Update CVE sources 2024-05-28 08:49

This commit is contained in:
0xMarcio
2024-05-28 08:49:17 +00:00
parent d837a731f9
commit 4edef1e4c8
2210 changed files with 61836 additions and 560 deletions

View File

@@ -11,6 +11,7 @@ The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1
#### Reference
- http://ffmpeg.org/security.html
- https://ffmpeg.org/trac/ffmpeg/ticket/794
#### Github
No PoCs found on GitHub currently.

View File

@@ -10,6 +10,7 @@ Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x
### POC
#### Reference
- https://ffmpeg.org/security.html
- https://trac.ffmpeg.org/ticket/5992
#### Github

View File

@@ -10,7 +10,7 @@ Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0
### POC
#### Reference
No PoCs from references.
- https://ffmpeg.org/security.html
#### Github
- https://github.com/ARPSyndicate/cvemon

View File

@@ -10,6 +10,7 @@ Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3
### POC
#### Reference
- https://ffmpeg.org/security.html
- https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
#### Github

View File

@@ -10,6 +10,7 @@ Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox be
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
- https://bugzilla.mozilla.org/show_bug.cgi?id=1240880

View File

@@ -11,6 +11,7 @@ Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox be
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
#### Github

View File

@@ -11,6 +11,7 @@ Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox be
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
#### Github

View File

@@ -11,6 +11,7 @@ The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
- https://bugzilla.mozilla.org/show_bug.cgi?id=1246061

View File

@@ -10,6 +10,7 @@ Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worke
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
- https://bugzilla.mozilla.org/show_bug.cgi?id=1252330

View File

@@ -10,6 +10,7 @@ Race condition in the get implementation in the ServiceWorkerManager class in th
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
#### Github

View File

@@ -11,6 +11,7 @@ Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
#### Github

View File

@@ -10,6 +10,7 @@ Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Securi
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
- https://bugzilla.mozilla.org/show_bug.cgi?id=1223743

View File

@@ -10,6 +10,7 @@ The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
#### Github

View File

@@ -10,6 +10,7 @@ The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Fi
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2936-1
- http://www.ubuntu.com/usn/USN-2936-3
- https://bugzilla.mozilla.org/show_bug.cgi?id=870870

View File

@@ -11,6 +11,7 @@ The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg
#### Reference
- https://bugzilla.libav.org/show_bug.cgi?id=929
- https://ffmpeg.org/security.html
#### Github
No PoCs found on GitHub currently.

View File

@@ -10,6 +10,7 @@
### POC
#### Reference
- http://archive.is/eF2GR
- https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada
#### Github

View File

@@ -34,6 +34,7 @@ Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 a
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/sobinge/nuclei-templates
- https://github.com/superfish9/pt
- https://github.com/tanjiti/sec_profile
- https://github.com/tomoyamachi/gocarts
- https://github.com/userprofilesecured/Path-transversal-payloads
- https://github.com/x-f1v3/Vulnerability_Environment

17
2020/CVE-2020-19762.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2020-19762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19762)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Automated Logic Corporation (ALC) WebCTRL System 6.5 and prior allows remote attackers to execute any JavaScript code via a XSS payload for the first parameter in a GET request.
### POC
#### Reference
- https://github.com/ismailerkek/CVEs/blob/main/CVE-2020-19762-RESERVED.md
#### Github
No PoCs found on GitHub currently.

View File

@@ -13,6 +13,7 @@ loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows loc
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc
#### Github
- https://github.com/0ptyx/cve-2024-0582
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/DarkFunct/CVE_Exploits

52
2021/CVE-2021-42285.md Normal file
View File

@@ -0,0 +1,52 @@
### [CVE-2021-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42285)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2020H2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2021H2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%207%20Service%20Pack%201&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%208.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2%20Service%20Pack%201&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.10240.19119%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.4770%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.2300%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.18363.1916%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19041.1348%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19042.1348%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19043.1348%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.350%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22000.318%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%3C%206.1.7601.25769%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.1.0%3C%206.1.7601.25769%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.2.0%3C%206.2.9200.23517%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.3.0%3C%206.3.9600.20174%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen)
### Description
Windows Kernel Elevation of Privilege Vulnerability
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/T-RN-R/PatchDiffWednesday

17
2021/CVE-2021-45614.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2021-45614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45614)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58.
### POC
#### Reference
- https://kb.netgear.com/000064141/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0520
#### Github
No PoCs found on GitHub currently.

