Security
Headlines
HeadlinesLatestCVEs

Tag

#php

Hesk Rtl CMS 1 Cross Site Scripting

Hesk Rtl CMS version 1 suffers from a cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#windows#google#php#auth#firefox
haraj 1.1 Add Administrator

haraj version 1.1 suffers from an add administrator vulnerability.

HaasCMS 1.0 Cross Site Scripting

HaasCMS version 1.0 suffers from a cross site scripting vulnerability.

CVE-2023-39708: Free and Open Source inventory management system php source code

A stored cross-site scripting (XSS) vulnerability in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Add New parameter under the New Buy section.

CVE-2023-40766: Ticket Support Script | Online Help Desk System

User enumeration is found in in PHPJabbers Ticket Support Script v3.2. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.

CVE-2023-40767: Make An Offer Widget | PHPJabbers

User enumeration is found in in PHPJabbers Make an Offer Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.

CVE-2023-40752: Make An Offer Widget | PHPJabbers

There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Make an Offer Widget v1.0.

CVE-2023-40761: Yacht Listing Script | Boat Classifieds Script

User enumeration is found in PHPJabbers Yacht Listing Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.

CVE-2023-40765: Event Booking Calendar System | PHPJabbers

User enumeration is found in PHPJabbers Event Booking Calendar v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.