Latest vulnerabilities [Monday, January 29, 2024 + weekend]

Latest vulnerabilities [Monday, January 29, 2024 + weekend]
{{titre}}

Last update performed on 01/29/2024 at 11:57:07 PM

(21) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : exodusintel.com

Vulnerability ID : CVE-2024-23613

First published on : 26-01-2024 00:15:08
Last modified on : 26-01-2024 13:51:45

Description :
A buffer overflow vulnerability exists in Symantec Deployment Solution version 7.9 when parsing UpdateComputer tokens. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

CVE ID : CVE-2024-23613
Source : disclosures@exodusintel.com
CVSS Score : 10.0

References :
https://blog.exodusintel.com/2024/01/25/symantec-deployment-solution-axengine-exe-buffer-overflow-remote-code-execution | source : disclosures@exodusintel.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-23614

First published on : 26-01-2024 00:15:08
Last modified on : 26-01-2024 13:51:45

Description :
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.

CVE ID : CVE-2024-23614
Source : disclosures@exodusintel.com
CVSS Score : 10.0

References :
https://blog.exodusintel.com/2024/01/25/symantec-messaging-gateway-stack-buffer-overflow-remote-code-execution/ | source : disclosures@exodusintel.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-23615

First published on : 26-01-2024 00:15:08
Last modified on : 26-01-2024 13:51:45

Description :
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.

CVE ID : CVE-2024-23615
Source : disclosures@exodusintel.com
CVSS Score : 10.0

References :
https://blog.exodusintel.com/2024/01/25/symantec-messaging-gateway-libdec2lha-so-stack-buffer-overflow-remote-code-execution/ | source : disclosures@exodusintel.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-23616

First published on : 26-01-2024 00:15:08
Last modified on : 26-01-2024 13:51:45

Description :
A buffer overflow vulnerability exists in Symantec Server Management Suite version 7.9 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

CVE ID : CVE-2024-23616
Source : disclosures@exodusintel.com
CVSS Score : 10.0

References :
https://blog.exodusintel.com/2024/01/25/symantec-server-management-suite-axengine-exe-buffer-overflow-remote-code-execution/ | source : disclosures@exodusintel.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-23621

First published on : 26-01-2024 00:15:09
Last modified on : 26-01-2024 13:51:45

Description :
A buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution.

CVE ID : CVE-2024-23621
Source : disclosures@exodusintel.com
CVSS Score : 10.0

References :
https://blog.exodusintel.com/2024/01/25/ibm-merge-healthcare-efilm-workstation-license-server-buffer-overflow/ | source : disclosures@exodusintel.com

Vulnerability : CWE-131


Vulnerability ID : CVE-2024-23622

First published on : 26-01-2024 00:15:10
Last modified on : 26-01-2024 13:51:45

Description :
A stack-based buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution with SYSTEM privileges.

CVE ID : CVE-2024-23622
Source : disclosures@exodusintel.com
CVSS Score : 10.0

References :
https://blog.exodusintel.com/2024/01/25/ibm-merge-healthcare-efilm-workstation-license-server-copysls_request3-buffer-overflow/ | source : disclosures@exodusintel.com

Vulnerability : CWE-131


Vulnerability ID : CVE-2024-23619

First published on : 26-01-2024 00:15:09
Last modified on : 26-01-2024 13:51:45

Description :
A hardcoded credential vulnerability exists in IBM Merge Healthcare eFilm Workstation. A remote, unauthenticated attacker can exploit this vulnerability to achieve information disclosure or remote code execution.

CVE ID : CVE-2024-23619
Source : disclosures@exodusintel.com
CVSS Score : 9.8

References :
https://blog.exodusintel.com/2024/01/25/ibm-merge-healthcare-efilm-workstation-information-disclosure/ | source : disclosures@exodusintel.com

Vulnerability : CWE-798


Vulnerability ID : CVE-2024-23617

First published on : 26-01-2024 00:15:09
Last modified on : 26-01-2024 13:51:45

Description :
A buffer overflow vulnerability exists in Symantec Data Loss Prevention version 14.0.2 and before. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a crafted document to achieve code execution.

CVE ID : CVE-2024-23617
Source : disclosures@exodusintel.com
CVSS Score : 9.6

References :
https://blog.exodusintel.com/2024/01/25/symantec-data-loss-prevention-wp6sr-dll-stack-buffer-overflow-remote-code-execution/ | source : disclosures@exodusintel.com

Vulnerability : CWE-119


Vulnerability ID : CVE-2024-23618

First published on : 26-01-2024 00:15:09
Last modified on : 26-01-2024 13:51:45

Description :
An arbitrary code execution vulnerability exists in Arris SURFboard SGB6950AC2 devices. An unauthenticated attacker can exploit this vulnerability to achieve code execution as root.

CVE ID : CVE-2024-23618
Source : disclosures@exodusintel.com
CVSS Score : 9.6

References :
https://blog.exodusintel.com/2024/01/25/arris-surfboard-sbg6950ac2-arbitrary-command-execution-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-306


Vulnerability ID : CVE-2024-23624

First published on : 26-01-2024 00:15:10
Last modified on : 26-01-2024 13:51:45

Description :
A command injection vulnerability exists in the gena.cgi module of D-Link DAP-1650 devices. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.

CVE ID : CVE-2024-23624
Source : disclosures@exodusintel.com
CVSS Score : 9.6

References :
https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-gena-cgi-subscribe-command-injection-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-23625

First published on : 26-01-2024 00:15:10
Last modified on : 26-01-2024 13:51:45

Description :
A command injection vulnerability exists in D-Link DAP-1650 devices when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.

CVE ID : CVE-2024-23625
Source : disclosures@exodusintel.com
CVSS Score : 9.6

References :
https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-23629

First published on : 26-01-2024 00:15:11
Last modified on : 26-01-2024 13:51:45

Description :
An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.

CVE ID : CVE-2024-23629
Source : disclosures@exodusintel.com
CVSS Score : 9.6

References :
https://blog.exodusintel.com/2024/01/25/motorola-mr2600-authentication-bypass-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2024-23626

First published on : 26-01-2024 00:15:10
Last modified on : 26-01-2024 13:51:45

Description :
A command injection vulnerability exists in the ‘SaveSysLogParams’ parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.

CVE ID : CVE-2024-23626
Source : disclosures@exodusintel.com
CVSS Score : 9.0

References :
https://blog.exodusintel.com/2024/01/25/motorola-mr2600-savesyslogparams-command-injection-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-23627

First published on : 26-01-2024 00:15:11
Last modified on : 26-01-2024 13:51:45

Description :
A command injection vulnerability exists in the 'SaveStaticRouteIPv4Params' parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.

CVE ID : CVE-2024-23627
Source : disclosures@exodusintel.com
CVSS Score : 9.0

References :
https://blog.exodusintel.com/2024/01/25/motorola-mr2600-savestaticrouteipv4params-command-injection-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-23628

First published on : 26-01-2024 00:15:11
Last modified on : 26-01-2024 13:51:45

Description :
A command injection vulnerability exists in the 'SaveStaticRouteIPv6Params' parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.

CVE ID : CVE-2024-23628
Source : disclosures@exodusintel.com
CVSS Score : 9.0

References :
https://blog.exodusintel.com/2024/01/25/motorola-mr2600-savestaticrouteipv6params-command-injection-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-23630

First published on : 26-01-2024 00:15:12
Last modified on : 26-01-2024 13:51:45

Description :
An arbitrary firmware upload vulnerability exists in the Motorola MR2600. An attacker can exploit this vulnerability to achieve code execution on the device. Authentication is required, however can be bypassed.

CVE ID : CVE-2024-23630
Source : disclosures@exodusintel.com
CVSS Score : 9.0

References :
https://blog.exodusintel.com/2024/01/25/motorola-mr2600-arbitrary-firmware-upload-vulnerability/ | source : disclosures@exodusintel.com

Vulnerability : CWE-434


Source : gitlab.com

Vulnerability ID : CVE-2024-0402

First published on : 26-01-2024 01:15:08
Last modified on : 26-01-2024 13:51:45

Description :
An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 which allows an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace.

CVE ID : CVE-2024-0402
Source : cve@gitlab.com
CVSS Score : 9.9

References :
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | source : cve@gitlab.com
https://gitlab.com/gitlab-org/gitlab/-/issues/437819 | source : cve@gitlab.com

Vulnerability : CWE-22


Source : cisco.com

Vulnerability ID : CVE-2024-20253

First published on : 26-01-2024 18:15:10
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to the improper processing of user-provided data that is being read into memory. An attacker could exploit this vulnerability by sending a crafted message to a listening port of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the web services user. With access to the underlying operating system, the attacker could also establish root access on the affected device.

CVE ID : CVE-2024-20253
Source : ykramarz@cisco.com
CVSS Score : 9.9

References :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-rce-bWNzQcUm | source : ykramarz@cisco.com


Source : incibe.es

Vulnerability ID : CVE-2024-1015

First published on : 29-01-2024 14:15:09
Last modified on : 29-01-2024 14:25:21

Description :
Remote command execution vulnerability in SE-elektronic GmbH E-DDC3.3 affecting versions 03.07.03 and higher. An attacker could send different commands from the operating system to the system via the web configuration functionality of the device.

CVE ID : CVE-2024-1015
Source : cve-coordination@incibe.es
CVSS Score : 9.8

References :
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-se-elektronic-gmbh-products | source : cve-coordination@incibe.es

Vulnerability : CWE-94


Source : github.com

Vulnerability ID : CVE-2024-23827

First published on : 29-01-2024 16:15:09
Last modified on : 29-01-2024 16:19:11

Description :
Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue.

CVE ID : CVE-2024-23827
Source : security-advisories@github.com
CVSS Score : 9.8

References :
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m | source : security-advisories@github.com

Vulnerability : CWE-22


Source : microsoft.com

Vulnerability ID : CVE-2024-21326

First published on : 26-01-2024 01:15:10
Last modified on : 26-01-2024 13:51:45

Description :
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21326
Source : secure@microsoft.com
CVSS Score : 9.6

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21326 | source : secure@microsoft.com


(37) HIGH VULNERABILITIES [7.0, 8.9]

Source : exodusintel.com

Vulnerability ID : CVE-2024-23620

First published on : 26-01-2024 00:15:09
Last modified on : 26-01-2024 13:51:45

Description :
An improper privilege management vulnerability exists in IBM Merge Healthcare eFilm Workstation. A local, authenticated attacker can exploit this vulnerability to escalate privileges to SYSTEM.

