Security
Headlines
HeadlinesLatestCVEs

Tag

#firefox

CVE-2022-4359: Security Bulletin

The WP RSS By Publishers WordPress plugin through 0.1 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

CVE
#sql#vulnerability#web#linux#wordpress#php#perl#auth#firefox
CVE-2022-4352: Security Bulletin

The Qe SEO Handyman WordPress plugin through 1.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

Scanvus now supports Vulners and Vulns.io VM Linux vulnerability detection APIs

Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]

BDWeb-Link LMS 1.11.5 SQL Injection

BDWeb-Link LMS version 1.11.5 suffers from a remote SQL injection vulnerability.

Courier Deprixa 2.5 Backdoor Account

Courier Deprixa version 2.5 has been reported as having a default backdoor account.

Consultine Consulting Business And Finance Website CMS 1.8 Backdoor Account

Consultine Consulting Business and Finance Website CMS version 1.8 has been reported as having a default backdoor account.

Car Dealer Pro 2.01 Backdoor Account

Car Dealer Pro version 2.01 has been reported as having a default backdoor account.

Botble 5.28.3 Backdoor Account

Botble version 5.28.3 has been reported as having a default backdoor account.

Active Ecommerce CMS 6.4.0 Backdoor Account

Active Ecommerce CMS version 6.4.0 has been reported as having a default backdoor account.

CVE-2022-4160: Security Bulletin

The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.