![]() ![]() ![]() This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF. Product: Android Versions: Android kernel Android ID: A-250100597References: N/A User interaction is not needed for exploitation. This could lead to remote code execution with no additional execution privileges needed. In cd_CodeMsg of cd_codec.c, there is a possible out of bounds write due to a heap buffer overflow. A remote user may cause an unexpected app termination or arbitrary code execution This issue is fixed in macOS Big Sur 11.6.6, macOS Monterey 12.3, Security Update 2022-004 Catalina. A use after free issue was addressed with improved memory management. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |