Security
Headlines
HeadlinesLatestCVEs

Tag

#git

CVE-2023-5015: The ucms has xss · Issue #3 · Num-Nine/CVE

A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239856.

CVE
#xss#vulnerability#web#windows#git#php#firefox
Strategic IT Staff Augmentation: A Roadmap for C-Level Executives

By Owais Sultan Finding the Perfect IT Staff Augmentation and Staffing Services Company for Your Needs. This is a post from HackRead.com Read the original post: Strategic IT Staff Augmentation: A Roadmap for C-Level Executives

Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle

Cyberattacks on casinos grab attention, but a steady stream of less publicized attacks leave vulnerable victims struggling to recover.

CVE-2023-41157: Usermin-2.000/CVE-2023-41157 at main · shindeanik/Usermin-2.000

Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.

CVE-2023-42336: CVE/netis_WF2409E/Root_Hard_Code.md at main · adhikara13/CVE

An issue in NETIS SYSTEMS WF2409Ev4 v.1.0.1.705 allows a remote attacker to execute arbitrary code and obtain sensitive information via the password parameter in the /etc/shadow.sample component.

CVE-2023-41436: CSZ-CMS-Stored-XSS---Pages-Content/README.md at main · sromanhu/CSZ-CMS-Stored-XSS---Pages-Content

Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component.

CVE-2023-41887: Remote Code exec in project import with mysql jdbc url attack

OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, a remote code execution vulnerability allows any unauthenticated user to execute code on the server. Version 3.7.5 has a patch for this issue.

CVE-2023-41886: Arbitrary file read in project import with mysql jdbc url attack

OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, an arbitrary file read vulnerability allows any unauthenticated user to read a file on a server. Version 3.7.5 fixes this issue.

CVE-2023-42442: jumpserver/apps/terminal/api/session/session.py at v3.6.1 · jumpserver/jumpserver

JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).