WordPress Tablesome plugin versions prior to 1.0.9 suffer from a cross site scripting vulnerability.
8d34ca979d3351395c44ea8fcf0d676735c2b2a08d622d02af367591811fd5cf
WordPress Login Rebuilder plugin versions prior to 2.8.1 suffer from a persistent cross site scripting vulnerability.
e4c890bd10b036bc28ddba1b8cd33d4e1e3c00136bc0365e79bfff66d6ce7dd0
WordPress Seo By 10Web plugin versions prior to 2.8.1 suffer from a persistent cross site scripting vulnerability.
063b994605694ed231a4af358c6208017c3920debf819f30c828810a843b4be3
jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.
c104d54e5f523941ed7f4f29c4b40ad95b160a268c4a7ed95433316d2c244c60
WordPress Login Configurator plugin version 2.1 and below suffer from a cross site scripting vulnerability.
e5e253464a546f3e0cfcdbce34ae6cc91a22cf463dad24650461e839cfe11b27
Google Chrome version 115.0.5790.102 WebGPU use-after-free memory corruption proof of concept exploit.
8d8a37ec6a9723c095e854941ee699a99d052bf1885ef10eb39b13deb719ce3d
Ubuntu Security Notice 6203-2 - USN-6203-1 fixed a vulnerability in Django. This update provides the corresponding update for Ubuntu 18.04 ESM. Seokchan Yoon discovered that Django incorrectly handled certain regular expressions. A remote attacker could possibly use this issue to cause Django to consume resources, leading to a denial of service.
b887c1bee14d859a651cafd1f5c9fe0eb9aa2103052f27c21f69c71fa9ba27f3
Joomla VirtueMart Shopping-Cart extension version 4.0.12 suffers from a cross site scripting vulnerability.
9f5ac10afca18a008b7b2f1cdb9b2a76b15a112ae99d53ad00af6dd9e3c4c6ab
Joomla HikaShop extension version 4.7.4 suffers from a cross site scripting vulnerability.
4a640ebc95c61f7de9b73e8609aacf419c4ada6b11f9acd82eff51a3c9f16fd4
Apple Security Advisory 2023-07-24-1 - Safari 16.6 addresses bypass and code execution vulnerabilities.
2b9c86c0981c6cb849514c3a50af9f2290b7101e67e4681c2c882186a7f80d10
Ubuntu Security Notice 6241-1 - Jan Wasilewski and Gorka Eguileor discovered that OpenStack incorrectly handled deleted volume attachments. An authenticated user or attacker could possibly use this issue to gain access to sensitive information.
660a72fb20d31d9e227a37eb72a70d3cbe73b618e8e1c7d54df8413161c9a724
WordPress Page Builder KingComposer plugin version 2.9.6 suffers from a cross site scripting vulnerability.
13a1ca560e74613eb2d4517f0addb6da665a264ecdfd2a0a3388354bd3480ea9
WordPress Page Builder KingComposer plugin version 2.8.1 suffers from a cross site scripting vulnerability.
77662abf0776375201ff60f781da8c55a661a3ddfbb935e265a40435e5c6cd90
WordPress Duplicator plugin version 3.8.7 appears to leave backups in a world accessible directory under the document root.
8f7867098777bfb7d7988fcc7cf6d15c45a7a00aa260411393d341e6ecc3e473
Red Hat Security Advisory 2023-4262-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include privilege escalation and use-after-free vulnerabilities.
c2107d44997a315d2fc4dcb96db78c2276e181339b5e26f7e8bea82df6d598cf
Red Hat Security Advisory 2023-4256-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include privilege escalation and use-after-free vulnerabilities.
00264b65a8b6babbd8ab84242cb20a330e5e0d88f344f11ebfdaa64459ccfc7c
Red Hat Security Advisory 2023-4252-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
6156786294d3494ea88cfd7c133a82f17d3f41e607df631c36327acb00e10f97
WordPress KAP theme version 2.0 suffers from a directory traversal vulnerability.
b99a35a7f05c70af3e4af085c38296033d8d1935f9d2f1826181da48039fea2a
WordPress Oxygen-Theme version 7.8 suffers from a directory traversal vulnerability.
9b724ef95e4a5066e2bd72fd803b34b58ae2a5959085fdba6fb92bca72897d0a
WordPress Slider Revolution Update Captions CSS version 4.6.5 suffers from a directory traversal vulnerability.
89c1b8a764e94cab65059b98391eabc08d6ff7b37c0f981dc35770da5df0470e
WordPress U Parts Themes version 4.9.x suffers from a directory traversal vulnerability.
36ca5052106ca43a2ddf02b7078bd103dea951951c7a4c736f305e595f0c5675
CMSgrafia version 7 suffers from a remote SQL injection vulnerability.
eedce3134151f81d061cf0bdf6b0d55bb1e8e53b38410093fb87ba1e9642c0d5
Red Hat Security Advisory 2023-4255-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include privilege escalation and use-after-free vulnerabilities.
7deb8bc0eb00bb9e857593b7ec29d01e1b6391c2e237f76d544bda750cdd394c
NiceCMS version 2.0.8 appears to leave default credentials installed after installation.
e2119d540ada27fe7e69f14084bf762d55d625355047bdcdaf1a278467ac1e49
Cloud Base Multiple School Generate and Management System version 4.6.0 appears to leave default credentials installed after installation.
c8aad86c156b8aa02efacdeb8562c47b035b0e1c9f25601f4861264002b35935