Latest vulnerabilities [Saturday, January 13, 2024]

Latest vulnerabilities [Saturday, January 13, 2024]
{{titre}}

Last update performed on 01/13/2024 at 11:57:06 PM

(0) CRITICAL VULNERABILITIES [9.0, 10.0]

(4) HIGH VULNERABILITIES [7.0, 8.9]

Source : vuldb.com

Vulnerability ID : CVE-2024-0479

First published on : 13-01-2024 07:15:08
Last modified on : 13-01-2024 07:15:08

Description :
A vulnerability was found in Taokeyun up to 1.0.5. It has been classified as critical. Affected is the function login of the file application/index/controller/m/User.php of the component HTTP POST Request Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250584.

CVE ID : CVE-2024-0479
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://note.zhaoj.in/share/Np0ZdyKEnVOV | source : cna@vuldb.com
https://vuldb.com/?ctiid.250584 | source : cna@vuldb.com
https://vuldb.com/?id.250584 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0480

First published on : 13-01-2024 08:15:07
Last modified on : 13-01-2024 08:15:07

Description :
A vulnerability was found in Taokeyun up to 1.0.5. It has been declared as critical. Affected by this vulnerability is the function index of the file application/index/controller/m/Drs.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250585 was assigned to this vulnerability.

CVE ID : CVE-2024-0480
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://note.zhaoj.in/share/0KtyJccrP3Ba | source : cna@vuldb.com
https://vuldb.com/?ctiid.250585 | source : cna@vuldb.com
https://vuldb.com/?id.250585 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0510

First published on : 13-01-2024 22:15:45
Last modified on : 13-01-2024 22:15:45

Description :
A vulnerability, which was classified as critical, has been found in HaoKeKeJi YiQiNiu up to 3.1. Affected by this issue is the function http_post of the file /application/pay/controller/Api.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250652.

CVE ID : CVE-2024-0510
Source : cna@vuldb.com
CVSS Score : 7.3

References :
https://note.zhaoj.in/share/gBtNhBb39u9u | source : cna@vuldb.com
https://vuldb.com/?ctiid.250652 | source : cna@vuldb.com
https://vuldb.com/?id.250652 | source : cna@vuldb.com

Vulnerability : CWE-918


Source : patchstack.com

Vulnerability ID : CVE-2024-22142

First published on : 13-01-2024 00:15:44
Last modified on : 13-01-2024 00:15:44

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs Profile Builder Pro allows Reflected XSS.This issue affects Profile Builder Pro: from n/a through 3.10.0.

CVE ID : CVE-2024-22142
Source : audit@patchstack.com
CVSS Score : 7.1

References :
https://patchstack.com/database/vulnerability/profile-builder-pro/wordpress-profile-builder-pro-plugin-3-10-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


(27) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : patchstack.com

Vulnerability ID : CVE-2024-22137

First published on : 13-01-2024 00:15:44
Last modified on : 13-01-2024 00:15:44

Description :
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch Constant Contact Forms by MailMunch allows Stored XSS.This issue affects Constant Contact Forms by MailMunch: from n/a through 2.0.11.

CVE ID : CVE-2024-22137
Source : audit@patchstack.com
CVSS Score : 6.5

References :
https://patchstack.com/database/vulnerability/constant-contact-forms-by-mailmunch/wordpress-constant-contact-forms-by-mailmunch-plugin-2-0-11-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Source : github.com

Vulnerability ID : CVE-2024-22209

First published on : 13-01-2024 08:15:07
Last modified on : 13-01-2024 08:15:07

Description :
Open edX Platform is a service-oriented platform for authoring and delivering online learning. A user with a JWT and more limited scopes could call endpoints exceeding their access. This vulnerability has been patched in commit 019888f.