CVE ID : CVE-2024-23620
Source : disclosures@exodusintel.com
CVSS Score : 8.8

References :
https://blog.exodusintel.com/2024/01/25/ibm-merge-healthcare-efilm-workstation-system-privilege-escalation/ | source : disclosures@exodusintel.com

Vulnerability : CWE-269


Source : vuldb.com

Vulnerability ID : CVE-2024-0919

First published on : 26-01-2024 09:15:08
Last modified on : 28-01-2024 09:15:08

Description :
A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It has been classified as critical. This affects the function do_setNTP of the component POST Request Handler. The manipulation of the argument NtpDstStart/NtpDstEnd leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252123. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0919
Source : cna@vuldb.com
CVSS Score : 8.8

References :
https://vuldb.com/?ctiid.252123 | source : cna@vuldb.com
https://vuldb.com/?id.252123 | source : cna@vuldb.com
https://warp-desk-89d.notion.site/TEW-815DAP-94a631c20dee4f399268dbcc880f1f4c?pvs=4 | source : cna@vuldb.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-0945

First published on : 26-01-2024 21:15:08
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability classified as critical has been found in 60IndexPage up to 1.8.5. This affects an unknown part of the file /include/file.php of the component Parameter Handler. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252189 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0945
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://note.zhaoj.in/share/7F54gy22y7uJ | source : cna@vuldb.com
https://vuldb.com/?ctiid.252189 | source : cna@vuldb.com
https://vuldb.com/?id.252189 | source : cna@vuldb.com

Vulnerability : CWE-918


Vulnerability ID : CVE-2024-0946

First published on : 26-01-2024 21:15:08
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability classified as critical was found in 60IndexPage up to 1.8.5. This vulnerability affects unknown code of the file /apply/index.php of the component Parameter Handler. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252190 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0946
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://note.zhaoj.in/share/iNSyaClT0hGi | source : cna@vuldb.com
https://vuldb.com/?ctiid.252190 | source : cna@vuldb.com
https://vuldb.com/?id.252190 | source : cna@vuldb.com

Vulnerability : CWE-918


Vulnerability ID : CVE-2024-1006

First published on : 29-01-2024 16:15:08
Last modified on : 29-01-2024 16:19:11

Description :
A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1006
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://note.zhaoj.in/share/vWuVlU2eg79t | source : cna@vuldb.com
https://vuldb.com/?ctiid.252275 | source : cna@vuldb.com
https://vuldb.com/?id.252275 | source : cna@vuldb.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2024-1009

First published on : 29-01-2024 17:15:09
Last modified on : 29-01-2024 17:39:52

Description :
A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Admin/login.php. The manipulation of the argument txtusername leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252278 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-1009
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://vuldb.com/?ctiid.252278 | source : cna@vuldb.com
https://vuldb.com/?id.252278 | source : cna@vuldb.com
https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0918

First published on : 26-01-2024 09:15:07
Last modified on : 28-01-2024 09:15:07

Description :
A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0918
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://vuldb.com/?ctiid.252122 | source : cna@vuldb.com
https://vuldb.com/?id.252122 | source : cna@vuldb.com
https://warp-desk-89d.notion.site/TEW-800MB-1f9576ce12234b72b08b9c7f4c7d32a6?pvs=4 | source : cna@vuldb.com

Vulnerability : CWE-78


Vulnerability ID : CVE-2024-0920

First published on : 26-01-2024 09:15:08
Last modified on : 28-01-2024 09:15:08

Description :
A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It has been declared as critical. This vulnerability affects unknown code of the file /admin_ping.htm of the component POST Request Handler. The manipulation of the argument ipv4_ping/ipv6_ping leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252124. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0920
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://vuldb.com/?ctiid.252124 | source : cna@vuldb.com
https://vuldb.com/?id.252124 | source : cna@vuldb.com
https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8?pvs=4 | source : cna@vuldb.com

Vulnerability : CWE-77


Vulnerability ID : CVE-2024-0990

First published on : 29-01-2024 01:15:08
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability, which was classified as critical, was found in Tenda i6 1.0.0.9(3857). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component httpd. The manipulation of the argument ping1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252255. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0990
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-i6-has-stack-buffer-overflow-vulnerability-in-formSetAutoPing-2e009d81eb7e45438565d5ba6794f4e3?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252255 | source : cna@vuldb.com
https://vuldb.com/?id.252255 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0991

First published on : 29-01-2024 01:15:08
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability has been found in Tenda i6 1.0.0.9(3857) and classified as critical. This vulnerability affects the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252256. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0991
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-i6-has-stack-buffer-overflow-vulnerability-in-formSetCfm-9c9952ba7216422c8188e75c94bb531a?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252256 | source : cna@vuldb.com
https://vuldb.com/?id.252256 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0992

First published on : 29-01-2024 01:15:08
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability was found in Tenda i6 1.0.0.9(3857) and classified as critical. This issue affects the function formwrlSSIDset of the file /goform/wifiSSIDset of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252257 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0992
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-i6-has-stack-buffer-overflow-vulnerability-in-formwrlSSIDset-f0e8be2eb0614e03a60160b48f8527f5?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252257 | source : cna@vuldb.com
https://vuldb.com/?id.252257 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0993

First published on : 29-01-2024 02:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability was found in Tenda i6 1.0.0.9(3857). It has been classified as critical. Affected is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0993
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-i6-has-stack-buffer-overflow-vulnerability-in-formWifiMacFilterGet-8b2c5cb67e2a433cad62d737782a7e0f?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252258 | source : cna@vuldb.com
https://vuldb.com/?id.252258 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0994

First published on : 29-01-2024 02:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability was found in Tenda W6 1.0.0.9(4122). It has been declared as critical. Affected by this vulnerability is the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252259. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0994
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-W6-has-stack-buffer-overflow-vulnerability-in-formSetCfm-4fab28f92ca74f519245b606d8345821?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252259 | source : cna@vuldb.com
https://vuldb.com/?id.252259 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0995

First published on : 29-01-2024 02:15:08
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability was found in Tenda W6 1.0.0.9(4122). It has been rated as critical. Affected by this issue is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component httpd. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252260. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0995
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-w6-has-stack-buffer-overflow-vulnerability-in-formwrlSSIDset-e283b41905934e97b4c65632a0018eba?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252260 | source : cna@vuldb.com
https://vuldb.com/?id.252260 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0996

First published on : 29-01-2024 03:15:07
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability classified as critical has been found in Tenda i9 1.0.0.9(4122). This affects the function formSetCfm of the file /goform/setcfm of the component httpd. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252261 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0996
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/Tenda-i9-has-stack-buffer-overflow-vulnerability-in-formSetCfm-c1bd9745c81e4207aceeaa1ba5e10563?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252261 | source : cna@vuldb.com
https://vuldb.com/?id.252261 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0997

First published on : 29-01-2024 13:15:08
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. Affected by this issue is the function setOpModeCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument pppoeUser leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252266 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0997
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setOpModeCfg-9faac02b13d84bd3b7fe84aab68c7add?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252266 | source : cna@vuldb.com
https://vuldb.com/?id.252266 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0998

First published on : 29-01-2024 13:15:08
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252267. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0998
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setDiagnosisCfg-b2d36451543e4c6da063646721a24604?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252267 | source : cna@vuldb.com
https://vuldb.com/?id.252267 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0999

First published on : 29-01-2024 13:15:08
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. This vulnerability affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument eTime leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252268. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0999
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setParentalRules-f891c062b86349a596ee173cb456b4f6?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252268 | source : cna@vuldb.com
https://vuldb.com/?id.252268 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-1000

First published on : 29-01-2024 14:15:08
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been rated as critical. This issue affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252269 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1000
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setTracerouteCfg-b6b3fe05b4a945a3bc460dbcb61dfc75?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252269 | source : cna@vuldb.com
https://vuldb.com/?id.252269 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-1001

First published on : 29-01-2024 14:15:08
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability classified as critical has been found in Totolink N200RE 9.3.5u.6139_B20201216. Affected is the function main of the file /cgi-bin/cstecgi.cgi. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-252270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1001
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-main-942df77e9c70495390e4aed2a29f3d13?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252270 | source : cna@vuldb.com
https://vuldb.com/?id.252270 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-1002

First published on : 29-01-2024 14:15:09
Last modified on : 29-01-2024 14:25:21

Description :
A vulnerability classified as critical was found in Totolink N200RE 9.3.5u.6139_B20201216. Affected by this vulnerability is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ePort leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1002
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setIpPortFilterRules-71c3f0a947e14b7f95fa19b7d6676994?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252271 | source : cna@vuldb.com
https://vuldb.com/?id.252271 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-1003

First published on : 29-01-2024 15:15:10
Last modified on : 29-01-2024 16:19:11

Description :
A vulnerability, which was classified as critical, has been found in Totolink N200RE 9.3.5u.6139_B20201216. Affected by this issue is the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252272. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1003
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setLanguageCfg-72357294db1e4f8096b29d3f2592d1fc?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252272 | source : cna@vuldb.com
https://vuldb.com/?id.252272 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-1004

First published on : 29-01-2024 15:15:10
Last modified on : 29-01-2024 16:19:11

Description :
A vulnerability, which was classified as critical, was found in Totolink N200RE 9.3.5u.6139_B20201216. This affects the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1004
Source : cna@vuldb.com
CVSS Score : 7.2

References :
https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-loginAuth-cbde48da404049328cb698394b6c0641?pvs=4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252273 | source : cna@vuldb.com
https://vuldb.com/?id.252273 | source : cna@vuldb.com

Vulnerability : CWE-121


Source : cert.pl

Vulnerability ID : CVE-2023-5378

First published on : 29-01-2024 12:15:07
Last modified on : 29-01-2024 14:25:21

Description :
Improper Input Validation vulnerability in MegaBIP and already unsupported SmodBIP software allows for Stored XSS.This issue affects SmodBIP in all versions and MegaBIP in versions up to 4.36.2 (newer versions were not tested; the vendor has not confirmed fixing the vulnerability).

CVE ID : CVE-2023-5378
Source : cvd@cert.pl
CVSS Score : 8.8

References :
https://cert.pl/en/posts/2023/12/CVE-2023-5378 | source : cvd@cert.pl
https://cert.pl/posts/2023/12/CVE-2023-5378 | source : cvd@cert.pl
https://megabip.pl/ | source : cvd@cert.pl
https://smod.pl/ | source : cvd@cert.pl

Vulnerability : CWE-20


Source : github.com

Vulnerability ID : CVE-2024-23828

First published on : 29-01-2024 17:15:10
Last modified on : 29-01-2024 17:39:52

Description :
Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to an authenticated arbitrary command execution via CRLF attack when changing the value of test_config_cmd or start_cmd. This vulnerability exists due to an incomplete fix for CVE-2024-22197 and CVE-2024-22198. This vulnerability has been patched in version 2.0.0.beta.12.

CVE ID : CVE-2024-23828
Source : security-advisories@github.com
CVSS Score : 8.8

References :
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8 | source : security-advisories@github.com

Vulnerability : CWE-74


Source : patchstack.com

Vulnerability ID : CVE-2024-22283

First published on : 27-01-2024 00:15:24
Last modified on : 27-01-2024 00:42:46

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Delhivery Delhivery Logistics Courier.This issue affects Delhivery Logistics Courier: from n/a through 1.0.107.

CVE ID : CVE-2024-22283
Source : audit@patchstack.com
CVSS Score : 8.5

References :
https://patchstack.com/database/vulnerability/delhivery-logistics-courier/wordpress-delhivery-logistics-courier-plugin-1-0-107-subscriber-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-23506

First published on : 27-01-2024 00:15:24
Last modified on : 27-01-2024 00:42:46

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in InstaWP Team InstaWP Connect – 1-click WP Staging & Migration.This issue affects InstaWP Connect – 1-click WP Staging & Migration: from n/a through 0.1.0.9.

CVE ID : CVE-2024-23506
Source : audit@patchstack.com
CVSS Score : 7.7

References :
https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-9-sensitive-data-exposure-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2024-22147

First published on : 27-01-2024 00:15:24
Last modified on : 27-01-2024 00:42:46

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Overnight PDF Invoices & Packing Slips for WooCommerce.This issue affects PDF Invoices & Packing Slips for WooCommerce: from n/a through 3.7.5.

CVE ID : CVE-2024-22147
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/woocommerce-pdf-invoices-packing-slips/wordpress-pdf-invoices-packing-slips-for-woocommerce-plugin-3-7-5-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Source : forcepoint.com

Vulnerability ID : CVE-2023-1705

First published on : 29-01-2024 17:15:08
Last modified on : 29-01-2024 17:39:52

Description :
Missing Authorization vulnerability in Forcepoint F|One SmartEdge Agent on Windows (bgAutoinstaller service modules) allows Privilege Escalation, Functionality Bypass.This issue affects F|One SmartEdge Agent: before 1.7.0.230330-554.

CVE ID : CVE-2023-1705
Source : psirt@forcepoint.com
CVSS Score : 8.4

References :
https://support.forcepoint.com/s/article/000042333 | source : psirt@forcepoint.com

Vulnerability : CWE-862


Source : microsoft.com

Vulnerability ID : CVE-2024-21385

First published on : 26-01-2024 01:15:10
Last modified on : 26-01-2024 13:51:45

Description :
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

CVE ID : CVE-2024-21385
Source : secure@microsoft.com
CVSS Score : 8.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21385 | source : secure@microsoft.com


Source : cloudflare.com

Vulnerability ID : CVE-2024-0212

First published on : 29-01-2024 10:15:08
Last modified on : 29-01-2024 14:25:21

Description :
The Cloudflare Wordpress plugin was found to be vulnerable to improper authentication. The vulnerability enables attackers with a lower privileged account to access data from the Cloudflare API.