View File

@@ -55,6 +55,7 @@ No PoCs from references.
- https://github.com/Cruxer8Mech/Idk
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/T-RN-R/PatchDiffWednesday
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC

17
2023/CVE-2023-0033.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0033)
![](https://img.shields.io/static/v1?label=Product&message=PDF%20Viewer&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The PDF Viewer WordPress plugin before 1.0.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
### POC
#### Reference
- https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0034.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0034)
![](https://img.shields.io/static/v1?label=Product&message=JetWidgets%20For%20Elementor&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.0.14%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The JetWidgets For Elementor WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/ffbdb8a1-19c3-45e9-81b0-ad47a0791c4a
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0037.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0037)
![](https://img.shields.io/static/v1?label=Product&message=10Web%20Map%20Builder%20for%20Google%20Maps&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.0.73%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The 10Web Map Builder for Google Maps WordPress plugin before 1.0.73 does not properly sanitise and escape some parameters before using them in an SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
### POC
#### Reference
- https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0043.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0043)
![](https://img.shields.io/static/v1?label=Product&message=Custom%20Add%20User&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Custom Add User WordPress plugin through 2.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
### POC
#### Reference
- https://wpscan.com/vulnerability/e012f23a-7daf-4ef3-b116-d0e2ed5bd0a3
#### Github
No PoCs found on GitHub currently.

View File

@@ -18,5 +18,7 @@ The current implementation of the prctl syscall does not issue an IBPB immediate
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoforget/CVE-POC
- https://github.com/xu-xiang/awesome-security-vul-llm
- https://github.com/youwizard/CVE-POC