CVE ID : CVE-2024-22209
Source : security-advisories@github.com
CVSS Score : 6.4

References :
https://github.com/openedx/edx-platform/blob/0b3e4d73b6fb6f41ae87cf2b77bca12052ee1ac8/lms/djangoapps/courseware/block_render.py#L752-L775 | source : security-advisories@github.com
https://github.com/openedx/edx-platform/commit/019888f3d15beaebcb7782934f6c43b0c2b3735e | source : security-advisories@github.com
https://github.com/openedx/edx-platform/security/advisories/GHSA-qx8m-mqx3-j9fm | source : security-advisories@github.com

Vulnerability : CWE-284


Vulnerability ID : CVE-2024-21640

First published on : 13-01-2024 08:15:07
Last modified on : 13-01-2024 08:15:07

Description :
Chromium Embedded Framework (CEF) is a simple framework for embedding Chromium-based browsers in other applications.`CefVideoConsumerOSR::OnFrameCaptured` does not check `pixel_format` properly, which leads to out-of-bounds read out of the sandbox. This vulnerability was patched in commit 1f55d2e.

CVE ID : CVE-2024-21640
Source : security-advisories@github.com
CVSS Score : 5.4

References :
https://github.com/chromiumembedded/cef/commit/1f55d2e12f62cfdfbf9da6968fde2f928982670b | source : security-advisories@github.com
https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh | source : security-advisories@github.com

Vulnerability : CWE-125


Source : vuldb.com

Vulnerability ID : CVE-2024-0475

First published on : 13-01-2024 00:15:43
Last modified on : 13-01-2024 00:15:43

Description :
A vulnerability, which was classified as critical, has been found in code-projects Dormitory Management System 1.0. Affected by this issue is some unknown functionality of the file modifyuser.php. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250580.

CVE ID : CVE-2024-0475
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/7-Dormitory%20Management%20System%20has%20SQL%20injection%20vulnerabilities%20modifyuser.php.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250580 | source : cna@vuldb.com
https://vuldb.com/?id.250580 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0477

First published on : 13-01-2024 06:15:49
Last modified on : 13-01-2024 06:15:49

Description :
A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/action/update-deworm.php. The manipulation of the argument usage_deworm leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250582 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0477
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL5.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250582 | source : cna@vuldb.com
https://vuldb.com/?id.250582 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0478

First published on : 13-01-2024 07:15:07
Last modified on : 13-01-2024 07:15:07

Description :
A vulnerability was found in code-projects Fighting Cock Information System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/pages/edit_chicken.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250583.

CVE ID : CVE-2024-0478
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL8.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250583 | source : cna@vuldb.com
https://vuldb.com/?id.250583 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0481

First published on : 13-01-2024 09:15:07
Last modified on : 13-01-2024 09:15:07

Description :
A vulnerability was found in Taokeyun up to 1.0.5. It has been rated as critical. Affected by this issue is the function shopGoods of the file application/index/controller/app/store/Goods.php of the component HTTP POST Request Handler. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250586 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0481
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/TKWDqowIoLqs | source : cna@vuldb.com
https://vuldb.com/?ctiid.250586 | source : cna@vuldb.com
https://vuldb.com/?id.250586 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0482

First published on : 13-01-2024 10:15:07
Last modified on : 13-01-2024 10:15:07

Description :
A vulnerability classified as critical has been found in Taokeyun up to 1.0.5. This affects the function index of the file application/index/controller/app/Video.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250587.

CVE ID : CVE-2024-0482
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/MuWxURhTIYTP | source : cna@vuldb.com
https://vuldb.com/?ctiid.250587 | source : cna@vuldb.com
https://vuldb.com/?id.250587 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0483

First published on : 13-01-2024 10:15:08
Last modified on : 13-01-2024 10:15:08

Description :
A vulnerability classified as critical was found in Taokeyun up to 1.0.5. This vulnerability affects the function index of the file application/index/controller/app/Task.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250588.

