A vulnerability was found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability.
More Stories
mingw-poppler-24.02.0-4.fc41
FEDORA-2025-e39bfb1baa Packages in this update: mingw-poppler-24.02.0-4.fc41 Update description: Backport fix for CVE-2024-56378. Read More
mingw-poppler-24.02.0-4.fc40
FEDORA-2025-ed039a54de Packages in this update: mingw-poppler-24.02.0-4.fc40 Update description: Backport fix for CVE-2024-56378. Read More
gimp-2.10.38-12.fc40
FEDORA-2024-ccdbd92d7b Packages in this update: gimp-2.10.38-12.fc40 Update description: This update fixes issues with loading TGA and XCF files. Read More
Multiple vulnerabilities in CTFd versions <= 3.7.4
Posted by Blazej Adamczyk on Dec 30 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Multiple vulnerabilities in CTFd versions <= 3.7.4 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1 General information ═════════════════════......
IBMi Navigator / CVE-2024-51464 / HTTP Security Token Bypass
Posted by hyp3rlinx on Dec 30 [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/IBMi_Navigator_HTTP_Security_Token_Bypass-CVE-2024-51464.txt [+] x.com/hyp3rlinx...
IBMi Navigator / CVE-2024-51463 / Server Side Request Forgery (SSRF)
Posted by hyp3rlinx on Dec 30 [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinx.altervista.org [+] Source: https://hyp3rlinx.altervista.org/advisories/IBMi_Navigator_Server_Side_Request_Forgery_CVE-2024-51463.txt [+] x.com/hyp3rlinx...