βΌ CVE-2023-0955 βΌ
π Read
via "National Vulnerability Database".
The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27245 βΌ
π Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in File Management Project 1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field under the Edit User module.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1093 βΌ
π Read
via "National Vulnerability Database".
The OAuth Single Sign On WordPress plugin before 6.24.2 does not have CSRF checks when discarding Identify providers (IdP), which could allow attackers to make logged in admins delete all IdP via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0816 βΌ
π Read
via "National Vulnerability Database".
The Formidable Forms WordPress plugin before 6.1 uses several potentially untrusted headers to determine the IP address of the client, leading to IP Address spoofing and bypass of anti-spam protections.π Read
via "National Vulnerability Database".
βΌ CVE-2023-1400 βΌ
π Read
via "National Vulnerability Database".
The Modern Events Calendar Lite WordPress plugin through 5.16.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).π Read
via "National Vulnerability Database".
βΌ CVE-2022-48426 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possibleπ Read
via "National Vulnerability Database".
βΌ CVE-2023-1399 βΌ
π Read
via "National Vulnerability Database".
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected deviceΓ’β¬β’s default configuration and achieve remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0497 βΌ
π Read
via "National Vulnerability Database".
The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0823 βΌ
π Read
via "National Vulnerability Database".
The Cookie Notice & Compliance for GDPR / CCPA WordPress plugin before 2.4.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacksπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0502 βΌ
π Read
via "National Vulnerability Database".
The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-25828 βΌ
π Read
via "National Vulnerability Database".
Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its Γ’β¬ΕalbumsΓ’β¬οΏ½ module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)π Read
via "National Vulnerability Database".
βΌ CVE-2023-1654 βΌ
π Read
via "National Vulnerability Database".
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-48429 βΌ
π Read
via "National Vulnerability Database".
In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possibleπ Read
via "National Vulnerability Database".
βΌ CVE-2023-1069 βΌ
π Read
via "National Vulnerability Database".
The Complianz WordPress plugin before 6.4.2, Complianz Premium WordPress plugin before 6.4.2 do not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacksπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0335 βΌ
π Read
via "National Vulnerability Database".
The WP Shamsi WordPress plugin through 4.3.3 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber delete attachment.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27847 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability found in PrestaShop xipblog v.2.0.1 and before allow a remote attacker to gain privileges via the xipcategoryclass and xippostsclass components.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27241 βΌ
π Read
via "National Vulnerability Database".
SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0499 βΌ
π Read
via "National Vulnerability Database".
The QuickSwish WordPress plugin before 1.1.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-28627 βΌ
π Read
via "National Vulnerability Database".
pymedusa is an automatic video library manager for TV Shows. In versions prior 1.0.12 an attacker with access to the web interface can update the git executable path in /config/general/ > advanced settings with arbitrary OS commands. An attacker may exploit this vulnerability to take execute arbitrary OS commands as the user running the pymedusa program. Users are advised to upgrade. There are no known workarounds for this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28655 βΌ
π Read
via "National Vulnerability Database".
A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28640 βΌ
π Read
via "National Vulnerability Database".
Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.π Read
via "National Vulnerability Database".