CVE ID : CVE-2024-0483
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://note.zhaoj.in/share/dm5VSyxmQIdl | source : cna@vuldb.com
https://vuldb.com/?ctiid.250588 | source : cna@vuldb.com
https://vuldb.com/?id.250588 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0484

First published on : 13-01-2024 11:15:12
Last modified on : 13-01-2024 11:15:12

Description :
A vulnerability, which was classified as critical, has been found in code-projects Fighting Cock Information System 1.0. This issue affects some unknown processing of the file admin/action/update_mother.php. The manipulation of the argument age_mother leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250589 was assigned to this vulnerability.

CVE ID : CVE-2024-0484
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL6.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250589 | source : cna@vuldb.com
https://vuldb.com/?id.250589 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0485

First published on : 13-01-2024 11:15:12
Last modified on : 13-01-2024 11:15:12

Description :
A vulnerability, which was classified as critical, was found in code-projects Fighting Cock Information System 1.0. Affected is an unknown function of the file admin/pages/tables/add_con.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250590 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0485
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL7.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250590 | source : cna@vuldb.com
https://vuldb.com/?id.250590 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0486

First published on : 13-01-2024 12:15:41
Last modified on : 13-01-2024 12:15:41

Description :
A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/action/add_con.php. The manipulation of the argument chicken leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250591.

CVE ID : CVE-2024-0486
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL1.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250591 | source : cna@vuldb.com
https://vuldb.com/?id.250591 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0487

First published on : 13-01-2024 13:15:07
Last modified on : 13-01-2024 13:15:07

Description :
A vulnerability was found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/action/delete-vaccine.php. The manipulation of the argument ref leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250592.

CVE ID : CVE-2024-0487
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL2.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250592 | source : cna@vuldb.com
https://vuldb.com/?id.250592 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0488

First published on : 13-01-2024 13:15:08
Last modified on : 13-01-2024 13:15:08

Description :
A vulnerability was found in code-projects Fighting Cock Information System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/action/new-feed.php. The manipulation of the argument type_feed leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250593 was assigned to this vulnerability.

CVE ID : CVE-2024-0488
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL4.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250593 | source : cna@vuldb.com
https://vuldb.com/?id.250593 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0489

First published on : 13-01-2024 14:15:45
Last modified on : 13-01-2024 14:15:45

Description :
A vulnerability was found in code-projects Fighting Cock Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/action/edit_chicken.php. The manipulation of the argument ref leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250594 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0489
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/yingqian1984/FirePunch/blob/main/Fighting%20Cock%20Information%20System/FIGHTING_COCK_INFORMATION_SYSTEM_SQL3.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.250594 | source : cna@vuldb.com
https://vuldb.com/?id.250594 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0492

First published on : 13-01-2024 15:15:08
Last modified on : 13-01-2024 15:15:08

Description :
A vulnerability classified as critical was found in Kashipara Billing Software 1.0. Affected by this vulnerability is an unknown functionality of the file buyer_detail_submit.php of the component HTTP POST Request Handler. The manipulation of the argument gstn_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250597 was assigned to this vulnerability.

CVE ID : CVE-2024-0492
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability/blob/main/BILLING%20SOFTWARE%20sql.docx | source : cna@vuldb.com
https://vuldb.com/?ctiid.250597 | source : cna@vuldb.com
https://vuldb.com/?id.250597 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0493

First published on : 13-01-2024 16:15:44
Last modified on : 13-01-2024 16:15:44

Description :
A vulnerability, which was classified as critical, has been found in Kashipara Billing Software 1.0. Affected by this issue is some unknown functionality of the file submit_delivery_list.php of the component HTTP POST Request Handler. The manipulation of the argument customer_details leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250598 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0493
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability/blob/main/BILLING%20SOFTWARE%20SQL%20injection%20vulnerability(5).docx | source : cna@vuldb.com
https://vuldb.com/?ctiid.250598 | source : cna@vuldb.com
https://vuldb.com/?id.250598 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0494

First published on : 13-01-2024 16:15:44
Last modified on : 13-01-2024 16:15:44

Description :
A vulnerability, which was classified as critical, was found in Kashipara Billing Software 1.0. This affects an unknown part of the file material_bill.php of the component HTTP POST Request Handler. The manipulation of the argument itemtypeid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250599.

