Dernières vulnérabilités du Samedi 9 Septembre 2023

Dernières vulnérabilités du Samedi 9 Septembre 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Dernière mise à jour efféctuée le 09/09/2023 à 23:58:02

(0) Vulnérabilité(s) CRITICAL [9.0, 10.0]

(0) Vulnérabilité(s) HIGH [7.0, 8.9]

(9) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Source : wordfence.com

Vulnérabilité ID : CVE-2023-4838

Première publication le : 09-09-2023 02:15:46
Dernière modification le : 09-09-2023 02:15:46

Description :
The Simple Download Counter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes like 'before' and 'after'. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2023-4838
Source : security@wordfence.com
Score CVSS : 6.4

Références :
https://plugins.trac.wordpress.org/changeset/2963794 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/aa5f7f2a-c7b7-4339-a608-51fd684c18bf?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-79


Source : vuldb.com

Vulnérabilité ID : CVE-2023-4845

Première publication le : 09-09-2023 07:15:50
Dernière modification le : 09-09-2023 07:15:50

Description :
A vulnerability was found in SourceCodester Simple Membership System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file account_edit_query.php. The manipulation of the argument admin_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239254 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4845
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/BigBaos/MemShipVul/blob/main/Simple-Membership-System%20account_edit_query.php%20has%20Sqlinjection.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.239254 | source : cna@vuldb.com
https://vuldb.com/?id.239254 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4846

Première publication le : 09-09-2023 08:15:07
Dernière modification le : 09-09-2023 08:15:07

Description :
A vulnerability was found in SourceCodester Simple Membership System 1.0. It has been rated as critical. This issue affects some unknown processing of the file delete_member.php. The manipulation of the argument mem_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239255.

CVE ID : CVE-2023-4846
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/Swpan2018/Vulhub/blob/main/Simple-Membership-System%20delete_member.php%20has%20Sqlinjection.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.239255 | source : cna@vuldb.com
https://vuldb.com/?id.239255 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4848

Première publication le : 09-09-2023 10:15:07
Dernière modification le : 09-09-2023 10:15:07

Description :
A vulnerability classified as critical was found in SourceCodester Simple Book Catalog App 1.0. Affected by this vulnerability is an unknown functionality of the file delete_book.php. The manipulation of the argument delete leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239257 was assigned to this vulnerability.

CVE ID : CVE-2023-4848
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.239257 | source : cna@vuldb.com
https://vuldb.com/?id.239257 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4849

Première publication le : 09-09-2023 11:15:14
Dernière modification le : 09-09-2023 11:15:14

Description :
A vulnerability, which was classified as critical, has been found in IBOS OA 4.5.5. Affected by this issue is some unknown functionality of the file ?r=file/dashboard/trash&op=del. The manipulation of the argument fids leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-239258 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4849
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/TinkAnet/cve/blob/main/sql.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.239258 | source : cna@vuldb.com
https://vuldb.com/?id.239258 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4850

Première publication le : 09-09-2023 12:15:07
Dernière modification le : 09-09-2023 12:15:07

Description :
A vulnerability, which was classified as critical, was found in IBOS OA 4.5.5. This affects an unknown part of the file ?r=dashboard/position/del. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239259.

CVE ID : CVE-2023-4850
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/RCEraser/cve/blob/main/sql_inject_2.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.239259 | source : cna@vuldb.com
https://vuldb.com/?id.239259 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4851

Première publication le : 09-09-2023 12:15:08
Dernière modification le : 09-09-2023 12:15:08

Description :
A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects unknown code of the file ?r=dashboard/position/edit&op=member. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239260.

CVE ID : CVE-2023-4851
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/liuqiba12345678/cve/blob/main/sql.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.239260 | source : cna@vuldb.com
https://vuldb.com/?id.239260 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4852

Première publication le : 09-09-2023 13:15:21
Dernière modification le : 09-09-2023 13:15:21

Description :
A vulnerability was found in IBOS OA 4.5.5 and classified as critical. This issue affects some unknown processing of the file ?r=dashboard/database/optimize. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239261 was assigned to this vulnerability.

CVE ID : CVE-2023-4852
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/r1pte/cve/blob/main/sql.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.239261 | source : cna@vuldb.com
https://vuldb.com/?id.239261 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Source : gitlab.com

Vulnérabilité ID : CVE-2023-4874

Première publication le : 09-09-2023 15:15:34
Dernière modification le : 09-09-2023 15:15:34

Description :
Null pointer dereference when viewing a specially crafted email in Mutt >1.5.2 <2.2.12

CVE ID : CVE-2023-4874
Source : cve@gitlab.com
Score CVSS : 4.3

Références :
https://gitlab.com/muttmua/mutt/-/commit/452ee330e094bfc7c9a68555e5152b1826534555.patch | source : cve@gitlab.com
https://gitlab.com/muttmua/mutt/-/commit/a4752eb0ae0a521eec02e59e51ae5daedf74fda0.patch | source : cve@gitlab.com

Vulnérabilité : CWE-475


(3) Vulnérabilité(s) LOW [0.1, 3.9]

Source : vuldb.com

Vulnérabilité ID : CVE-2023-4847

Première publication le : 09-09-2023 08:15:07
Dernière modification le : 09-09-2023 08:15:07

Description :
A vulnerability classified as problematic has been found in SourceCodester Simple Book Catalog App 1.0. Affected is an unknown function of the component Update Book Form. The manipulation of the argument book_title/book_author leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239256.

CVE ID : CVE-2023-4847
Source : cna@vuldb.com
Score CVSS : 3.5

Références :
https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.239256 | source : cna@vuldb.com
https://vuldb.com/?id.239256 | source : cna@vuldb.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4864

Première publication le : 09-09-2023 21:15:43
Dernière modification le : 09-09-2023 21:15:43

Description :
A vulnerability, which was classified as problematic, was found in SourceCodester Take-Note App 1.0. This affects an unknown part of the file index.php. The manipulation of the argument noteContent with the input <script>alert('xss')</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239349 was assigned to this vulnerability.

CVE ID : CVE-2023-4864
Source : cna@vuldb.com
Score CVSS : 3.5

Références :
https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.239349 | source : cna@vuldb.com
https://vuldb.com/?id.239349 | source : cna@vuldb.com

Vulnérabilité : CWE-79


Source : gitlab.com

Vulnérabilité ID : CVE-2023-4875

Première publication le : 09-09-2023 15:15:35
Dernière modification le : 09-09-2023 15:15:35

Description :
Null pointer dereference when composing from a specially crafted draft message in Mutt >1.5.2 <2.2.12

CVE ID : CVE-2023-4875
Source : cve@gitlab.com
Score CVSS : 2.2

Références :
https://gitlab.com/muttmua/mutt/-/commit/452ee330e094bfc7c9a68555e5152b1826534555.patch | source : cve@gitlab.com
https://gitlab.com/muttmua/mutt/-/commit/4cc3128abdf52c615911589394a03271fddeefc6.patch | source : cve@gitlab.com

Vulnérabilité : CWE-475


(0) Vulnérabilité(s) NO SCORE [0.0, 0.0]

Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.