CVE ID : CVE-2024-0212
Source : cna@cloudflare.com
CVSS Score : 8.1

References :
https://github.com/cloudflare/Cloudflare-WordPress/releases/tag/v4.12.3 | source : cna@cloudflare.com
https://github.com/cloudflare/Cloudflare-WordPress/security/advisories/GHSA-h2fj-7r3m-7gf2 | source : cna@cloudflare.com

Vulnerability : CWE-284


Source : netapp.com

Vulnerability ID : CVE-2024-21985

First published on : 26-01-2024 16:15:22
Last modified on : 26-01-2024 16:33:07

Description :
ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 and 9.13.1P4 are susceptible to a vulnerability which could allow an authenticated user with multiple remote accounts with differing roles to perform actions via REST API beyond their intended privilege. Possible actions include viewing limited configuration details and metrics or modifying limited settings, some of which could result in a Denial of Service (DoS).

CVE ID : CVE-2024-21985
Source : security-alert@netapp.com
CVSS Score : 7.6

References :
https://security.netapp.com/advisory/ntap-20240126-0001/ | source : security-alert@netapp.com

Vulnerability : CWE-269


Source : usom.gov.tr

Vulnerability ID : CVE-2023-6919

First published on : 26-01-2024 08:15:42
Last modified on : 26-01-2024 13:51:45

Description :
Path Traversal: '/../filedir' vulnerability in Biges Safe Life Technologies Electronics Inc. VGuard allows Absolute Path Traversal.This issue affects VGuard: before V500.0003.R008.4011.C0012.B351.C.

CVE ID : CVE-2023-6919
Source : iletisim@usom.gov.tr
CVSS Score : 7.5

References :
https://www.usom.gov.tr/bildirim/tr-24-0054 | source : iletisim@usom.gov.tr

Vulnerability : CWE-25


Source : redhat.com

Vulnerability ID : CVE-2023-6200

First published on : 28-01-2024 13:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.

CVE ID : CVE-2023-6200
Source : secalert@redhat.com
CVSS Score : 7.5

References :
https://access.redhat.com/security/cve/CVE-2023-6200 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2250377 | source : secalert@redhat.com
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dade3f6a1e4e | source : secalert@redhat.com

Vulnerability : CWE-362


Vulnerability ID : CVE-2023-6291

First published on : 26-01-2024 15:15:08
Last modified on : 26-01-2024 16:33:07

Description :
A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.

CVE ID : CVE-2023-6291
Source : secalert@redhat.com
CVSS Score : 7.1

References :
https://access.redhat.com/errata/RHSA-2023:7854 | source : secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7855 | source : secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7856 | source : secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7857 | source : secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7858 | source : secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7860 | source : secalert@redhat.com
https://access.redhat.com/errata/RHSA-2023:7861 | source : secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2023-6291 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2251407 | source : secalert@redhat.com

Vulnerability : CWE-20


Source : opentext.com

Vulnerability ID : CVE-2023-4550

First published on : 29-01-2024 21:15:08
Last modified on : 29-01-2024 21:15:08

Description :
Improper Input Validation, Files or Directories Accessible to External Parties vulnerability in OpenText AppBuilder on Windows, Linux allows Probe System Files. An unauthenticated or authenticated user can abuse a page of AppBuilder to read arbitrary files on the server on which it is hosted. This issue affects AppBuilder: from 21.2 before 23.2.

CVE ID : CVE-2023-4550
Source : security@opentext.com
CVSS Score : 7.5

References :
https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b | source : security@opentext.com

Vulnerability : CWE-20
Vulnerability : CWE-552


Vulnerability ID : CVE-2023-4551

First published on : 29-01-2024 21:15:08
Last modified on : 29-01-2024 21:15:08

Description :
Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows OS Command Injection. The AppBuilder's Scheduler functionality that facilitates creation of scheduled tasks is vulnerable to command injection. This allows authenticated users to inject arbitrary operating system commands into the executing process. This issue affects AppBuilder: from 21.2 before 23.2.

CVE ID : CVE-2023-4551
Source : security@opentext.com
CVSS Score : 7.2

References :
https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b | source : security@opentext.com

Vulnerability : CWE-20


(107) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : github.com

Vulnerability ID : CVE-2024-23826

First published on : 29-01-2024 16:15:09
Last modified on : 29-01-2024 16:19:11

Description :
spbu_se_site is the website of the Department of System Programming of St. Petersburg State University. Before 2024.01.29, when uploading an avatar image, an authenticated user may intentionally use a large Unicode filename which would lead to a server-side denial of service under Windows. This is due to no limitation of the length of the filename and the costly use of the Unicode normalization with the form NFKD on Windows OS. This vulnerability was fixed in the 2024.01.29 release.

CVE ID : CVE-2024-23826
Source : security-advisories@github.com
CVSS Score : 6.8

References :
https://github.com/spbu-se/spbu_se_site/commit/5ad623eb0405260763046343c5785bc588d8a57d | source : security-advisories@github.com
https://github.com/spbu-se/spbu_se_site/security/advisories/GHSA-5vfc-v7hg-pvwm | source : security-advisories@github.com

Vulnerability : CWE-770


Vulnerability ID : CVE-2024-23822

First published on : 29-01-2024 16:15:09
Last modified on : 29-01-2024 16:19:11

Description :
Thruk is a multibackend monitoring webinterface. Prior to 3.12, the Thruk web monitoring application presents a vulnerability in a file upload form that allows a threat actor to arbitrarily upload files to the server to any path they desire and have permissions for. This vulnerability is known as Path Traversal or Directory Traversal. Version 3.12 fixes the issue.

CVE ID : CVE-2024-23822
Source : security-advisories@github.com
CVSS Score : 5.4

References :
https://github.com/sni/Thruk/commit/1aa9597cdf2722a69651124f68cbb449be12cc39 | source : security-advisories@github.com
https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx | source : security-advisories@github.com

Vulnerability : CWE-22


Vulnerability ID : CVE-2024-23820

First published on : 26-01-2024 17:15:13
Last modified on : 26-01-2024 18:29:26

Description :
OpenFGA, an authorization/permission engine, is vulnerable to a denial of service attack in versions prior to 1.4.3. In some scenarios that depend on the model and tuples used, a call to `ListObjects` may not release memory properly. So when a sufficiently high number of those calls are executed, the OpenFGA server can create an `out of memory` error and terminate. Version 1.4.3 contains a patch for this issue.

CVE ID : CVE-2024-23820
Source : security-advisories@github.com
CVSS Score : 5.3

References :
https://github.com/openfga/openfga/commit/908ac85c8b7769c8042cca31886df8db01976c39 | source : security-advisories@github.com
https://github.com/openfga/openfga/releases/tag/v1.4.3 | source : security-advisories@github.com
https://github.com/openfga/openfga/security/advisories/GHSA-rxpw-85vw-fx87 | source : security-advisories@github.com

Vulnerability : CWE-770


Source : redhat.com

Vulnerability ID : CVE-2024-0841

First published on : 28-01-2024 12:15:52
Last modified on : 29-01-2024 14:25:25

Description :
A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

CVE ID : CVE-2024-0841
Source : secalert@redhat.com
CVSS Score : 6.6

References :
https://access.redhat.com/security/cve/CVE-2024-0841 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2256490 | source : secalert@redhat.com


Vulnerability ID : CVE-2023-40546

First published on : 29-01-2024 17:15:08
Last modified on : 29-01-2024 17:39:52

Description :
A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.

CVE ID : CVE-2023-40546
Source : secalert@redhat.com
CVSS Score : 6.2

References :
https://access.redhat.com/security/cve/CVE-2023-40546 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2241796 | source : secalert@redhat.com

Vulnerability : CWE-476


Vulnerability ID : CVE-2023-40549

First published on : 29-01-2024 17:15:08
Last modified on : 29-01-2024 17:39:52

Description :
An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.

CVE ID : CVE-2023-40549
Source : secalert@redhat.com
CVSS Score : 6.2

References :
https://access.redhat.com/security/cve/CVE-2023-40549 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2241797 | source : secalert@redhat.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-40550

First published on : 29-01-2024 17:15:08
Last modified on : 29-01-2024 17:39:52

Description :
An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.

CVE ID : CVE-2023-40550
Source : secalert@redhat.com
CVSS Score : 5.5

References :
https://access.redhat.com/security/cve/CVE-2023-40550 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2259915 | source : secalert@redhat.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-40551

First published on : 29-01-2024 17:15:08
Last modified on : 29-01-2024 17:39:52

Description :
A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.

CVE ID : CVE-2023-40551
Source : secalert@redhat.com
CVSS Score : 5.1

References :
https://access.redhat.com/security/cve/CVE-2023-40551 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2259918 | source : secalert@redhat.com

Vulnerability : CWE-125


Vulnerability ID : CVE-2023-40548

First published on : 29-01-2024 15:15:08
Last modified on : 29-01-2024 16:19:17

Description :
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.

CVE ID : CVE-2023-40548
Source : secalert@redhat.com
CVSS Score : 4.9

References :
https://access.redhat.com/security/cve/CVE-2023-40548 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2241782 | source : secalert@redhat.com

Vulnerability : CWE-122


Source : gitlab.com

Vulnerability ID : CVE-2023-6159

First published on : 26-01-2024 02:15:07
Last modified on : 26-01-2024 13:51:45

Description :
An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input.

CVE ID : CVE-2023-6159
Source : cve@gitlab.com
CVSS Score : 6.5

References :
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | source : cve@gitlab.com
https://gitlab.com/gitlab-org/gitlab/-/issues/431924 | source : cve@gitlab.com
https://hackerone.com/reports/2251278 | source : cve@gitlab.com

Vulnerability : CWE-1333


Vulnerability ID : CVE-2023-5933

First published on : 26-01-2024 01:15:08
Last modified on : 26-01-2024 13:51:45

Description :
An issue has been discovered in GitLab CE/EE affecting all versions after 13.7 before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Improper input sanitization of user name allows arbitrary API PUT requests.

CVE ID : CVE-2023-5933
Source : cve@gitlab.com
CVSS Score : 6.4

References :
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | source : cve@gitlab.com
https://gitlab.com/gitlab-org/gitlab/-/issues/430236 | source : cve@gitlab.com
https://hackerone.com/reports/2225710 | source : cve@gitlab.com

Vulnerability : CWE-80


Vulnerability ID : CVE-2023-5612

First published on : 26-01-2024 02:15:07
Last modified on : 26-01-2024 13:51:45

Description :
An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled.

CVE ID : CVE-2023-5612
Source : cve@gitlab.com
CVSS Score : 5.3

References :
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | source : cve@gitlab.com
https://gitlab.com/gitlab-org/gitlab/-/issues/428441 | source : cve@gitlab.com
https://hackerone.com/reports/2208790 | source : cve@gitlab.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2024-0456

First published on : 26-01-2024 01:15:09
Last modified on : 26-01-2024 13:51:45

Description :
An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project

CVE ID : CVE-2024-0456
Source : cve@gitlab.com
CVSS Score : 4.3

References :
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | source : cve@gitlab.com
https://gitlab.com/gitlab-org/gitlab/-/issues/430726 | source : cve@gitlab.com

Vulnerability : CWE-285


Source : wordfence.com

Vulnerability ID : CVE-2024-0697

First published on : 27-01-2024 05:15:08
Last modified on : 29-01-2024 14:25:30

Description :
The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.3 via the node_id parameter in the backuply_get_jstree function. This makes it possible for attackers with administrator privileges or higher to read the contents of arbitrary files on the server, which can contain sensitive information.

