Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2023-3158: Mail Control <= 0.2.8 - Unauthenticated Stored Cross-Site Scripting via Email Subject — Wordfence Intelligence

The Mail Control plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 0.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE
#xss#vulnerability#web#wordpress#intel#perl#auth
CVE-2023-3525: Getnet Argentina para Woocommerce 0.0.1 - 0.0.4 - Authorization Bypass via webhook — Wordfence Intelligence

The Getnet Argentina para Woocommerce plugin for WordPress is vulnerable to authorization bypass due to missing validation on the 'webhook' function in versions up to, and including, 0.0.4. This makes it possible for unauthenticated attackers to set their payment status to 'APPROVED' without payment.

CVE-2023-3011: ARMember <= 4.0.5 - Cross-Site Request Forgery — Wordfence Intelligence

The ARMember plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.5. This is due to missing or incorrect nonce validation on the arm_check_user_cap function. This makes it possible for unauthenticated attackers to perform multiple unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-2562: Gallery Metabox <= 1.5 - Missing Authorization via refresh_metabox — Wordfence Intelligence

The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post.

CVE-2021-4415: Sunshine Photo Cart <= 2.8.28 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Sunshine Photo Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.28 This is due to missing or incorrect nonce validation on the sunshine_products_quicksave_post() function. This makes it possible for unauthenticated attackers to save custom post data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4414: Abandoned Cart Lite for WooCommerce <= 5.8.5 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.8.5. This is due to missing or incorrect nonce validation on the wcal_preview_emails() function. This makes it possible for unauthenticated attackers to generate email preview templates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4413: Process Steps Template Designer <= 1.2.1 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Process Steps Template Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the save() function. This makes it possible for unauthenticated attackers to save field icons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4412: WP Prayer <= 1.6.5 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The WP Prayer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5. This is due to missing or incorrect nonce validation on the save() and export() functions. This makes it possible for unauthenticated attackers to save plugin settings and trigger a data export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2021-4407: Custom Banners <= 3.2.2 - Cross-Site Request Forgery Bypass — Wordfence Intelligence

The Custom Banners plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.2 This is due to missing or incorrect nonce validation on the saveCustomFields() function. This makes it possible for unauthenticated attackers to save custom fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Proposed Massachusetts law to ban sale of your mobile location data

Categories: News Categories: Personal Tags: mobile Tags: cellphone Tags: location Tags: locational Tags: sale Tags: selling Tags: broker Tags: data Tags: tracking Tags: anonymous A proposed law would ban brokers from selling mobile location data in Massachusetts. (Read more...) The post Proposed Massachusetts law to ban sale of your mobile location data appeared first on Malwarebytes Labs.