The Five Star Restaurant Reservations WordPress plugin before 2.4.12 does not have authorisation when changing whether a payment was successful or failed, allowing unauthenticated users to change the payment status of arbitrary bookings. Furthermore, due to the lack of sanitisation and escaping, attackers could perform Cross-Site Scripting attacks against a logged in admin viewing the failed payments
Category Archives: Advisories
CVE-2021-24649
The WP User Frontend WordPress plugin before 3.5.29 uses a user supplied argument called urhidden in its registration form, which contains the role for the account to be created with, encrypted via wpuf_encryption(). This could allow an attacker having access to the AUTH_KEY and AUTH_SALT constant (via an arbitrary file access issue for example, or if the blog is using the default keys) to create an account with any role they want, such as admin
mingw-python3-3.10.8-2.fc37
FEDORA-2022-3e859b6bc6
Packages in this update:
mingw-python3-3.10.8-2.fc37
Update description:
Backport patch for CVE-2022-45061.
mingw-python3-3.10.8-2.fc36
FEDORA-2022-45d2cfdfa4
Packages in this update:
mingw-python3-3.10.8-2.fc36
Update description:
Backport patch for CVE-2022-45061.
galera-26.4.13-1.fc36 mariadb-10.5.18-1.fc36
FEDORA-2022-cf88f807f9
Packages in this update:
galera-26.4.13-1.fc36
mariadb-10.5.18-1.fc36
Update description:
MariaDB 10.5.18 & Galera 26.4.13
Release notes:
galera-26.4.13-1.fc35 mariadb-10.5.18-1.fc35
FEDORA-2022-333df1c4aa
Packages in this update:
galera-26.4.13-1.fc35
mariadb-10.5.18-1.fc35
Update description:
MariaDB 10.5.18 & Galera 26.4.13
Release notes:
galera-26.4.13-1.fc37 mariadb-10.5.18-1.fc37
FEDORA-2022-e0e9a43546
Packages in this update:
galera-26.4.13-1.fc37
mariadb-10.5.18-1.fc37
Update description:
MariaDB 10.5.18 & Galera 26.4.13
Release notes:
ZDI-22-1610: (Pwn2Own) Microsoft Teams electronSafeIpc Arbitrary File Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization.
ZDI-22-1609: (Pwn2Own) Microsoft Teams chat Client-Side Template Injection Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. No user interaction is required if the attacker and target are in the same Teams organization.
ZDI-22-1608: (Pwn2Own) Microsoft Teams URL Allowlist Bypass Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Teams. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.