18
2023/CVE-2023-0058.md Normal file
View File

@@ -0,0 +1,18 @@
### [CVE-2023-0058](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0058)
![](https://img.shields.io/static/v1?label=Product&message=Tiempo.com&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when creating and editing its shortcode, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
### POC
#### Reference
- https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0059.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0059)
![](https://img.shields.io/static/v1?label=Product&message=Youzify&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.2.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Youzify WordPress plugin before 1.2.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/5e26c485-9a5a-44a3-95b3-6c063a1c321c
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0060.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0060)
![](https://img.shields.io/static/v1?label=Product&message=Responsive%20Gallery%20Grid&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.3.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Responsive Gallery Grid WordPress plugin before 2.3.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/be2fc859-3158-4f06-861d-382381a7551b
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0061.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0061)
![](https://img.shields.io/static/v1?label=Product&message=Judge.me%20Product%20Reviews%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.3.21%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Judge.me Product Reviews for WooCommerce WordPress plugin before 1.3.21 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0062.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0062](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0062)
![](https://img.shields.io/static/v1?label=Product&message=EAN%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The EAN for WooCommerce WordPress plugin before 4.4.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/450f94a3-56b1-41c7-ac29-fbda1dc04794
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0063.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0063)
![](https://img.shields.io/static/v1?label=Product&message=WordPress%20Shortcodes&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WordPress Shortcodes WordPress plugin through 1.6.36 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/2262f2fc-8122-46ed-8e67-8c34ee35fc97
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0064.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0064)
![](https://img.shields.io/static/v1?label=Product&message=eVision%20Responsive%20Column%20Layout%20Shortcodes&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0065.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0065)
![](https://img.shields.io/static/v1?label=Product&message=i2%20Pros%20%26%20Cons&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The i2 Pros & Cons WordPress plugin through 1.3.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/42c3ac68-4bbc-4d47-ad53-2c9ed48cd677
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0066.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0066)
![](https://img.shields.io/static/v1?label=Product&message=Companion%20Sitemap%20Generator&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Companion Sitemap Generator WordPress plugin through 4.5.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/545c9e2f-bacd-4f30-ae01-de1583e26d32
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0067.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0067](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0067)
![](https://img.shields.io/static/v1?label=Product&message=Timed%20Content&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.73%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Timed Content WordPress plugin before 2.73 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/92f43da9-9903-4bcf-99e8-0e269072d389
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0068.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0068)
![](https://img.shields.io/static/v1?label=Product&message=Product%20GTIN%20(EAN%2C%20UPC%2C%20ISBN)%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Product GTIN (EAN, UPC, ISBN) for WooCommerce WordPress plugin through 1.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/4abd1454-380c-4c23-8474-d7da4b2f3b8e
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0069.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0069](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0069)
![](https://img.shields.io/static/v1?label=Product&message=WPaudio%20MP3%20Player&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WPaudio MP3 Player WordPress plugin through 4.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/d9f00bcb-3746-4a9d-a222-4d532e84615f
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0070.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0070)
![](https://img.shields.io/static/v1?label=Product&message=ResponsiveVoice%20Text%20To%20Speech&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.7.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The ResponsiveVoice Text To Speech WordPress plugin before 1.7.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/0d8fbd1a-9fac-42ac-94e0-f8921deb1696
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0071.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0071)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Tabs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Tabs WordPress plugin before 2.1.17 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/3834a162-2cdc-41e9-9c9d-2b576eed4db9
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0072.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0072)
![](https://img.shields.io/static/v1?label=Product&message=WC%20Vendors%20Marketplace&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WC Vendors Marketplace WordPress plugin before 2.4.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/bb2b876f-7216-4f31-9d1f-a45405c545ce
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0073.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0073)
![](https://img.shields.io/static/v1?label=Product&message=Client%20Logo%20Carousel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Client Logo Carousel WordPress plugin through 3.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0074.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0074)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Social%20Widget&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Social Widget WordPress plugin before 2.2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/82f543e3-9397-4364-9546-af5ea134fcd4
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0075.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0075)
![](https://img.shields.io/static/v1?label=Product&message=Amazon%20JS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Amazon JS WordPress plugin through 0.10 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/097acd6f-3291-4cdc-a054-4432b6350411
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0076.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0076)
![](https://img.shields.io/static/v1?label=Product&message=Download%20Attachments&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Download Attachments WordPress plugin before 1.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/a0a44f8a-877c-40df-a3ba-b9b806ffb772/
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0078.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0078)
![](https://img.shields.io/static/v1?label=Product&message=Resume%20Builder&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Resume Builder WordPress plugin through 3.1.1 does not sanitize and escape some parameters related to Resume, which could allow users with a role as low as subscriber to perform Stored XSS attacks against higher privilege users
### POC
#### Reference
- https://wpscan.com/vulnerability/e667854f-56f8-4dbe-9573-6652a8aacc2c
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0079.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0079](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0079)
![](https://img.shields.io/static/v1?label=Product&message=Customer%20Reviews%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.17.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Customer Reviews for WooCommerce WordPress plugin before 5.17.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/fdaba4d1-950d-4512-95de-cd43fe9e73e5/
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0080.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0080)
![](https://img.shields.io/static/v1?label=Product&message=Customer%20Reviews%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%205.16.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
The Customer Reviews for WooCommerce WordPress plugin before 5.16.0 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
### POC
#### Reference
- https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0081.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0081)
![](https://img.shields.io/static/v1?label=Product&message=MonsterInsights&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The MonsterInsights WordPress plugin before 8.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/76d2963c-ebff-498f-9484-3c3008750c14
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0082.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0082)
![](https://img.shields.io/static/v1?label=Product&message=ExactMetrics&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The ExactMetrics WordPress plugin before 7.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/e1ba5047-0c39-478f-89c7-b0bb638efdff
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0094.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0094)
![](https://img.shields.io/static/v1?label=Product&message=UpQode%20Google%20Maps&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/1453471f-164d-4487-a736-8cea086212fe/
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0095.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0095)
![](https://img.shields.io/static/v1?label=Product&message=Page%20View%20Count&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Page View Count WordPress plugin before 2.6.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0096.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0096)
![](https://img.shields.io/static/v1?label=Product&message=Form%20builder%20to%20get%20in%20touch%20with%20visitors%2C%20grow%20your%20email%20list%20and%20collect%20payments%20%E2%80%94%20Happyforms&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Happyforms WordPress plugin before 1.22.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/b28150e7-214b-4bcd-85c0-e819c4223484
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0097.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0097)
![](https://img.shields.io/static/v1?label=Product&message=Post%20Grid%2C%20Post%20Carousel%2C%20%26%20List%20Category%20Posts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Post Grid, Post Carousel, & List Category Posts WordPress plugin before 2.4.19 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/19379f08-d667-4b1e-a774-0f4a17ad7bff
#### Github
No PoCs found on GitHub currently.

