<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Security Advisories on Martin Kubečka</title>
    <link>https://martinkubecka.sk/security-advisories/</link>
    <description>Recent content in Security Advisories on Martin Kubečka</description>
    <image>
      <title>Martin Kubečka</title>
      <url>https://martinkubecka.sk/images/avatar_transparent.png</url>
      <link>https://martinkubecka.sk/images/avatar_transparent.png</link>
    </image>
    <generator>Hugo -- gohugo.io</generator>
    <lastBuildDate>Tue, 01 Jul 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://martinkubecka.sk/security-advisories/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2025-56683: DOM-based Cross-Site Scripting Leading to Remote Code Execution in Logseq Application</title>
      <link>https://martinkubecka.sk/security-advisories/cve-2025-56683/</link>
      <pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate>
      
      <guid>https://martinkubecka.sk/security-advisories/cve-2025-56683/</guid>
      <description>A DOM-based XSS vulnerability in Logseq version 0.10.9 allows Remote Code Execution by injecting malicious JavaScript through unsanitized plugin README content combined with insufficient protocol validation.</description>
    </item>
    
    <item>
      <title>CVE-2023-47622: Multiple Reflected Cross-Site Scripting Vulnerabilities in IT Service Management Platform iTop</title>
      <link>https://martinkubecka.sk/security-advisories/cve-2023-47622/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
      
      <guid>https://martinkubecka.sk/security-advisories/cve-2023-47622/</guid>
      <description>Reflected XSS vulnerability in multiple query parameters of Combodo iTop’s render endpoint allows JavaScript injection and execution.</description>
    </item>
    
    <item>
      <title>CVE-2021-41433: Authentication Bypass in Resumes Management by EGavilan Media</title>
      <link>https://martinkubecka.sk/security-advisories/cve-2021-41433/</link>
      <pubDate>Wed, 22 Jun 2022 00:00:01 +0000</pubDate>
      
      <guid>https://martinkubecka.sk/security-advisories/cve-2021-41433/</guid>
      <description>SQL injection vulnerability in EGavilan Media&amp;#39;s Resumes Management and Job application allows unauthenticated attackers to bypass login authentication.</description>
    </item>
    
    <item>
      <title>CVE-2021-41432: Stored Cross-Site Scripting Vulnerability in the Blog Content in FlatPress</title>
      <link>https://martinkubecka.sk/security-advisories/cve-2021-41432/</link>
      <pubDate>Wed, 22 Jun 2022 00:00:00 +0000</pubDate>
      
      <guid>https://martinkubecka.sk/security-advisories/cve-2021-41432/</guid>
      <description>Stored XSS vulnerability in FlatPress 1.2.1 allows arbitrary JavaScript execution via crafted post content.</description>
    </item>
    
    <item>
      <title>CVE-2021-41434: Stored Cross-Site Scripting Vulnerability in Expense Management System by EGavilan Media</title>
      <link>https://martinkubecka.sk/security-advisories/cve-2021-41434/</link>
      <pubDate>Wed, 22 Jun 2022 00:00:00 +0000</pubDate>
      
      <guid>https://martinkubecka.sk/security-advisories/cve-2021-41434/</guid>
      <description>Stored XSS vulnerability in Expense Management System 1.0 allows arbitrary JavaScript execution via expense description input.</description>
    </item>
    
    <item>
      <title>CVE-2021-37413: Authentication Bypass in Content Management System Provided by GRANDCOM, s.r.o.</title>
      <link>https://martinkubecka.sk/security-advisories/cve-2021-37413/</link>
      <pubDate>Thu, 01 Jul 2021 00:00:00 +0000</pubDate>
      
      <guid>https://martinkubecka.sk/security-advisories/cve-2021-37413/</guid>
      <description>Unauthenticated SQL injection vulnerability in GRANDCOM CMS allows login bypass via crafted username.</description>
    </item>
    
  </channel>
</rss>
