Latest vulnerabilities [Sunday, December 31, 2023]

Latest vulnerabilities [Sunday, December 31, 2023]
{{titre}}

Last update performed on 12/31/2023 at 11:57:07 PM

(6) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : patchstack.com

Vulnerability ID : CVE-2023-52181

First published on : 31-12-2023 10:15:08
Last modified on : 31-12-2023 10:15:08

Description :
Deserialization of Untrusted Data vulnerability in Presslabs Theme per user.This issue affects Theme per user: from n/a through 1.0.1.

CVE ID : CVE-2023-52181
Source : audit@patchstack.com
CVSS Score : 10.0

References :
https://patchstack.com/database/vulnerability/theme-per-user/wordpress-theme-per-user-plugin-1-0-1-unauthenticated-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-52182

First published on : 31-12-2023 10:15:08
Last modified on : 31-12-2023 10:15:08

Description :
Deserialization of Untrusted Data vulnerability in ARI Soft ARI Stream Quiz โ€“ WordPress Quizzes Builder.This issue affects ARI Stream Quiz โ€“ WordPress Quizzes Builder: from n/a through 1.3.0.

CVE ID : CVE-2023-52182
Source : audit@patchstack.com
CVSS Score : 9.9

References :
https://patchstack.com/database/vulnerability/ari-stream-quiz/wordpress-ari-stream-quiz-plugin-1-3-0-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-51423

First published on : 31-12-2023 18:15:50
Last modified on : 31-12-2023 18:15:50

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder Team Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition.This issue affects Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition: from n/a through 3.05.0.

CVE ID : CVE-2023-51423
Source : audit@patchstack.com
CVSS Score : 9.3

References :
https://patchstack.com/database/vulnerability/webinar-ignition/wordpress-webinarignition-plugin-3-05-0-unauthenticated-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-51469

First published on : 31-12-2023 18:15:51
Last modified on : 31-12-2023 18:15:51

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mestres do WP Checkout Mestres WP.This issue affects Checkout Mestres WP: from n/a through 7.1.9.6.

CVE ID : CVE-2023-51469
Source : audit@patchstack.com
CVSS Score : 9.3

References :
https://patchstack.com/database/vulnerability/checkout-mestres-wp/wordpress-checkout-mestres-wp-plugin-7-1-9-6-unauthenticated-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-49777

First published on : 31-12-2023 11:15:08
Last modified on : 31-12-2023 11:15:08

Description :
Deserialization of Untrusted Data vulnerability in YITH YITH WooCommerce Product Add-Ons.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.3.0.

CVE ID : CVE-2023-49777
Source : audit@patchstack.com
CVSS Score : 9.1

References :
https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-extra-options-plugin-4-3-0-php-object-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-502


Vulnerability ID : CVE-2023-39157

First published on : 31-12-2023 10:15:07
Last modified on : 31-12-2023 10:15:07

Description :
Improper Control of Generation of Code ('Code Injection') vulnerability in Crocoblock JetElements For Elementor.This issue affects JetElements For Elementor: from n/a through 2.6.10.

CVE ID : CVE-2023-39157
Source : audit@patchstack.com
CVSS Score : 9.0

References :
https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-10-authenticated-remote-code-execution-rce-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-94


(6) HIGH VULNERABILITIES [7.0, 8.9]

Source : patchstack.com

Vulnerability ID : CVE-2023-52133

First published on : 31-12-2023 18:15:52
Last modified on : 31-12-2023 18:15:52

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WhileTrue Most And Least Read Posts Widget.This issue affects Most And Least Read Posts Widget: from n/a through 2.5.16.

CVE ID : CVE-2023-52133
Source : audit@patchstack.com
CVSS Score : 8.5

References :
https://patchstack.com/database/vulnerability/most-and-least-read-posts-widget/wordpress-most-and-least-read-posts-widget-plugin-2-5-16-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-52180

First published on : 31-12-2023 11:15:09
Last modified on : 31-12-2023 11:15:09

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.1.0.

CVE ID : CVE-2023-52180
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/zip-recipes/wordpress-recipe-maker-for-your-food-blog-from-zip-recipes-plugin-8-1-0-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-52134

First published on : 31-12-2023 17:15:08
Last modified on : 31-12-2023 17:15:08

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eyal Fitoussi GEO my WordPress.This issue affects GEO my WordPress: from n/a through 4.0.2.

CVE ID : CVE-2023-52134
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/geo-my-wp/wordpress-geo-my-wordpress-plugin-4-0-2-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-51547

First published on : 31-12-2023 18:15:51
Last modified on : 31-12-2023 18:15:51

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPManageNinja LLC Fluent Support โ€“ WordPress Helpdesk and Customer Support Ticket Plugin.This issue affects Fluent Support โ€“ WordPress Helpdesk and Customer Support Ticket Plugin: from n/a through 1.7.6.