CVE ID : CVE-2024-0697
Source : security@wordfence.com
CVSS Score : 6.5

References :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026806%40backuply&new=3026806%40backuply&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/70effa22-fbf6-44cb-9d1b-8625969c10ac?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0824

First published on : 27-01-2024 05:15:08
Last modified on : 29-01-2024 14:25:30

Description :
The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Link Anything functionality in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE ID : CVE-2024-0824
Source : security@wordfence.com
CVSS Score : 6.4

References :
https://plugins.trac.wordpress.org/changeset/3026499/exclusive-addons-for-elementor/trunk/extensions/link-anything.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/925b0a86-ed23-471c-84e2-ae78a01b1876?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0667

First published on : 27-01-2024 04:15:08
Last modified on : 29-01-2024 14:25:30

Description :
The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.15.21. This is due to missing or incorrect nonce validation on the 'execute' function. This makes it possible for unauthenticated attackers to execute arbitrary methods in the 'BoosterController' class via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE ID : CVE-2024-0667
Source : security@wordfence.com
CVSS Score : 5.4

References :
https://plugins.trac.wordpress.org/browser/form-maker/tags/1.15.21/booster/controller.php#L34 | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027368%40form-maker&new=3027368%40form-maker&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/d55c832b-f558-4e8a-8301-33dd38d39ef1?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2023-6497

First published on : 27-01-2024 04:15:08
Last modified on : 29-01-2024 14:25:30

Description :
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the automatic redirect URL setting in all versions up to and including 4.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVE ID : CVE-2023-6497
Source : security@wordfence.com
CVSS Score : 4.4

References :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3007737%40wordpress-simple-paypal-shopping-cart&new=3007737%40wordpress-simple-paypal-shopping-cart&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ac6201a1-7ca9-461b-b9ad-16407120dfae?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0664

First published on : 27-01-2024 04:15:08
Last modified on : 29-01-2024 14:25:30

Description :
The Meks Smart Social Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Meks Smart Social Widget in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVE ID : CVE-2024-0664
Source : security@wordfence.com
CVSS Score : 4.4

References :
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027347%40meks-smart-social-widget&new=3027347%40meks-smart-social-widget&sfp_email=&sfph_mail= | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/722aae99-fcfb-4234-9245-5db57aaa03c5?source=cve | source : security@wordfence.com


Vulnerability ID : CVE-2024-0618

First published on : 27-01-2024 06:15:48
Last modified on : 29-01-2024 14:25:30

Description :
The Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via imported form titles in all versions up to, and including, 5.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVE ID : CVE-2024-0618
Source : security@wordfence.com
CVSS Score : 4.4

References :
https://advisory.abay.sh/cve-2024-0618/ | source : security@wordfence.com
https://plugins.trac.wordpress.org/changeset/3022938/fluentform/tags/5.1.7/app/Helpers/Helper.php?old=3000676&old_path=fluentform%2Ftags%2F5.1.5%2Fapp%2FHelpers%2FHelper.php | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/0348d465-f351-4c52-b293-8b3b058292b9?source=cve | source : security@wordfence.com


Source : palantir.com

Vulnerability ID : CVE-2023-30970

First published on : 29-01-2024 19:15:08
Last modified on : 29-01-2024 19:15:08

Description :
Gotham Table service and Forward App were found to be vulnerable to a Path traversal issue allowing an authenticated user to read arbitrary files on the file system.

CVE ID : CVE-2023-30970
Source : cve-coordination@palantir.com
CVSS Score : 6.5

References :
https://palantir.safebase.us/?tcuUid=69be99ef-ad24-4339-9017-c8bf70789c72 | source : cve-coordination@palantir.com

Vulnerability : CWE-36


Source : vuldb.com

Vulnerability ID : CVE-2024-0933

First published on : 26-01-2024 17:15:11
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability was found in Niushop B2B2C V5 and classified as critical. Affected by this issue is some unknown functionality of the file \app\model\Upload.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252140. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0933
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://docs.qq.com/doc/DYnNWeHdTVXZqZURH | source : cna@vuldb.com
https://vuldb.com/?ctiid.252140 | source : cna@vuldb.com
https://vuldb.com/?id.252140 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2024-0936

First published on : 26-01-2024 17:15:11
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Affected by this vulnerability is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252181 was assigned to this vulnerability. NOTE: The vendor was contacted early and confirmed immediately the existence of the issue. A patch is planned to be released in February 2024.

CVE ID : CVE-2024-0936
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/bayuncao/vul-cve-5 | source : cna@vuldb.com
https://github.com/bayuncao/vul-cve-5/blob/main/poc.py | source : cna@vuldb.com
https://vuldb.com/?ctiid.252181 | source : cna@vuldb.com
https://vuldb.com/?id.252181 | source : cna@vuldb.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2024-0937

First published on : 26-01-2024 18:15:10
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability, which was classified as critical, has been found in van_der_Schaar LAB synthcity 0.2.9. Affected by this issue is the function load_from_file of the component PKL File Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252182 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early and confirmed immediately the existence of the issue. A patch is planned to be released in February 2024.

CVE ID : CVE-2024-0937
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/bayuncao/vul-cve-6 | source : cna@vuldb.com
https://github.com/bayuncao/vul-cve-6/blob/main/poc.py | source : cna@vuldb.com
https://vuldb.com/?ctiid.252182 | source : cna@vuldb.com
https://vuldb.com/?id.252182 | source : cna@vuldb.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2024-0939

First published on : 26-01-2024 19:15:08
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0939
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252184 | source : cna@vuldb.com
https://vuldb.com/?id.252184 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2024-0962

First published on : 27-01-2024 13:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability was found in obgm libcoap 4.3.4. It has been rated as critical. Affected by this issue is the function get_split_entry of the file src/coap_oscore.c of the component Configuration File Handler. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-252206 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0962
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/obgm/libcoap/issues/1310 | source : cna@vuldb.com
https://github.com/obgm/libcoap/issues/1310#issue-2099860835 | source : cna@vuldb.com
https://github.com/obgm/libcoap/pull/1311 | source : cna@vuldb.com
https://vuldb.com/?ctiid.252206 | source : cna@vuldb.com
https://vuldb.com/?id.252206 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0987

First published on : 29-01-2024 00:15:08
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability classified as critical has been found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected is an unknown function of the file /runtime/log. The manipulation leads to improper output neutralization for logs. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252252. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0987
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/mhLwGOcLxYfP | source : cna@vuldb.com
https://vuldb.com/?ctiid.252252 | source : cna@vuldb.com
https://vuldb.com/?id.252252 | source : cna@vuldb.com

Vulnerability : CWE-117


Vulnerability ID : CVE-2024-0988

First published on : 29-01-2024 00:15:08
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability classified as critical was found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this vulnerability is the function checklogin of the file /application/index/common.php. The manipulation of the argument App_User_id/App_user_Token leads to improper authentication. The exploit has been disclosed to the public and may be used. The identifier VDB-252253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0988
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/2dBOnquxgCDl | source : cna@vuldb.com
https://vuldb.com/?ctiid.252253 | source : cna@vuldb.com
https://vuldb.com/?id.252253 | source : cna@vuldb.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2024-1007

First published on : 29-01-2024 16:15:08
Last modified on : 29-01-2024 16:19:11

Description :
A vulnerability was found in SourceCodester Employee Management System 1.0. It has been classified as critical. Affected is an unknown function of the file edit_profile.php. The manipulation of the argument txtfullname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252276.

CVE ID : CVE-2024-1007
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://vuldb.com/?ctiid.252276 | source : cna@vuldb.com
https://vuldb.com/?id.252276 | source : cna@vuldb.com
https://www.youtube.com/watch?v=1yesMwvWcL4 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-1021

First published on : 29-01-2024 22:15:08
Last modified on : 29-01-2024 22:15:08

Description :
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.5.5. Affected by this issue is the function readRawText of the component HTTP Request Handler. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252290 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-1021
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://vuldb.com/?ctiid.252290 | source : cna@vuldb.com
https://vuldb.com/?id.252290 | source : cna@vuldb.com
https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5 | source : cna@vuldb.com

Vulnerability : CWE-918


Vulnerability ID : CVE-2024-0938

First published on : 26-01-2024 18:15:10
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file /general/email/inbox/delete_webmail.php. The manipulation of the argument WEBBODY_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-252183. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0938
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/Yu1e/vuls/blob/main/SQL%20injection%20vulnerability%20exists%20in%20Tongda%20OA.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252183 | source : cna@vuldb.com
https://vuldb.com/?id.252183 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0941

First published on : 26-01-2024 19:15:08
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability was found in Novel-Plus 4.3.0-RC1 and classified as critical. This issue affects some unknown processing of the file /novel/bookComment/list. The manipulation of the argument sort leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-252185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0941
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/red0-ha1yu/warehouse/blob/main/novel-plus_sqlinject2.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252185 | source : cna@vuldb.com
https://vuldb.com/?id.252185 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0989

First published on : 29-01-2024 01:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability, which was classified as problematic, has been found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this issue is the function del_sn_db of the file /application/index/controller/Service.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-252254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0989
Source : cna@vuldb.com
CVSS Score : 5.4

References :
https://note.zhaoj.in/share/XKxaJTphW6PB | source : cna@vuldb.com
https://vuldb.com/?ctiid.252254 | source : cna@vuldb.com
https://vuldb.com/?id.252254 | source : cna@vuldb.com

Vulnerability : CWE-24


Vulnerability ID : CVE-2024-1005

First published on : 29-01-2024 15:15:10
Last modified on : 29-01-2024 16:19:11

Description :
A vulnerability has been found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This vulnerability affects unknown code of the file /runtime/log. The manipulation leads to files or directories accessible. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252274 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-1005
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://note.zhaoj.in/share/M9ERphWTXUPj | source : cna@vuldb.com
https://vuldb.com/?ctiid.252274 | source : cna@vuldb.com
https://vuldb.com/?id.252274 | source : cna@vuldb.com

Vulnerability : CWE-552


Vulnerability ID : CVE-2024-1016

First published on : 29-01-2024 18:15:07
Last modified on : 29-01-2024 18:15:07

Description :
A vulnerability was found in Solar FTP Server 2.1.1/2.1.2. It has been declared as problematic. This vulnerability affects unknown code of the component PASV Command Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-252286 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-1016
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html | source : cna@vuldb.com
https://vuldb.com/?ctiid.252286 | source : cna@vuldb.com
https://vuldb.com/?id.252286 | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-1017

First published on : 29-01-2024 19:15:08
Last modified on : 29-01-2024 19:15:08

Description :
A vulnerability was found in Gabriels FTP Server 1.2. It has been rated as problematic. This issue affects some unknown processing. The manipulation of the argument USERNAME leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-252287.

CVE ID : CVE-2024-1017
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html | source : cna@vuldb.com
https://vuldb.com/?ctiid.252287 | source : cna@vuldb.com
https://vuldb.com/?id.252287 | source : cna@vuldb.com
https://www.youtube.com/watch?v=wwHuXfYS8yQ | source : cna@vuldb.com

Vulnerability : CWE-404


Vulnerability ID : CVE-2024-0959

First published on : 27-01-2024 11:15:17
Last modified on : 29-01-2024 14:25:30

Description :
A vulnerability was found in StanfordVL GibsonEnv 0.3.1. It has been classified as critical. Affected is the function cloudpickle.load of the file gibson\utils\pposgd_fuse.py. The manipulation leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252204.

CVE ID : CVE-2024-0959
Source : cna@vuldb.com
CVSS Score : 5.0

References :
https://github.com/bayuncao/vul-cve-7 | source : cna@vuldb.com
https://github.com/bayuncao/vul-cve-7/blob/main/dataset.pkl | source : cna@vuldb.com
https://vuldb.com/?ctiid.252204 | source : cna@vuldb.com
https://vuldb.com/?id.252204 | source : cna@vuldb.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2024-0960

First published on : 27-01-2024 12:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability was found in flink-extended ai-flow 0.3.1. It has been declared as critical. Affected by this vulnerability is the function cloudpickle.loads of the file \ai_flow\cli\commands\workflow_command.py. The manipulation leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-252205 was assigned to this vulnerability.

CVE ID : CVE-2024-0960
Source : cna@vuldb.com
CVSS Score : 5.0

References :
https://github.com/bayuncao/vul-cve-8 | source : cna@vuldb.com
https://github.com/bayuncao/vul-cve-8/blob/main/dataset.pkl | source : cna@vuldb.com
https://vuldb.com/?ctiid.252205 | source : cna@vuldb.com
https://vuldb.com/?id.252205 | source : cna@vuldb.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2024-0921

First published on : 26-01-2024 14:15:50
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139.

