Update CVE sources 2024-05-28 08:49
This commit is contained in:
@@ -11,6 +11,7 @@ The adpcm_decode_frame function in adpcm.c in libavcodec in FFmpeg before 0.9.1
|
||||
|
||||
#### Reference
|
||||
- http://ffmpeg.org/security.html
|
||||
- https://ffmpeg.org/trac/ffmpeg/ticket/794
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -10,6 +10,7 @@ Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://ffmpeg.org/security.html
|
||||
- https://trac.ffmpeg.org/ticket/5992
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -10,7 +10,7 @@ Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://ffmpeg.org/security.html
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
|
||||
@@ -10,6 +10,7 @@ Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://ffmpeg.org/security.html
|
||||
- https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -10,6 +10,7 @@ Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox be
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1240880
|
||||
|
||||
|
||||
@@ -11,6 +11,7 @@ Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox be
|
||||
|
||||
#### Reference
|
||||
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -11,6 +11,7 @@ Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox be
|
||||
|
||||
#### Reference
|
||||
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -11,6 +11,7 @@ The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0
|
||||
|
||||
#### Reference
|
||||
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1246061
|
||||
|
||||
|
||||
@@ -10,6 +10,7 @@ Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worke
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1252330
|
||||
|
||||
|
||||
@@ -10,6 +10,7 @@ Race condition in the get implementation in the ServiceWorkerManager class in th
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -11,6 +11,7 @@ Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo
|
||||
|
||||
#### Reference
|
||||
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -10,6 +10,7 @@ Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Securi
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=1223743
|
||||
|
||||
|
||||
@@ -10,6 +10,7 @@ The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -10,6 +10,7 @@ The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Fi
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/USN-2936-1
|
||||
- http://www.ubuntu.com/usn/USN-2936-3
|
||||
- https://bugzilla.mozilla.org/show_bug.cgi?id=870870
|
||||
|
||||
|
||||
@@ -11,6 +11,7 @@ The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg
|
||||
|
||||
#### Reference
|
||||
- https://bugzilla.libav.org/show_bug.cgi?id=929
|
||||
- https://ffmpeg.org/security.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -10,6 +10,7 @@
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://archive.is/eF2GR
|
||||
- https://medium.com/@BaYinMin/cve-2017-12778-qbittorrent-ui-lock-authentication-bypass-30959ff55ada
|
||||
|
||||
#### Github
|
||||
|
||||
@@ -34,6 +34,7 @@ Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 a
|
||||
- https://github.com/pen4uin/vulnerability-research-list
|
||||
- https://github.com/sobinge/nuclei-templates
|
||||
- https://github.com/superfish9/pt
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/tomoyamachi/gocarts
|
||||
- https://github.com/userprofilesecured/Path-transversal-payloads
|
||||
- https://github.com/x-f1v3/Vulnerability_Environment
|
||||
|
||||
17
2020/CVE-2020-19762.md
Normal file
17
2020/CVE-2020-19762.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2020-19762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19762)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Automated Logic Corporation (ALC) WebCTRL System 6.5 and prior allows remote attackers to execute any JavaScript code via a XSS payload for the first parameter in a GET request.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://github.com/ismailerkek/CVEs/blob/main/CVE-2020-19762-RESERVED.md
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -13,6 +13,7 @@ loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows loc
|
||||
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc
|
||||
|
||||
#### Github
|
||||
- https://github.com/0ptyx/cve-2024-0582
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Ch4nc3n/PublicExploitation
|
||||
- https://github.com/DarkFunct/CVE_Exploits
|
||||
|
||||
52
2021/CVE-2021-42285.md
Normal file
52
2021/CVE-2021-42285.md
Normal file
@@ -0,0 +1,52 @@
|
||||
### [CVE-2021-42285](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42285)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=blue)
|
||||

