The User Submitted Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the âuser-submitted-contentâ parameter in versions up to, and including, 20230809 due to insuff ...
Continue ReadingAugust 15, 2023
The User Submitted Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the âuser-submitted-contentâ parameter in versions up to, and including, 20230809 due to insuff ...
Continue ReadingAugust 15, 2023
The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attack ...
Continue ReadingAugust 15, 2023
A post-authentication command injection vulnerability in the NTP feature of Zyxel NBG6604 firmware version V1.01(ABIR.1)C0 could allow an authenticated attacker to execute some OS commands remotely by ...
Continue ReadingAugust 14, 2023
Post ContentRead More ...
Continue ReadingAugust 14, 2023
# CVE-2023-27163 > Request-Baskets v1.2.1 - Server-side reques...Read More ...
Continue ReadingAugust 13, 2023
The Premium Packages - Sell Digital Products Securely plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.7.4 due to insufficient restriction on the 'wpdmpp_ ...
Continue ReadingAugust 12, 2023
gitlab is vulnerable to Authorization Bypasses. This vulnerability occurs due to a flaw in the way that GitLab handles GraphQL mutations. An attacker can exploit this vulnerability to perform Git acti ...
Continue ReadingAugust 12, 2023
gitlab is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists in the GraphQL API, allowing an attacker to call mutations as the victimRead More ...
Continue ReadingAugust 12, 2023
gitlab is vulnerable to Information Disclosure. This vulnerability occurs due to a flaw in the way that GitLab handles GraphQL queries. An attacker can exploit this vulnerability to access project det ...
Continue ReadingAugust 12, 2023
gitlab is vulnerable to Cross-Site Leak. The vulnerability exists in the OAuth flow, allowing an attacker to leak an OAuth access token by getting the victim to visit a malicious page with SafariRead ...
Continue ReadingAugust 12, 2023