CVE ID : CVE-2024-0921
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/xiyuanhuaigu/cve/blob/main/rce.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252139 | source : cna@vuldb.com
https://vuldb.com/?id.252139 | source : cna@vuldb.com

Vulnerability : CWE-78


Vulnerability ID : CVE-2024-0922

First published on : 26-01-2024 14:15:50
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this vulnerability is the function formQuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252127. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0922
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formQuickIndex.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252127 | source : cna@vuldb.com
https://vuldb.com/?id.252127 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0923

First published on : 26-01-2024 14:15:50
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. Affected by this issue is the function formSetDeviceName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0923
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252128 | source : cna@vuldb.com
https://vuldb.com/?id.252128 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0924

First published on : 26-01-2024 15:15:08
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function formSetPPTPServer. The manipulation of the argument startIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0924
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetPPTPServer.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252129 | source : cna@vuldb.com
https://vuldb.com/?id.252129 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0925

First published on : 26-01-2024 15:15:08
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability has been found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This vulnerability affects the function formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252130 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0925
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetVirtualSer.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252130 | source : cna@vuldb.com
https://vuldb.com/?id.252130 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0926

First published on : 26-01-2024 15:15:08
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and classified as critical. This issue affects the function formWifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252131. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0926
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formWifiWpsOOB.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252131 | source : cna@vuldb.com
https://vuldb.com/?id.252131 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0927

First published on : 26-01-2024 15:15:09
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been classified as critical. Affected is the function fromAddressNat. The manipulation of the argument entrys/mitInterface/page leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252132. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0927
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252132 | source : cna@vuldb.com
https://vuldb.com/?id.252132 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0928

First published on : 26-01-2024 16:15:21
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromDhcpListClient. The manipulation of the argument page/listN leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0928
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252133 | source : cna@vuldb.com
https://vuldb.com/?id.252133 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0929

First published on : 26-01-2024 16:15:22
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0929
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252134 | source : cna@vuldb.com
https://vuldb.com/?id.252134 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0930

First published on : 26-01-2024 16:15:22
Last modified on : 26-01-2024 16:33:07

Description :
A vulnerability classified as critical has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This affects the function fromSetWirelessRepeat. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0930
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252135 | source : cna@vuldb.com
https://vuldb.com/?id.252135 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0931

First published on : 26-01-2024 17:15:10
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability classified as critical was found in Tenda AC10U 15.03.06.49_multi_TDE01. This vulnerability affects the function saveParentControlInfo. The manipulation of the argument deviceId/time/urls leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252136. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0931
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252136 | source : cna@vuldb.com
https://vuldb.com/?id.252136 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0932

First published on : 26-01-2024 17:15:11
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability, which was classified as critical, has been found in Tenda AC10U 15.03.06.49_multi_TDE01. This issue affects the function setSmartPowerManagement. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252137 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0932
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252137 | source : cna@vuldb.com
https://vuldb.com/?id.252137 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2024-0986

First published on : 29-01-2024 00:15:07
Last modified on : 29-01-2024 14:25:25

Description :
A vulnerability was found in Issabel PBX 4.0.0. It has been rated as critical. This issue affects some unknown processing of the file /index.php?menu=asterisk_cli of the component Asterisk-Cli. The manipulation of the argument Command leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252251. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0986
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link | source : cna@vuldb.com
https://vuldb.com/?ctiid.252251 | source : cna@vuldb.com
https://vuldb.com/?id.252251 | source : cna@vuldb.com

Vulnerability : CWE-78


Vulnerability ID : CVE-2024-1008

First published on : 29-01-2024 16:15:08
Last modified on : 29-01-2024 16:19:11

Description :
A vulnerability was found in SourceCodester Employee Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file edit-photo.php of the component Profile Page. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252277 was assigned to this vulnerability.

CVE ID : CVE-2024-1008
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://vuldb.com/?ctiid.252277 | source : cna@vuldb.com
https://vuldb.com/?id.252277 | source : cna@vuldb.com
https://www.youtube.com/watch?v=z4gcLZCOcnc | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2024-1011

First published on : 29-01-2024 17:15:10
Last modified on : 29-01-2024 17:39:52

Description :
A vulnerability classified as problematic was found in SourceCodester Employee Management System 1.0. This vulnerability affects unknown code of the file delete-leave.php of the component Leave Handler. The manipulation of the argument id leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252280.

CVE ID : CVE-2024-1011
Source : cna@vuldb.com
CVSS Score : 4.3

References :
https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control | source : cna@vuldb.com
https://vuldb.com/?ctiid.252280 | source : cna@vuldb.com
https://vuldb.com/?id.252280 | source : cna@vuldb.com

Vulnerability : CWE-284


Source : incibe.es

Vulnerability ID : CVE-2024-1014

First published on : 29-01-2024 14:15:09
Last modified on : 29-01-2024 14:25:21

Description :
Uncontrolled resource consumption vulnerability in SE-elektronic GmbH E-DDC3.3 affecting versions 03.07.03 and higher. An attacker could interrupt the availability of the administration panel by sending multiple ICMP packets.

CVE ID : CVE-2024-1014
Source : cve-coordination@incibe.es
CVSS Score : 6.2

References :
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-se-elektronic-gmbh-products | source : cve-coordination@incibe.es

Vulnerability : CWE-400


Vulnerability ID : CVE-2024-23856

First published on : 26-01-2024 09:15:08
Last modified on : 27-01-2024 00:37:35

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/itemlist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23856
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23857

First published on : 26-01-2024 09:15:08
Last modified on : 27-01-2024 00:37:34

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnlinecreate.php, in the batchno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23857
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23858

First published on : 26-01-2024 09:15:09
Last modified on : 27-01-2024 00:37:32

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuancelinecreate.php, in the batchno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23858
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23859

First published on : 26-01-2024 09:15:09
Last modified on : 27-01-2024 00:37:30

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructurelinecreate.php, in the flatamount parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23859
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23860

First published on : 26-01-2024 09:15:09
Last modified on : 27-01-2024 00:37:23

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/currencylist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23860
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23861

First published on : 26-01-2024 09:15:09
Last modified on : 27-01-2024 00:37:21

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/unitofmeasurementcreate.php, in the unitofmeasurementid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23861
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23862

First published on : 26-01-2024 09:15:09
Last modified on : 27-01-2024 00:37:18

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grndisplay.php, in the grnno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23862
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23863

First published on : 26-01-2024 10:15:07
Last modified on : 27-01-2024 00:37:13

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructuredisplay.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23863
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23864

First published on : 26-01-2024 10:15:07
Last modified on : 27-01-2024 00:37:11

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/countrylist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23864
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23865

First published on : 26-01-2024 10:15:08
Last modified on : 27-01-2024 00:37:09

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructurelist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23865
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23866

First published on : 26-01-2024 10:15:08
Last modified on : 27-01-2024 00:37:08

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/countrycreate.php, in the countryid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23866
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23867

First published on : 26-01-2024 10:15:08
Last modified on : 27-01-2024 00:37:06

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/statecreate.php, in the stateid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23867
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23868

First published on : 26-01-2024 10:15:08
Last modified on : 27-01-2024 00:37:01

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnlist.php, in the deleted parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23868
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23869

First published on : 26-01-2024 10:15:09
Last modified on : 27-01-2024 00:36:57

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuanceprint.php, in the issuanceno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23869
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23870

First published on : 26-01-2024 10:15:09
Last modified on : 27-01-2024 00:36:52

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuancelist.php, in the delete parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23870
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23871

First published on : 26-01-2024 10:15:09
Last modified on : 27-01-2024 00:36:47

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/unitofmeasurementmodify.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23871
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23872

First published on : 26-01-2024 10:15:09
Last modified on : 27-01-2024 00:36:44

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/locationmodify.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23872
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23873

First published on : 26-01-2024 10:15:09
Last modified on : 27-01-2024 00:36:39

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/currencymodify.php, in the currencyid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23873
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23874

First published on : 26-01-2024 10:15:10
Last modified on : 27-01-2024 00:40:23

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/companymodify.php, in the address1 parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23874
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23875

First published on : 26-01-2024 10:15:10
Last modified on : 27-01-2024 00:40:21

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuancedisplay.php, in the issuanceno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23875
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23876

First published on : 26-01-2024 10:15:10
Last modified on : 27-01-2024 00:40:18

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructurecreate.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23876
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23877

First published on : 26-01-2024 10:15:10
Last modified on : 27-01-2024 00:40:16

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/currencycreate.php, in the currencyid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23877
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23878

First published on : 26-01-2024 10:15:10
Last modified on : 27-01-2024 00:40:15

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnprint.php, in the grnno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23878
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23879

First published on : 26-01-2024 10:15:10
Last modified on : 27-01-2024 00:40:13

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/statemodify.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23879
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23880

First published on : 26-01-2024 10:15:11
Last modified on : 27-01-2024 00:40:12

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxcodelist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23880
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23881

First published on : 26-01-2024 10:15:11
Last modified on : 27-01-2024 00:40:10

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/statelist.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23881
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23882

First published on : 26-01-2024 10:15:11
Last modified on : 27-01-2024 00:40:08

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxcodecreate.php, in the taxcodeid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23882
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23883

First published on : 26-01-2024 10:15:11
Last modified on : 27-01-2024 00:40:07

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/taxstructuremodify.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23883
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23884

First published on : 26-01-2024 10:15:11
Last modified on : 27-01-2024 00:40:05

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grnmodify.php, in the grndate parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23884
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23885

First published on : 26-01-2024 10:15:12
Last modified on : 27-01-2024 00:40:03

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/countrymodify.php, in the countryid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23885
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23886

First published on : 26-01-2024 10:15:12
Last modified on : 27-01-2024 00:40:02

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/itemmodify.php, in the bincardinfo parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23886
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23887

First published on : 26-01-2024 10:15:12
Last modified on : 27-01-2024 00:40:00

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/grncreate.php, in the grndate parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23887
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23888

First published on : 26-01-2024 10:15:12
Last modified on : 27-01-2024 00:39:58

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stocktransactionslist.php, in the itemidy parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23888
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23889

First published on : 26-01-2024 10:15:12
Last modified on : 27-01-2024 00:39:57

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/itemgroupcreate.php, in the itemgroupid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23889
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23890

First published on : 26-01-2024 11:15:08
Last modified on : 27-01-2024 00:39:55

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/itempopup.php, in the description parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23890
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23891

First published on : 26-01-2024 11:15:08
Last modified on : 27-01-2024 00:39:54

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/itemcreate.php, in the itemid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23891
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23892

First published on : 26-01-2024 11:15:08
Last modified on : 27-01-2024 00:39:52

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/costcentercreate.php, in the costcenterid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23892
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23893

First published on : 26-01-2024 11:15:09
Last modified on : 27-01-2024 00:39:51

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/costcentermodify.php, in the costcenterid parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23893
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23894

First published on : 26-01-2024 11:15:09
Last modified on : 27-01-2024 00:39:49

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stockissuancecreate.php, in the issuancedate parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23894
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Vulnerability ID : CVE-2024-23896

First published on : 26-01-2024 11:15:09
Last modified on : 27-01-2024 00:39:47

Description :
A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, whereby user-controlled inputs are not sufficiently encoded, resulting in a Cross-Site Scripting (XSS) vulnerability via /cupseasylive/stock.php, in the batchno parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.

CVE ID : CVE-2024-23896
Source : cve-coordination@incibe.es
CVSS Score : 6.1

References :
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cups-easy | source : cve-coordination@incibe.es

Vulnerability : CWE-79

Vulnerability : CWE-79

Vulnerable product(s) : cpe:2.3:a:ajaysharma:cups_easy:1.0:*:*:*:*:*:*:*


Source : cisco.com

Vulnerability ID : CVE-2024-20263

First published on : 26-01-2024 18:15:11
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.

CVE ID : CVE-2024-20263
Source : ykramarz@cisco.com
CVSS Score : 5.8

References :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-bus-acl-bypass-5zn9hNJk | source : ykramarz@cisco.com


Vulnerability ID : CVE-2024-20305

First published on : 26-01-2024 18:15:11
Last modified on : 26-01-2024 18:29:26

Description :
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.

CVE ID : CVE-2024-20305
Source : ykramarz@cisco.com
CVSS Score : 4.8

References :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-xss-9TFuu5MS | source : ykramarz@cisco.com


Source : fluidattacks.com

Vulnerability ID : CVE-2024-0788

First published on : 29-01-2024 17:15:09
Last modified on : 29-01-2024 17:39:52

Description :
SUPERAntiSpyware Pro X v10.0.1260 is vulnerable to kernel-level API parameters manipulation and Denial of Service vulnerabilities by triggering the 0x9C402140 IOCTL code of the saskutil64.sys driver.

CVE ID : CVE-2024-0788
Source : help@fluidattacks.com
CVSS Score : 5.8

References :
https://fluidattacks.com/advisories/brubeck/ | source : help@fluidattacks.com
https://www.superantispyware.com/professional-x-edition.html | source : help@fluidattacks.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2024-23441

First published on : 29-01-2024 16:15:09
Last modified on : 29-01-2024 16:19:11

Description :
Vba32 Antivirus v3.36.0 is vulnerable to a Denial of Service vulnerability by triggering the 0x2220A7 IOCTL code of the Vba32m64.sys driver.

