Security
Headlines
HeadlinesLatestCVEs

Tag

#php

BookingWizz 6.0.1 Information Disclosure

BookingWizz version 6.0.1 suffers from an information leakage vulnerability.

Packet Storm
#vulnerability#windows#google#php#auth#firefox
DBCInfoTech CMS 2.0 Administrator Reinstall

DBCInfoTech CMS version 2.0 suffers from an unauthenticated administrator reinstall vulnerability.

Education Time Indonesian School CRM 1.7 Cross Site Scripting

Education Time Indonesian School CRM version 1.7 suffers from a cross site scripting vulnerability.

Eden CMS 1.02 Cross Site Scripting

Eden CMS version 1.02 suffers from a cross site scripting vulnerability.

Ecommerce Responsive 1.2 Insecure Direct Object Reference

Ecommerce Responsive version 1.2 suffers from an insecure direct object reference vulnerability.

E-Biz CMS 2.0 Cross Site Request Forgery

E-Biz CMS version 2.0 suffers from a cross site request forgery vulnerability.

EasyPX CMS 06.02.04 Cross Site Scripting

EasyPX CMS version 06.02.04 suffers from a cross site scripting vulnerability.

Ongoing Xurum Attacks on E-commerce Sites Exploiting Critical Magento 2 Vulnerability

E-commerce sites using Adobe's Magento 2 software are the target of an ongoing campaign that has been active since at least January 2023. The attacks, dubbed Xurum by Akamai, leverage a now-patched critical security flaw (CVE-2022-24086, CVSS score: 9.8) in Adobe Commerce and Magento Open Source that, if successfully exploited, could lead to arbitrary code execution. "The attacker seems to be

CVE-2023-4321: prevent xhtml files from being uploaded in the assets manager · Cockpit-HQ/Cockpit@34ab31e

Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.4.3.

CVE-2023-4293: wpdm-premium-packages.php in wpdm-premium-packages/tags/5.7.4 – WordPress Plugin Repository

The Premium Packages - Sell Digital Products Securely plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.7.4 due to insufficient restriction on the 'wpdmpp_update_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'profile[role]' parameter during a profile update.