Latest vulnerabilities [Friday, December 29, 2023]

Latest vulnerabilities [Friday, December 29, 2023]
{{titre}}

Last update performed on 12/29/2023 at 11:57:06 PM

(27) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : patchstack.com

Vulnerability ID : CVE-2023-25054

First published on : 29-12-2023 09:15:08
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in David F. Carr RSVPMaker.This issue affects RSVPMaker: from n/a through 10.6.6.

CVE ID : CVE-2023-25054
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-10-6-6-remote-code-execution-rce-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-51505

First published on : 29-12-2023 13:15:10
Last modified on : 29-12-2023 13:56:17

Description :
Deserialization of Untrusted Data vulnerability in realmag777 Active Products Tables for WooCommerce. Professional products tables for WooCommerce store.This issue affects Active Products Tables for WooCommerce. Professional products tables for WooCommerce store : from n/a through 1.0.6.

CVE ID : CVE-2023-51505
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/profit-products-tables-for-woocommerce/wordpress-active-products-tables-for-woocommerce-plugin-1-0-6-unauthenticated-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-51411

First published on : 29-12-2023 14:15:46
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Shabti Kaplan Frontend Admin by DynamiApps.This issue affects Frontend Admin by DynamiApps: from n/a through 3.18.3.

CVE ID : CVE-2023-51411
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/acf-frontend-form-element/wordpress-frontend-admin-by-dynamiapps-plugin-3-18-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51419

First published on : 29-12-2023 14:15:47
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Bertha.Ai BERTHA AI. Your AI co-pilot for WordPress and Chrome.This issue affects BERTHA AI. Your AI co-pilot for WordPress and Chrome: from n/a through 1.11.10.7.

CVE ID : CVE-2023-51419
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/bertha-ai-free/wordpress-bertha-ai-plugin-1-11-10-7-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51468

First published on : 29-12-2023 14:15:47
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Jacques Malgrange Rencontre โ€“ Dating Site.This issue affects Rencontre โ€“ Dating Site: from n/a through 3.10.1.

CVE ID : CVE-2023-51468
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-10-1-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51473

First published on : 29-12-2023 14:15:47
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Pixelemu TerraClassifieds โ€“ Simple Classifieds Plugin.This issue affects TerraClassifieds โ€“ Simple Classifieds Plugin: from n/a through 2.0.3.

CVE ID : CVE-2023-51473
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/terraclassifieds/wordpress-terraclassifieds-plugin-2-0-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51475

First published on : 29-12-2023 14:15:47
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in IOSS WP MLM SOFTWARE PLUGIN.This issue affects WP MLM SOFTWARE PLUGIN: from n/a through 4.0.

CVE ID : CVE-2023-51475
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/wp-mlm/wordpress-wp-mlm-unilevel-plugin-4-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-32095

First published on : 29-12-2023 09:15:08
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in Milan Dini? Rename Media Files.This issue affects Rename Media Files: from n/a through 1.0.1.

CVE ID : CVE-2023-32095
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/rename-media-files/wordpress-rename-media-files-plugin-1-0-1-remote-code-execution-rce-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-46623

First published on : 29-12-2023 09:15:09
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in TienCOP WP EXtra.This issue affects WP EXtra: from n/a through 6.2.

CVE ID : CVE-2023-46623
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/wp-extra/wordpress-wp-extra-plugin-6-2-remote-code-execution-rce-via-htaccess-modification-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-47840

First published on : 29-12-2023 09:15:09
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.

CVE ID : CVE-2023-47840
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/qode-essential-addons/wordpress-qode-essential-addons-plugin-1-5-2-arbitrary-plugin-installation-and-activation-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-49830

First published on : 29-12-2023 10:15:10
Last modified on : 29-12-2023 13:56:27

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in Brainstorm Force Astra Pro.This issue affects Astra Pro: from n/a through 4.3.1.

CVE ID : CVE-2023-49830
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/astra-addon/wordpress-astra-pro-plugin-4-3-1-contributor-remote-code-execution-rce-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-51422

First published on : 29-12-2023 13:15:10
Last modified on : 29-12-2023 13:56:17

Description :
Deserialization of Untrusted Data vulnerability in Saleswonder Team Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition.This issue affects Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition: from n/a through 3.05.0.

CVE ID : CVE-2023-51422
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/webinar-ignition/wordpress-webinarignition-plugin-3-05-0-authenticated-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-51470

First published on : 29-12-2023 13:15:10
Last modified on : 29-12-2023 13:56:17

Description :
Deserialization of Untrusted Data vulnerability in Jacques Malgrange Rencontre โ€“ Dating Site.This issue affects Rencontre โ€“ Dating Site: from n/a through 3.11.1.

CVE ID : CVE-2023-51470
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-11-1-authenticated-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-51410

First published on : 29-12-2023 14:15:46
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in WPVibes WP Mail Log.This issue affects WP Mail Log: from n/a through 1.1.2.

CVE ID : CVE-2023-51410
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/wp-mail-log/wordpress-wp-mail-log-plugin-1-1-2-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51417

First published on : 29-12-2023 14:15:46
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Joris van Montfort JVM Gutenberg Rich Text Icons.This issue affects JVM Gutenberg Rich Text Icons: from n/a through 1.2.3.

CVE ID : CVE-2023-51417
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/jvm-rich-text-icons/wordpress-jvm-rich-text-icons-plugin-1-2-3-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51421

First published on : 29-12-2023 14:15:47
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Soft8Soft LLC Verge3D Publishing and E-Commerce.This issue affects Verge3D Publishing and E-Commerce: from n/a through 4.5.2.

CVE ID : CVE-2023-51421
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/verge3d/wordpress-verge3d-plugin-4-5-2-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-51414

First published on : 29-12-2023 13:15:10
Last modified on : 29-12-2023 13:56:17

Description :
Deserialization of Untrusted Data vulnerability in EnvialoSimple EnvรญaloSimple: Email Marketing y Newsletters.This issue affects EnvรญaloSimple: Email Marketing y Newsletters: from n/a through 2.1.

CVE ID : CVE-2023-51414
Source : audit@patchstack.com
CVSS Score : 9.6

References :
https://patchstack.com/database/vulnerability/envialosimple-email-marketing-y-newsletters-gratis/wordpress-envialosimple-plugin-2-1-unauthenticated-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-51545

First published on : 29-12-2023 13:15:11
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF), Deserialization of Untrusted Data vulnerability in ThemeHigh Job Manager & Career โ€“ Manage job board listings, and recruitments.This issue affects Job Manager & Career โ€“ Manage job board listings, and recruitments: from n/a through 1.4.4.

CVE ID : CVE-2023-51545
Source : audit@patchstack.com
CVSS Score : 9.6

References :
https://patchstack.com/database/vulnerability/job-manager-career/wordpress-job-manager-career-plugin-1-4-4-cross-site-request-forgery-csrf-to-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352
Vulnerability : CWE-502


Vulnerability ID : CVE-2023-40606

First published on : 29-12-2023 09:15:08
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in Kanban for WordPress Kanban Boards for WordPress.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21.

CVE ID : CVE-2023-40606
Source : audit@patchstack.com
CVSS Score : 9.1

References :
https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-21-arbitrary-code-execution-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-45751

First published on : 29-12-2023 09:15:09
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in POSIMYTH Nexter Extension.This issue affects Nexter Extension: from n/a through 2.0.3.

CVE ID : CVE-2023-45751
Source : audit@patchstack.com
CVSS Score : 9.1

References :
https://patchstack.com/database/vulnerability/nexter-extension/wordpress-nexter-extension-plugin-2-0-3-remote-code-execution-rce-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-51420

First published on : 29-12-2023 10:15:13
Last modified on : 29-12-2023 13:56:27

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in Soft8Soft LLC Verge3D Publishing and E-Commerce.This issue affects Verge3D Publishing and E-Commerce: from n/a through 4.5.2.

CVE ID : CVE-2023-51420
Source : audit@patchstack.com
CVSS Score : 9.1

References :
https://patchstack.com/database/vulnerability/verge3d/wordpress-verge3d-plugin-4-5-2-remote-code-execution-rce-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-51412

First published on : 29-12-2023 14:15:46
Last modified on : 29-12-2023 14:46:03

Description :
Unrestricted Upload of File with Dangerous Type vulnerability in Piotnet Piotnet Forms.This issue affects Piotnet Forms: from n/a through 1.0.25.

