Security
Headlines
HeadlinesLatestCVEs

Tag

#xss

CVE-2023-37224: Archer Update for Multiple Vulnerabilities

An issue in Archer Platform before v.6.13 fixed in v.6.12.0.6 and v.6.13.0 allows an authenticated attacker to obtain sensitive information via the log files.

CVE
#xss#csrf#vulnerability#web#java#auth
CVE-2023-36119: NVD - CVE-2023-0527

File upload vulnerability in PHPGurukul Online Security Guards Hiring System v.1.0 allows a remote attacker to execute arbitrary code via a crafted php file to the \osghs\admin\images file.

BloodBank 1.0 Cross Site Scripting

BloodBank version 1.0 suffers from a cross site scripting vulnerability.

Blogator 0.93 Cross Site Scripting

Blogator version 0.93 suffers from a cross site scripting vulnerability.

Bigware Shop 2.3 Cross Site Scripting

Bigware Shop version 2.3 suffers from a cross site scripting vulnerability.

Bazaar Social Listing Shopping Web PHP Template 2.3.2 Cross Site Scripting

Bazaar Social Listing Shopping Web PHP Template version 2.3.2 suffers from a cross site scripting vulnerability.

CVE-2023-3672: XSS mitigation · PlaidWeb/webmention.js@3551b66

Cross-site Scripting (XSS) - DOM in GitHub repository plaidweb/webmention.js prior to 0.5.5.

Zimbra Warns of Critical Zero-Day Flaw in Email Software Amid Active Exploitation

Zimbra has warned of a critical zero-day security flaw in its email software that has come under active exploitation in the wild. "A security vulnerability in Zimbra Collaboration Suite Version 8.8.15 that could potentially impact the confidentiality and integrity of your data has surfaced," the company said in an advisory. It also said that the issue has been addressed and that it's expected to

CVE-2023-2082: class-buy-me-a-coffee.php in buymeacoffee/trunk/includes – WordPress Plugin Repository

The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.6 due to insufficient sanitization and escaping on the 'text value set via the bmc_post_reception action. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to inject arbitrary web scripts into pages that execute whenever a victim accesses a page with the injected scripts.