A vulnerability was found in EyouCMS 1.6.2. It has been classified as problematic. Affected is an unknown function. The manipulation of the argument web_recordnum leads to cross site scripting.
This vulnerability is traded as CVE-2023-34657. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Conditional Menus Plugin up to 1.2.0 on WordPress. It has been rated as problematic. This issue affects some unknown processing of the component Attribute Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2023-2654. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in File Renaming on Upload Plugin up to 2.5.1 on WordPress. Affected is an unknown function of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2023-2684. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Social Share, Social Login and Social Comments Plugin 7.13.30 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2023-2779. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in QuBot Plugin up to 1.1.5 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Chat Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-2399. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human Identities (NHIs).
At the top of mind when NHIs are mentioned, most security teams immediately think of Service Accounts.
Hydrografisch opnemingsvaartuig Zr.Ms. Luymes en mijnenjager Zr.Ms. Schiedam zijn vandaag teruggekeerd in Den Helder. Beide opereerden op de Oostzee. Daar maakten de schepen afgelopen maanden deel uit van de Standing NATO Mine Countermeasures Group 1 (SNMCMG1). Beveiliging van onderzeese infrastructuur stond binnen dit NAVO-vlootverband centraal.
A vulnerability was found in AI ChatBot Plugin up to 4.5.5 on WordPress and classified as problematic. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2023-2811. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in WP Sticky Social Plugin up to 1.0.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2023-3320. The attack may be initiated remotely. Furthermore, there is an exploit available.