Attackers are smuggling payment card-skimming malicious code into checkout pages on Magento-based e-commerce sites by abusing the Google Tag Manager ad tool.
Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites.
Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent
A vulnerability classified as problematic has been found in Gestpay for WooCommerce Plugin up to 20221130 on WordPress. This affects the function ajax_delete_card. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-0432. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in Gestpay for WooCommerce Plugin up to 20221130 on WordPress. This vulnerability affects the function ajax_unset_default_card. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2024-0433. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in SourceCodester Student Management System 1.0. Affected is an unknown function of the file /student/controller.php. The manipulation of the argument photo leads to unrestricted upload.
This vulnerability is traded as CVE-2024-5047. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in SourceCodester Gas Agency Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file edituser.php. The manipulation of the argument id leads to sql injection.
This vulnerability was named CVE-2024-5051. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in SourceCodester Best House Rental Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection.
This vulnerability was named CVE-2024-5093. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Best House Rental Management System 1.0 and classified as critical. This issue affects some unknown processing of the file view_payment.php. The manipulation of the argument id leads to sql injection.
The identification of this vulnerability is CVE-2024-5094. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in SourceCodester Simple Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument username leads to sql injection.
This vulnerability is known as CVE-2024-5098. Access to the local network is required for this attack. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Simple Inventory System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updateprice.php. The manipulation of the argument ITEM leads to sql injection.
This vulnerability is handled as CVE-2024-5099. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Simple Inventory System 1.0. It has been classified as critical. This affects an unknown part of the file tableedit.php. The manipulation of the argument from/to leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-5100. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Simple Inventory System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file updateproduct.php. The manipulation of the argument ITEM leads to sql injection.
This vulnerability was named CVE-2024-5101. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection.
This vulnerability is handled as CVE-2024-5116. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in SourceCodester Event Registration System 1.0. This affects an unknown part of the file portal.php. The manipulation of the argument username/password leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-5117. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in SourceCodester Event Registration System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument username/password leads to sql injection.
This vulnerability was named CVE-2024-5118. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Event Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Master.php?f=load_registration. The manipulation of the argument last_id/event_id leads to sql injection.
The identification of this vulnerability is CVE-2024-5119. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Event Registration System 1.0. It has been classified as critical. Affected is an unknown function of the file /registrar/?page=registration. The manipulation of the argument e leads to sql injection.
This vulnerability is traded as CVE-2024-5120. It is possible to launch the attack remotely. Furthermore, there is an exploit available.