Security
Headlines
HeadlinesLatestCVEs

Tag

#php

Asanhamayesh CMS 3.4.6 Directory Traversal

Asanhamayesh CMS version 3.4.6 suffers from a directory traversal vulnerability.

Packet Storm
#vulnerability#windows#google#php#auth#firefox
ARTISTRY LIMITED LMS 0.5 Insecure Settings

ARTISTRY LIMITED LMS version 0.5 appears to leave default credentials installed after installation.

CVE-2023-37627: PoC for CVE-2023-37627

Code-projects Online Restaurant Management System 1.0 is vulnerable to SQL Injection. Through SQL injection, an attacker can bypass the admin panel and view order records, add items, delete items etc.

CVE-2021-4426: Changeset 2548729 for absolute-reviews – WordPress Plugin Repository

The Absolute Reviews plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.8. This is due to missing or incorrect nonce validation on the metabox_review_save() function. This makes it possible for unauthenticated attackers to save meta tags via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2020-36761: Changeset 2368373 for top-10 – WordPress Plugin Repository

The Top 10 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.10.4. This is due to missing or incorrect nonce validation on the tptn_export_tables() function. This makes it possible for unauthenticated attackers to generate an export of the top 10 table via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4424: Changeset 2548890 for slider-hero/trunk/qcld-slider-main.php – WordPress Plugin Repository

The Slider Hero plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.2.0. This is due to missing or incorrect nonce validation on the qc_slider_hero_duplicate() function. This makes it possible for unauthenticated attackers to duplicate slides via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2020-36756: Changeset 2371142 for wd-google-analytics – WordPress Plugin Repository

The 10WebAnalytics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.8. This is due to missing or incorrect nonce validation on the create_csv_file() function. This makes it possible for unauthenticated attackers to create a CSV file via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-2517: plugin.php in metform/trunk – WordPress Plugin Repository

The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on the permalink_setup function. This makes it possible for unauthenticated attackers to change the permalink structure via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. While nonce verification is implemented, verification only takes place when a nonce is provided.

CVE-2020-36752: Changeset 2368978 for nifty-coming-soon-and-under-construction-page – WordPress Plugin Repository

The Coming Soon & Maintenance Mode Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.57. This is due to missing or incorrect nonce validation on the save_meta_box() function. This makes it possible for unauthenticated attackers to save meta boxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-2869: class-wp-members-admin-tab-fields.php in wp-members/trunk/includes/admin/tabs – WordPress Plugin Repository

The WP-Members Membership plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the do_field_reorder function in versions up to, and including, 3.4.7.3. This makes it possible for authenticated attackers with subscriber-level access to reorder form elements on login forms.