CVE ID : CVE-2024-23441
Source : help@fluidattacks.com
CVSS Score : 5.5

References :
https://fluidattacks.com/advisories/rollins/ | source : help@fluidattacks.com
https://www.anti-virus.by/vba32 | source : help@fluidattacks.com

Vulnerability : CWE-400


Source : flexerasoftware.com

Vulnerability ID : CVE-2023-29081

First published on : 26-01-2024 20:15:54
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability has been reported in Suite Setups built with versions prior to InstallShield 2023 R2. This vulnerability may allow locally authenticated users to cause a Denial of Service (DoS) condition when handling move operations on local, temporary folders.

CVE ID : CVE-2023-29081
Source : PSIRT-CNA@flexerasoftware.com
CVSS Score : 5.5

References :
https://community.flexera.com/t5/InstallShield-Knowledge-Base/CVE-2023-29081-InstallShield-Symlink-Vulnerability-Affecting/ta-p/305052 | source : PSIRT-CNA@flexerasoftware.com

Vulnerability : CWE-276


Source : opentext.com

Vulnerability ID : CVE-2023-4552

First published on : 29-01-2024 21:15:09
Last modified on : 29-01-2024 21:15:09

Description :
Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows Probe System Files. An authenticated AppBuilder user with the ability to create or manage existing databases can leverage them to exploit the AppBuilder server - including access to its local file system. This issue affects AppBuilder: from 21.2 before 23.2.

CVE ID : CVE-2023-4552
Source : security@opentext.com
CVSS Score : 5.5

References :
https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b | source : security@opentext.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-4553

First published on : 29-01-2024 21:15:09
Last modified on : 29-01-2024 21:15:09

Description :
Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows Probe System Files. AppBuilder configuration files are viewable by unauthenticated users. This issue affects AppBuilder: from 21.2 before 23.2.

CVE ID : CVE-2023-4553
Source : security@opentext.com
CVSS Score : 5.3

References :
https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b | source : security@opentext.com

Vulnerability : CWE-20


Vulnerability ID : CVE-2023-4554

First published on : 29-01-2024 21:15:09
Last modified on : 29-01-2024 21:15:09

Description :
Improper Restriction of XML External Entity Reference vulnerability in OpenText AppBuilder on Windows, Linux allows Server Side Request Forgery, Probe System Files. AppBuilder's XML processor is vulnerable to XML External Entity Processing (XXE), allowing an authenticated user to upload specially crafted XML files to induce server-side request forgery, disclose files local to the server that processes them. This issue affects AppBuilder: from 21.2 before 23.2.

CVE ID : CVE-2023-4554
Source : security@opentext.com
CVSS Score : 4.9

References :
https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b | source : security@opentext.com

Vulnerability : CWE-611


Source : microsoft.com

Vulnerability ID : CVE-2024-21387

First published on : 26-01-2024 01:15:10
Last modified on : 26-01-2024 13:51:45

Description :
Microsoft Edge for Android Spoofing Vulnerability

CVE ID : CVE-2024-21387
Source : secure@microsoft.com
CVSS Score : 5.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21387 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21382

First published on : 26-01-2024 01:15:10
Last modified on : 26-01-2024 13:51:45

Description :
Microsoft Edge for Android Information Disclosure Vulnerability

CVE ID : CVE-2024-21382
Source : secure@microsoft.com
CVSS Score : 4.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21382 | source : secure@microsoft.com


Source : patchstack.com

Vulnerability ID : CVE-2023-52187

First published on : 27-01-2024 00:15:24
Last modified on : 27-01-2024 00:42:46

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Thomas Maier Image Source Control Lite – Show Image Credits and Captions.This issue affects Image Source Control Lite – Show Image Credits and Captions: from n/a through 2.17.0.

CVE ID : CVE-2023-52187
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/image-source-control-isc/wordpress-image-source-control-lite-plugin-2-17-0-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Source : otrs.com

Vulnerability ID : CVE-2024-23792

First published on : 29-01-2024 10:15:08
Last modified on : 29-01-2024 14:25:21

Description :
When adding attachments to ticket comments, another user can add attachments as well impersonating the orginal user. The attack requires a logged-in other user to know the UUID. While the legitimate user completes the comment, the malicious user can add more files to the comment. This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.

CVE ID : CVE-2024-23792
Source : security@otrs.com
CVSS Score : 5.3

References :
https://otrs.com/release-notes/otrs-security-advisory-2024-03/ | source : security@otrs.com

Vulnerability : CWE-287


Vulnerability ID : CVE-2024-23791

First published on : 29-01-2024 10:15:08
Last modified on : 29-01-2024 14:25:21

Description :
Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.

CVE ID : CVE-2024-23791
Source : security@otrs.com
CVSS Score : 4.9

References :
https://otrs.com/release-notes/otrs-security-advisory-2024-02/ | source : security@otrs.com

Vulnerability : CWE-532


Source : synaptics.com

Vulnerability ID : CVE-2023-6482

First published on : 27-01-2024 01:15:08
Last modified on : 29-01-2024 17:15:09

Description :
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.

CVE ID : CVE-2023-6482
Source : PSIRT@synaptics.com
CVSS Score : 5.2

References :
https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf | source : PSIRT@synaptics.com

Vulnerability : CWE-321


(12) LOW VULNERABILITIES [0.1, 3.9]

Source : vuldb.com

Vulnerability ID : CVE-2024-0942

First published on : 26-01-2024 20:15:54
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability was found in Totolink N200RE V5 9.3.5u.6255_B20211224. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-252186 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0942
Source : cna@vuldb.com
CVSS Score : 3.7

References :
https://drive.google.com/file/d/1oWAGbmDtHDIUN1WSRAh4ZnuzHOuvTU4T/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.252186 | source : cna@vuldb.com
https://vuldb.com/?id.252186 | source : cna@vuldb.com
https://youtu.be/b0tU2CiLbnU | source : cna@vuldb.com

Vulnerability : CWE-613


Vulnerability ID : CVE-2024-0943

First published on : 26-01-2024 20:15:54
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252187. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0943
Source : cna@vuldb.com
CVSS Score : 3.7

References :
https://drive.google.com/file/d/1OBs4kc1KvbqrMhQHs54WtwxxxiBoI0hL/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.252187 | source : cna@vuldb.com
https://vuldb.com/?id.252187 | source : cna@vuldb.com

Vulnerability : CWE-613


Vulnerability ID : CVE-2024-0944

First published on : 26-01-2024 20:15:54
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability was found in Totolink T8 4.1.5cu.833_20220905. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252188. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0944
Source : cna@vuldb.com
CVSS Score : 3.7

References :
https://drive.google.com/file/d/1YPisSnxM5CwSLKFgs9w5k5MtNUgiijVo/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.252188 | source : cna@vuldb.com
https://vuldb.com/?id.252188 | source : cna@vuldb.com

Vulnerability : CWE-613


Vulnerability ID : CVE-2024-0958

First published on : 27-01-2024 06:15:48
Last modified on : 29-01-2024 14:25:30

Description :
A vulnerability was found in CodeAstro Stock Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /index.php of the component Add Category Handler. The manipulation of the argument Category Name/Category Description leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252203.

CVE ID : CVE-2024-0958
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.252203 | source : cna@vuldb.com
https://vuldb.com/?id.252203 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-1010

First published on : 29-01-2024 17:15:09
Last modified on : 29-01-2024 17:39:52

Description :
A vulnerability classified as problematic has been found in SourceCodester Employee Management System 1.0. This affects an unknown part of the file edit-profile.php. The manipulation of the argument fullname/phone/date of birth/address/date of appointment leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-252279.

CVE ID : CVE-2024-1010
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://github.com/jomskiller/Employee-Management-System---Stored-XSS | source : cna@vuldb.com
https://github.com/jomskiller/Employee-Management-System---Stored-XSS/ | source : cna@vuldb.com
https://vuldb.com/?ctiid.252279 | source : cna@vuldb.com
https://vuldb.com/?id.252279 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-1020

First published on : 29-01-2024 22:15:08
Last modified on : 29-01-2024 22:15:08

Description :
A vulnerability classified as problematic was found in Rebuild up to 3.5.5. Affected by this vulnerability is the function getStorageFile of the file /filex/proxy-download. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252289 was assigned to this vulnerability.

CVE ID : CVE-2024-1020
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://vuldb.com/?ctiid.252289 | source : cna@vuldb.com
https://vuldb.com/?id.252289 | source : cna@vuldb.com
https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-0948

First published on : 26-01-2024 22:15:11
Last modified on : 27-01-2024 00:42:46

Description :
A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <<h1 onload=alert(1)>>test</h1> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2024-0948
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.252191 | source : cna@vuldb.com
https://vuldb.com/?id.252191 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-1018

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
A vulnerability classified as problematic has been found in PbootCMS 3.2.5-20230421. Affected is an unknown function of the file /admin.php?p=/Area/index#tab=t2. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252288.

CVE ID : CVE-2024-1018
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://github.com/1MurasaKi/PboostCMS_XSS/blob/main/README.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.252288 | source : cna@vuldb.com
https://vuldb.com/?id.252288 | source : cna@vuldb.com

Vulnerability : CWE-79


Source : otrs.com

Vulnerability ID : CVE-2024-23790

First published on : 29-01-2024 10:15:08
Last modified on : 29-01-2024 14:25:21

Description :
Improper Input Validation vulnerability in the upload functionality for user avatars allows functionality misuse due to missing check of filetypes. This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023 through 2023.1.1.

CVE ID : CVE-2024-23790
Source : security@otrs.com
CVSS Score : 3.5

References :
https://otrs.com/release-notes/otrs-security-advisory-2024-01/ | source : security@otrs.com

Vulnerability : CWE-20


Source : palantir.com

Vulnerability ID : CVE-2023-22836

First published on : 29-01-2024 19:15:08
Last modified on : 29-01-2024 19:15:08

Description :
In cases where a multi-tenant stack user is operating Foundry’s Linter service, and the user changes a group name from the default value, the renamed value may be visible to the rest of the stack’s tenants.

CVE ID : CVE-2023-22836
Source : cve-coordination@palantir.com
CVSS Score : 3.5

References :
https://palantir.safebase.us/?tcuUid=f9bf67ef-be15-4f87-a526-bf6064e8f682 | source : cve-coordination@palantir.com

Vulnerability : CWE-862


Source : microsoft.com

Vulnerability ID : CVE-2024-21383

First published on : 26-01-2024 01:15:10
Last modified on : 26-01-2024 13:51:45

Description :
Microsoft Edge (Chromium-based) Spoofing Vulnerability

CVE ID : CVE-2024-21383
Source : secure@microsoft.com
CVSS Score : 3.3

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21383 | source : secure@microsoft.com


Vulnerability ID : CVE-2024-21336

First published on : 26-01-2024 18:15:12
Last modified on : 26-01-2024 18:29:26

Description :
Microsoft Edge (Chromium-based) Spoofing Vulnerability

CVE ID : CVE-2024-21336
Source : secure@microsoft.com
CVSS Score : 2.5

References :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21336 | source : secure@microsoft.com


(72) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-38317

First published on : 26-01-2024 05:15:11
Last modified on : 26-01-2024 13:51:45

Description :
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the network interface name entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVE ID : CVE-2023-38317
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/openNDS/openNDS/blob/master/ChangeLog | source : cve@mitre.org
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | source : cve@mitre.org
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | source : cve@mitre.org
https://www.forescout.com/resources/sierra21-vulnerabilities | source : cve@mitre.org


Vulnerability ID : CVE-2023-38318

First published on : 26-01-2024 05:15:11
Last modified on : 26-01-2024 13:51:45

Description :
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVE ID : CVE-2023-38318
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/openNDS/openNDS/blob/master/ChangeLog | source : cve@mitre.org
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | source : cve@mitre.org
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | source : cve@mitre.org
https://www.forescout.com/resources/sierra21-vulnerabilities | source : cve@mitre.org


Vulnerability ID : CVE-2023-38319

First published on : 26-01-2024 05:15:12
Last modified on : 26-01-2024 13:51:45

Description :
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the FAS key entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVE ID : CVE-2023-38319
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/openNDS/openNDS/blob/master/ChangeLog | source : cve@mitre.org
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | source : cve@mitre.org
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | source : cve@mitre.org
https://www.forescout.com/resources/sierra21-vulnerabilities | source : cve@mitre.org