CVE ID : CVE-2023-51412
Source : audit@patchstack.com
CVSS Score : 9.0

References :
https://patchstack.com/database/vulnerability/piotnetforms/wordpress-piotnetforms-plugin-1-0-25-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-434


Source : usom.gov.tr

Vulnerability ID : CVE-2023-4541

First published on : 29-12-2023 15:15:09
Last modified on : 29-12-2023 17:08:18

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ween Software Admin Panel allows SQL Injection.This issue affects Admin Panel: through 20231229. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4541
Source : iletisim@usom.gov.tr
CVSS Score : 9.8

References :
https://www.usom.gov.tr/bildirim/tr-23-0740 | source : iletisim@usom.gov.tr

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-4674

First published on : 29-12-2023 15:15:09
Last modified on : 29-12-2023 17:08:18

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yaztek Software Technologies and Computer Systems E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: through 20231229. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4674
Source : iletisim@usom.gov.tr
CVSS Score : 9.8

References :
https://www.usom.gov.tr/bildirim/tr-23-0741 | source : iletisim@usom.gov.tr

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-4675

First published on : 29-12-2023 15:15:09
Last modified on : 29-12-2023 17:08:18

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GM Information Technologies MDO allows SQL Injection.This issue affects MDO: through 20231229. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4675
Source : iletisim@usom.gov.tr
CVSS Score : 9.8

References :
https://www.usom.gov.tr/bildirim/tr-23-0742 | source : iletisim@usom.gov.tr

Vulnerability : CWE-89


Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability ID : CVE-2023-51434

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by buffer overflow vulnerability, successful exploitation could cause code execution.

CVE ID : CVE-2023-51434
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 9.3

References :
https://www.hihonor.com/global/security/cve-2023-51434/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Source : github.com

Vulnerability ID : CVE-2023-52139

First published on : 29-12-2023 18:15:39
Last modified on : 29-12-2023 19:28:15

Description :
Misskey is an open source, decentralized social media platform. Third-party applications may be able to access some endpoints or Websocket APIs that are incorrectly specified as [kind](https://github.com/misskey-dev/misskey/blob/406b4bdbe79b5b0b68fcdcb3c4b6e419460a0258/packages/backend/src/server/api/endpoints.ts#L811) or [secure](https://github.com/misskey-dev/misskey/blob/406b4bdbe79b5b0b68fcdcb3c4b6e419460a0258/packages/backend/src/server/api/endpoints.ts#L805) without the user's permission and perform operations such as reading or adding non-public content. As a result, if the user who authenticated the application is an administrator, confidential information such as object storage secret keys and SMTP server passwords will be leaked, and general users can also create invitation codes without permission and leak non-public user information. This is patched in version [2023.12.1](https://github.com/misskey-dev/misskey/commit/c96bc36fedc804dc840ea791a9355d7df0748e64).

CVE ID : CVE-2023-52139
Source : security-advisories@github.com
CVSS Score : 9.0

References :
https://github.com/misskey-dev/misskey/commit/c96bc36fedc804dc840ea791a9355d7df0748e64 | source : security-advisories@github.com
https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm | source : security-advisories@github.com

Vulnerability : CWE-285


(23) HIGH VULNERABILITIES [7.0, 8.9]

Source : patchstack.com

Vulnerability ID : CVE-2023-22677

First published on : 29-12-2023 09:15:08
Last modified on : 29-12-2023 13:56:33

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in BinaryStash WP Booklet.This issue affects WP Booklet: from n/a through 2.1.8.

CVE ID : CVE-2023-22677
Source : audit@patchstack.com
CVSS Score : 8.5

References :
https://patchstack.com/database/vulnerability/wp-booklet/wordpress-wp-booklet-plugin-2-1-8-remote-code-execution-rce?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2022-44589

First published on : 29-12-2023 10:15:08
Last modified on : 29-12-2023 13:56:27

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in miniOrange miniOrange's Google Authenticator โ€“ WordPress Two Factor Authentication โ€“ 2FA , Two Factor, OTP SMS and Email | Passwordless login.This issue affects miniOrange's Google Authenticator โ€“ WordPress Two Factor Authentication โ€“ 2FA , Two Factor, OTP SMS and Email | Passwordless login: from n/a through 5.6.1.

CVE ID : CVE-2022-44589
Source : audit@patchstack.com
CVSS Score : 8.1

References :
https://patchstack.com/database/vulnerability/miniorange-2-factor-authentication/wordpress-miniorange-two-factor-authentication-plugin-5-6-1-sensitive-data-exposure-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-52135

First published on : 29-12-2023 11:15:11
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WS Form WS Form LITE โ€“ Drag & Drop Contact Form Builder for WordPress.This issue affects WS Form LITE โ€“ Drag & Drop Contact Form Builder for WordPress: from n/a through 1.9.170.

CVE ID : CVE-2023-52135
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/ws-form/wordpress-ws-form-lite-drag-drop-contact-form-builder-for-wordpress-plugin-1-9-170-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-50837

First published on : 29-12-2023 12:15:44
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebFactory Ltd Login Lockdown โ€“ Protect Login Form.This issue affects Login Lockdown โ€“ Protect Login Form: from n/a through 2.06.

CVE ID : CVE-2023-50837
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/login-lockdown/wordpress-login-lockdown-protect-login-form-plugin-2-06-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-50901

First published on : 29-12-2023 11:15:08
Last modified on : 29-12-2023 13:56:27

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HT Mega โ€“ Absolute Addons For Elementor allows Reflected XSS.This issue affects HT Mega โ€“ Absolute Addons For Elementor: from n/a through 2.3.8.

CVE ID : CVE-2023-50901
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-absolute-addons-for-elementor-plugin-2-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51373

First published on : 29-12-2023 11:15:09
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ian Kennerley Google Photos Gallery with Shortcodes allows Reflected XSS.This issue affects Google Photos Gallery with Shortcodes: from n/a through 4.0.2.

CVE ID : CVE-2023-51373
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/google-picasa-albums-viewer/wordpress-google-photos-gallery-with-shortcodes-plugin-4-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50892

First published on : 29-12-2023 12:15:45
Last modified on : 29-12-2023 13:56:17

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodexThemes TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme allows Reflected XSS.This issue affects TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme: from n/a through 5.9.1.

CVE ID : CVE-2023-50892
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/thegem/wordpress-thegem-theme-5-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50893

First published on : 29-12-2023 12:15:45
Last modified on : 29-12-2023 13:56:17

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UpSolution Impreza โ€“ WordPress Website and WooCommerce Builder allows Reflected XSS.This issue affects Impreza โ€“ WordPress Website and WooCommerce Builder: from n/a through 8.17.4.

CVE ID : CVE-2023-50893
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/us-core/wordpress-upsolution-core-plugin-8-17-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Source : cloudflare.com

Vulnerability ID : CVE-2023-7080

First published on : 29-12-2023 12:15:47
Last modified on : 29-12-2023 13:56:17

Description :
The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate Origin/Host headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability to run code. If wrangler dev --remote was being used, an attacker could access production resources if they were bound to the worker. This issue was fixed in wrangler@3.19.0 and wrangler@2.20.2. Whilst wrangler dev's inspector server listens on local interfaces by default as of wrangler@3.16.0, an SSRF vulnerability in miniflare https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7 (CVE-2023-7078) allowed access from the local network until wrangler@3.18.0. wrangler@3.19.0 and wrangler@2.20.2 introduced validation for the Origin/Host headers.

CVE ID : CVE-2023-7080
Source : cna@cloudflare.com
CVSS Score : 8.5

References :
https://github.com/cloudflare/workers-sdk/issues/4430 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/pull/4437 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/pull/4535 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/pull/4550 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf | source : cna@cloudflare.com

Vulnerability : CWE-269


Vulnerability ID : CVE-2023-7078

First published on : 29-12-2023 12:15:47
Last modified on : 29-12-2023 13:56:17

Description :
Sending specially crafted HTTP requests to Miniflare's server could result in arbitrary HTTP and WebSocket requests being sent from the server. If Miniflare was configured to listen on external network interfaces (as was the default in wrangler until 3.19.0), an attacker on the local network could access other local servers.