View File

@@ -11,6 +11,7 @@ The Simple URLs WordPress plugin before 115 does not sanitise and escape some pa
#### Reference
- http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html
- https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8
#### Github
- https://github.com/ARPSyndicate/cvemon

21
2023/CVE-2023-0118.md Normal file
View File

@@ -0,0 +1,21 @@
### [CVE-2023-0118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0118)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.11%20for%20RHEL%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.11%20for%20RHEL%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.12%20for%20RHEL%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.13%20for%20RHEL%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.14%20for%20RHEL%208&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds

18
2023/CVE-2023-0119.md Normal file
View File

@@ -0,0 +1,18 @@
### [CVE-2023-0119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0119)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.13%20for%20RHEL%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Red%20Hat%20Satellite%206.14%20for%20RHEL%208&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds

17
2023/CVE-2023-0143.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0143)
![](https://img.shields.io/static/v1?label=Product&message=Send%20PDF%20for%20Contact%20Form%207&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Send PDF for Contact Form 7 WordPress plugin before 0.9.9.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
### POC
#### Reference
- https://wpscan.com/vulnerability/c4cd3d98-9678-49cb-9d1a-551ef8a810b9
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0144.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0144](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0144)
![](https://img.shields.io/static/v1?label=Product&message=Event%20Manager%20and%20Tickets%20Selling%20Plugin%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Event Manager and Tickets Selling Plugin for WooCommerce WordPress plugin before 3.8.0 does not validate and escape some of its post meta before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/d7b3917a-d11f-4216-9d2c-30771d83a7b4
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0145.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0145)
![](https://img.shields.io/static/v1?label=Product&message=Saan%20World%20Clock&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Saan World Clock WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/f4e4b4a2-c7cb-42ce-9d5b-bd84efcbf54d
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0146.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0146](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0146)
![](https://img.shields.io/static/v1?label=Product&message=Naver%20Map&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Naver Map WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/d1218c69-4f6a-4b2d-a537-5cc16a46ba7b
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0147.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0147](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0147)
![](https://img.shields.io/static/v1?label=Product&message=Flexible%20Captcha&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Flexible Captcha WordPress plugin through 4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/af9cbb4a-42fc-43c5-88f3-349b417f1a6a
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0148.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0148)
![](https://img.shields.io/static/v1?label=Product&message=Gallery%20Factory%20Lite&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Gallery Factory Lite WordPress plugin through 2.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/f15f2f2c-2053-4b93-8064-15b5243a4021
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0149.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0149)
![](https://img.shields.io/static/v1?label=Product&message=WordPrezi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%200.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WordPrezi WordPress plugin before 0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/6b6f9e42-7f7f-4daa-99c9-14a24a6d76b0
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0150.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0150](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0150)
![](https://img.shields.io/static/v1?label=Product&message=Cloak%20Front%20End%20Email&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.9.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Cloak Front End Email WordPress plugin before 1.9.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/517154dc-d6bd-462d-b955-061a7b7f8da5
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0151.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0151](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0151)
![](https://img.shields.io/static/v1?label=Product&message=uTubeVideo%20Gallery&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The uTubeVideo Gallery WordPress plugin before 2.0.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/d9fc6f5f-efc1-4e23-899b-e9a49330ed13
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0152.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0152](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0152)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Multi%20Store%20Locator&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Multi Store Locator WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/8281fce2-6f24-4d3f-895f-4d8694806609
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0153.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0153)
![](https://img.shields.io/static/v1?label=Product&message=Vimeo%20Video%20Autoplay%20Automute&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Vimeo Video Autoplay Automute WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/f3459868-28aa-4a5d-94d8-bbc17e3ce653
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0154.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0154)
![](https://img.shields.io/static/v1?label=Product&message=GamiPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The GamiPress WordPress plugin before 1.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/5e66e173-776d-4423-b4a2-eb7316b2502f
#### Github
No PoCs found on GitHub currently.

