Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ [PRODSECBUG-2422] Cross-site scripting through email template names (XSS) - CVE-2019-8132

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š [PRODSECBUG-2422] Cross-site scripting through email template names (XSS) - CVE-2019-8132


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: portal.patchman.co

An authenticated user could craft a malicious payload in the template Name field for email templates in the Design Configuration dashboard.

Part of update Magento 2.3.3 and 2.2.10 Security Update

This vulnerability affects the following application versions:

  • Magento 2.0.0
  • Magento 2.0.1
  • Magento 2.0.2
  • Magento 2.0.3
  • Magento 2.0.4
  • Magento 2.0.5
  • Magento 2.0.6
  • Magento 2.0.7
  • Magento 2.0.8
  • Magento 2.0.9
  • Magento 2.0.10
  • Magento 2.0.11
  • Magento 2.0.12
  • Magento 2.0.13
  • Magento 2.0.14
  • Magento 2.0.15
  • Magento 2.0.16
  • Magento 2.0.17
  • Magento 2.0.18
  • Magento 2.1.0
  • Magento 2.1.1
  • Magento 2.1.2
  • Magento 2.1.3
  • Magento 2.1.4
  • Magento 2.1.5
  • Magento 2.1.6
  • Magento 2.1.7
  • Magento 2.1.8
  • Magento 2.1.9
  • Magento 2.1.10
  • Magento 2.1.11
  • Magento 2.1.12
  • Magento 2.1.13
  • Magento 2.1.14
  • Magento 2.1.15
  • Magento 2.1.16
  • Magento 2.1.17
  • Magento 2.1.18
  • Magento 2.2.0
  • Magento 2.2.1
  • Magento 2.2.2
  • Magento 2.2.3
  • Magento 2.2.4
  • Magento 2.2.5
  • Magento 2.2.6
  • Magento 2.2.7
  • Magento 2.2.8
  • Magento 2.2.9
  • Magento 2.3.0
  • Magento 2.3.1
  • Magento 2.3.2
  • Magento 2.3.2-p1
  • Magento 2.3.2-p2
...



๐Ÿ“Œ [PRODSECBUG-2053] Prevents XSS in Newsletter Template


๐Ÿ“ˆ 37.73 Punkte

๐Ÿ“Œ XSS vulnerability in template names


๐Ÿ“ˆ 31.21 Punkte

๐Ÿ“Œ [ PRODSECBUG-2053 ] Vulnerability in Newsletter Template


๐Ÿ“ˆ 30.27 Punkte

๐Ÿ“Œ XSS-LOADER - XSS Payload Generator / XSS Scanner / XSS Dork Finder


๐Ÿ“ˆ 29.81 Punkte

๐Ÿ“Œ [PRODSECBUG-2151] Remote Code Execution through Path Traversal


๐Ÿ“ˆ 27 Punkte

๐Ÿ“Œ [PRODSECBUG-2156] Remote Code Execution through Unauthorized File Upload


๐Ÿ“ˆ 27 Punkte

๐Ÿ“Œ [PRODSECBUG-2198] SQL Injection vulnerability through an unauthenticated user


๐Ÿ“ˆ 27 Punkte

๐Ÿ“Œ [PRODSECBUG-1860] Admin Account XSS Attack Cessation via Filename


๐Ÿ“ˆ 26.25 Punkte

๐Ÿ“Œ [PRODSECBUG-2138] Widget Based XSS Vulnerability


๐Ÿ“ˆ 26.25 Punkte

๐Ÿ“Œ [PRODSECBUG-2192] Remote code execution though crafted newsletter and email templates


๐Ÿ“ˆ 25.45 Punkte

๐Ÿ“Œ [PRODSECBUG-2192] Remote code execution though crafted newsletter and email templates


๐Ÿ“ˆ 25.45 Punkte

๐Ÿ“Œ Stripo Inc: Bypass email verification and create email template with the editor


๐Ÿ“ˆ 24.79 Punkte

๐Ÿ“Œ Best Fortnite Game Names [50+ Unique]: Characters, New Names


๐Ÿ“ˆ 24.56 Punkte

๐Ÿ“Œ Discord Server Names: Best, Good, Cool, Funny, and Aesthetic Names


๐Ÿ“ˆ 24.56 Punkte

๐Ÿ“Œ HackerOne: Names not completely redacted despite "Redact the names of the involved users" is selected


๐Ÿ“ˆ 24.56 Punkte

๐Ÿ“Œ JetBrains YouTrack Plugin up to 1.8.1.2 on Confluence Template link-text-template Remote Code Execution


๐Ÿ“ˆ 22.95 Punkte

๐Ÿ“Œ Researcher bypass email filter โ€“ XSS in Gmailโ€™s AMP For Email


๐Ÿ“ˆ 20.76 Punkte

๐Ÿ“Œ Researcher bypass email filter โ€“ XSS in Gmailโ€™s AMP For Email


๐Ÿ“ˆ 20.76 Punkte

๐Ÿ“Œ Attunity Data Leak Through Unsecured Amazon S3 Buckets Affected Netflix, Ford, And Other Big Names


๐Ÿ“ˆ 20.49 Punkte

๐Ÿ“Œ Utility for making Flatpak-installed apps available in the terminal through their normal command names


๐Ÿ“ˆ 20.49 Punkte

๐Ÿ“Œ Crosslinked - LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organization Through Search Engine Scraping


๐Ÿ“ˆ 20.49 Punkte

๐Ÿ“Œ Crosslinked - LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organization Through Search Engine Scraping


๐Ÿ“ˆ 20.49 Punkte

๐Ÿ“Œ CrossLinked - LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organization Through Search Engine Scraping


๐Ÿ“ˆ 20.49 Punkte

๐Ÿ“Œ Marc chouinard, email security operations lead at vircom talks about email fraud, bec scams, and the evolution of email threats.


๐Ÿ“ˆ 19.97 Punkte

๐Ÿ“Œ GitLab: Email notification about login email changed is not received when using verified linked email address


๐Ÿ“ˆ 19.97 Punkte

๐Ÿ“Œ Reddit: Able to bypass email verification and change email to any other user email


๐Ÿ“ˆ 19.97 Punkte

๐Ÿ“Œ [20160621] Two different XSS problems via attachment names


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers


๐Ÿ“ˆ 18.94 Punkte

๐Ÿ“Œ Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers


๐Ÿ“ˆ 18.94 Punkte

๐Ÿ“Œ US fedsโ€™ names, home and email addresses hacked and posted online


๐Ÿ“ˆ 18.94 Punkte

๐Ÿ“Œ Names, addresses, phone numbers, email addresses and Social Security numbers for 1000's were impacted in ComplyRight breach.


๐Ÿ“ˆ 18.94 Punkte

๐Ÿ“Œ The data-management firmโ€™s customer database held names, email addresses, some ip addresses and more: a wealth of ammo for phishers.


๐Ÿ“ˆ 18.94 Punkte

๐Ÿ“Œ Technical Glitch exposes some user email address and names on amazon


๐Ÿ“ˆ 18.94 Punkte











matomo