CVE ID : CVE-2023-7078
Source : cna@cloudflare.com
CVSS Score : 7.5

References :
https://github.com/cloudflare/workers-sdk/pull/4532 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7 | source : cna@cloudflare.com

Vulnerability : CWE-918


Source : microsoft.com

Vulnerability ID : CVE-2020-17163

First published on : 29-12-2023 17:15:49
Last modified on : 29-12-2023 19:28:15

Description :
Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVE ID : CVE-2020-17163
Source : secure@microsoft.com
CVSS Score : 7.8

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17163 | source : secure@microsoft.com


Source : github.com

Vulnerability ID : CVE-2023-52137

First published on : 29-12-2023 17:16:07
Last modified on : 29-12-2023 19:28:15

Description :
The [`tj-actions/verify-changed-files`](https://github.com/tj-actions/verify-changed-files) action allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. The [`verify-changed-files`](https://github.com/tj-actions/verify-changed-files) workflow returns the list of files changed within a workflow execution. This could potentially allow filenames that contain special characters such as `;` which can be used by an attacker to take over the [GitHub Runner](https://docs.github.com/en/actions/using-github-hosted-runners/about-github-hosted-runners) if the output value is used in a raw fashion (thus being directly replaced before execution) inside a `run` block. By running custom commands, an attacker may be able to steal secrets such as `GITHUB_TOKEN` if triggered on other events than `pull_request`. This has been patched in versions [17](https://github.com/tj-actions/verify-changed-files/releases/tag/v17) and [17.0.0](https://github.com/tj-actions/verify-changed-files/releases/tag/v17.0.0) by enabling `safe_output` by default and returning filename paths escaping special characters for bash environments.

CVE ID : CVE-2023-52137
Source : security-advisories@github.com
CVSS Score : 7.7

References :
https://github.com/tj-actions/verify-changed-files/commit/498d3f316f501aa72485060e8c96fde7b2014f12 | source : security-advisories@github.com
https://github.com/tj-actions/verify-changed-files/commit/592e305da041c09a009afa4a43c97d889bed65c3 | source : security-advisories@github.com
https://github.com/tj-actions/verify-changed-files/security/advisories/GHSA-ghm2-rq8q-wrhc | source : security-advisories@github.com

Vulnerability : CWE-20


Source : pandorafms.com

Vulnerability ID : CVE-2023-41815

First published on : 29-12-2023 12:15:43
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Malicious code could be executed in the File Manager section. This issue affects Pandora FMS: from 700 through 774.

CVE ID : CVE-2023-41815
Source : security@pandorafms.com
CVSS Score : 7.5

References :
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | source : security@pandorafms.com

Vulnerability : CWE-79


Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability ID : CVE-2023-23431

First published on : 29-12-2023 02:15:43
Last modified on : 29-12-2023 03:13:44

Description :
Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file.

CVE ID : CVE-2023-23431
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 7.3

References :
https://www.hihonor.com/global/security/cve-2023-23431/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-347


Vulnerability ID : CVE-2023-23432

First published on : 29-12-2023 02:15:44
Last modified on : 29-12-2023 03:13:44

Description :
Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file.

CVE ID : CVE-2023-23432
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 7.3

References :
https://www.hihonor.com/global/security/cve-2023-23432/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-347


Vulnerability ID : CVE-2023-23436

First published on : 29-12-2023 02:15:44
Last modified on : 29-12-2023 03:13:44

Description :
Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file

CVE ID : CVE-2023-23436
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 7.3

References :
https://www.hihonor.com/global/security/cve-2023-23436/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-347


Vulnerability ID : CVE-2023-51435

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51435
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 7.1

References :
https://www.hihonor.com/global/security/cve-2023-51435/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-51431

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.

CVE ID : CVE-2023-51431
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 7.0

References :
https://www.hihonor.com/global/security/cve-2023-51431/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Source : vuldb.com

Vulnerability ID : CVE-2023-7156

First published on : 29-12-2023 06:15:43
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability has been found in Campcodes Online College Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php of the component Search. The manipulation of the argument category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249178 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-7156
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-95b95ab64ccc | source : cna@vuldb.com
https://vuldb.com/?ctiid.249178 | source : cna@vuldb.com
https://vuldb.com/?id.249178 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7158

First published on : 29-12-2023 07:15:11
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.

CVE ID : CVE-2023-7158
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://github.com/micropython/micropython/issues/13007 | source : cna@vuldb.com
https://github.com/micropython/micropython/pull/13039 | source : cna@vuldb.com
https://github.com/micropython/micropython/pull/13039/commits/f397a3ec318f3ad05aa287764ae7cef32202380f | source : cna@vuldb.com
https://github.com/micropython/micropython/releases/tag/v1.22.0 | source : cna@vuldb.com
https://vuldb.com/?ctiid.249180 | source : cna@vuldb.com
https://vuldb.com/?id.249180 | source : cna@vuldb.com

Vulnerability : CWE-122


Vulnerability ID : CVE-2023-7161

First published on : 29-12-2023 08:15:37
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3.1. This affects an unknown part of the file index.php?para=index of the component Login. The manipulation of the argument check_VirtualSiteId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249183.

CVE ID : CVE-2023-7161
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://github.com/fixitc/cve/blob/main/sql.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249183 | source : cna@vuldb.com
https://vuldb.com/?id.249183 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-4464

First published on : 29-12-2023 10:15:11
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability, which was classified as critical, has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This issue affects some unknown processing of the component Diagnostic Telnet Mode. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-249257 was assigned to this vulnerability.

CVE ID : CVE-2023-4464
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249257 | source : cna@vuldb.com
https://vuldb.com/?id.249257 | source : cna@vuldb.com

Vulnerability : CWE-78


Source : mattermost.com

Vulnerability ID : CVE-2023-7114

First published on : 29-12-2023 13:15:12
Last modified on : 29-12-2023 13:56:17

Description :
Mattermost version 2.10.0 and earlier fails to sanitize deeplink paths, which allows an attacker to perform CSRF attacks against the server.

CVE ID : CVE-2023-7114
Source : responsibledisclosure@mattermost.com
CVSS Score : 7.1

References :
https://mattermost.com/security-updates | source : responsibledisclosure@mattermost.com

Vulnerability : CWE-74


(69) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability ID : CVE-2023-23426

First published on : 29-12-2023 03:15:09
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by file writing vulnerability, successful exploitation could cause information disclosure.

CVE ID : CVE-2023-23426
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 6.6

References :
https://www.hihonor.com/global/security/cve-2023-23426/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23424

First published on : 29-12-2023 03:15:08
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by file writing vulnerability, successful exploitation could cause code execution

CVE ID : CVE-2023-23424
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 6.5

References :
https://www.hihonor.com/global/security/cve-2023-23424/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23441

First published on : 29-12-2023 04:15:08
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by out of bounds read vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-23441
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 6.0

References :
https://www.hihonor.com/global/security/cve-2023-23441/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-51429

First published on : 29-12-2023 04:15:09
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51429
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 6.0

References :
https://www.hihonor.com/global/security/cve-2023-51429/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23442

First published on : 29-12-2023 04:15:08
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-23442
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.6

References :
https://www.hihonor.com/global/security/cve-2023-23442/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23443

First published on : 29-12-2023 04:15:08
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-23443
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.6

References :
https://www.hihonor.com/global/security/cve-2023-23443/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-51426

First published on : 29-12-2023 04:15:09
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51426
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.6

References :
https://www.hihonor.com/global/security/cve-2023-51426/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-843


Vulnerability ID : CVE-2023-51427

First published on : 29-12-2023 04:15:09
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51427
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.6

References :
https://www.hihonor.com/global/security/cve-2023-51427/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-843


Vulnerability ID : CVE-2023-51428

First published on : 29-12-2023 04:15:09
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51428
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.6

References :
https://www.hihonor.com/global/security/cve-2023-51428/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-843


Vulnerability ID : CVE-2023-51430

First published on : 29-12-2023 04:15:09
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51430
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.4

References :
https://www.hihonor.com/global/security/cve-2023-51430/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23433

First published on : 29-12-2023 02:15:44
Last modified on : 29-12-2023 03:13:44

Description :
Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file.

CVE ID : CVE-2023-23433
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23433/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-347


Vulnerability ID : CVE-2023-23434

First published on : 29-12-2023 02:15:44
Last modified on : 29-12-2023 03:13:44

Description :
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.

