CVE-2024-8484 REST API TO MiniProgram <= 4.7.1 – Unauthenticated SQL Injection

The REST API TO MiniProgram plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the /wp-json/watch-life-net/v1/comment/getcomments REST API endpoint in all versi ...

Continue Reading
CVE-2024-8484 REST API TO MiniProgram <= 4.7.1 – Unauthenticated SQL Injection

The REST API TO MiniProgram plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the /wp-json/watch-life-net/v1/comment/getcomments REST API endpoint in all versi ...

Continue Reading
CVE-2024-8485 REST API TO MiniProgram <= 4.7.1 – Unauthenticated Arbitrary User Email Update and Privilege Escalation via Account Takeover

The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validatio ...

Continue Reading
CVE-2024-8485 REST API TO MiniProgram <= 4.7.1 – Unauthenticated Arbitrary User Email Update and Privilege Escalation via Account Takeover

The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validatio ...

Continue Reading
CVE-2023-5359

The W3 Total Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.5 via Google OAuth API secrets stored in plaintext in the publicly visible ...

Continue Reading
CVE-2024-21545

Proxmox Virtual Environment is an open-source server management platform for enterprise virtualization. Insufficient safeguards against malicious API response values allow authenticated attackers with ...

Continue Reading
CVE-2024-8067

In versions of Helix Core prior to 2024.1 Patch 2 (2024.1/2655224) a Windows ANSI API Unicode &quot;best fit&quot; argument injection was...Read More ...

Continue Reading
Traccar 5.12 Remote Code Execution Exploit

This Metasploit module exploits a remote code execution vulnerability in Traccar versions 5.1 through 5.12. Remote code execution can be obtained by combining path traversal and an unrestricted file u ...

Continue Reading

Back to Main

Subscribe for the latest news: