‼ CVE-2022-4024 ‼
📖 Read
via "National Vulnerability Database".
The Registration Forms WordPress plugin before 3.8.1.3 does not have authorisation and CSRF when deleting users via an init action handler, allowing unauthenticated attackers to delete arbitrary users (along with their posts)📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4259 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in phpRedisAdmin up to 1.17.3. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the argument response leads to use of wrong operator in string comparison. The name of the patch is 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216267.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4261 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in pacman-canvas up to 1.0.5. Affected is the function addHighscore of the file data/db-handler.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 1.0.6 is able to address this issue. The name of the patch is 29522c90ca1cebfce6453a5af5a45281d99b0646. It is recommended to upgrade the affected component. VDB-216270 is the identifier assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4050 ‼
📖 Read
via "National Vulnerability Database".
The JoomSport WordPress plugin before 5.2.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4063 ‼
📖 Read
via "National Vulnerability Database".
The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3983 ‼
📖 Read
via "National Vulnerability Database".
The Checkout for PayPal WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4106 ‼
📖 Read
via "National Vulnerability Database".
The Wholesale Market for WooCommerce WordPress plugin before 1.0.7 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3984 ‼
📖 Read
via "National Vulnerability Database".
The Flowplayer Video Player WordPress plugin before 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36618 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3987 ‼
📖 Read
via "National Vulnerability Database".
The Responsive Lightbox2 WordPress plugin before 1.0.4 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4061 ‼
📖 Read
via "National Vulnerability Database".
The JobBoardWP WordPress plugin before 1.2.2 does not properly validate file names and types in its file upload functionalities, allowing unauthenticated users to upload arbitrary files such as PHP.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-4258 ‼
📖 Read
via "National Vulnerability Database".
** DISPUTED ** A vulnerability was found in whohas. It has been rated as problematic. This issue affects some unknown processing of the component Package Information Handler. The manipulation leads to cleartext transmission of sensitive information. The attack may be initiated remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 667c3e2e9178f15c23d7918b5db25cd0792c8472. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216251. NOTE: Most sources redirect to the encrypted site which limits the possibilities of an attack.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4107 ‼
📖 Read
via "National Vulnerability Database".
The SMSA Shipping for WooCommerce WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks, as well as does not validate the file to be downloaded, allowing any authenticated users, such as subscriber to download arbitrary file from the server📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4112 ‼
📖 Read
via "National Vulnerability Database".
The Quizlord WordPress plugin through 2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4108 ‼
📖 Read
via "National Vulnerability Database".
The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3986 ‼
📖 Read
via "National Vulnerability Database".
The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4125 ‼
📖 Read
via "National Vulnerability Database".
The Popup Manager WordPress plugin through 1.6.6 does not have authorisation and CSRF check when creating/updating popups, and is missing sanitisation as well as escaping, which could allow unauthenticated attackers to create arbitrary popups and add Stored XSS payloads as well📖 Read
via "National Vulnerability Database".
‼ CVE-2020-36619 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4058 ‼
📖 Read
via "National Vulnerability Database".
The Photo Gallery by 10Web WordPress plugin before 1.8.3 does not validate and escape some parameters before outputting them back in in JS code later on in another page, which could lead to Stored XSS issue when an attacker makes a logged in admin open a malicious URL or page under their control.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-4124 ‼
📖 Read
via "National Vulnerability Database".
The Popup Manager WordPress plugin through 1.6.6 does not have authorisation and CSRF checks when deleting popups, which could allow unauthenticated users to delete them📖 Read
via "National Vulnerability Database".
🕴 Bugcrowd Launches Bug Bounty Program for Australian-Based Navitas 🕴
📖 Read
via "Dark Reading".
Leading global education provider engages with Bugcrowd Security Researchers to identify threats.📖 Read
via "Dark Reading".
Dark Reading
Bugcrowd Launches Bug Bounty Program for Australian-Based Navitas
Leading global education provider engages with Bugcrowd Security Researchers to identify threats.