A vulnerability was found in BestWebSoft Contact Form 3.21. It has been classified as problematic. This affects the function cntctfrm_settings_page of the file contact_form.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.22 is able to address this issue. The name of the patch is 8398d96ff0fe45ec9267d7259961c2ef89ed8005. It is recommended to upgrade the affected component. The identifier VDB-225321 was assigned to this vulnerability.
More Stories
mingw-poppler-24.02.0-4.fc41
FEDORA-2025-e39bfb1baa Packages in this update: mingw-poppler-24.02.0-4.fc41 Update description: Backport fix for CVE-2024-56378. Read More
mingw-poppler-24.02.0-4.fc40
FEDORA-2025-ed039a54de Packages in this update: mingw-poppler-24.02.0-4.fc40 Update description: Backport fix for CVE-2024-56378. Read More
gimp-2.10.38-12.fc40
FEDORA-2024-ccdbd92d7b Packages in this update: gimp-2.10.38-12.fc40 Update description: This update fixes issues with loading TGA and XCF files. Read More
Multiple vulnerabilities in CTFd versions <= 3.7.4
Posted by Blazej Adamczyk on Dec 30 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Multiple vulnerabilities in CTFd versions <= 3.7.4 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1 General information ═════════════════════......
IBMi Navigator / CVE-2024-51464 / HTTP Security Token Bypass
Posted by hyp3rlinx on Dec 30 [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/IBMi_Navigator_HTTP_Security_Token_Bypass-CVE-2024-51464.txt [+] x.com/hyp3rlinx...
IBMi Navigator / CVE-2024-51463 / Server Side Request Forgery (SSRF)
Posted by hyp3rlinx on Dec 30 [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/IBMi_Navigator_Server_Side_Request_Forgery_CVE-2024-51463.txt [+] x.com/hyp3rlinx...