Security
Headlines
HeadlinesLatestCVEs

Tag

#csrf

CVE-2019-25091

A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file src/nsupdate/settings/base.py of the component CSRF Cookie Handler. The manipulation of the argument CSRF_COOKIE_HTTPONLY leads to cookie without 'httponly' flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability.

CVE
#csrf#vulnerability
CVE-2016-15005: GO-2020-0045 - Go Packages

CSRF tokens are generated using math/rand, which is not a cryptographically secure rander number generation, making predicting their values relatively trivial and allowing an attacker to bypass CSRF protections which relatively few requests.

CVE-2020-28191: CVE-2020-28191 - GitHub Advisory Database

The console in Togglz before 2.9.4 allows CSRF.

CVE-2022-4266

The Bulk Delete Users by Email WordPress plugin through 1.2 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete non admin users by knowing their email via a CSRF attack

CVE-2022-26969: Cross-Origin Resource Sharing (CORS) - HTTP | MDN

In Directus before 9.7.0, the default settings of CORS_ORIGIN and CORS_ENABLED are true.

CVE-2022-44381: CENSUS | IT Security Works

Snipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request.

WordPress Yith WooCommerce Gift Cards Premium 3.19.0 Shell Upload

WordPress Yith WooCommerce Gift Cards Premium plugin versions 3.19.0 and below suffer from a remote shell upload vulnerability.

CVE-2022-46491: 🛡️ CSRF Add Background User in nbnbk · Issue #2 · Fanli2012/nbnbk

A Cross-Site Request Forgery (CSRF) vulnerability in the Add Administrator function of the default version of nbnbk allows attackers to arbitrarily add Administrator accounts.

CVE-2020-36625: Fix WebSocket upgrade CSRF vulnerability by 11k · Pull Request #35 · destinygg/chat

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in destiny.gg chat. It has been rated as problematic. This issue affects the function websocket.Upgrader of the file main.go. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is bebd256fc3063111fb4503ca25e005ebf6e73780. It is recommended to apply a patch to fix this issue. The identifier VDB-216521 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

GHSA-85fp-523q-5xwc: rdiffweb vulnerable to Cross-Site Request Forgery

rdiffweb prior to version 2.5.4 is vulnerable to Cross-Site Request Forgery (CSRF).