Security
Headlines
HeadlinesLatestCVEs

Tag

#php

Threat Source newsletter (March 30, 2023) — It’s impossible to tell if your home security camera or doorbell is truly safe

Very few of us looking to buy these pieces of equipment are qualified to say if these products are even secure, and those among us who are are probably smart enough to know not to buy these products in the first place.

TALOS
#sql#vulnerability#web#mac#microsoft#amazon#cisco#php#botnet
Eve-ng 5.0.1-13 Cross Site Scripting

Eve-ng version 5.0.1-13 suffers from a cross site scripting vulnerability.

WordPress WPForms 1.7.8 Cross Site Scripting

WordPress WPForms plugin version 1.7.8 suffers from a cross site scripting vulnerability.

DSL-124 Wireless N300 ADSL2+ Backup Disclosure

DSL-124 Wireless N300 ADSL2+ suffers from a backup disclosure vulnerability.

Ubuntu Security Notice USN-5983-1

Ubuntu Security Notice 5983-1 - Cyku Hong discovered that Nette was not properly handling and validating data used for code generation. A remote attacker could possibly use this issue to execute arbitrary code.

myBB forums 1.8.26 Cross Site Scripting

myBB forums version 1.8.26 suffers from a persistent cross site scripting vulnerability.

Helmet Store Showroom 1.0 SQL Injection

Helmet Store Showroom version 1.0 suffers from a remote SQL injection vulnerability that allows for login bypass.

CVE-2023-28733: Changelog - AcyMailing

AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.

CVE-2023-28731: CVE-2023-28731 - Bug Bounty Switzerland

AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.

CVE-2023-27489: Stored XSS via SVG file upload

Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute. This vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers. This configuration change is provided in version 12.1 and users are advised to upgrade. Users unable to upgrade may set their Content-Security-Policy HTTP header manually.