CVE ID : CVE-2023-23434
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23434/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23435

First published on : 29-12-2023 02:15:44
Last modified on : 29-12-2023 03:13:44

Description :
Some Honor products are affected by signature management vulnerability, successful exploitation could cause the forged system file overwrite the correct system file

CVE ID : CVE-2023-23435
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23435/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-347


Vulnerability ID : CVE-2023-23427

First published on : 29-12-2023 03:15:09
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.

CVE ID : CVE-2023-23427
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23427/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-269


Vulnerability ID : CVE-2023-23429

First published on : 29-12-2023 03:15:09
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.

CVE ID : CVE-2023-23429
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23429/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-269


Vulnerability ID : CVE-2023-23438

First published on : 29-12-2023 03:15:10
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions

CVE ID : CVE-2023-23438
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23438/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23439

First published on : 29-12-2023 03:15:10
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.

CVE ID : CVE-2023-23439
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-23439/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-6939

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause denial of service.

CVE ID : CVE-2023-6939
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 4.0

References :
https://www.hihonor.com/global/security/cve-2023-6939/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Source : patchstack.com

Vulnerability ID : CVE-2023-51396

First published on : 29-12-2023 11:15:10
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brizy.Io Brizy โ€“ Page Builder allows Stored XSS.This issue affects Brizy โ€“ Page Builder: from n/a through 2.4.29.

CVE ID : CVE-2023-51396
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/brizy/wordpress-brizy-page-builder-plugin-2-4-29-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51397

First published on : 29-12-2023 11:15:10
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force WP Remote Site Search allows Stored XSS.This issue affects WP Remote Site Search: from n/a through 1.0.4.

CVE ID : CVE-2023-51397
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/wp-remote-site-search/wordpress-wp-remote-site-search-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51399

First published on : 29-12-2023 11:15:10
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Back Button Widget allows Stored XSS.This issue affects Back Button Widget: from n/a through 1.6.3.

CVE ID : CVE-2023-51399
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/back-button-widget/wordpress-back-button-widget-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51541

First published on : 29-12-2023 11:15:11
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uroลกevi? Stock Ticker allows Stored XSS.This issue affects Stock Ticker: from n/a through 3.23.4.

CVE ID : CVE-2023-51541
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/stock-ticker/wordpress-stock-ticker-plugin-3-23-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50879

First published on : 29-12-2023 12:15:44
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WordPress.Com Editing Toolkit allows Stored XSS.This issue affects WordPress.Com Editing Toolkit: from n/a through 3.78784.

CVE ID : CVE-2023-50879
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/full-site-editing/wordpress-wordpress-com-editing-toolkit-plugin-3-78784-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50880

First published on : 29-12-2023 12:15:44
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The BuddyPress Community BuddyPress allows Stored XSS.This issue affects BuddyPress: from n/a through 11.3.1.

CVE ID : CVE-2023-50880
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/buddypress/wordpress-buddypress-plugin-11-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50881

First published on : 29-12-2023 12:15:44
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager โ€“ Restricted Content, Users & Roles, Enhanced Security and More allows Stored XSS.This issue affects Advanced Access Manager โ€“ Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.15.

CVE ID : CVE-2023-50881
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-15-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50889

First published on : 29-12-2023 12:15:45
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder โ€“ WordPress Page Builder allows Stored XSS.This issue affects Beaver Builder โ€“ WordPress Page Builder: from n/a through 2.7.2.

CVE ID : CVE-2023-50889
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/beaver-builder-lite-version/wordpress-beaver-builder-plugin-2-7-2-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50891

First published on : 29-12-2023 12:15:45
Last modified on : 29-12-2023 13:56:17

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zoho Forms Form plugin for WordPress โ€“ Zoho Forms allows Stored XSS.This issue affects Form plugin for WordPress โ€“ Zoho Forms: from n/a through 3.0.1.

CVE ID : CVE-2023-50891
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/zoho-forms/wordpress-zoho-forms-plugin-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50896

First published on : 29-12-2023 11:15:08
Last modified on : 29-12-2023 13:56:27

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weForms weForms โ€“ Easy Drag & Drop Contact Form Builder For WordPress allows Stored XSS.This issue affects weForms โ€“ Easy Drag & Drop Contact Form Builder For WordPress: from n/a through 1.6.17.

CVE ID : CVE-2023-50896
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/weforms/wordpress-weforms-plugin-1-6-17-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51361

First published on : 29-12-2023 11:15:09
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ginger Plugins Sticky Chat Widget: Click to chat, SMS, Email, Messages, Call Button, Live Chat and Live Support Button allows Stored XSS.This issue affects Sticky Chat Widget: Click to chat, SMS, Email, Messages, Call Button, Live Chat and Live Support Button: from n/a through 1.1.8.

CVE ID : CVE-2023-51361
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/sticky-chat-widget/wordpress-sticky-chat-widget-plugin-1-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51371

First published on : 29-12-2023 11:15:09
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bit Assist Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget allows Stored XSS.This issue affects Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget: from n/a through 1.1.9.

CVE ID : CVE-2023-51371
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/bit-assist/wordpress-chat-button-plugin-1-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51372

First published on : 29-12-2023 11:15:09
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HashBar โ€“ WordPress Notification Bar allows Stored XSS.This issue affects HashBar โ€“ WordPress Notification Bar: from n/a through 1.4.1.

CVE ID : CVE-2023-51372
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/hashbar-wp-notification-bar/wordpress-hashbar-wordpress-notification-bar-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-51374

First published on : 29-12-2023 11:15:10
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ZeroBounce ZeroBounce Email Verification & Validation allows Stored XSS.This issue affects ZeroBounce Email Verification & Validation: from n/a through 1.0.11.

CVE ID : CVE-2023-51374
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/zerobounce/wordpress-zerobounce-email-verification-validation-plugin-1-0-11-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-50878

First published on : 29-12-2023 13:15:08
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF) vulnerability in InspireUI MStore API.This issue affects MStore API: from n/a through 4.10.1.

CVE ID : CVE-2023-50878
Source : audit@patchstack.com
CVSS Score : 5.4

References :
https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-4-10-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-51358

First published on : 29-12-2023 13:15:09
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Bright Plugins Block IPs for Gravity Forms.This issue affects Block IPs for Gravity Forms: from n/a through 1.0.1.

CVE ID : CVE-2023-51358
Source : audit@patchstack.com
CVSS Score : 5.4

References :
https://patchstack.com/database/vulnerability/gf-block-ips/wordpress-block-ips-for-gravity-forms-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-51378

First published on : 29-12-2023 13:15:09
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Rise Themes Rise Blocks โ€“ A Complete Gutenberg Page Builder.This issue affects Rise Blocks โ€“ A Complete Gutenberg Page Builder: from n/a through 3.1.

CVE ID : CVE-2023-51378
Source : audit@patchstack.com
CVSS Score : 5.4

References :
https://patchstack.com/database/vulnerability/rise-blocks/wordpress-rise-blocks-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-51527

First published on : 29-12-2023 15:15:10
Last modified on : 29-12-2023 17:08:18

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Senol Sahin AI Power: Complete AI Pack โ€“ Powered by GPT-4.This issue affects AI Power: Complete AI Pack โ€“ Powered by GPT-4: from n/a through 1.8.2.

CVE ID : CVE-2023-51527
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/gpt3-ai-content-generator/wordpress-ai-power-complete-ai-pack-powered-by-gpt-4-plugin-1-8-2-sensitive-data-exposure-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-51687

First published on : 29-12-2023 15:15:10
Last modified on : 29-12-2023 17:08:18

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in impleCode Product Catalog Simple.This issue affects Product Catalog Simple: from n/a through 1.7.6.

CVE ID : CVE-2023-51687
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/post-type-x/wordpress-product-catalog-simple-plugin-1-7-6-sensitive-data-exposure-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-51688

First published on : 29-12-2023 15:15:10
Last modified on : 29-12-2023 17:08:18

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in impleCode eCommerce Product Catalog Plugin for WordPress.This issue affects eCommerce Product Catalog Plugin for WordPress: from n/a through 3.3.26.