CVE ID : CVE-2024-0494
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability/blob/main/BILLING%20SOFTWARE%20SQL%20injection%20vulnerability(3).docx | source : cna@vuldb.com
https://vuldb.com/?ctiid.250599 | source : cna@vuldb.com
https://vuldb.com/?id.250599 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0495

First published on : 13-01-2024 17:15:07
Last modified on : 13-01-2024 17:15:07

Description :
A vulnerability has been found in Kashipara Billing Software 1.0 and classified as critical. This vulnerability affects unknown code of the file party_submit.php of the component HTTP POST Request Handler. The manipulation of the argument party_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250600.

CVE ID : CVE-2024-0495
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability/blob/main/BILLING%20SOFTWARE%20SQL%20injection%20vulnerability(2).docx | source : cna@vuldb.com
https://vuldb.com/?ctiid.250600 | source : cna@vuldb.com
https://vuldb.com/?id.250600 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0496

First published on : 13-01-2024 17:15:08
Last modified on : 13-01-2024 17:15:08

Description :
A vulnerability was found in Kashipara Billing Software 1.0 and classified as critical. This issue affects some unknown processing of the file item_list_edit.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250601 was assigned to this vulnerability.

CVE ID : CVE-2024-0496
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/BILLING-SOFTWARE-SQL-injection-vulnerability/blob/main/BILLING%20SOFTWARE%20SQL%20injection%20vulnerability(1).docx | source : cna@vuldb.com
https://vuldb.com/?ctiid.250601 | source : cna@vuldb.com
https://vuldb.com/?id.250601 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0497

First published on : 13-01-2024 18:15:43
Last modified on : 13-01-2024 18:15:43

Description :
A vulnerability was found in Campcodes Student Information System 1.0. It has been classified as critical. Affected is an unknown function of the file /classes/Users.php?f=save. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-250602 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0497
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/heishou/blob/main/SQL%20injection%20exists%20in%20student%20information%20system%20.docx | source : cna@vuldb.com
https://vuldb.com/?ctiid.250602 | source : cna@vuldb.com
https://vuldb.com/?id.250602 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0498

First published on : 13-01-2024 18:15:44
Last modified on : 13-01-2024 18:15:44

Description :
A vulnerability was found in Project Worlds Lawyer Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file searchLawyer.php. The manipulation of the argument experience leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250603.

CVE ID : CVE-2024-0498
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/laoquanshi/heishou/blob/main/lawyermanagementsystem.doc | source : cna@vuldb.com
https://vuldb.com/?ctiid.250603 | source : cna@vuldb.com
https://vuldb.com/?id.250603 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2024-0505

First published on : 13-01-2024 22:15:44
Last modified on : 13-01-2024 22:15:44

Description :
A vulnerability was found in ZhongFuCheng3y Austin 1.0 and classified as critical. This issue affects the function getFile of the file com/java3y/austin/web/controller/MaterialController.java of the component Upload Material Menu. The manipulation leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250619.

CVE ID : CVE-2024-0505
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/biantaibao/Austin-CMS-report/blob/main/File%20Upload%20Vulnerabilities.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.250619 | source : cna@vuldb.com
https://vuldb.com/?id.250619 | source : cna@vuldb.com

Vulnerability : CWE-434


Vulnerability ID : CVE-2024-0490

First published on : 13-01-2024 14:15:46
Last modified on : 13-01-2024 14:15:46

Description :
A vulnerability was found in Huaxia ERP up to 3.1. It has been rated as problematic. This issue affects some unknown processing of the file /user/getAllList. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-250595.

