Category: CVSS2 - MEDIUM
CVE-2023-4308

The User Submitted Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user-submitted-content’ parameter in versions up to, and including, 20230809 due to insuff ...

Continue Reading
CVE-2023-2916

The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attack ...

Continue Reading
CVE-2023-33013

A post-authentication command injection vulnerability in the NTP feature of Zyxel NBG6604 firmware version V1.01(ABIR.1)C0 could allow an authenticated attacker to execute some OS commands remotely by ...

Continue Reading
Request-Baskets v1.2.1 – Server-side request forgery Vulnerability

Post ContentRead More ...

Continue Reading
Exploit for Server-Side Request Forgery in Rbaskets Request Baskets

# CVE-2023-27163 > Request-Baskets v1.2.1 - Server-side reques...Read More ...

Continue Reading
CVE-2023-4293

The Premium Packages - Sell Digital Products Securely plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.7.4 due to insufficient restriction on the 'wpdmpp_ ...

Continue Reading
Authorization Bypass

gitlab is vulnerable to Authorization Bypasses. This vulnerability occurs due to a flaw in the way that GitLab handles GraphQL mutations. An attacker can exploit this vulnerability to perform Git acti ...

Continue Reading
Cross-Site Request Forgery (CSRF)

gitlab is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists in the GraphQL API, allowing an attacker to call mutations as the victimRead More ...

Continue Reading
Information Disclosure

gitlab is vulnerable to Information Disclosure. This vulnerability occurs due to a flaw in the way that GitLab handles GraphQL queries. An attacker can exploit this vulnerability to access project det ...

Continue Reading
Cross-Site Leak

gitlab is vulnerable to Cross-Site Leak. The vulnerability exists in the OAuth flow, allowing an attacker to leak an OAuth access token by getting the victim to visit a malicious page with SafariRead ...

Continue Reading
Load more