CVE ID : CVE-2023-51688
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/ecommerce-product-catalog/wordpress-ecommerce-product-catalog-plugin-for-wordpress-plugin-3-3-26-sensitive-data-exposure-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-51676

First published on : 29-12-2023 13:15:11
Last modified on : 29-12-2023 13:56:17

Description :
Server-Side Request Forgery (SSRF) vulnerability in Leevio Happy Addons for Elementor.This issue affects Happy Addons for Elementor: from n/a through 3.9.1.1.

CVE ID : CVE-2023-51676
Source : audit@patchstack.com
CVSS Score : 4.9

References :
https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-9-1-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-918


Vulnerability ID : CVE-2023-31095

First published on : 29-12-2023 10:15:09
Last modified on : 29-12-2023 13:56:27

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.2.8.

CVE ID : CVE-2023-31095
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/cf7-hubspot/wordpress-integration-for-contact-form-7-hubspot-plugin-1-2-8-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-31229

First published on : 29-12-2023 10:15:09
Last modified on : 29-12-2023 13:56:27

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in WP Directory Kit.This issue affects WP Directory Kit: from n/a through 1.1.9.

CVE ID : CVE-2023-31229
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wp-directory-kit-plugin-1-1-9-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-31237

First published on : 29-12-2023 10:15:09
Last modified on : 29-12-2023 13:56:27

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.9.

CVE ID : CVE-2023-31237
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-32101

First published on : 29-12-2023 10:15:10
Last modified on : 29-12-2023 13:56:27

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Pexle Chris Library Viewer.This issue affects Library Viewer: from n/a through 2.0.6.

CVE ID : CVE-2023-32101
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/library-viewer/wordpress-library-viewer-plugin-2-0-6-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-32517

First published on : 29-12-2023 10:15:10
Last modified on : 29-12-2023 13:56:27

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in PluginOps MailChimp Subscribe Form, Optin Builder, PopUp Builder, Form Builder.This issue affects MailChimp Subscribe Form, Optin Builder, PopUp Builder, Form Builder: from n/a through 4.0.9.3.

CVE ID : CVE-2023-32517
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/mailchimp-subscribe-sm/wordpress-mailchimp-subscribe-forms-plugin-4-0-9-1-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-51675

First published on : 29-12-2023 14:15:48
Last modified on : 29-12-2023 14:46:03

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in AAM Advanced Access Manager โ€“ Restricted Content, Users & Roles, Enhanced Security and More.This issue affects Advanced Access Manager โ€“ Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.18.

CVE ID : CVE-2023-51675
Source : audit@patchstack.com
CVSS Score : 4.7

References :
https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-18-open-redirection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-51402

First published on : 29-12-2023 12:15:46
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Brain Storm Force Ultimate Addons for WPBakery Page Builder.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a through 3.19.17.

CVE ID : CVE-2023-51402
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/ultimate_vc_addons/wordpress-ultimate-addons-for-wpbakery-page-builder-plugin-3-19-17-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-50902

First published on : 29-12-2023 13:15:09
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WPExpertsio New User Approve.This issue affects New User Approve: from n/a through 2.5.1.

CVE ID : CVE-2023-50902
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/new-user-approve/wordpress-new-user-approve-plugin-2-5-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-51354

First published on : 29-12-2023 13:15:09
Last modified on : 29-12-2023 13:56:17

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WebbaPlugins Appointment & Event Booking Calendar Plugin โ€“ Webba Booking.This issue affects Appointment & Event Booking Calendar Plugin โ€“ Webba Booking: from n/a through 4.5.33.

CVE ID : CVE-2023-51354
Source : audit@patchstack.com
CVSS Score : 4.3

References :
https://patchstack.com/database/vulnerability/webba-booking-lite/wordpress-webba-booking-plugin-4-5-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-51517

First published on : 29-12-2023 15:15:10
Last modified on : 29-12-2023 17:08:18

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CodePeople Calculated Fields Form.This issue affects Calculated Fields Form: from n/a through 1.2.28.

CVE ID : CVE-2023-51517
Source : audit@patchstack.com
CVSS Score : 4.1

References :
https://patchstack.com/database/vulnerability/calculated-fields-form/wordpress-calculated-fields-form-plugin-1-2-28-open-redirection-via-shortcode-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Source : cloudflare.com

Vulnerability ID : CVE-2023-7079

First published on : 29-12-2023 12:15:47
Last modified on : 29-12-2023 13:56:17

Description :
Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.

CVE ID : CVE-2023-7079
Source : cna@cloudflare.com
CVSS Score : 6.4

References :
https://github.com/cloudflare/workers-sdk/pull/4532 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/pull/4535 | source : cna@cloudflare.com
https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828 | source : cna@cloudflare.com

Vulnerability : CWE-287


Source : vuldb.com

Vulnerability ID : CVE-2023-7144

First published on : 29-12-2023 01:15:44
Last modified on : 29-12-2023 03:13:44

Description :
A vulnerability classified as critical has been found in gopeak MasterLab up to 3.3.10. This affects the function sqlInject of the file app/ctrl/framework/Feature.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249147.

CVE ID : CVE-2023-7144
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/4HDWrBHGCf9e | source : cna@vuldb.com
https://vuldb.com/?ctiid.249147 | source : cna@vuldb.com
https://vuldb.com/?id.249147 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7145

First published on : 29-12-2023 02:15:45
Last modified on : 29-12-2023 03:13:44

Description :
A vulnerability classified as critical was found in gopeak MasterLab up to 3.3.10. This vulnerability affects the function sqlInject of the file app/ctrl/Framework.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249148.

CVE ID : CVE-2023-7145
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/LEbo1ypfzfQh | source : cna@vuldb.com
https://vuldb.com/?ctiid.249148 | source : cna@vuldb.com
https://vuldb.com/?id.249148 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7146

First published on : 29-12-2023 02:15:45
Last modified on : 29-12-2023 03:13:44

Description :
A vulnerability, which was classified as critical, has been found in gopeak MasterLab up to 3.3.10. This issue affects the function sqlInjectDelete of the file app/ctrl/framework/Feature.php of the component HTTP POST Request Handler. The manipulation of the argument phone leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249149 was assigned to this vulnerability.

CVE ID : CVE-2023-7146
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/jRqEcVBTsZh4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.249149 | source : cna@vuldb.com
https://vuldb.com/?id.249149 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7147

First published on : 29-12-2023 03:15:11
Last modified on : 29-12-2023 13:56:44

Description :
A vulnerability, which was classified as critical, was found in gopeak MasterLab up to 3.3.10. Affected is the function base64ImageContent of the file app/ctrl/User.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-249150 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-7147
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/affd8cjn50HC | source : cna@vuldb.com
https://vuldb.com/?ctiid.249150 | source : cna@vuldb.com
https://vuldb.com/?id.249150 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-7155

First published on : 29-12-2023 05:15:09
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability, which was classified as critical, was found in SourceCodester Free and Open Source Inventory Management System 1.0. This affects an unknown part of the file /ample/app/action/edit_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249177 was assigned to this vulnerability.

CVE ID : CVE-2023-7155
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://medium.com/@heishou/inventory-management-system-sql-injection-f6d67247c7ae | source : cna@vuldb.com
https://vuldb.com/?ctiid.249177 | source : cna@vuldb.com
https://vuldb.com/?id.249177 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7157

First published on : 29-12-2023 06:15:43
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /app/ajax/sell_return_data.php. The manipulation of the argument columns[0][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249179.

CVE ID : CVE-2023-7157
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://medium.com/@heishou/inventory-management-system-sql-injection-7b955b5707eb | source : cna@vuldb.com
https://vuldb.com/?ctiid.249179 | source : cna@vuldb.com
https://vuldb.com/?id.249179 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-4467

First published on : 29-12-2023 10:15:12
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability was found in Poly Trio 8800 7.2.6.0019 and classified as critical. Affected by this issue is some unknown functionality of the component Test Automation Mode. The manipulation leads to backdoor. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249260.

CVE ID : CVE-2023-4467
Source : cna@vuldb.com
CVSS Score : 6.2

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249260 | source : cna@vuldb.com
https://vuldb.com/?id.249260 | source : cna@vuldb.com

Vulnerability : CWE-912


Vulnerability ID : CVE-2023-7152

First published on : 29-12-2023 05:15:09
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-7152
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/jimmo/micropython/commit/8b24aa36ba978eafc6114b6798b47b7bfecdca26 | source : cna@vuldb.com
https://github.com/micropython/micropython/issues/12887 | source : cna@vuldb.com
https://vuldb.com/?ctiid.249158 | source : cna@vuldb.com
https://vuldb.com/?id.249158 | source : cna@vuldb.com

Vulnerability : CWE-416


Vulnerability ID : CVE-2023-7104

First published on : 29-12-2023 10:15:13
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.