CVE ID : CVE-2024-0490
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://github.com/laoquanshi/puppy/blob/main/Logic%20loopholes%20in%20Huaxia%20ERP%20can%20lead%20to%20unauthorized%20access.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.250595 | source : cna@vuldb.com
https://vuldb.com/?id.250595 | source : cna@vuldb.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2024-0491

First published on : 13-01-2024 15:15:08
Last modified on : 13-01-2024 15:15:08

Description :
A vulnerability classified as problematic has been found in Huaxia ERP up to 3.1. Affected is an unknown function of the file src/main/java/com/jsh/erp/controller/UserController.java. The manipulation leads to weak password recovery. It is possible to launch the attack remotely. Upgrading to version 3.2 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-250596.

CVE ID : CVE-2024-0491
Source : cna@vuldb.com
CVSS Score : 5.3

References :
https://github.com/laoquanshi/puppy/blob/main/Logic%20loopholes%20in%20Huaxia%20ERP%20can%20lead%20to%20unauthorized%20access2.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.250596 | source : cna@vuldb.com
https://vuldb.com/?id.250596 | source : cna@vuldb.com

Vulnerability : CWE-640


Vulnerability ID : CVE-2024-0502

First published on : 13-01-2024 20:15:45
Last modified on : 13-01-2024 20:15:45

Description :
A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250610 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0502
Source : cna@vuldb.com
CVSS Score : 4.7

References :
https://drive.google.com/file/d/1DGb371-evTgstf42t3u2dOM4KBEt5mPw/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250610 | source : cna@vuldb.com
https://vuldb.com/?id.250610 | source : cna@vuldb.com

Vulnerability : CWE-89


Source : wordfence.com

Vulnerability ID : CVE-2024-0251

First published on : 13-01-2024 08:15:06
Last modified on : 13-01-2024 08:15:06

Description :
The Advanced Woo Search plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search parameter in all versions up to, and including, 2.96 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This only affects sites when the Dynamic Content for Elementor plugin is also installed.

CVE ID : CVE-2024-0251
Source : security@wordfence.com
CVSS Score : 6.1

References :
https://plugins.trac.wordpress.org/browser/advanced-woo-search/tags/2.94/includes/class-aws-integrations.php#L2170 | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/advanced-woo-search/tags/2.94/includes/class-aws-integrations.php#L287 | source : security@wordfence.com
https://plugins.trac.wordpress.org/browser/advanced-woo-search/tags/2.97/includes/class-aws-integrations.php#L2104 | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/91358e40-e64f-4e8e-b5a3-7d2133db5fe9?source=cve | source : security@wordfence.com


(6) LOW VULNERABILITIES [0.1, 3.9]

Source : vuldb.com

Vulnerability ID : CVE-2024-0503

First published on : 13-01-2024 21:15:07
Last modified on : 13-01-2024 21:15:07

Description :
A vulnerability was found in code-projects Online FIR System 1.0. It has been classified as problematic. This affects an unknown part of the file registercomplaint.php. The manipulation of the argument Name/Address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250611.

CVE ID : CVE-2024-0503
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://drive.google.com/file/d/1n9Zas-iSOfKVMN3UzPyVGgQgCmig2A5I/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250611 | source : cna@vuldb.com
https://vuldb.com/?id.250611 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-0504

First published on : 13-01-2024 21:15:08
Last modified on : 13-01-2024 21:15:08

Description :
A vulnerability has been found in code-projects Simple Online Hotel Reservation System 1.0 and classified as problematic. This vulnerability affects unknown code of the file add_reserve.php of the component Make a Reservation Page. The manipulation of the argument Firstname/Lastname with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250618 is the identifier assigned to this vulnerability.

CVE ID : CVE-2024-0504
Source : cna@vuldb.com
CVSS Score : 3.5

References :
https://drive.google.com/file/d/1BIa4jfZ9FbW9d7O3tRdAKF3tb6b5NUB6/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250618 | source : cna@vuldb.com
https://vuldb.com/?id.250618 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-0476

First published on : 13-01-2024 06:15:48
Last modified on : 13-01-2024 06:15:48

Description :
A vulnerability, which was classified as problematic, was found in Blood Bank & Donor Management 1.0. This affects an unknown part of the file request-received-bydonar.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250581 was assigned to this vulnerability.

