Restaurant Reservation System Patches Easy-to-Exploit XSS Bug - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105) +--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107) +--- Thread: Restaurant Reservation System Patches Easy-to-Exploit XSS Bug (/showthread.php?tid=15126) |
Restaurant Reservation System Patches Easy-to-Exploit XSS Bug - silversurfer - 25 May 21 Quote:An easy-to-exploit bug impacting the WordPress plugin ReDi Restaurant Reservation allows unauthenticated attackers to pilfer reservation data and customer personal identifiable information by simply submitting a malicious snippet of JavaScript code into the reservation comment field. Read more: Reservation System Fixes Easy-to-Exploit XSS Bug | Threatpost |