View File

@@ -10,7 +10,7 @@ The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not limit what
### POC
#### Reference
No PoCs from references.
- https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f2360a759
#### Github
- https://github.com/b0marek/CVE-2023-0156

View File

@@ -10,7 +10,7 @@ The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not escape the
### POC
#### Reference
No PoCs from references.
- https://wpscan.com/vulnerability/8248b550-6485-4108-a701-8446ffa35f06
#### Github
- https://github.com/b0marek/CVE-2023-0157

View File

@@ -10,7 +10,7 @@ The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1
### POC
#### Reference
No PoCs from references.
- https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809
#### Github
- https://github.com/im-hanzou/EVCer

17
2023/CVE-2023-0165.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0165)
![](https://img.shields.io/static/v1?label=Product&message=Cost%20Calculator&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Cost Calculator WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/f00b82f7-d8ad-4f6b-b791-81cc16b6336b
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0166.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0166)
![](https://img.shields.io/static/v1?label=Product&message=Product%20Slider%20for%20WooCommerce%20by%20PickPlugins&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.13.42%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Product Slider for WooCommerce by PickPlugins WordPress plugin before 1.13.42 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/f5d43062-4ef3-4dd1-b916-0127f0016f5c
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0167.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0167)
![](https://img.shields.io/static/v1?label=Product&message=GetResponse%20for%20WordPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The GetResponse for WordPress plugin through 5.5.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/fafbf666-b908-48ef-9041-fea653e9bfeb
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0168.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0168)
![](https://img.shields.io/static/v1?label=Product&message=Olevmedia%20Shortcodes&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Olevmedia Shortcodes WordPress plugin through 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/e854efee-16fc-4379-9e66-d2883e01fb32
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0169.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0169)
![](https://img.shields.io/static/v1?label=Product&message=Form%20plugin%20for%20WordPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Zoho Forms WordPress plugin before 3.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/178d71f2-4666-4f7e-ada5-cb72a50fd663
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0170.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0170)
![](https://img.shields.io/static/v1?label=Product&message=Html5%20Audio%20Player&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Html5 Audio Player WordPress plugin before 2.1.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/19ee5e33-acc8-40c5-8f54-c9cb0fa491f0
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0171.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0171)
![](https://img.shields.io/static/v1?label=Product&message=jQuery%20T(-)%20Countdown%20Widget&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The jQuery T(-) Countdown Widget WordPress plugin before 2.3.24 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/32324655-ff91-4a53-a2c5-ebe6678d4a9d
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0172.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0172](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0172)
![](https://img.shields.io/static/v1?label=Product&message=Embed%2C%20curate%20%26%20aggregate%20social%20media%20feeds%20into%20your%20website%20using%20JUICER&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.11%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Juicer WordPress plugin before 1.11 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/c8982b8d-985f-4a5d-840d-e8be7c3405bd
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0173.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0173)
![](https://img.shields.io/static/v1?label=Product&message=Drag%20%26%20Drop%20Sales%20Funnel%20Builder%20for%20WordPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Drag & Drop Sales Funnel Builder for WordPress plugin before 2.6.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/c543b6e2-a7c0-4ba7-a308-e9951dd59fb9
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0174.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0174)
![](https://img.shields.io/static/v1?label=Product&message=WP%20VR&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP VR WordPress plugin before 8.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0175.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0175](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0175)
![](https://img.shields.io/static/v1?label=Product&message=Responsive%20Clients%20Logo%20Gallery%20Plugin%20for%20WordPress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Responsive Clients Logo Gallery Plugin for WordPress plugin through 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/cdcd3c2c-cb29-4b21-8d3d-7eafbc1d3098
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0176.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0176)
![](https://img.shields.io/static/v1?label=Product&message=Giveaways%20and%20Contests%20by%20RafflePress&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Giveaways and Contests by RafflePress WordPress plugin before 1.11.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/a762c25b-5c47-400e-8964-407cf4c94e9f
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0177.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0177)
![](https://img.shields.io/static/v1?label=Product&message=Social%20Like%20Box%20and%20Page%20by%20WpDevArt&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%200.8.41%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Social Like Box and Page by WpDevArt WordPress plugin before 0.8.41 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/712c2154-37f4-424c-ba3b-26ba6aa95bca
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0178.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0178)
![](https://img.shields.io/static/v1?label=Product&message=Annual%20Archive&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Annual Archive WordPress plugin before 1.6.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/cc308e15-7937-4d41-809d-74f8c13bee23
#### Github
No PoCs found on GitHub currently.