CVE ID : CVE-2024-0476
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://drive.google.com/file/d/1Hvv_oKuEplp4DTcOf9xImgyPt58a8jGz/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250581 | source : cna@vuldb.com
https://vuldb.com/?id.250581 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-0499

First published on : 13-01-2024 19:15:08
Last modified on : 13-01-2024 19:15:08

Description :
A vulnerability, which was classified as problematic, has been found in SourceCodester House Rental Management System 1.0. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250607.

CVE ID : CVE-2024-0499
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://drive.google.com/file/d/1DTGd_IWdS_tMOQN0Pt1-MeZ4Yv3tXiRt/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250607 | source : cna@vuldb.com
https://vuldb.com/?id.250607 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-0500

First published on : 13-01-2024 19:15:08
Last modified on : 13-01-2024 19:15:08

Description :
A vulnerability, which was classified as problematic, was found in SourceCodester House Rental Management System 1.0. Affected is an unknown function of the component Manage Tenant Details. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250608.

CVE ID : CVE-2024-0500
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://drive.google.com/file/d/1z30nTAfoX58NqwIMXyHb3LB6Pv2bEm5v/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250608 | source : cna@vuldb.com
https://vuldb.com/?id.250608 | source : cna@vuldb.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2024-0501

First published on : 13-01-2024 20:15:45
Last modified on : 13-01-2024 20:15:45

Description :
A vulnerability has been found in SourceCodester House Rental Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Manage Invoice Details. The manipulation of the argument Invoice leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250609 was assigned to this vulnerability.

CVE ID : CVE-2024-0501
Source : cna@vuldb.com
CVSS Score : 2.4

References :
https://drive.google.com/file/d/1xEenTDcXwNYdOxY8kdQ142nRnbcHrTRv/view?usp=sharing | source : cna@vuldb.com
https://vuldb.com/?ctiid.250609 | source : cna@vuldb.com
https://vuldb.com/?id.250609 | source : cna@vuldb.com

Vulnerability : CWE-79


(17) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-50072

First published on : 13-01-2024 01:15:38
Last modified on : 13-01-2024 01:15:38

Description :
A Stored Cross-Site Scripting (XSS) vulnerability exists in OpenKM version 7.1.40 (dbb6e88) With Professional Extension that allows an authenticated user to upload a note on a file which acts as a stored XSS payload. Any user who opens the note of a document file will trigger the XSS.

CVE ID : CVE-2023-50072
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/ahrixia/CVE-2023-50072 | source : cve@mitre.org


Vulnerability ID : CVE-2023-33472

First published on : 13-01-2024 02:15:07
Last modified on : 13-01-2024 02:15:07

Description :
An issue was discovered in Scada-LTS v2.7.5.2 build 4551883606 and before, allows remote attackers with low-level authentication to escalate privileges, execute arbitrary code, and obtain sensitive information via Event Handlers function.

CVE ID : CVE-2023-33472
Source : cve@mitre.org
CVSS Score : /

References :
https://hev0x.github.io/posts/scadalts-cve-2023-33472/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-46942

First published on : 13-01-2024 02:15:07
Last modified on : 13-01-2024 02:15:07

Description :
Lack of authentication in NPM's package @evershop/evershop before version 1.0.0-rc.8, allows remote attackers to obtain sensitive information via improper authorization in GraphQL endpoints.

CVE ID : CVE-2023-46942
Source : cve@mitre.org
CVSS Score : /

References :
https://devhub.checkmarx.com/cve-details/CVE-2023-46942/ | source : cve@mitre.org
https://devhub.checkmarx.com/cve-details/Cx00cea2d5-d2c5/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-46943

First published on : 13-01-2024 02:15:07
Last modified on : 13-01-2024 02:15:07

Description :
An issue was discovered in NPM's package @evershop/evershop before version 1.0.0-rc.8. The HMAC secret used for generating tokens is hardcoded as "secret". A weak HMAC secret poses a risk because attackers can use the predictable secret to create valid JSON Web Tokens (JWTs), allowing them access to important information and actions within the application.