Vulnerability ID : CVE-2023-38323

First published on : 26-01-2024 05:15:12
Last modified on : 26-01-2024 13:51:45

Description :
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVE ID : CVE-2023-38323
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/openNDS/openNDS/blob/master/ChangeLog | source : cve@mitre.org
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | source : cve@mitre.org
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | source : cve@mitre.org
https://www.forescout.com/resources/sierra21-vulnerabilities | source : cve@mitre.org


Vulnerability ID : CVE-2023-48126

First published on : 26-01-2024 07:15:56
Last modified on : 26-01-2024 13:51:45

Description :
An issue in Luxe Beauty Clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48126
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/Luxe%20Beauty%20Clinic.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48127

First published on : 26-01-2024 07:15:56
Last modified on : 26-01-2024 13:51:45

Description :
An issue in myGAKUYA mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48127
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/myGAKUYA.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48128

First published on : 26-01-2024 07:15:57
Last modified on : 26-01-2024 13:51:45

Description :
An issue in UNITED BOXING GYM mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48128
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/UNITED%20BOXING%20GYM.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48130

First published on : 26-01-2024 07:15:57
Last modified on : 26-01-2024 13:51:45

Description :
An issue in GINZA CAFE mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48130
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/GINZA%20CAFE.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48131

First published on : 26-01-2024 07:15:57
Last modified on : 26-01-2024 13:51:45

Description :
An issue in CHIGASAKI BAKERY mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48131
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/CHIGASAKI%20BAKERY.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48132

First published on : 26-01-2024 07:15:58
Last modified on : 26-01-2024 13:51:45

Description :
An issue in kosei entertainment esportsstudioLegends mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48132
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/esportsstudioLegends.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48133

First published on : 26-01-2024 07:15:58
Last modified on : 26-01-2024 13:51:45

Description :
An issue in angel coffee mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48133
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/angel%20coffee.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48135

First published on : 26-01-2024 07:15:58
Last modified on : 26-01-2024 13:51:45

Description :
An issue in mimasaka_farm mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48135
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/mimasaka_farm.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-48129

First published on : 26-01-2024 08:15:42
Last modified on : 26-01-2024 13:51:45

Description :
An issue in kimono-oldnew mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

CVE ID : CVE-2023-48129
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/kimono-oldnew.md | source : cve@mitre.org


Vulnerability ID : CVE-2024-22545

First published on : 26-01-2024 08:15:42
Last modified on : 26-01-2024 13:51:45

Description :
TRENDnet TEW-824DRU version 1.04b01 is vulnerable to Command Injection via the system.ntp.server in the sub_420AE0() function.

CVE ID : CVE-2024-22545
Source : cve@mitre.org
CVSS Score : /

References :
https://warp-desk-89d.notion.site/TEW-824DRU-e7228d462ce24fa1a9fecb0bee57caad | source : cve@mitre.org


Vulnerability ID : CVE-2022-48622

First published on : 26-01-2024 09:15:07
Last modified on : 26-01-2024 13:51:45

Description :
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.

CVE ID : CVE-2022-48622
Source : cve@mitre.org
CVSS Score : /

References :
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22550

First published on : 26-01-2024 15:15:09
Last modified on : 26-01-2024 16:33:07

Description :
An arbitrary file upload vulnerability in the component /alsdemo/ss/mediam.cgi of ShopSite v14.0 allows attackers to execute arbitrary code via uploading a crafted SVG file.

CVE ID : CVE-2024-22550
Source : cve@mitre.org
CVSS Score : /

References :
https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html | source : cve@mitre.org


Vulnerability ID : CVE-2024-22551

First published on : 26-01-2024 15:15:09
Last modified on : 26-01-2024 16:33:07

Description :
WhatACart v2.0.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /site/default/search.

CVE ID : CVE-2024-22551
Source : cve@mitre.org
CVSS Score : /

References :
https://packetstormsecurity.com/files/176314/WhatACart-2.0.7-Cross-Site-Scripting.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-52389

First published on : 27-01-2024 03:15:07
Last modified on : 29-01-2024 14:25:30

Description :
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.

CVE ID : CVE-2023-52389
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release | source : cve@mitre.org
https://github.com/pocoproject/poco/issues/4320 | source : cve@mitre.org
https://pocoproject.org/blog/?p=1226 | source : cve@mitre.org


Vulnerability ID : CVE-2023-48201

First published on : 27-01-2024 06:15:47
Last modified on : 29-01-2024 14:25:30

Description :
Cross Site Scripting (XSS) vulnerability in Sunlight CMS v.8.0.1, allows remote authenticated attackers to execute arbitrary code and escalate privileges via a crafted script to the Content text editor component.

CVE ID : CVE-2023-48201
Source : cve@mitre.org
CVSS Score : /

References :
https://mechaneus.github.io/CVE-2023-48201.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-48202

First published on : 27-01-2024 06:15:47
Last modified on : 29-01-2024 14:25:30

Description :
Cross-Site Scripting (XSS) vulnerability in Sunlight CMS 8.0.1 allows an authenticated low-privileged user to escalate privileges via a crafted SVG file in the File Manager component.

CVE ID : CVE-2023-48202
Source : cve@mitre.org
CVSS Score : /

References :
https://mechaneus.github.io/CVE-2023-48202.html | source : cve@mitre.org


Vulnerability ID : CVE-2024-22860

First published on : 27-01-2024 06:15:48
Last modified on : 29-01-2024 14:25:30

Description :
Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the jpegxl_anim_read_packet component in the JPEG XL Animation decoder.

CVE ID : CVE-2024-22860
Source : cve@mitre.org
CVSS Score : /

References :
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=61991 | source : cve@mitre.org
https://github.com/FFmpeg/FFmpeg/commit/d2e8974699a9e35cc1a926bf74a972300d629cd5 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22862

First published on : 27-01-2024 06:15:48
Last modified on : 29-01-2024 14:25:30

Description :
Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the JJPEG XL Parser.

CVE ID : CVE-2024-22862
Source : cve@mitre.org
CVSS Score : /

References :
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62113 | source : cve@mitre.org
https://github.com/FFmpeg/FFmpeg/commit/ca09d8a0dcd82e3128e62463231296aaf63ae6f7 | source : cve@mitre.org


Vulnerability ID : CVE-2024-22861

First published on : 27-01-2024 07:15:07
Last modified on : 29-01-2024 14:25:30

Description :
Integer overflow vulnerability in FFmpeg before n6.1, allows attackers to cause a denial of service (DoS) via the avcodec/osq module.

CVE ID : CVE-2024-22861
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/FFmpeg/FFmpeg/commit/87b8c1081959e45ffdcbabb3d53ac9882ef2b5ce | source : cve@mitre.org


Vulnerability ID : CVE-2024-23738

First published on : 28-01-2024 01:15:07
Last modified on : 29-01-2024 14:25:25

Description :
An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.

CVE ID : CVE-2024-23738
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/V3x0r/CVE-2024-23738 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23743

First published on : 28-01-2024 02:15:08
Last modified on : 29-01-2024 14:25:25

Description :
An issue in Notion for macOS version 3.1.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.

CVE ID : CVE-2024-23743
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/V3x0r/CVE-2024-23743 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23739

First published on : 28-01-2024 03:15:07
Last modified on : 29-01-2024 14:25:25

Description :
An issue in Discord for macOS version 0.0.291 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.

CVE ID : CVE-2024-23739
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/V3x0r/CVE-2024-23739 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23741

First published on : 28-01-2024 03:15:08
Last modified on : 29-01-2024 14:25:25

Description :
An issue in Hyper on macOS version 3.4.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.

CVE ID : CVE-2024-23741
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/V3x0r/CVE-2024-23741 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23742

First published on : 28-01-2024 03:15:08
Last modified on : 29-01-2024 14:25:25

Description :
An issue in Loom on macOS version 0.196.1 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.

CVE ID : CVE-2024-23742
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/V3x0r/CVE-2024-23742 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23740

First published on : 28-01-2024 04:15:07
Last modified on : 29-01-2024 14:25:25

Description :
An issue in Kap for macOS version 3.6.0 and before, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.

CVE ID : CVE-2024-23740
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/V3x0r/CVE-2024-23740 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24736

First published on : 29-01-2024 04:15:07
Last modified on : 29-01-2024 14:25:21

Description :
The POP3 service in YahooPOPs (aka YPOPs!) 1.6 allows a remote denial of service (reboot) via a long string to TCP port 110, a related issue to CVE-2004-1558.

CVE ID : CVE-2024-24736
Source : cve@mitre.org
CVSS Score : /

References :
https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-45916

First published on : 29-01-2024 09:15:42
Last modified on : 29-01-2024 09:15:42

Description :
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE ID : CVE-2023-45916
Source : cve@mitre.org
CVSS Score : /

References :


Vulnerability ID : CVE-2023-45921

First published on : 29-01-2024 09:15:42
Last modified on : 29-01-2024 09:15:42

Description :
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE ID : CVE-2023-45921
Source : cve@mitre.org
CVSS Score : /

References :


Vulnerability ID : CVE-2023-45932

First published on : 29-01-2024 09:15:42
Last modified on : 29-01-2024 09:15:42

Description :
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE ID : CVE-2023-45932
Source : cve@mitre.org
CVSS Score : /

References :


Vulnerability ID : CVE-2023-46050

First published on : 29-01-2024 09:15:42
Last modified on : 29-01-2024 09:15:42

Description :
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE ID : CVE-2023-46050
Source : cve@mitre.org
CVSS Score : /

References :


Vulnerability ID : CVE-2024-22559

First published on : 29-01-2024 14:15:09
Last modified on : 29-01-2024 14:25:21

Description :
LightCMS v2.0 is vulnerable to Cross Site Scripting (XSS) in the Content Management - Articles field.

CVE ID : CVE-2024-22559
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/eddy8/LightCMS/issues/34 | source : cve@mitre.org


Vulnerability ID : CVE-2024-23747

First published on : 29-01-2024 14:15:09
Last modified on : 29-01-2024 14:25:21

Description :
The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability. This vulnerability resides in the system's handling of user data access through a /Modernanet/LAUDO/LAU0000100/Laudo?id= URI. By manipulating this id parameter, an attacker can gain access to sensitive medical information.

CVE ID : CVE-2024-23747
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/louiselalanne/CVE-2024-23747 | source : cve@mitre.org
https://modernasistemas.com.br/sitems/ | source : cve@mitre.org


Vulnerability ID : CVE-2024-24134

First published on : 29-01-2024 19:15:08
Last modified on : 29-01-2024 19:15:08

Description :
Sourcecodester Online Food Menu 1.0 is vulnerable to Cross Site Scripting (XSS) via the 'Menu Name' and 'Description' fields in the Update Menu section.

CVE ID : CVE-2024-24134
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/2024_Online_Food_Menu_XSS/ | source : cve@mitre.org


Vulnerability ID : CVE-2024-24135

First published on : 29-01-2024 19:15:08
Last modified on : 29-01-2024 19:15:08

Description :
Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks.

CVE ID : CVE-2024-24135
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-51839

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
DeviceFarmer stf v3.6.6 suffers from Use of a Broken or Risky Cryptographic Algorithm.

CVE ID : CVE-2023-51839
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/DeviceFarmer/stf | source : cve@mitre.org
https://github.com/DeviceFarmer/stf/issues/736 | source : cve@mitre.org
https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-51839.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51840

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
DoraCMS 2.1.8 is vulnerable to Use of Hard-coded Cryptographic Key.

CVE ID : CVE-2023-51840
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/doramart/DoraCMS | source : cve@mitre.org
https://github.com/doramart/DoraCMS/issues/262 | source : cve@mitre.org
https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-51840.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51842

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
An algorithm-downgrade issue was discovered in Ylianst MeshCentral 1.1.16.

