Security
Headlines
HeadlinesLatestCVEs

Tag

#web

CVE-2023-34017: WordPress Five Star Restaurant Reservations plugin <= 2.6.7 - Reflected Cross Site Scripting (XSS) vulnerability - Patchstack

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FiveStarPlugins Five Star Restaurant Reservations plugin <= 2.6.7 versions.

CVE
#xss#vulnerability#web#wordpress#auth
CVE-2023-36502: WordPress Balkon theme <= 1.3.2 - Reflected Cross Site Scripting (XSS) vulnerability - Patchstack

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cththemes Balkon plugin <= 1.3.2 versions.

CVE-2023-36501: WordPress teachPress plugin <= 9.0.2 - Cross Site Scripting (XSS) vulnerability - Patchstack

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Michael Winkler teachPress plugin <= 9.0.2 versions.

CVE-2023-36503: WordPress WordPress Button Plugin MaxButtons plugin <= 9.5.3 - Cross Site Scripting (XSS) vulnerability - Patchstack

Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Max Foundry WordPress Button Plugin MaxButtons plugin <= 9.5.3 versions.

CVE-2023-36385: WordPress PostX – Gutenberg Post Grid Blocks plugin <= 2.9.9 - Cross Site Scripting (XSS) vulnerability - Patchstack

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wpxpo PostX – Gutenberg Post Grid Blocks plugin <= 2.9.9 versions.

Joomla VirtueMart Shopping-Cart 4.0.12 Cross Site Scripting

Joomla VirtueMart Shopping-Cart extension version 4.0.12 suffers from a cross site scripting vulnerability.

Joomla HikaShop 4.7.4 Cross Site Scripting

Joomla HikaShop extension version 4.7.4 suffers from a cross site scripting vulnerability.

Apple Security Advisory 2023-07-24-1

Apple Security Advisory 2023-07-24-1 - Safari 16.6 addresses bypass and code execution vulnerabilities.

GHSA-vh2g-6c4x-5hmp: Path traversal and code execution via prototype vulnerability

### Impact Due to the use of the [object destructuring assignment](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Operators/Destructuring_assignment) syntax in the user export code path, combined with a path traversal vulnerability, a specially crafted payload could invoke the user export logic to arbitrarily execute javascript files on the local disk. ### Patches Patched in v2.8.7 ### Workarounds Site maintainers can cherry pick ec58700f6dff8e5b4af1544f6205ec362b593092 into their codebase to patch the exploit.