View File

@@ -34,5 +34,7 @@ A buffer overflow vulnerability was found in the Netfilter subsystem in the Linu
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tanjiti/sec_profile
- https://github.com/whoforget/CVE-POC
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC

17
2023/CVE-2023-0212.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0212)
![](https://img.shields.io/static/v1?label=Product&message=Advanced%20Recent%20Posts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Advanced Recent Posts WordPress plugin through 0.6.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/5fdd44aa-7f3f-423a-9fb0-dc9dc36f33a3
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0219.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0219)
![](https://img.shields.io/static/v1?label=Product&message=FluentSMTP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.2.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The FluentSMTP WordPress plugin before 2.2.3 does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.
### POC
#### Reference
- https://wpscan.com/vulnerability/71662b72-311c-42db-86c5-a0276d25535c
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0220.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0220](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0220)
![](https://img.shields.io/static/v1?label=Product&message=Pinpoint%20Booking%20System&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.9.9.2.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Pinpoint Booking System WordPress plugin before 2.9.9.2.9 does not validate and escape one of its shortcode attributes before using it in a SQL statement, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0224.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0224)
![](https://img.shields.io/static/v1?label=Product&message=GiveWP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.24.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The GiveWP WordPress plugin before 2.24.1 does not properly escape user input before it reaches SQL queries, which could let unauthenticated attackers perform SQL Injection attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/d8da539d-0a1b-46ef-b48d-710c59cf68e1/
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0230.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0230)
![](https://img.shields.io/static/v1?label=Product&message=VK%20All%20in%20One%20Expansion%20Unit&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%209.86.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The VK All in One Expansion Unit WordPress plugin before 9.86.0.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/a4ad73b2-6a70-48ff-bf4c-28f81b193748
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0231.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0231)
![](https://img.shields.io/static/v1?label=Product&message=ShopLentor&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.5.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The ShopLentor WordPress plugin before 2.5.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/533c19d5-219c-4389-a8bf-8b3a35b33b20
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0233.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0233)
![](https://img.shields.io/static/v1?label=Product&message=ActiveCampaign&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%208.1.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The ActiveCampaign WordPress plugin before 8.1.12 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0234.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0234)
![](https://img.shields.io/static/v1?label=Product&message=SiteGround%20Security&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The SiteGround Security WordPress plugin before 1.3.1 does not properly sanitize user input before using it in an SQL query, leading to an authenticated SQL injection issue.
### POC
#### Reference
- https://wpscan.com/vulnerability/acf3e369-1290-4b3f-83bf-2209b9dd06e1
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0252.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0252)
![](https://img.shields.io/static/v1?label=Product&message=Contextual%20Related%20Posts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Contextual Related Posts WordPress plugin before 3.3.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/5754a4fd-1adf-47aa-976f-3b28750058c2
#### Github
No PoCs found on GitHub currently.

View File

@@ -10,7 +10,7 @@ The Enable Media Replace WordPress plugin before 4.0.2 does not prevent authors
### POC
#### Reference
No PoCs from references.
- https://wpscan.com/vulnerability/b0239208-1e23-4774-9b8c-9611704a07a0
#### Github
- https://github.com/codeb0ss/CVE-2023-0255-PoC

17
2023/CVE-2023-0259.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0259)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Google%20Review%20Slider&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2011.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The WP Google Review Slider WordPress plugin before 11.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
### POC
#### Reference
- https://wpscan.com/vulnerability/d3bb0eac-1f4e-4191-8f3b-104a5bb54558
#### Github
No PoCs found on GitHub currently.

17
2023/CVE-2023-0260.md Normal file
View File

@@ -0,0 +1,17 @@
### [CVE-2023-0260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0260)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Review%20Slider&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2012.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The WP Review Slider WordPress plugin before 12.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
### POC
#### Reference
- https://wpscan.com/vulnerability/9165d46b-2a27-4e83-a096-73ffe9057c80
#### Github
No PoCs found on GitHub currently.

Some files were not shown because too many files have changed in this diff Show More