‼ CVE-2020-35948 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-20004 ‼
📖 Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows field access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35936 ‼
📖 Read
via "National Vulnerability Database".
Stored Cross-Site Scripting (XSS) vulnerabilities in the Post Grid plugin before 2.0.73 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to post_grid_import_xml_layouts.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35937 ‼
📖 Read
via "National Vulnerability Database".
Stored Cross-Site Scripting (XSS) vulnerabilities in the Team Showcase plugin before 1.22.16 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to team_import_xml_layouts.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35932 ‼
📖 Read
via "National Vulnerability Database".
Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes.📖 Read
via "National Vulnerability Database".
‼ CVE-2019-25012 ‼
📖 Read
via "National Vulnerability Database".
The Webform Report project 7.x-1.x-dev for Drupal allows remote attackers to view submissions by visiting the /rss.xml page. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
‼ CVE-2017-20001 ‼
📖 Read
via "National Vulnerability Database".
The AES encryption project 7.x and 8.x for Drupal does not sufficiently prevent attackers from decrypting data, aka SA-CONTRIB-2017-027. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-20001 ‼
📖 Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows node access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35933 ‼
📖 Read
via "National Vulnerability Database".
A Reflected Authenticated Cross-Site Scripting (XSS) vulnerability in the Newsletter plugin before 6.8.2 for WordPress allows remote attackers to trick a victim into submitting a tnpc_render AJAX request containing either JavaScript in an options parameter, or a base64-encoded JSON string containing JavaScript in the encoded_options parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35939 ‼
📖 Read
via "National Vulnerability Database".
PHP Object injection vulnerabilities in the Team Showcase plugin before 1.22.16 for WordPress allow remote authenticated attackers to inject arbitrary PHP objects due to insecure unserialization of data supplied in a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to team_import_xml_layouts.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35938 ‼
📖 Read
via "National Vulnerability Database".
PHP Object injection vulnerabilities in the Post Grid plugin before 2.0.73 for WordPress allow remote authenticated attackers to inject arbitrary PHP objects due to insecure unserialization of data supplied in a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to post_grid_import_xml_layouts.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35935 ‼
📖 Read
via "National Vulnerability Database".
The Advanced Access Manager plugin before 6.6.2 for WordPress allows privilege escalation on profile updates via the aam_user_roles POST parameter if Multiple Role support is enabled. (The mechanism for deciding whether a user was entitled to add a role did not work in various custom-role scenarios.)📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35944 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. The pagelayer_settings_page function is vulnerable to CSRF, which can lead to XSS.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-20005 ‼
📖 Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows user registration bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
‼ CVE-2016-20003 ‼
📖 Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows user enumeration, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35950 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.153 for WordPress. It allows CSRF (via almost any endpoint).📖 Read
via "National Vulnerability Database".
‼ CVE-2016-20002 ‼
📖 Read
via "National Vulnerability Database".
The REST/JSON project 7.x-1.x for Drupal allows comment access bypass, aka SA-CONTRIB-2016-033. NOTE: This project is not covered by Drupal's security advisory policy.📖 Read
via "National Vulnerability Database".
❌ Inbox Attacks: The Miserable Year (2020) That Was ❌
📖 Read
via "Threat Post".
Reflecting on 2020's record-breaking year of spam and inbox threats.📖 Read
via "Threat Post".
Threat Post
Inbox Attacks: The Miserable Year (2020) That Was
Reflecting on 2020's record-breaking year of spam and inbox threats.
‼ CVE-2020-35717 ‼
📖 Read
via "National Vulnerability Database".
zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because nodeIntegration in webPreferences is true).📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35391 ‼
📖 Read
via "National Vulnerability Database".
Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3002 ‼
📖 Read
via "National Vulnerability Database".
Seo Panel 4.8.0 allows reflected XSS via the seo/seopanel/login.php?sec=forgot email parameter.📖 Read
via "National Vulnerability Database".