🛡 Cybersecurity & Privacy 🛡 - News
25.1K subscribers
88.4K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
‼ CVE-2023-45339 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'type' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26452 ‼

Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-29044 ‼

Documents operations could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now get escaped to avoid code execution. No publicly available exploits are known.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45332 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'deleted' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-29047 ‼

Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45334 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'status' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45340 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/details-router.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45337 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-26455 ‼

RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45328 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45326 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45329 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'role' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45323 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'name' parameter of the routers/add-item.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45344 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_balance' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-46725 ‼

FoodCoopShop is open source software for food coops and local shops. Versions prior to 3.6.1 are vulnerable to server-side request forgery. In the Network module, a manufacturer account can use the `/api/updateProducts.json` endpoint to make the server send a request to an arbitrary host. This means that the server can be used as a proxy into the internal network where the server is. Furthermore, the checks on a valid image are not adequate, leading to a time of check time of use issue. For example, by using a custom server that returns 200 on HEAD requests, then return a valid image on first GET request and then a 302 redirect to final target on second GET request, the server will copy whatever file is at the redirect destination, making this a full SSRF. Version 3.6.1 fixes this vulnerability.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45331 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'contact' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-29045 ‼

Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-45333 ‼

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'verified' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.

📖 Read

via "National Vulnerability Database".
🕴 Saudi Aramco CEO Warns of New Threat of Generative AI 🕴

Oil executive Amin H. Nasser calls for global cooperation and international standards to combat the dark side of artificial intelligence.

📖 Read

via "Dark Reading".
‼ CVE-2023-46925 ‼

Reportico 7.1.21 is vulnerable to Cross Site Scripting (XSS).

📖 Read

via "National Vulnerability Database".
‼ CVE-2023-38473 ‼

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.

📖 Read

via "National Vulnerability Database".