CVE ID : CVE-2023-51547
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/fluent-support/wordpress-fluent-support-plugin-1-7-6-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-52131

First published on : 31-12-2023 18:15:51
Last modified on : 31-12-2023 18:15:51

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Zinc Page Generator.This issue affects Page Generator: from n/a through 1.7.1.

CVE ID : CVE-2023-52131
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/page-generator/wordpress-page-generator-plugin-1-7-1-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-52132

First published on : 31-12-2023 18:15:51
Last modified on : 31-12-2023 18:15:51

Description :
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jewel Theme WP Adminify.This issue affects WP Adminify: from n/a through 3.1.6.

CVE ID : CVE-2023-52132
Source : audit@patchstack.com
CVSS Score : 7.6

References :
https://patchstack.com/database/vulnerability/adminify/wordpress-wp-adminify-plugin-3-1-6-sql-injection-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-89


(15) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : vuldb.com

Vulnerability ID : CVE-2023-7130

First published on : 31-12-2023 09:15:07
Last modified on : 31-12-2023 09:15:07

Description :
A vulnerability has been found in code-projects College Notes Gallery 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument user leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249133 was assigned to this vulnerability.

CVE ID : CVE-2023-7130
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/h4md153v63n/CVEs/blob/main/College_Notes_Gallery/College_Notes_Gallery-SQL_Injection.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249133 | source : cna@vuldb.com
https://vuldb.com/?id.249133 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7183

First published on : 31-12-2023 11:15:09
Last modified on : 31-12-2023 11:15:09

Description :
A vulnerability has been found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this vulnerability is an unknown functionality of the file shop/alipay_notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249385 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7183
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/NjPfD9xxhVRr | source : cna@vuldb.com
https://vuldb.com/?ctiid.249385 | source : cna@vuldb.com
https://vuldb.com/?id.249385 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7184

First published on : 31-12-2023 11:15:09
Last modified on : 31-12-2023 11:15:09

Description :
A vulnerability was found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this issue is some unknown functionality of the file shop/notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249386 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7184
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/Jo8N3eSeLx9c | source : cna@vuldb.com
https://vuldb.com/?ctiid.249386 | source : cna@vuldb.com
https://vuldb.com/?id.249386 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7185

First published on : 31-12-2023 12:15:32
Last modified on : 31-12-2023 12:15:32

Description :
A vulnerability was found in 7-card Fakabao up to 1.0_build20230805. It has been classified as critical. This affects an unknown part of the file shop/wxpay_notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249387. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7185
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/mqHZlle8Pcg8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.249387 | source : cna@vuldb.com
https://vuldb.com/?id.249387 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7186

First published on : 31-12-2023 13:15:07
Last modified on : 31-12-2023 13:15:07

Description :
A vulnerability was found in 7-card Fakabao up to 1.0_build20230805. It has been declared as critical. This vulnerability affects unknown code of the file member/notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7186
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/xHPvSBwWtR4z | source : cna@vuldb.com
https://vuldb.com/?ctiid.249388 | source : cna@vuldb.com
https://vuldb.com/?id.249388 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7187

First published on : 31-12-2023 14:15:42
Last modified on : 31-12-2023 14:15:42

Description :
A vulnerability was found in Totolink N350RT 9.3.5u.6139_B20201216. It has been rated as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi?action=login&flag=ie8 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. The identifier VDB-249389 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7187
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N350RT/1/README.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.249389 | source : cna@vuldb.com
https://vuldb.com/?id.249389 | source : cna@vuldb.com

Vulnerability : CWE-121


Vulnerability ID : CVE-2023-7189

First published on : 31-12-2023 15:15:08
Last modified on : 31-12-2023 15:15:08

Description :
A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7189
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/9yaojoQvesLu | source : cna@vuldb.com
https://vuldb.com/?ctiid.249391 | source : cna@vuldb.com
https://vuldb.com/?id.249391 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7190

First published on : 31-12-2023 16:15:44
Last modified on : 31-12-2023 16:15:44

Description :
A vulnerability, which was classified as critical, has been found in S-CMS up to 2.0_build20220529-20231006. Affected by this issue is some unknown functionality of the file /member/ad.php?action=ad. The manipulation of the argument A_text/A_url/A_contact leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249392. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7190
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/0ZY7hEQAskqM | source : cna@vuldb.com
https://vuldb.com/?ctiid.249392 | source : cna@vuldb.com
https://vuldb.com/?id.249392 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7191