CVE ID : CVE-2023-7104
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://sqlite.org/forum/forumpost/5bcbf4571c | source : cna@vuldb.com
https://sqlite.org/src/info/0e4e7a05c4204b47 | source : cna@vuldb.com
https://vuldb.com/?ctiid.248999 | source : cna@vuldb.com
https://vuldb.com/?id.248999 | source : cna@vuldb.com

Vulnerability : CWE-122


Vulnerability ID : CVE-2023-4463

First published on : 29-12-2023 10:15:11
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability classified as problematic was found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument Cookie leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249256.

CVE ID : CVE-2023-4463
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249256 | source : cna@vuldb.com
https://vuldb.com/?id.249256 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2023-7148

First published on : 29-12-2023 03:15:12
Last modified on : 29-12-2023 13:56:44

Description :
A vulnerability has been found in ShifuML shifu 0.12.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file src/main/java/ml/shifu/shifu/core/DataPurifier.java of the component Java Expression Language Handler. The manipulation of the argument FilterExpression leads to code injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249151.

CVE ID : CVE-2023-7148
Source : cna@vuldb.com
CVSS Score : 5.0

References :
https://drive.google.com/file/d/1ST3dD-iwUBgBNZ8tGaBbqVi1zRh5rLND/view | source : cna@vuldb.com
https://vuldb.com/?ctiid.249151 | source : cna@vuldb.com
https://vuldb.com/?id.249151 | source : cna@vuldb.com

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-7150

First published on : 29-12-2023 04:15:11
Last modified on : 29-12-2023 17:16:07

Description :
A vulnerability classified as critical was found in Campcodes Chic Beauty Salon 20230703. Affected by this vulnerability is an unknown functionality of the file product-list.php of the component Product Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249157 was assigned to this vulnerability.

CVE ID : CVE-2023-7150
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/laoquanshi/-Arbitrary-file-upload-vulnerability- | source : cna@vuldb.com
https://github.com/laoquanshi/Chic-Vulnerability- | source : cna@vuldb.com
https://vuldb.com/?ctiid.249157 | source : cna@vuldb.com
https://vuldb.com/?id.249157 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-7159

First published on : 29-12-2023 07:15:11
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability was found in gopeak MasterLab up to 3.3.10. It has been declared as critical. Affected by this vulnerability is the function add/update of the file app/ctrl/admin/User.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249181 was assigned to this vulnerability.

CVE ID : CVE-2023-7159
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://note.zhaoj.in/share/FE79uijyqmG7 | source : cna@vuldb.com
https://note.zhaoj.in/share/jNbywlXI46HV | source : cna@vuldb.com
https://vuldb.com/?ctiid.249181 | source : cna@vuldb.com
https://vuldb.com/?id.249181 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2023-7141

First published on : 29-12-2023 00:15:50
Last modified on : 29-12-2023 03:13:44

Description :
A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144.

CVE ID : CVE-2023-7141
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_5.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249144 | source : cna@vuldb.com
https://vuldb.com/?id.249144 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7142

First published on : 29-12-2023 00:15:50
Last modified on : 29-12-2023 03:13:44

Description :
A vulnerability was found in code-projects Client Details System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/clientview.php. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249145 was assigned to this vulnerability.

CVE ID : CVE-2023-7142
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_6.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249145 | source : cna@vuldb.com
https://vuldb.com/?id.249145 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-4468

First published on : 29-12-2023 10:15:13
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability was found in Poly Trio 8800 and Trio C60. It has been classified as problematic. This affects an unknown part of the component Poly Lens Management Cloud Registration. The manipulation leads to missing authorization. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-249261 was assigned to this vulnerability.

CVE ID : CVE-2023-4468
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249261 | source : cna@vuldb.com
https://vuldb.com/?id.249261 | source : cna@vuldb.com

Vulnerability : CWE-862


Source : pandorafms.com

Vulnerability ID : CVE-2023-44089

First published on : 29-12-2023 12:15:44
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). It was possible to execute malicious JS code on Visual Consoles. This issue affects Pandora FMS: from 700 through 774.

CVE ID : CVE-2023-44089
Source : security@pandorafms.com
CVSS Score : 6.1

References :
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | source : security@pandorafms.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-44088

First published on : 29-12-2023 12:15:43
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pandora FMS on all allows SQL Injection. Arbitrary SQL queries were allowed to be executed using any account with low privileges. This issue affects Pandora FMS: from 700 through 774.

CVE ID : CVE-2023-44088
Source : security@pandorafms.com
CVSS Score : 5.9

References :
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | source : security@pandorafms.com

Vulnerability : CWE-89


Source : github.com

Vulnerability ID : CVE-2023-51663

First published on : 29-12-2023 17:16:07
Last modified on : 29-12-2023 19:28:15

Description :
Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user's domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `test@example.org`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access.

CVE ID : CVE-2023-51663
Source : security-advisories@github.com
CVSS Score : 5.3

References :
https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw | source : security-advisories@github.com

Vulnerability : CWE-289


(20) LOW VULNERABILITIES [0.1, 3.9]

Source : patchstack.com

Vulnerability ID : CVE-2023-28786

First published on : 29-12-2023 10:15:08
Last modified on : 29-12-2023 13:56:27

Description :
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in SolidWP Solid Security โ€“ Password, Two Factor Authentication, and Brute Force Protection.This issue affects Solid Security โ€“ Password, Two Factor Authentication, and Brute Force Protection: from n/a through 8.1.4.

CVE ID : CVE-2023-28786
Source : audit@patchstack.com
CVSS Score : 3.7

References :
https://patchstack.com/database/vulnerability/better-wp-security/wordpress-ithemes-security-plugin-8-1-4-open-redirection-via-host-header-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-601


Vulnerability ID : CVE-2023-22676

First published on : 29-12-2023 09:15:08
Last modified on : 29-12-2023 13:56:33

Description :
Missing Authorization vulnerability in Anders Thorborg.This issue affects Anders Thorborg: from n/a through 1.4.12.

CVE ID : CVE-2023-22676
Source : audit@patchstack.com
CVSS Score : 3.1

References :
https://patchstack.com/database/vulnerability/acf-image-crop-add-on/wordpress-advanced-custom-fields-image-crop-add-on-plugin-1-4-12-broken-access-control?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-862


Source : vuldb.com

Vulnerability ID : CVE-2023-4462

First published on : 29-12-2023 10:15:11
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability classified as problematic has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. This affects an unknown part of the component Web Configuration Application. The manipulation leads to insufficiently random values. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249255.

CVE ID : CVE-2023-4462
Source : cna@vuldb.com
CVSS Score : 3.7

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249255 | source : cna@vuldb.com
https://vuldb.com/?id.249255 | source : cna@vuldb.com

Vulnerability : CWE-330


Vulnerability ID : CVE-2023-7149

First published on : 29-12-2023 04:15:11
Last modified on : 29-12-2023 13:56:39

Description :
A vulnerability was found in code-projects QR Code Generator 1.0. It has been classified as problematic. This affects an unknown part of the file /download.php?file=author.png. The manipulation of the argument file with the input "><iMg src=N onerror=alert(document.domain)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249153 was assigned to this vulnerability.

CVE ID : CVE-2023-7149
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://github.com/h4md153v63n/CVEs/blob/main/QR_Code_Generator/QR_Code_Generator-Reflected_Cross_Site_Scripting.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249153 | source : cna@vuldb.com
https://vuldb.com/?id.249153 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-7166

First published on : 29-12-2023 09:15:09
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c62da9bb3a9b3603014d0edb436146512631100d. It is recommended to apply a patch to fix this issue. The identifier VDB-249201 was assigned to this vulnerability.

