A vulnerability, which was classified as critical, has been found in Booster for WooCommerce Plugin up to 5.4.3 on WordPress (E-Commerce Management Software). This issue affects the function process_email_verification/reset_and_mail_activation_link
of the file ~/includes/class-wcj-emails-verification.php of the component Email Verification Module. Applying a patch is able to eliminate this problem. The bugfix is ready for download at plugins.trac.wordpress.org.
Booster for WooCommerce Plugin up to 5.4.3 on WordPress Email Verification Module class-wcj-emails-verification.php authentication spoofing
- Virtual Patching
- August 31, 2021
- 7:05 am
CVE-2023-27982 : SCHNEIDER ELECTRIC IGSS DATA SERVER/IGSS DASHBOARD/CUSTOM REPORTS UP TO 16.0.0.23040 DASHBOARD FILE DATA AUTHENTICITY
Description A CWE-345: Insufficient Verification of Data Authenticity vulnerability exists in the Data Server that could cause manipulation of dashboard
CVE-2023-1501 : ROCKOA 2.3.2 ACLOUDCOSACTION.PHP.SQL RUNACTION FILEID UNRESTRICTED UPLOAD
Description A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the
CVE-2023-28116 : CONTIKI-NG UP TO 4.8/4.9 BLE L2CAP MODULE PACKETBUF_SIZE BUFFER OVERFLOW
Description Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an