βΌ CVE-2022-23808 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23807 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4172 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.π Read
via "National Vulnerability Database".
βΌ CVE-2021-4103 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 1.0.34.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23850 βΌ
π Read
via "National Vulnerability Database".
xhtml_translate_entity in xhtml.c in epub2txt (aka epub2txt2) through 2.02 allows a stack-based buffer overflow via a crafted EPUB document.π Read
via "National Vulnerability Database".
βΌ CVE-2021-46024 βΌ
π Read
via "National Vulnerability Database".
Projectworlds online-shopping-webvsite-in-php 1.0 suffers from a SQL Injection vulnerability via the "id" parameter in cart_add.php, No login is required.π Read
via "National Vulnerability Database".
βΌ CVE-2021-45380 βΌ
π Read
via "National Vulnerability Database".
AppCMS 2.0.101 has a XSS injection vulnerability in \templates\m\inc_head.phpπ Read
via "National Vulnerability Database".
βΌ CVE-2022-23852 βΌ
π Read
via "National Vulnerability Database".
Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.π Read
via "National Vulnerability Database".
βΌ CVE-2022-23858 βΌ
π Read
via "National Vulnerability Database".
In StarWind Command Center before V2 build 6021, an authenticated read-only user can elevate privileges to administrator through the REST API.π Read
via "National Vulnerability Database".
β Unusual βDonald Trumpβ Packer Malware Delivers RATs, Infostealers β
π Read
via "Threat Post".
The βDTPackerβ downloader used fake Liverpool Football Club sites as lures for several weeks, a report finds.π Read
via "Threat Post".
Threat Post
Unusual βDonald Trumpβ Packer Malware Delivers RATs, Infostealers
The βDTPackerβ downloader used fake Liverpool Football Club sites as lures for several weeks, a report finds.
βΌ CVE-2021-25035 βΌ
π Read
via "National Vulnerability Database".
The Backup and Staging by WP Time Capsule WordPress plugin before 1.22.7 does not sanitise and escape the error parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scriptingπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25045 βΌ
π Read
via "National Vulnerability Database".
The Asgaros Forum WordPress plugin before 1.15.15 does not validate or escape the forum_id parameter before using it in a SQL statement when editing a forum, leading to an SQL injection issueπ Read
via "National Vulnerability Database".
βΌ CVE-2021-24858 βΌ
π Read
via "National Vulnerability Database".
The Cookie Notification Plugin for WordPress plugin before 1.0.9 does not sanitise or escape the id GET parameter before using it in a SQL statement, when retrieving the setting to edit in the admin dashboard, leading to an authenticated SQL Injectionπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25083 βΌ
π Read
via "National Vulnerability Database".
The Registrations for the Events Calendar WordPress plugin before 2.7.10 does not escape the qtype parameter before outputting it back in an attribute in the settings page, leading to a Reflected Cross-Site Scriptingπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25076 βΌ
π Read
via "National Vulnerability Database".
The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scriptingπ Read
via "National Vulnerability Database".
βΌ CVE-2021-24694 βΌ
π Read
via "National Vulnerability Database".
The Simple Download Monitor WordPress plugin before 3.9.11 could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attack via 1) "color" or "css_class" argument of sdm_download shortcode, 2) "class" or "placeholder" argument of sdm_search_form shortcode.π Read
via "National Vulnerability Database".
βΌ CVE-2021-24696 βΌ
π Read
via "National Vulnerability Database".
The Simple Download Monitor WordPress plugin before 3.9.9 does not enforce nonce checks, which could allow attackers to perform CSRF attacks to 1) make admins export logs to exploit a separate log disclosure vulnerability (fixed in 3.9.6), 2) delete logs (fixed in 3.9.9), 3) remove thumbnail image from downloadsπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25079 βΌ
π Read
via "National Vulnerability Database".
The Contact Form Entries WordPress plugin before 1.2.4 does not sanitise and escape various parameters, such as form_id, status, end_date, order, orderby and search before outputting them back in the admin pageπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25015 βΌ
π Read
via "National Vulnerability Database".
The myCred WordPress plugin before 2.4 does not sanitise and escape the search query before outputting it back in the history dashboard page, leading to a Reflected Cross-Site Scripting issueπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25013 βΌ
π Read
via "National Vulnerability Database".
The Qubely WordPress plugin before 1.7.8 does not have authorisation and CSRF check on the qubely_delete_saved_block AJAX action, and does not ensure that the block to be deleted belong to the plugin, as a result, any authenticated users, such as subscriber can delete arbitrary postsπ Read
via "National Vulnerability Database".
βΌ CVE-2021-25080 βΌ
π Read
via "National Vulnerability Database".
The Contact Form Entries WordPress plugin before 1.1.7 does not validate, sanitise and escape the IP address retrieved via headers such as CLIENT-IP and X-FORWARDED-FOR, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against logged in admins viewing the created entryπ Read
via "National Vulnerability Database".