Lädt...

🕵️ wp-hotel-booking Plugin up to 1.10.2 on WordPress Cookie class-wphb-sessions.php thimpress_hotel_booking_1 deserialization


Nachrichtenbereich: 🕵️ Sicherheitslücken
🔗 Quelle: vuldb.com

A vulnerability was found in wp-hotel-booking Plugin up to 1.10.2 on WordPress (Hospitality Software). It has been rated as critical. This issue affects an unknown part of the file includes/class-wphb-sessions.php of the component Cookie Handler. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. ...

🕵️ CVE-2023-6049 | Estatik Real Estate Plugin up to 4.1.0 on WordPress Cookie deserialization


📈 29.9 Punkte
🕵️ Sicherheitslücken

🕵️ Facebook for WordPress Plugin up to 2.x on WordPress Function run_action deserialization


📈 24.46 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2019-8141 | Magento up to 2.1.18/2.2.9/2.3.2 Phar Deserialization deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ Artica Pandora FMS 742 Phar Deserialization deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ PHPMailer up to 6.4.0 Phar Deserialization addAttachment deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ pystemon prior 2021-02-13 YAML Deserialization config.py safe_load deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ IBM QRadar SIEM 7.3/7.4 Java Deserialization deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2020-5741 | Plex Media Server on Windows Deserialization deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2019-17358 | Cacti up to 1.2.7 Deserialization lib/functions.php Array deserialization


📈 20.66 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2022-35223 | EasyUse MailHunter Ultimate Cookie deserialization


📈 20.38 Punkte
🕵️ Sicherheitslücken

🕵️ U.S. Dept Of Defense: Remote Code Execution through DNN Cookie Deserialization


📈 20.38 Punkte
🕵️ Sicherheitslücken

⚠️ [remote] DotNetNuke - Cookie Deserialization Remote Code Execution (Metasploit)


📈 20.38 Punkte
⚠️ PoC

⚠️ #0daytoday #DotNetNuke Cookie Deserialization Remote Code Execution Exploit [remote #exploits #0day #Exploit]


📈 20.38 Punkte
⚠️ PoC

⚠️ DotNetNuke Cookie Deserialization Remote Code Execution


📈 20.38 Punkte
⚠️ PoC

💾 DotNetNuke Cookie Deserialization Remote Code Execution


📈 20.38 Punkte
💾 IT Security Tools

🕵️ IBM WebSphere bis 7.0.0.41/8.0.0.12/8.5.5.10/9.0.0.1 Cookie Deserialization erweiterte Rechte


📈 20.38 Punkte
🕵️ Sicherheitslücken

🕵️ IBM WebSphere bis 7.0.0.41/8.0.0.12/8.5.5.10/9.0.0.1 Cookie Deserialization erweiterte Rechte


📈 20.38 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2023-34050 | VMware Spring AMQP up to 2.4.16/3.0.9 Class deserialization


📈 20.27 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2021-4125 | Kube Reporting Hive JndiLookup.class deserialization


📈 20.27 Punkte
🕵️ Sicherheitslücken

🕵️ Apache Tapestry up to 5.4.5/5.5.0/5.6.2/5.7.0 AppModule.class deserialization


📈 20.27 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2022-1655 | Red Hat OpenStack Session Cookie cookie httponly flag


📈 20.1 Punkte
🕵️ Sicherheitslücken

🕵️ Dancer Perl 1.3111 Dancer.pm lib/Dancer/Cookie.pm cookie/cookies input validation


📈 20.1 Punkte
🕵️ Sicherheitslücken

🕵️ Synology Router Manager up to 1.2.4 Set-Cookie Header cookie without 'httponly' flag


📈 20.1 Punkte
🕵️ Sicherheitslücken

🕵️ October CMS up to 1.0.467 Cookie cookie validation


📈 20.1 Punkte
🕵️ Sicherheitslücken

🕵️ SAP Disclosure Management 10.1 Cookie httponly cookie without 'httponly' flag


📈 20.1 Punkte
🕵️ Sicherheitslücken

📰 Flask-Session-Cookie-Manager - Flask Session Cookie Decoder/Encoder


📈 20.1 Punkte
📰 IT Security Nachrichten

matomo