First published on : 31-12-2023 16:15:44
Last modified on : 31-12-2023 16:15:44

Description :
A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7191
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://note.zhaoj.in/share/Fmytf7wBINbP | source : cna@vuldb.com
https://vuldb.com/?ctiid.249393 | source : cna@vuldb.com
https://vuldb.com/?id.249393 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7188

First published on : 31-12-2023 15:15:08
Last modified on : 31-12-2023 15:15:08

Description :
A vulnerability classified as critical has been found in Shipping 100 Fahuo100 up to 1.1. Affected is an unknown function of the file member/login.php. The manipulation of the argument M_pwd leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-249390 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7188
Source : cna@vuldb.com
CVSS Score : 5.0

References :
https://note.zhaoj.in/share/az24SaQJn1UQ | source : cna@vuldb.com
https://vuldb.com/?ctiid.249390 | source : cna@vuldb.com
https://vuldb.com/?id.249390 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-7193

First published on : 31-12-2023 17:15:08
Last modified on : 31-12-2023 17:15:08

Description :
A vulnerability was found in MTab Bookmark up to 1.2.6 and classified as critical. This issue affects some unknown processing of the file public/install.php of the component Installation. The manipulation leads to improper access controls. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249395. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-7193
Source : cna@vuldb.com
CVSS Score : 4.6

References :
https://note.zhaoj.in/share/StNQi1dYnB5w | source : cna@vuldb.com
https://vuldb.com/?ctiid.249395 | source : cna@vuldb.com
https://vuldb.com/?id.249395 | source : cna@vuldb.com

Vulnerability : CWE-284


Source : patchstack.com

Vulnerability ID : CVE-2023-51503

First published on : 31-12-2023 18:15:51
Last modified on : 31-12-2023 18:15:51

Description :
Authorization Bypass Through User-Controlled Key vulnerability in Automattic WooPayments โ€“ Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments โ€“ Fully Integrated Solution Built and Supported by Woo: from n/a through 6.9.2.

CVE ID : CVE-2023-51503
Source : audit@patchstack.com
CVSS Score : 5.9

References :
https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woopayments-plugin-6-6-2-unauthenticated-insecure-direct-object-references-idor-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-639


Vulnerability ID : CVE-2023-52185

First published on : 31-12-2023 17:15:08
Last modified on : 31-12-2023 17:15:08

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Everestthemes Everest Backup โ€“ WordPress Cloud Backup, Migration, Restore & Cloning Plugin.This issue affects Everest Backup โ€“ WordPress Cloud Backup, Migration, Restore & Cloning Plugin: from n/a through 2.1.9.

CVE ID : CVE-2023-52185
Source : audit@patchstack.com
CVSS Score : 5.3

References :
https://patchstack.com/database/vulnerability/everest-backup/wordpress-everest-backup-plugin-2-1-9-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-200


Source : moxa.com

Vulnerability ID : CVE-2023-6093

First published on : 31-12-2023 10:15:08
Last modified on : 31-12-2023 10:15:08

Description :
A vulnerability has been identified in OnCell G3150A-LTE Series firmware versions v1.3 and prior. The vulnerability result from incorrectly restricts frame objects, which lead to user confusion about which interface the user is interacting with. This vulnerability may lead attacker to trick user into interacting with the application.

CVE ID : CVE-2023-6093
Source : psirt@moxa.com
CVSS Score : 5.3

References :
https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3150a-lte-series-multiple-web-application-vulnerabilities-and-security-enhancement | source : psirt@moxa.com

Vulnerability : CWE-1021


Vulnerability ID : CVE-2023-6094

First published on : 31-12-2023 10:15:08
Last modified on : 31-12-2023 10:15:08

Description :
A vulnerability has been identified in OnCell G3150A-LTE Series firmware versions v1.3 and prior. The vulnerability results from a lack of protection for sensitive information during transmission. An attacker eavesdropping on the traffic between the web browser and server may obtain sensitive information. This type of attack could be executed to gather sensitive information or to facilitate a subsequent attack against the target.

CVE ID : CVE-2023-6094
Source : psirt@moxa.com
CVSS Score : 5.3

References :
https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3150a-lte-series-multiple-web-application-vulnerabilities-and-security-enhancement | source : psirt@moxa.com

Vulnerability : CWE-319


(0) LOW VULNERABILITIES [0.1, 3.9]

(9) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-52266

First published on : 31-12-2023 00:15:44
Last modified on : 31-12-2023 00:15:44

Description :
ehttp 1.0.6 before 17405b9 has an epoll_socket.cpp read_func use-after-free. An attacker can make many connections over a short time to trigger this.