CVE ID : CVE-2023-7166
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://github.com/201206030/novel-plus/commit/c62da9bb3a9b3603014d0edb436146512631100d | source : cna@vuldb.com
https://github.com/JTZ-a/SRC/blob/master/novel-plus/storedXSS/en-us.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249201 | source : cna@vuldb.com
https://vuldb.com/?id.249201 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-4465

First published on : 29-12-2023 10:15:12
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability, which was classified as problematic, was found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60. Affected is an unknown function of the component Configuration File Import. The manipulation of the argument device.auth.localAdminPassword leads to unverified password change. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249258 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4465
Source : cna@vuldb.com
CVSS Score : 2.7

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249258 | source : cna@vuldb.com
https://vuldb.com/?id.249258 | source : cna@vuldb.com

Vulnerability : CWE-620


Vulnerability ID : CVE-2023-4466

First published on : 29-12-2023 10:15:12
Last modified on : 29-12-2023 13:56:27

Description :
A vulnerability has been found in Poly CCX 400, CCX 600, Trio 8800 and Trio C60 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation leads to protection mechanism failure. The attack can be launched remotely. The vendor explains that they do not regard this as a vulnerability as this is a feature that they offer to their customers who have a variety of environmental needs that are met through different firmware builds. To avoid potential roll-back attacks, they remove vulnerable builds from the public servers as a remediation effort. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249259.

CVE ID : CVE-2023-4466
Source : cna@vuldb.com
CVSS Score : 2.7

References :
https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11919.html | source : cna@vuldb.com
https://modzero.com/en/advisories/mz-23-01-poly-voip-devices/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249259 | source : cna@vuldb.com
https://vuldb.com/?id.249259 | source : cna@vuldb.com

Vulnerability : CWE-693


Vulnerability ID : CVE-2023-7143

First published on : 29-12-2023 01:15:43
Last modified on : 29-12-2023 03:13:44

Description :
A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-7143
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-Blind_Cross_Site_Scripting.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249146 | source : cna@vuldb.com
https://vuldb.com/?id.249146 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-7160

First published on : 29-12-2023 08:15:36
Last modified on : 29-12-2023 13:56:33

Description :
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add Engineer Handler. The manipulation of the argument first name/last name with the input <script>alert(0)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249182 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-7160
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://vuldb.com/?ctiid.249182 | source : cna@vuldb.com
https://vuldb.com/?id.249182 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-7171

First published on : 29-12-2023 18:15:39
Last modified on : 29-12-2023 19:28:15

Description :
A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named d6093d8182362422370d7eaf6c53afde9ee45215. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-249307.

CVE ID : CVE-2023-7171
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://github.com/201206030/novel-plus/commit/d6093d8182362422370d7eaf6c53afde9ee45215 | source : cna@vuldb.com
https://github.com/JTZ-a/SRC/blob/master/novel-plus/storedXSS2/en-us.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249307 | source : cna@vuldb.com
https://vuldb.com/?id.249307 | source : cna@vuldb.com

Vulnerability : CWE-79


Source : pandorafms.com

Vulnerability ID : CVE-2023-41814

First published on : 29-12-2023 12:15:43
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Through an HTML payload (iframe tag) it is possible to carry out XSS attacks when the user receiving the messages opens their notifications. This issue affects Pandora FMS: from 700 through 774.

CVE ID : CVE-2023-41814
Source : security@pandorafms.com
CVSS Score : 3.7

References :
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | source : security@pandorafms.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-41813

First published on : 29-12-2023 12:15:43
Last modified on : 29-12-2023 13:56:23

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Allows you to edit the Web Console user notification options. This issue affects Pandora FMS: from 700 through 774.

CVE ID : CVE-2023-41813
Source : security@pandorafms.com
CVSS Score : 3.0

References :
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | source : security@pandorafms.com

Vulnerability : CWE-79


Source : mattermost.com

Vulnerability ID : CVE-2023-7113

First published on : 29-12-2023 13:15:11
Last modified on : 29-12-2023 13:56:17

Description :
Mattermost version 8.1.6 and earlier fails to sanitize channel mention data in posts, which allows an attacker to inject markup in the web client.

CVE ID : CVE-2023-7113
Source : responsibledisclosure@mattermost.com
CVSS Score : 3.7

References :
https://mattermost.com/security-updates | source : responsibledisclosure@mattermost.com

Vulnerability : CWE-79


Source : github.com

Vulnerability ID : CVE-2023-52085

First published on : 29-12-2023 00:15:50
Last modified on : 29-12-2023 03:13:44

Description :
Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.

CVE ID : CVE-2023-52085
Source : security-advisories@github.com
CVSS Score : 3.3

References :
https://github.com/wintercms/winter/commit/5bc9257fe2bc47d8b786a1b1bf96bafad23d8ddd | source : security-advisories@github.com
https://github.com/wintercms/winter/security/advisories/GHSA-2x7r-93ww-cxrq | source : security-advisories@github.com

Vulnerability : CWE-22


Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability ID : CVE-2023-23428

First published on : 29-12-2023 03:15:09
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.

CVE ID : CVE-2023-23428
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 3.3

References :
https://www.hihonor.com/global/security/cve-2023-23428/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-269


Vulnerability ID : CVE-2023-23430

First published on : 29-12-2023 03:15:09
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.

CVE ID : CVE-2023-23430
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 3.3

References :
https://www.hihonor.com/global/security/cve-2023-23430/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4

Vulnerability : CWE-269


Vulnerability ID : CVE-2023-23437

First published on : 29-12-2023 03:15:10
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak

CVE ID : CVE-2023-23437
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 3.3

References :
https://www.hihonor.com/global/security/cve-2023-23437/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-23440

First published on : 29-12-2023 03:15:10
Last modified on : 29-12-2023 13:56:44

Description :
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.

CVE ID : CVE-2023-23440
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 3.3

References :
https://www.hihonor.com/global/security/cve-2023-23440/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-51432

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by out of bounds read vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51432
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 3.2

References :
https://www.hihonor.com/global/security/cve-2023-51432/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


Vulnerability ID : CVE-2023-51433

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.

CVE ID : CVE-2023-51433
Source : 3836d913-7555-4dd0-a509-f5667fdf5fe4
CVSS Score : 2.9

References :
https://www.hihonor.com/global/security/cve-2023-51433/ | source : 3836d913-7555-4dd0-a509-f5667fdf5fe4


(23) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-50104

First published on : 29-12-2023 00:15:50
Last modified on : 29-12-2023 03:13:44

Description :
ZZCMS 2023 has a file upload vulnerability in 3/E_bak5.1/upload/index.php, allowing attackers to exploit this loophole to gain server privileges and execute arbitrary code.

CVE ID : CVE-2023-50104
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/zzq66/cve4 | source : cve@mitre.org


Vulnerability ID : CVE-2023-31292

First published on : 29-12-2023 02:15:44
Last modified on : 29-12-2023 03:13:44

Description :
An issue was discovered in Sesami Cash Point & Transport Optimizer (CPTO) 6.3.8.6 (#718), allows local attackers to obtain sensitive information and bypass authentication via "Back Button Refresh" attack.

CVE ID : CVE-2023-31292
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0051/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31298

First published on : 29-12-2023 02:15:45
Last modified on : 29-12-2023 03:13:44

Description :
Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code and obtain sensitive information via the User ID field when creating a new system user.

CVE ID : CVE-2023-31298
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0060/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31301

First published on : 29-12-2023 02:15:45
Last modified on : 29-12-2023 03:13:44

Description :
Stored Cross Site Scripting (XSS) Vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code and obtain sensitive information via the Username field of the login form and application log.

CVE ID : CVE-2023-31301
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0059/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31293

First published on : 29-12-2023 03:15:10
Last modified on : 29-12-2023 13:56:44

Description :
An issue was discovered in Sesami Cash Point & Transport Optimizer (CPTO) 6.3.8.6 (#718), allows remote attackers to obtain sensitive information and bypass profile restriction via improper access control in the Reader system user's web browser, allowing the journal to be displayed, despite the option being disabled.

CVE ID : CVE-2023-31293
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0061/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31294

First published on : 29-12-2023 03:15:10
Last modified on : 29-12-2023 13:56:44

Description :
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the Delivery Name field.

CVE ID : CVE-2023-31294
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0052/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31296

First published on : 29-12-2023 04:15:09
Last modified on : 29-12-2023 13:56:39

Description :
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows attackers to obtain sensitive information via the User Name field.

CVE ID : CVE-2023-31296
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0054/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-52173

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
XnView Classic before 2.51.3 on Windows has a Write Access Violation at xnview.exe+0x3ADBD0.

