眈眈探求 | 详情
+
+ 401c41411354b1b74ceb3821a722ef06 |
+ CVE-2023-4497 |
+ 2023-10-04 13:15:26 |
+ Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Icon parameter. The XSS is loaded from /users.ghp. |
+ 详情 |
+
+
+
+ 641189385f33bb1b91751ea0043b6275 |
+ CVE-2023-4496 |
+ 2023-10-04 13:15:26 |
+ Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter. |
+ 详情 |
+
+
+
+ 122e8a08fbae0b948c74ba348ea9b038 |
+ CVE-2023-4495 |
+ 2023-10-04 13:15:26 |
+ Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Resume parameter. The XSS is loaded from /register.ghp. |
+ 详情 |
+
+
+
+ 1d8d4e2f26089891b78362dd762a8558 |
+ CVE-2023-4494 |
+ 2023-10-04 13:15:26 |
+ Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine. |
+ 详情 |
+
+
+
+ d3d952f6dc8655117121015f600086a5 |
+ CVE-2023-4493 |
+ 2023-10-04 13:15:25 |
+ Stored Cross-Site Scripting in Easy Address Book Web Server 1.6 version, through the users_admin.ghp file that affects multiple parameters such as (firstname, homephone, lastname, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate, workzip). This vulnerability allows a remote attacker to store a malicious JavaScript payload in the application to be executed when the page is loaded, resulting in an integrity impact. |
+ 详情 |
+
+
310d0d3e9d94763c028edd46af7d0ac8 |
CVE-2023-4997 |
@@ -2283,6 +2323,22 @@
+
+ 81b935f928b2b997b6fc9cc58f2db370 |
+ CVE-2023-44974 |
+ 2023-10-03 21:15:10 |
+ An arbitrary file upload vulnerability in the component /admin/plugin.php of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. |
+ 详情 |
+
+
+
+ fc4f7dfa657e3f5bf049777fc61cb976 |
+ CVE-2023-44973 |
+ 2023-10-03 21:15:10 |
+ An arbitrary file upload vulnerability in the component /content/templates/ of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. |
+ 详情 |
+
+
8c5369129e67d9df89ae6b2f5f63a82e |
CVE-2023-5255 |
@@ -2299,6 +2355,14 @@
+
+ d8dae8102674ea962818f8d36572be58 |
+ CVE-2023-4564 |
+ 2023-10-03 16:15:10 |
+ This vulnerability could allow an attacker to store a malicious JavaScript payload in the broadcast message parameter within the admin panel. |
+ 详情 |
+
+
0dbd62539f3b1621d56f1fd2fc9574ec |
CVE-2023-4886 |
@@ -2387,6 +2451,14 @@
+
+ a66088352c52a7edcfa7a8332841740f |
+ CVE-2023-4659 |
+ 2023-10-02 15:15:15 |
+ Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication. |
+ 详情 |
+
+
1ddd7b203d4442582fb039d4e7a6a2e0 |
CVE-2023-5106 |
@@ -2395,78 +2467,6 @@
-
- 6f5be1920d82e9d6dc530fa7ac54339d |
- CVE-2023-5329 |
- 2023-10-02 00:15:10 |
- A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability. |
- 详情 |
-
-
-
- a169821774aed9156ba6a727d2ff6d59 |
- CVE-2023-5328 |
- 2023-10-02 00:15:10 |
- A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability. |
- 详情 |
-
-
-
- 8b07a29a4c3b333bc2e2154b7f5a542d |
- CVE-2023-5327 |
- 2023-10-01 23:15:08 |
- A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028. |
- 详情 |
-
-
-
- 9d7536185eb3755e189185b4959f0aa1 |
- CVE-2023-5326 |
- 2023-10-01 23:15:08 |
- A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027. |
- 详情 |
-
-
-
- 00bc9214a7f397d1b56b0ae221964ade |
- CVE-2023-5324 |
- 2023-10-01 21:15:42 |
- A vulnerability has been found in eeroOS up to 6.16.4-11 and classified as critical. This vulnerability affects unknown code of the component Ethernet Interface. The manipulation leads to denial of service. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241024. |
- 详情 |
-
-
-
- af6e7926bf594213f7ce8ed5c4bc8b71 |
- CVE-2023-5322 |
- 2023-10-01 05:15:09 |
- ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/edit_manageadmin.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240992. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. |
- 详情 |
-
-
-
- 84c2f3c275bcde2fcafb5767d71614f2 |
- CVE-2023-5323 |
- 2023-10-01 01:15:24 |
- Cross-site Scripting (XSS) - Generic in GitHub repository dolibarr/dolibarr prior to 18.0. |
- 详情 |
-
-
-
- ac55b54e3e5df1a2f230e428061a580a |
- CVE-2023-5112 |
- 2023-09-30 23:15:40 |
- Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "specials_type_name[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser. |
- 详情 |
-
-
-
- a1d4daf3b0efd6abaa387a32952a21df |
- CVE-2023-5111 |
- 2023-09-30 23:15:40 |
- Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "featured_type_name[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser. |
- 详情 |
-
-