Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Deine Informationsquelle fรผr IT Sicherheit | TSEC

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š #0daytoday #WordPress WP Super Cache 1.7.1 Plugin - Remote Code Execution (Authenticated) Vulnerabi [#0day #Exploit]


๐Ÿ’ก Newskategorie: PoC
๐Ÿ”— Quelle: 0day.today

...



๐Ÿ“Œ WP Super Cache Plugin up to 1.7.1 on WordPress Cache Settings wp-cache-config.php cache_path code injection


๐Ÿ“ˆ 51.99 Punkte

๐Ÿ“Œ #0daytoday #Wordpress Contact Form 7 to Database Extension 2.10.32 Plugin - CSV Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 48.62 Punkte

๐Ÿ“Œ #0daytoday #Wordpress Survey & Poll 1.5.7.3 Plugin - sss_params SQL Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 48.62 Punkte

๐Ÿ“Œ #0daytoday #Wordpress Strong Testimonials 2.40.1 Plugin - Persistent Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 48.62 Punkte

๐Ÿ“Œ #0daytoday #Online Students Management System 1.0 - Remote Code Execution (Authenticated) Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 43.77 Punkte

๐Ÿ“Œ #0daytoday #WordPress WP Super Cache 1.7.1 Plugin - Remote Code Execution (Authenticated) Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 43.77 Punkte

๐Ÿ“Œ #0daytoday #WordPress W3 Total Cache Plugin - Unauthenticated Arbitrary File Read Exploit [#0day #Exploit]


๐Ÿ“ˆ 41.28 Punkte

๐Ÿ“Œ #0daytoday #PlaySMS 1.4 - sendfromfile.php?Filename Authenticated Code Execution Exploit [#0day #Exploit]


๐Ÿ“ˆ 40.56 Punkte

๐Ÿ“Œ #0daytoday #PlaySMS 1.4 - import.php Authenticated CSV File Upload Code Execution Exploit [#0day #Exploit]


๐Ÿ“ˆ 40.56 Punkte

๐Ÿ“Œ #0daytoday #ManageEngine opManager 12.3.150 - Authenticated Code Execution Exploit [#0day #Exploit]


๐Ÿ“ˆ 40.56 Punkte

๐Ÿ“Œ #0daytoday #Typesetter CMS 5.1 - Arbitrary Code Execution (Authenticated) Exploit [#0day #Exploit]


๐Ÿ“ˆ 40.56 Punkte

๐Ÿ“Œ #0daytoday #SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution Exploit [#0day #Exploit]


๐Ÿ“ˆ 40.07 Punkte

๐Ÿ“Œ #0daytoday #Plex Media Server 1.13.2.5154 - SSDP Processing XML External Entity Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Joomla Dutch Auction Factory 2.0.2 Component - filter_order_Dir SQL Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #iWay Data Quality Suite Web Console 10.6.1.ga - XML External Entity Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Viva Visitor & Volunteer ID Tracking 0.95.1 - fname SQL Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Electricks eCommerce 1.0 - Cross-Site Request Forgery (Change Admin Password) Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Sierra Wireless AirLink ES450 ACEManager ping_result.cgi Cross Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Sierra Wireless AirLink ES450 ACEManager ping_result.cgi Cross Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Zoho ManageEngine ServiceDesk Plus 9.3 - (SiteLookup.do) Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #MyT Project Management 1.5.1 - User[username] Persistent Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #thrsrossi Millhouse-Project 1.414 - (content) Persistent Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Snipe-IT Open Source Asset Management 4.7.5 - Persistent Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Avaya IP Office Application Server 11.0.0.0 - Reflective Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #ForensiTAppxService 2.2.0.4 - (ForensiTAppxService.exe) Unquoted Service Path Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Simple Online Food Ordering System 1.0 - (id) SQL Injection (Unauthenticated) Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Motorola Device Manager 2.5.4 - (MotoHelperService.exe) Unquoted Service Path Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Bakeshop Online Ordering System 1.0 - (Owner) Persistent Cross-site scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Online Tours & Travels Management System 1.0 - (id) SQL Injection Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Flexmonster Pivot Table & Charts 2.7.17 - (To OLAP) Reflected XSS Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Vehicle Parking Tracker System 1.0 - (Owner Name) Stored Cross-Site Scripting Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #PDFCOMPLETE Corporate Edition 4.1.45 - (pdfcDispatcher) Unquoted Service Path Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #F5 Big IP TMM uri_normalize_host Information Disclosure / Out-Of-Bounds Write Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Simple Student Information System 1.0 - SQL Injection (Authentication Bypass) Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte

๐Ÿ“Œ #0daytoday #Korenix CSRF / Backdoor Accounts / Command Injection / Missing Authentication Vulnerabi [#0day #Exploit]


๐Ÿ“ˆ 38.52 Punkte











matomo