The Duplicate Page or Post WordPress plugin before 1.5.1 does not have any authorisation and has a flawed CSRF check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin’s settings, or perform such attack via CSRF. Furthermore, due to the lack of escaping, this could lead to Stored Cross-Site Scripting issues
More Stories
USN-7022-3: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This...
firefox-131.0.2-1.fc40
FEDORA-2024-db72f480e8 Packages in this update: firefox-131.0.2-1.fc40 Update description: New upstream version (131.0.2) Read More
USN-7060-1: EDK II vulnerabilities
It was discovered that EDK II did not check the buffer length in XHCI, which could lead to a stack...
SEC Consult SA-20241009-0 :: Local Privilege Escalation via MSI installer in Palo Alto Networks GlobalProtect (CVE-2024-9473)
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Oct 09 <<< image/webp; name="cmd.webp": Unrecognized >>> Read More
firefox-131.0.2-1.fc39
FEDORA-2024-f109ae6fc7 Packages in this update: firefox-131.0.2-1.fc39 Update description: Updated to latest upstream (131.0.2) Read More
firefox-131.0.2-1.fc41
FEDORA-2024-d85494e836 Packages in this update: firefox-131.0.2-1.fc41 Update description: Updated to latest upstream (131.0.2) Read More