CVE ID : CVE-2023-52173
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/seyit-sigirci/Vulnerability-Disclosures/blob/main/XNView-Crash-Reports/BOF%5B0x54D%5D%2B3%7B%2B0~3%23460c%7D%20469.15d%20%40%20xnview.exe%2B0x3ADBD0.html | source : cve@mitre.org
https://newsgroup.xnview.com/viewtopic.php?f=35&t=46016 | source : cve@mitre.org


Vulnerability ID : CVE-2023-52174

First published on : 29-12-2023 04:15:10
Last modified on : 29-12-2023 13:56:39

Description :
XnView Classic before 2.51.3 on Windows has a Write Access Violation at xnview.exe+0x3125D6.

CVE ID : CVE-2023-52174
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/seyit-sigirci/Vulnerability-Disclosures/blob/main/XNView-Crash-Reports/BOF%5B0x1C94%5D%2B4%7B%2B0~4%231b99%7D%20128.ecf%20%40%20xnview.exe%2B0x3125D6.html | source : cve@mitre.org
https://newsgroup.xnview.com/viewtopic.php?f=35&t=46016 | source : cve@mitre.org


Vulnerability ID : CVE-2023-31299

First published on : 29-12-2023 05:15:08
Last modified on : 29-12-2023 13:56:39

Description :
Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code via the Barcode field of a container.

CVE ID : CVE-2023-31299
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0055/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31295

First published on : 29-12-2023 06:15:43
Last modified on : 29-12-2023 13:56:33

Description :
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the User Profile field.

CVE ID : CVE-2023-31295
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0053/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31300

First published on : 29-12-2023 06:15:43
Last modified on : 29-12-2023 13:56:33

Description :
An issue was discovered in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via transmission of unencrypted, cleartext credentials during Password Reset feature.

CVE ID : CVE-2023-31300
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0057/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-31302

First published on : 29-12-2023 06:15:43
Last modified on : 29-12-2023 13:56:33

Description :
Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) 6.3.8.6 (#718), allows remote attackers to execute arbitrary code via the Teller field.

CVE ID : CVE-2023-31302
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0056/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-23634

First published on : 29-12-2023 07:15:10
Last modified on : 29-12-2023 13:56:33

Description :
SQL Injection vulnerability in Documize version 5.4.2, allows remote attackers to execute arbitrary code via the user parameter of the /api/dashboard/activity endpoint.

CVE ID : CVE-2023-23634
Source : cve@mitre.org
CVSS Score : /

References :
https://herolab.usd.de/en/security-advisories/usd-2022-0066/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-50570

First published on : 29-12-2023 15:15:09
Last modified on : 29-12-2023 17:08:18

Description :
An issue in the component IPAddressBitsDivision of IPAddress v5.1.0 leads to an infinite loop.

CVE ID : CVE-2023-50570
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/seancfoley/IPAddress/issues/118 | source : cve@mitre.org


Vulnerability ID : CVE-2023-50571

First published on : 29-12-2023 15:15:09
Last modified on : 29-12-2023 17:08:18

Description :
easy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule.

CVE ID : CVE-2023-50571
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/j-easy/easy-rules/issues/419 | source : cve@mitre.org


Vulnerability ID : CVE-2023-50572

First published on : 29-12-2023 15:15:10
Last modified on : 29-12-2023 17:08:18

Description :
An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error.

CVE ID : CVE-2023-50572
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/jline/jline3/issues/909 | source : cve@mitre.org


Vulnerability ID : CVE-2023-50035

First published on : 29-12-2023 21:15:08
Last modified on : 29-12-2023 21:15:08

Description :
PHPGurukul Small CRM 3.0 is vulnerable to SQL Injection on the Users login panel because of "password" parameter is directly used in the SQL query without any sanitization and the SQL Injection payload being executed.

CVE ID : CVE-2023-50035
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/hackerhijeck/Exploited/blob/main/Small_CRM/SQL-Injection.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-50069

First published on : 29-12-2023 21:15:08
Last modified on : 29-12-2023 21:15:08

Description :
WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.

CVE ID : CVE-2023-50069
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/holomekc/wiremock/issues/51 | source : cve@mitre.org


Vulnerability ID : CVE-2023-50070

First published on : 29-12-2023 22:15:36
Last modified on : 29-12-2023 22:15:36

Description :
Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_ticket via department_id, customer_id, and subject.

CVE ID : CVE-2023-50070
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/geraldoalcantara/CVE-2023-50070 | source : cve@mitre.org
https://medium.com/%40geraldoalcantarapro/cve-2023-50070-1f58c2a64b1c | source : cve@mitre.org


Vulnerability ID : CVE-2023-50071

First published on : 29-12-2023 22:15:37
Last modified on : 29-12-2023 22:15:37

Description :
Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.

CVE ID : CVE-2023-50071
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/geraldoalcantara/CVE-2023-50071 | source : cve@mitre.org
https://medium.com/%40geraldoalcantarapro/cve-2023-50071-a20767cb3c7b | source : cve@mitre.org


Vulnerability ID : CVE-2023-52240

First published on : 29-12-2023 22:15:37
Last modified on : 29-12-2023 22:15:37

Description :
The Kantega SAML SSO OIDC Kerberos Single Sign-on apps before 6.20.0 for Atlassian products allow XSS if SAML POST Binding is enabled. This affects 4.4.2 through 4.14.8 before 4.14.9, 5.0.0 through 5.11.4 before 5.11.5, and 6.0.0 through 6.19.0 before 6.20.0. The full product names are Kantega SAML SSO OIDC Kerberos Single Sign-on for Jira Data Center & Server (Kantega SSO Enterprise), Kantega SAML SSO OIDC Kerberos Single Sign-on for Confluence Data Center & Server (Kantega SSO Enterprise), Kantega SAML SSO OIDC Kerberos Single Sign-on for Bitbucket Data Center & Server (Kantega SSO Enterprise), Kantega SAML SSO OIDC Kerberos Single Sign-on for Bamboo Data Center & Server (Kantega SSO Enterprise), and Kantega SAML SSO OIDC Kerberos Single Sign-on for FeCru Server (Kantega SSO Enterprise). (Here, FeCru refers to the Atlassian Fisheye and Crucible products running together.)

CVE ID : CVE-2023-52240
Source : cve@mitre.org
CVSS Score : /

References :
https://kantega-sso.atlassian.net/wiki/spaces/KSE/pages/1226473473/Security+Vulnerability+HTML+injection+Cross-site+scripting+in+SAML+POST+binding+Kantega+SSO+Enterprise | source : cve@mitre.org
https://marketplace.atlassian.com/apps/1211923/kantega-saml-sso-oidc-kerberos-single-sign-on-for-jira?hosting=datacenter&tab=versions | source : cve@mitre.org
https://marketplace.atlassian.com/apps/1212126/kantega-saml-sso-oidc-kerberos-single-sign-on-for-confluence?hosting=datacenter&tab=overview | source : cve@mitre.org
https://marketplace.atlassian.com/apps/1213019/kantega-saml-sso-oidc-kerberos-single-sign-on-for-bitbucket?hosting=datacenter&tab=overview | source : cve@mitre.org
https://marketplace.atlassian.com/apps/1215262/kantega-saml-sso-oidc-kerberos-single-sign-on-for-bamboo?hosting=datacenter&tab=overview | source : cve@mitre.org
https://marketplace.atlassian.com/apps/1215263/kantega-saml-sso-oidc-kerberos-single-sign-on-for-fecru?hosting=server&tab=overview | source : cve@mitre.org


Source : apache.org

Vulnerability ID : CVE-2023-47804

First published on : 29-12-2023 15:15:09
Last modified on : 29-12-2023 17:08:18

Description :
Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose. Links can be activated by clicks, or by automatic document events. The execution of such links must be subject to user approval. In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution. This is a corner case of CVE-2022-47502.

CVE ID : CVE-2023-47804
Source : security@apache.org
CVSS Score : /

References :
https://lists.apache.org/thread/ygp59swfcy6g46jf8v9s6qpwmxn8fsvb | source : security@apache.org
https://www.openoffice.org/security/cves/CVE-2023-47804.html | source : security@apache.org

Vulnerability : CWE-20
Vulnerability : CWE-88


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.