Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2023-30153: [CVE-2023-30153] Improper neutralization of a SQL parameter in the Payplug (payplug) module for PrestaShop

An SQL injection vulnerability in the Payplug (payplug) module for PrestaShop, in versions 3.6.0, 3.6.1, 3.6.2, 3.6.3, 3.7.0 and 3.7.1, allows remote attackers to execute arbitrary SQL commands via the ajax.php front controller.

CVE
#sql#vulnerability#web#js#php#auth
CVE-2021-4428: [TT-6952] Security Vulnerability Patch [TT-6889] Load Scripts Async by c5haw · Pull Request #20 · what3words/wordpress-autosuggest-plugin

A vulnerability has been found in what3words Autosuggest Plugin up to 4.0.0 on WordPress and classified as problematic. Affected by this vulnerability is the function enqueue_scripts of the file w3w-autosuggest/public/class-w3w-autosuggest-public.php of the component Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 4.0.1 is able to address this issue. The patch is named dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-234247.

LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack

[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called Defiant Tech Inc. pleaded guilty to running LeakedSource[.]com, a service that sold access to billions of passwords and other data exposed in countless data breaches. KrebsOnSecurity has learned that the owner of Defiant Tech, a 32-year-old Ontario man named Jordan Evan Bloom, was hired in late 2014 as a developer for the marital infidelity site AshleyMadison.com. Bloom resigned from AshleyMadison citing health reasons in June 2015 -- less than one month before unidentified hackers stole data on 37 million users -- and launched LeakedSource three months later.

CCOM Events CMS 0.1.02 SQL Injection

CCOM Events CMS version 0.1.02 suffers from a remote SQL injection vulnerability.

Catpops Technobiz CMS 4.0 Cross Site Scripting

Catpops Technobiz CMS version 4.0 suffers from a cross site scripting vulnerability.

Carbiz Buy Sell Car Marketplace Script 1.2.0 Insecure Settings

Carbiz Buy Sell Car Marketplace Script version 1.2.0 appears to leave default credentials installed after installation.

Capitol Matrimonial Banquet Centre 1.5 SQL Injection

Capitol Matrimonial Banquet Centre version 1.5 suffers from a remote SQL injection vulnerability.

CVE-2023-2433: Changeset 2939617 for yet-another-related-posts-plugin/trunk/classes/YARPP_Core.php – WordPress Plugin Repository

The YARPP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'className' parameter in versions up to, and including, 5.30.3 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE-2015-10122

A vulnerability was found in wp-donate Plugin up to 1.4 on WordPress. It has been classified as critical. This affects an unknown part of the file includes/donate-display.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.5 is able to address this issue. The identifier of the patch is 019114cb788d954c5d1b36d6c62418619e93a757. It is recommended to upgrade the affected component. The identifier VDB-234249 was assigned to this vulnerability.

CVE-2023-3713: class-profile-magic-admin.php in profilegrid-user-profiles-groups-and-communities/tags/5.4.8/admin – WordPress Plugin Repository

The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation.