Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2023-0404: Changeset 2836308 for events-made-easy – WordPress Plugin Repository

The Events Made Easy plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions related to AJAX actions in versions up to, and including, 2.3.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those functions intended for administrator use. While the plugin is still pending review from the WordPress repository, site owners can download a copy of the patched version directly from the developer's Github at https://github.com/liedekef/events-made-easy

CVE
#sql#js#git#wordpress#php#auth
CVE-2023-0402: Changeset 2844092 for social-warfare – WordPress Plugin Repository

The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.

CVE-2015-10071: Fix EZP-24140: Potential vulnerability in eZ Publish password recovery · gitter-badger/ezpublish-modern-legacy@5908d5e

A vulnerability was found in gitter-badger ezpublish-modern-legacy. It has been rated as problematic. This issue affects some unknown processing of the file kernel/user/forgotpassword.php. The manipulation leads to weak password recovery. Upgrading to version 1.0 is able to address this issue. The name of the patch is 5908d5ee65fec61ce0e321d586530461a210bf2a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218951.

CVE-2015-10070: Parameterize queries to prevent against SQL injection · copperwall/twiddit@2203d4c

A vulnerability was found in copperwall Twiddit. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation leads to sql injection. The name of the patch is 2203d4ce9810bdaccece5c48ff4888658a01acfc. It is recommended to apply a patch to fix this issue. The identifier VDB-218897 was assigned to this vulnerability.

CVE-2022-4892

A vulnerability was found in MyCMS. It has been classified as problematic. This affects the function build_view of the file lib/gener/view.php of the component Visitors Module. The manipulation of the argument original/converted leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is d64fcba4882a50e21cdbec3eb4a080cb694d26ee. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218895.

CVE-2023-0164: GitHub - Orangescrum/orangescrum: Orangescrum is a simple yet powerful free and open source project management software that helps team to organize their tasks, projects and deliver more.

OrangeScrum version 2.0.11 allows an authenticated external attacker to execute arbitrary commands on the server. This is possible because the application injects an attacker-controlled parameter into a system function.

Ivanti Cloud Services Appliance (CSA) Command Injection

This Metasploit module exploits a command injection vulnerability in the Ivanti Cloud Services Appliance (CSA) for Ivanti Endpoint Manager. A cookie based code injection vulnerability in the Cloud Services Appliance before 4.6.0-512 allows an unauthenticated user to execute arbitrary code with limited permissions. Successful exploitation results in command execution as the nobody user.

Jettweb Ready Rent A Car Script 4 Cross Site Scripting

Jettweb Ready Rent A Car Script version 4 suffers from a cross site scripting vulnerability.

PHP Hazir Haber Sitesi Scripti 3 SQL Injection

PHP Hazir Haber Sitesi Scripti version 3 suffers from a remote SQL injection vulnerability.

CVE-2017-20173: Corretta vulnerabilità SQL Injection · AlexRed/contentmap@dd265d2

A vulnerability was found in AlexRed contentmap. It has been rated as critical. Affected by this issue is the function Load of the file contentmap.php. The manipulation of the argument contentid leads to sql injection. The name of the patch is dd265d23ff4abac97422835002c6a47f45ae2a66. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218492.