CVE ID : CVE-2023-52266
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 | source : cve@mitre.org
https://github.com/hongliuliao/ehttp/issues/38 | source : cve@mitre.org


Vulnerability ID : CVE-2023-52267

First published on : 31-12-2023 00:15:44
Last modified on : 31-12-2023 00:15:44

Description :
ehttp 1.0.6 before 17405b9 has a simple_log.cpp _log out-of-bounds-read during error logging for long strings.

CVE ID : CVE-2023-52267
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766 | source : cve@mitre.org
https://github.com/hongliuliao/ehttp/issues/38 | source : cve@mitre.org


Vulnerability ID : CVE-2023-52269

First published on : 31-12-2023 01:15:07
Last modified on : 31-12-2023 01:15:07

Description :
MDaemon SecurityGateway through 9.0.3 allows XSS via a crafted Message Content Filtering rule. This might allow domain administrators to conduct attacks against global administrators.

CVE ID : CVE-2023-52269
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/vipercalling/XSSsecurityGateway/blob/main/finding | source : cve@mitre.org
https://mdaemon.com/pages/security-gateway | source : cve@mitre.org


Vulnerability ID : CVE-2023-52275

First published on : 31-12-2023 03:15:46
Last modified on : 31-12-2023 03:15:46

Description :
Gallery3d on Tecno Camon X CA7 devices allows attackers to view hidden images by navigating to data/com.android.gallery3d/.privatealbum/.encryptfiles and guessing the correct image file extension.

CVE ID : CVE-2023-52275
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/tahaafarooq/gallery3d-tecno-exploit/ | source : cve@mitre.org
https://hackmd.io/%40tahaafarooq/bypassing-gallery3d-in-tecno-camon-x | source : cve@mitre.org


Vulnerability ID : CVE-2023-52277

First published on : 31-12-2023 03:15:46
Last modified on : 31-12-2023 03:15:46

Description :
Royal RoyalTSX before 6.0.2.1 allows attackers to cause a denial of service (Heap Memory Corruption and application crash) or possibly have unspecified other impact via a long hostname in an RTSZ file, if the victim clicks on Test Connection. This occurs during SecureGatewayHost object processing in RAPortCheck.createNWConnection.

CVE ID : CVE-2023-52277
Source : cve@mitre.org
CVSS Score : /

References :
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php | source : cve@mitre.org


Vulnerability ID : CVE-2021-46900

First published on : 31-12-2023 05:15:08
Last modified on : 31-12-2023 05:15:08

Description :
Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.

CVE ID : CVE-2021-46900
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/sympa-community/sympa-community.github.io/blob/master/security/2021-001.md | source : cve@mitre.org
https://github.com/sympa-community/sympa/issues/1091 | source : cve@mitre.org
https://www.sympa.community/security/2021-001.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-52284

First published on : 31-12-2023 06:15:08
Last modified on : 31-12-2023 06:15:08

Description :
Bytecode Alliance wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) before 1.3.0 can have an "double free or corruption" error for a valid WebAssembly module because push_pop_frame_ref_offset is mishandled.

CVE ID : CVE-2023-52284
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/bytecodealliance/wasm-micro-runtime/compare/WAMR-1.2.3...WAMR-1.3.0 | source : cve@mitre.org
https://github.com/bytecodealliance/wasm-micro-runtime/issues/2586 | source : cve@mitre.org
https://github.com/bytecodealliance/wasm-micro-runtime/pull/2590 | source : cve@mitre.org


Vulnerability ID : CVE-2021-46901

First published on : 31-12-2023 07:15:07
Last modified on : 31-12-2023 07:15:07

Description :
examples/6lbr/apps/6lbr-webserver/httpd.c in CETIC-6LBR (aka 6lbr) 1.5.0 has a strcat stack-based buffer overflow via a request for a long URL over a 6LoWPAN network.

CVE ID : CVE-2021-46901
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/cetic/6lbr/blob/c3092a1ccc6b6b0e668f33f6f4b2d6967975d664/examples/6lbr/apps/6lbr-webserver/httpd.c#L119 | source : cve@mitre.org
https://github.com/cetic/6lbr/issues/414 | source : cve@mitre.org


Vulnerability ID : CVE-2023-52286

First published on : 31-12-2023 07:15:07
Last modified on : 31-12-2023 07:15:07

Description :
Tencent tdsqlpcloud through 1.8.5 allows unauthenticated remote attackers to discover database credentials via an index.php/api/install/get_db_info request, a related issue to CVE-2023-42387.

CVE ID : CVE-2023-52286
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/Narrator21/tdsql/blob/main/20230927.md | source : cve@mitre.org


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! Youโ€™ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.