βΌ CVE-2022-48426 βΌ
π Read
via "National Vulnerability Database".
In JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possibleπ Read
via "National Vulnerability Database".
βΌ CVE-2023-1399 βΌ
π Read
via "National Vulnerability Database".
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected deviceΓ’β¬β’s default configuration and achieve remote code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0497 βΌ
π Read
via "National Vulnerability Database".
The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0823 βΌ
π Read
via "National Vulnerability Database".
The Cookie Notice & Compliance for GDPR / CCPA WordPress plugin before 2.4.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacksπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0502 βΌ
π Read
via "National Vulnerability Database".
The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-25828 βΌ
π Read
via "National Vulnerability Database".
Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its Γ’β¬ΕalbumsΓ’β¬οΏ½ module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)π Read
via "National Vulnerability Database".
βΌ CVE-2023-1654 βΌ
π Read
via "National Vulnerability Database".
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.π Read
via "National Vulnerability Database".
βΌ CVE-2022-48429 βΌ
π Read
via "National Vulnerability Database".
In JetBrains Hub before 2022.3.15573, 2022.2.15572, 2022.1.15583 reflected XSS in dashboards was possibleπ Read
via "National Vulnerability Database".
βΌ CVE-2023-1069 βΌ
π Read
via "National Vulnerability Database".
The Complianz WordPress plugin before 6.4.2, Complianz Premium WordPress plugin before 6.4.2 do not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacksπ Read
via "National Vulnerability Database".
βΌ CVE-2023-0335 βΌ
π Read
via "National Vulnerability Database".
The WP Shamsi WordPress plugin through 4.3.3 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber delete attachment.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27847 βΌ
π Read
via "National Vulnerability Database".
SQL injection vulnerability found in PrestaShop xipblog v.2.0.1 and before allow a remote attacker to gain privileges via the xipcategoryclass and xippostsclass components.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27241 βΌ
π Read
via "National Vulnerability Database".
SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.π Read
via "National Vulnerability Database".
βΌ CVE-2023-0499 βΌ
π Read
via "National Vulnerability Database".
The QuickSwish WordPress plugin before 1.1.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attackπ Read
via "National Vulnerability Database".
βΌ CVE-2023-28627 βΌ
π Read
via "National Vulnerability Database".
pymedusa is an automatic video library manager for TV Shows. In versions prior 1.0.12 an attacker with access to the web interface can update the git executable path in /config/general/ > advanced settings with arbitrary OS commands. An attacker may exploit this vulnerability to take execute arbitrary OS commands as the user running the pymedusa program. Users are advised to upgrade. There are no known workarounds for this vulnerability.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28655 βΌ
π Read
via "National Vulnerability Database".
A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28640 βΌ
π Read
via "National Vulnerability Database".
Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25878 βΌ
π Read
via "National Vulnerability Database".
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-27927 βΌ
π Read
via "National Vulnerability Database".
An authenticated malicious user could acquire the simple mail transfer protocol (SMTP) Password in cleartext format, despite it being protected and hidden behind asterisks. The attacker could then perform further attacks using the SMTP credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28652 βΌ
π Read
via "National Vulnerability Database".
An authenticated malicious user could successfully upload a malicious image could lead to a denial-of-service condition.π Read
via "National Vulnerability Database".
βΌ CVE-2023-25908 βΌ
π Read
via "National Vulnerability Database".
Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.π Read
via "National Vulnerability Database".
βΌ CVE-2023-28597 βΌ
π Read
via "National Vulnerability Database".
Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from ZoomΓ’β¬β’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.π Read
via "National Vulnerability Database".