CVE ID : CVE-2023-51842
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Ylianst/MeshCentral/tree/master | source : cve@mitre.org
https://github.com/tianjk99/Cryptographic-Misuses/blob/main/Bug_MeshCentral.md | source : cve@mitre.org
https://github.com/tianjk99/Cryptographic-Misuses/blob/main/CVE-2023-51842.md | source : cve@mitre.org


Vulnerability ID : CVE-2024-22570

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
A stored cross-site scripting (XSS) vulnerability in /install.php?m=install&c=index&a=step3 of GreenCMS v2.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

CVE ID : CVE-2024-22570
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Num-Nine/CVE/issues/11 | source : cve@mitre.org


Vulnerability ID : CVE-2024-24136

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
The 'Your Name' field in the Submit Score section of Sourcecodester Math Game with Leaderboard v1.0 is vulnerable to Cross-Site Scripting (XSS) attacks.

CVE ID : CVE-2024-24136
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/2024_Math_Game_XSS | source : cve@mitre.org


Vulnerability ID : CVE-2024-24139

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
Sourcecodester Login System with Email Verification 1.0 allows SQL Injection via the 'user' parameter.

CVE ID : CVE-2024-24139
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection/ | source : cve@mitre.org


Vulnerability ID : CVE-2024-24140

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
Sourcecodester Daily Habit Tracker App 1.0 allows SQL Injection via the parameter 'tracker.'

CVE ID : CVE-2024-24140
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection | source : cve@mitre.org


Vulnerability ID : CVE-2024-24141

First published on : 29-01-2024 20:15:15
Last modified on : 29-01-2024 20:15:15

Description :
Sourcecodester School Task Manager App 1.0 allows SQL Injection via the 'task' parameter.

CVE ID : CVE-2024-24141
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1 | source : cve@mitre.org


Vulnerability ID : CVE-2023-49038

First published on : 29-01-2024 21:15:08
Last modified on : 29-01-2024 21:15:08

Description :
Command injection in the ping utility on Buffalo LS210D 1.78-0.03 allows a remote authenticated attacker to inject arbitrary commands onto the NAS as root.

CVE ID : CVE-2023-49038
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/christopher-pace/CVE-2023-49038 | source : cve@mitre.org


Source : jpcert.or.jp

Vulnerability ID : CVE-2024-23388

First published on : 26-01-2024 07:15:59
Last modified on : 26-01-2024 13:51:45

Description :
Improper authorization in handler for custom URL scheme issue in "Mercari" App for Android prior to version 5.78.0 allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App. As a result, the user may become a victim of a phishing attack.

CVE ID : CVE-2024-23388
Source : vultures@jpcert.or.jp
CVSS Score : /

References :
https://jvn.jp/en/jp/JVN70818619/ | source : vultures@jpcert.or.jp


Vulnerability ID : CVE-2024-23782

First published on : 28-01-2024 23:15:58
Last modified on : 29-01-2024 14:25:25

Description :
Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege may execute an arbitrary script on the web browser of the user who accessed the website using the product.

CVE ID : CVE-2024-23782
Source : vultures@jpcert.or.jp
CVSS Score : /

References :
https://developer.a-blogcms.jp/blog/news/JVN-34565930.html | source : vultures@jpcert.or.jp
https://jvn.jp/en/jp/JVN34565930/ | source : vultures@jpcert.or.jp


Source : openssl.org

Vulnerability ID : CVE-2024-0727

First published on : 26-01-2024 09:15:07
Last modified on : 26-01-2024 13:51:45

Description :
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.

CVE ID : CVE-2024-0727
Source : openssl-security@openssl.org
CVSS Score : /

References :
https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2 | source : openssl-security@openssl.org
https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a | source : openssl-security@openssl.org
https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c | source : openssl-security@openssl.org
https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8 | source : openssl-security@openssl.org
https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539 | source : openssl-security@openssl.org
https://www.openssl.org/news/secadv/20240125.txt | source : openssl-security@openssl.org


Source : wordfence.com

Vulnerability ID : CVE-2023-6470

First published on : 26-01-2024 21:15:08
Last modified on : 26-01-2024 21:15:08

Description :
Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER.

CVE ID : CVE-2023-6470
Source : security@wordfence.com
CVSS Score : /

References :


Source : xen.org

Vulnerability ID : CVE-2023-46838

First published on : 29-01-2024 11:15:07
Last modified on : 29-01-2024 14:25:21

Description :
Transmit requests in Xen's virtual network protocol can consist of multiple parts. While not really useful, except for the initial part any of them may be of zero length, i.e. carry no data at all. Besides a certain initial portion of the to be transferred data, these parts are directly translated into what Linux calls SKB fragments. Such converted request parts can, when for a particular SKB they are all of length zero, lead to a de-reference of NULL in core networking code.

CVE ID : CVE-2023-46838
Source : security@xen.org
CVSS Score : /

References :
https://xenbits.xenproject.org/xsa/advisory-448.html | source : security@xen.org


Source : apache.org

Vulnerability ID : CVE-2023-29055

First published on : 29-01-2024 13:15:07
Last modified on : 29-01-2024 15:15:08

Description :
In Apache Kylin version 2.0.0 to 4.0.3, there is a Server Config web interface that displays the content of file 'kylin.properties', that may contain serverside credentials. When the kylin service runs over HTTP (or other plain text protocol), it is possible for network sniffers to hijack the HTTP payload and get access to the content of kylin.properties and potentially the containing credentials. To avoid this threat, users are recommended to * Always turn on HTTPS so that network payload is encrypted. * Avoid putting credentials in kylin.properties, or at least not in plain text. * Use network firewalls to protect the serverside such that it is not accessible to external attackers. * Upgrade to version Apache Kylin 4.0.4, which filters out the sensitive content that goes to the Server Config web interface.

CVE ID : CVE-2023-29055
Source : security@apache.org
CVSS Score : /

References :
http://www.openwall.com/lists/oss-security/2024/01/29/1 | source : security@apache.org
https://lists.apache.org/thread/o1bvyv9wnfkx7dxpfjlor20nykgsoh6r | source : security@apache.org

Vulnerability : CWE-522


Source : wpscan.com

Vulnerability ID : CVE-2023-5124

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The Page Builder: Pagelayer WordPress plugin before 1.8.0 doesn't prevent attackers with administrator privileges from inserting malicious JavaScript inside a post's header or footer code, even when unfiltered_html is disallowed, such as in multi-site WordPress configurations.

CVE ID : CVE-2023-5124
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/1ef86546-3467-432c-a863-1ca3e5c65bd4/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-5943

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The Wp-Adv-Quiz WordPress plugin before 1.0.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.

CVE ID : CVE-2023-5943
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/18fbe9d5-4829-450b-988c-8ba4becd032a/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-5956

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The Wp-Adv-Quiz WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

CVE ID : CVE-2023-5956
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/b3d1fbae-88c9-45d1-92c6-0a529b21e3b2/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6165

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The Restrict Usernames Emails Characters WordPress plugin before 3.1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

CVE ID : CVE-2023-6165
Source : contact@wpscan.com
CVSS Score : /

References :
https://github.com/youki992/youki992.github.io/blob/master/others/apply2.md | source : contact@wpscan.com
https://wpscan.com/vulnerability/aba62286-9a82-4d5b-9b47-1fddde5da487/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6278

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo WordPress plugin before 2.2.25 does not sanitise and escape the biteship_error and biteship_message parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CVE ID : CVE-2023-6278
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/dfe5001f-31b9-4de2-a240-f7f5a992ac49/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6279

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The Woostify Sites Library WordPress plugin before 1.4.8 does not have authorisation in an AJAX action, allowing any authenticated users, such as subscriber to update arbitrary blog options and set them to 'activated' which could lead to DoS when using a specific option name

CVE ID : CVE-2023-6279
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/626bbc7d-0d0f-4418-ac61-666278a1cbdb/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6389

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The WordPress Toolbar WordPress plugin through 2.2.6 redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.

CVE ID : CVE-2023-6389
Source : contact@wpscan.com
CVSS Score : /

References :
https://magos-securitas.com/txt/CVE-2023-6389.txt | source : contact@wpscan.com
https://wpscan.com/vulnerability/04dafc55-3a8d-4dd2-96da-7a8b100e5a81/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6390

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:17

Description :
The WordPress Users WordPress plugin through 1.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.

CVE ID : CVE-2023-6390
Source : contact@wpscan.com
CVSS Score : /

References :
https://magos-securitas.com/txt/2023-6390.txt | source : contact@wpscan.com
https://wpscan.com/vulnerability/a0ca68d3-f885-46c9-9f6b-b77ad387d25d/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6391

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The Custom User CSS WordPress plugin through 0.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.

CVE ID : CVE-2023-6391
Source : contact@wpscan.com
CVSS Score : /

References :
https://magos-securitas.com/txt/CVE-2023-6391.txt | source : contact@wpscan.com
https://wpscan.com/vulnerability/4098b18d-6ff3-462c-af05-48adb6599cf3/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6503

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The WP Plugin Lister WordPress plugin through 2.1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.

CVE ID : CVE-2023-6503
Source : contact@wpscan.com
CVSS Score : /

References :
https://magos-securitas.com/txt/CVE-2023-6503.txt | source : contact@wpscan.com
https://wpscan.com/vulnerability/0d95de23-e8f6-4342-b19c-57cd22b2fee2/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6530

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The TJ Shortcodes WordPress plugin through 0.1.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

CVE ID : CVE-2023-6530
Source : contact@wpscan.com
CVSS Score : /

References :
https://research.cleantalk.org/cve-2023-6530-tj-shortcodes-stored-xss-poc/ | source : contact@wpscan.com
https://wpscan.com/vulnerability/8e63bf7c-7827-4c4d-b0e3-66354b218bee/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6633

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The Site Notes WordPress plugin through 2.0.0 does not have CSRF checks in some of its functionalities, which could allow attackers to make logged in users perform unwanted actions, such as deleting administration notes, via CSRF attacks

CVE ID : CVE-2023-6633
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/eb983d82-b894-41c5-b51f-94d4bba3ba39/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-6946

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The Autotitle for WordPress plugin through 1.0.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.

CVE ID : CVE-2023-6946
Source : contact@wpscan.com
CVSS Score : /

References :
https://magos-securitas.com/txt/CVE-2023-6946 | source : contact@wpscan.com
https://wpscan.com/vulnerability/54a00416-c7e3-44f3-8dd2-ed9e748055e6/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-7074

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The WP SOCIAL BOOKMARK MENU WordPress plugin through 1.2 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.

CVE ID : CVE-2023-7074
Source : contact@wpscan.com
CVSS Score : /

References :
https://magos-securitas.com/txt/CVE-2023-7074.txt | source : contact@wpscan.com
https://wpscan.com/vulnerability/7906c349-97b0-4d82-aef0-97a1175ae88e/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-7089

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The Easy SVG Allow WordPress plugin through 1.0 does not sanitize uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.

CVE ID : CVE-2023-7089
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/3b8ba734-7764-4ab6-a7e2-8de55bd46bed/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-7199

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The Relevanssi WordPress plugin before 4.22.0, Relevanssi Premium WordPress plugin before 2.25.0 allows any unauthenticated user to read draft and private posts via a crafted request

CVE ID : CVE-2023-7199
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/0c96a128-4473-41f5-82ce-94bba33ca4a3/ | source : contact@wpscan.com
https://www.relevanssi.com/release-notes/premium-2-25-free-4-22-release-notes/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-7200

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The EventON WordPress plugin before 4.4.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CVE ID : CVE-2023-7200
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/586cf0a5-515c-43ea-8c03-f2f47ed13c2c/ | source : contact@wpscan.com


Vulnerability ID : CVE-2023-7204

First published on : 29-01-2024 15:15:09
Last modified on : 29-01-2024 16:19:11

Description :
The WP STAGING WordPress Backup plugin before 3.2.0 allows access to cache files during the cloning process which provides

CVE ID : CVE-2023-7204
Source : contact@wpscan.com
CVSS Score : /

References :
https://wpscan.com/vulnerability/65a8cf83-d6cc-4d4c-a482-288a83a69879/ | source : contact@wpscan.com


Source : trendmicro.com

Vulnerability ID : CVE-2024-23940

First published on : 29-01-2024 19:15:08
Last modified on : 29-01-2024 19:15:08

Description :
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system.

CVE ID : CVE-2024-23940
Source : security@trendmicro.com
CVSS Score : /

References :
https://helpcenter.trendmicro.com/en-us/article/tmka-12134 | source : security@trendmicro.com
https://helpcenter.trendmicro.com/ja-jp/article/tmka-12132 | source : security@trendmicro.com
https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1 | source : security@trendmicro.com


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.