.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-46235 โผ
๐ Read
via "National Vulnerability Database".
FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10.15, due to a lack of request sanitization in the logs, a malicious request containing XSS would be stored in a log file. When an administrator of the FOG server logged in and viewed the logs, they would be parsed as HTML and displayed accordingly. Version 1.5.10.15 contains a patch. As a workaround, view logs from an external text editor rather than the dashboard.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-31212 โผ
๐ Read
via "National Vulnerability Database".
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CRM Perks Database for Contact Form 7, WPforms, Elementor forms contact-form-entries allows SQL Injection.This issue affects Database for Contact Form 7, WPforms, Elementor forms: from n/a through 1.3.0.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-5243 โผ
๐ Read
via "National Vulnerability Database".
The Login Screen Manager WordPress plugin through 3.5.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).๐ Read
via "National Vulnerability Database".
๐ด Survey: AppSec Maturity Hindered by Staffing, Budgets, Vulnerabilities ๐ด
๐ Read
via "Dark Reading".
Report highlights the challenges impeding the applications industry from achieving AppSec maturity.๐ Read
via "Dark Reading".
Dark Reading
Survey: AppSec Maturity Hindered by Staffing, Budgets, Vulnerabilities
Report highlights the challenges impeding the applications industry from achieving AppSec maturity.
๐ด Arid Viper Camouflages Malware in Knockoff Dating App ๐ด
๐ Read
via "Dark Reading".
The APT group uses updates from the app to get the user to download the malware.๐ Read
via "Dark Reading".
Dark Reading
Arid Viper Camouflages Malware in Knockoff Dating App
The APT group uses updates from the app to get the user to download the malware.
๐ด 'Prolific Puma' Hacker Gives Cybercriminals Access to .us Domains ๐ด
๐ Read
via "Dark Reading".
Cybercriminals are upping their phishing with shortened links and showing that coveted, regulated top-level domains aren't as exclusive as you'd think.๐ Read
via "Dark Reading".
Dark Reading
'Prolific Puma' Hacker Gives Cybercriminals Access to .us Domains
Cybercriminals are upping their phishing with shortened links and showing that coveted, regulated top-level domains aren't as exclusive as you'd think.
โผ CVE-2023-46255 โผ
๐ Read
via "National Vulnerability Database".
SpiceDB is an open source, Google Zanzibar-inspired database for creating and managing security-critical application permissions. Prior to version 1.27.0, when the provided datastore URI is malformed (e.g. by having a password which contains `:`) the full URI (including the provided password) is printed, so that the password is shown in the logs. Version 1.27.0 patches this issue.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-46248 โผ
๐ Read
via "National Vulnerability Database".
Cody is an artificial intelligence (AI) coding assistant. The Cody AI VSCode extension versions 0.10.0 through 0.14.0 are vulnerable to Remote Code Execution under certain conditions. An attacker in control of a malicious repository could modify the Cody configuration file `.vscode/cody.json` and overwrite Cody commands. If a user with the extension installed opens this malicious repository and runs a Cody command such as /explain or /doc, this could allow arbitrary code execution on the user's machine. The vulnerability is rated as critical severity, but with low exploitability. It requires the user to have a malicious repository loaded and execute the overwritten command in VS Code. The issue is exploitable regardless of the user blocking code execution on a repository through VS Code Workspace Trust. The issue was found during a regular 3rd party penetration test. The maintainers of Cody do not have evidence of open source repositories having malicious `.vscode/cody.json` files to exploit this vulnerability. The issue is fixed in version 0.14.1 of the Cody VSCode extension. In case users can't promptly upgrade, they should not open any untrusted repositories with the Cody extension loaded.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-46240 โผ
๐ Read
via "National Vulnerability Database".
CodeIgniter is a PHP full-stack web framework. Prior to CodeIgniter4 version 4.4.3, if an error or exception occurs, a detailed error report is displayed even if in the production environment. As a result, confidential information may be leaked. Version 4.4.3 contains a patch. As a workaround, replace `ini_set('display_errors', '0')` with `ini_set('display_errors', 'Off')` in `app/Config/Boot/production.php`.๐ Read
via "National Vulnerability Database".
โผ CVE-2023-46723 โผ
๐ Read
via "National Vulnerability Database".
lte-pic32-writer is a writer for PIC32 devices. In versions 0.0.1 and prior, those who use `sendto.txt` are vulnerable to attackers who known the IMEI reading the sendto.txt. The sendto.txt file can contain the SNS(such as slack and zulip) URL and API key. As of time of publication, a patch is not yet available. As workarounds, avoid using `sendto.txt` or use `.htaccess` to block access to `sendto.txt`.๐ Read
via "National Vulnerability Database".