CVE ID : CVE-2023-46943
Source : cve@mitre.org
CVSS Score : /

References :
https://devhub.checkmarx.com/cve-details/CVE-2023-46943/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-51804

First published on : 13-01-2024 02:15:07
Last modified on : 13-01-2024 02:15:07

Description :
An issue in rymcu forest v.0.02 allows a remote attacker to obtain sensitive information via manipulation of the HTTP body URL in the com.rymcu.forest.web.api.common.UploadController file.

CVE ID : CVE-2023-51804
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/rymcu/forest/issues/149 | source : cve@mitre.org


Vulnerability ID : CVE-2023-51805

First published on : 13-01-2024 02:15:07
Last modified on : 13-01-2024 02:15:07

Description :
SQL Injection vulnerability in TDuckCLoud tduck-platform v.4.0 allows a remote attacker to obtain sensitive information via the getFormKey parameter in the search function of FormDataMysqlService.java file.

CVE ID : CVE-2023-51805
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/TDuckCloud/tduck-platform/issues/22 | source : cve@mitre.org


Vulnerability ID : CVE-2023-51062

First published on : 13-01-2024 04:15:07
Last modified on : 13-01-2024 04:15:07

Description :
An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command.

CVE ID : CVE-2023-51062
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51063

First published on : 13-01-2024 04:15:07
Last modified on : 13-01-2024 04:15:07

Description :
QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based Reflected Cross Site Scripting (XSS) vulnerability within the component qnme-ajax?method=tree_level.

CVE ID : CVE-2023-51063
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51064

First published on : 13-01-2024 04:15:07
Last modified on : 13-01-2024 04:15:07

Description :
QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based reflected XSS vulnerability within the component qnme-ajax?method=tree_table.

CVE ID : CVE-2023-51064
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51064.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51065

First published on : 13-01-2024 04:15:07
Last modified on : 13-01-2024 04:15:07

Description :
Incorrect access control in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to obtain system backups and other sensitive information from the QStar Server.

CVE ID : CVE-2023-51065
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51066

First published on : 13-01-2024 04:15:07
Last modified on : 13-01-2024 04:15:07

Description :
An authenticated remote code execution vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows attackers to arbitrarily execute commands.

CVE ID : CVE-2023-51066
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51067

First published on : 13-01-2024 04:15:08
Last modified on : 13-01-2024 04:15:08

Description :
An unauthenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link.

CVE ID : CVE-2023-51067
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51067.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51068

First published on : 13-01-2024 04:15:08
Last modified on : 13-01-2024 04:15:08

Description :
An authenticated reflected cross-site scripting (XSS) vulnerability in QStar Archive Solutions Release RELEASE_3-0 Build 7 allows attackers to execute arbitrary javascript on a victim's browser via a crafted link.

CVE ID : CVE-2023-51068
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51070

First published on : 13-01-2024 04:15:08
Last modified on : 13-01-2024 04:15:08

Description :
An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily adjust sensitive SMB settings on the QStar Server.

CVE ID : CVE-2023-51070
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-51071

First published on : 13-01-2024 04:15:08
Last modified on : 13-01-2024 04:15:08

Description :
An access control issue in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to arbitrarily disable the SMB service on a victim's Qstar instance by executing a specific command in a link.

CVE ID : CVE-2023-51071
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51071.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-52288

First published on : 13-01-2024 04:15:08
Last modified on : 13-01-2024 04:15:08

Description :
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files.

CVE ID : CVE-2023-52288
Source : cve@mitre.org
CVSS Score : /

References :
https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-52289

First published on : 13-01-2024 04:15:08
Last modified on : 13-01-2024 04:15:08

Description :
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files.

CVE ID : CVE-2023-52289
Source : cve@mitre.org
CVSS Score : /

References :
https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md | source : cve@mitre.org


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.