Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

WordPress Adivaha Travel 2.3 Cross Site Scripting

WordPress Adivaha Travel plugin version 2.3 suffers from a cross site scripting vulnerability.

Packet Storm
#sql#xss#vulnerability#web#windows#wordpress#auth#ssh
Xlight FTP Server 3.9.3.6 Stack Buffer Overflow

Xlight FTP Server version 3.9.3.6 suffers from a stack buffer overflow vulnerability.

WordPress Ninja Forms 3.6.25 Cross Site Scripting

WordPress Ninja Forms plugin version 3.6.25 suffers from a cross site scripting vulnerability.

COURIER DEPRIXA 2.5 Cross Site Request Forgery

COURIER DEPRIXA version 2.5 suffers from a cross site request forgery vulnerability.

Webedition CMS 2.9.8.8 Cross Site Scripting

Webedition CMS version 2.9.8.8 suffers from a persistent cross site scripting vulnerability.

Webedition CMS 2.9.8.8 Remote Code Execution

Webedition CMS version 2.9.8.8 suffers from a remote code execution vulnerability.

Webutler 3.2 Shell Upload

Webutler version 3.2 suffers from a remote shell upload vulnerability.

Videoplay 1.3.0 Insecure Settings

Videoplay version 1.3.0 appears to leave default credentials installed after installation.

Teach a Man to Phish and He’s Set for Life

One frustrating aspect of email phishing is the frequency with which scammers fall back on tried-and-true methods that really have no business working these days. Like attaching a phishing email to a traditional, clean email message, or leveraging link redirects on LinkedIn, or abusing an encoding method that makes it easy to disguise booby-trapped Microsoft Windows files as relatively harmless documents.

CVE-2023-38708: Path traversal in AssetController:importServerFilesAction

Pimcore is an Open Source Data & Experience Management Platform: PIM, MDM, CDP, DAM, DXP/CMS & Digital Commerce. A path traversal vulnerability exists in the `AssetController::importServerFilesAction`, which allows an attacker to overwrite or modify sensitive files by manipulating the pimcore_log parameter.This can lead to potential denial of service---key file overwrite. The impact of this vulnerability allows attackers to: overwrite or modify sensitive files, potentially leading to unauthorized access, privilege escalation, or disclosure of confidential information. This could also cause a denial of service (DoS) if critical system files are overwritten or deleted.