|
||||
&color=blue)
|
||||
&color=blue)
|
||||

|
||||

|
||||
&color=blue)
|
||||

|
||||
&color=blue)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Windows Kernel Elevation of Privilege Vulnerability
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/T-RN-R/PatchDiffWednesday
|
||||
|
||||
17
2021/CVE-2021-45614.md
Normal file
17
2021/CVE-2021-45614.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2021-45614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45614)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://kb.netgear.com/000064141/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0520
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -55,6 +55,7 @@ No PoCs from references.
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
||||
- https://github.com/SYRTI/POC_to_review
|
||||
- https://github.com/T-RN-R/PatchDiffWednesday
|
||||
- https://github.com/WhooAmii/POC_to_review
|
||||
- https://github.com/k0mi-tg/CVE-POC
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
|
||||
17
2023/CVE-2023-0033.md
Normal file
17
2023/CVE-2023-0033.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0033)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The PDF Viewer WordPress plugin before 1.0.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0034.md
Normal file
17
2023/CVE-2023-0034.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0034](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0034)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The JetWidgets For Elementor WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/ffbdb8a1-19c3-45e9-81b0-ad47a0791c4a
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0037.md
Normal file
17
2023/CVE-2023-0037.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0037](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0037)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The 10Web Map Builder for Google Maps WordPress plugin before 1.0.73 does not properly sanitise and escape some parameters before using them in an SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0043.md
Normal file
17
2023/CVE-2023-0043.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0043)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Custom Add User WordPress plugin through 2.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e012f23a-7daf-4ef3-b116-d0e2ed5bd0a3
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -18,5 +18,7 @@ The current implementation of the prctl syscall does not issue an IBPB immediate
|
||||
- https://github.com/k0mi-tg/CVE-POC
|
||||
- https://github.com/manas3c/CVE-POC
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/whoforget/CVE-POC
|
||||
- https://github.com/xu-xiang/awesome-security-vul-llm
|
||||
- https://github.com/youwizard/CVE-POC
|
||||
|
||||
|
||||
18
2023/CVE-2023-0058.md
Normal file
18
2023/CVE-2023-0058.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2023-0058](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0058)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when creating and editing its shortcode, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0059.md
Normal file
17
2023/CVE-2023-0059.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0059)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Youzify WordPress plugin before 1.2.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/5e26c485-9a5a-44a3-95b3-6c063a1c321c
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0060.md
Normal file
17
2023/CVE-2023-0060.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0060](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0060)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Responsive Gallery Grid WordPress plugin before 2.3.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/be2fc859-3158-4f06-861d-382381a7551b
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0061.md
Normal file
17
2023/CVE-2023-0061.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0061)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Judge.me Product Reviews for WooCommerce WordPress plugin before 1.3.21 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/a1d0d131-c773-487e-88f8-e3d63936fbbb
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0062.md
Normal file
17
2023/CVE-2023-0062.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0062](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0062)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The EAN for WooCommerce WordPress plugin before 4.4.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/450f94a3-56b1-41c7-ac29-fbda1dc04794
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0063.md
Normal file
17
2023/CVE-2023-0063.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0063](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0063)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WordPress Shortcodes WordPress plugin through 1.6.36 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/2262f2fc-8122-46ed-8e67-8c34ee35fc97
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0064.md
Normal file
17
2023/CVE-2023-0064.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0064)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0065.md
Normal file
17
2023/CVE-2023-0065.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0065](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0065)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The i2 Pros & Cons WordPress plugin through 1.3.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/42c3ac68-4bbc-4d47-ad53-2c9ed48cd677
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0066.md
Normal file
17
2023/CVE-2023-0066.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0066](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0066)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Companion Sitemap Generator WordPress plugin through 4.5.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/545c9e2f-bacd-4f30-ae01-de1583e26d32
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0067.md
Normal file
17
2023/CVE-2023-0067.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0067](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0067)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Timed Content WordPress plugin before 2.73 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/92f43da9-9903-4bcf-99e8-0e269072d389
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0068.md
Normal file
17
2023/CVE-2023-0068.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0068)
|
||||
%20for%20WooCommerce&color=blue)
|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Product GTIN (EAN, UPC, ISBN) for WooCommerce WordPress plugin through 1.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/4abd1454-380c-4c23-8474-d7da4b2f3b8e
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0069.md
Normal file
17
2023/CVE-2023-0069.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0069](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0069)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WPaudio MP3 Player WordPress plugin through 4.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d9f00bcb-3746-4a9d-a222-4d532e84615f
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0070.md
Normal file
17
2023/CVE-2023-0070.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0070)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The ResponsiveVoice Text To Speech WordPress plugin before 1.7.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/0d8fbd1a-9fac-42ac-94e0-f8921deb1696
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0071.md
Normal file
17
2023/CVE-2023-0071.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0071](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0071)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WP Tabs WordPress plugin before 2.1.17 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/3834a162-2cdc-41e9-9c9d-2b576eed4db9
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0072.md
Normal file
17
2023/CVE-2023-0072.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0072)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WC Vendors Marketplace WordPress plugin before 2.4.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/bb2b876f-7216-4f31-9d1f-a45405c545ce
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0073.md
Normal file
17
2023/CVE-2023-0073.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0073)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Client Logo Carousel WordPress plugin through 3.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e5599968-a435-405a-8829-9840a2144987
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0074.md
Normal file
17
2023/CVE-2023-0074.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0074)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WP Social Widget WordPress plugin before 2.2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/82f543e3-9397-4364-9546-af5ea134fcd4
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0075.md
Normal file
17
2023/CVE-2023-0075.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0075](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0075)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Amazon JS WordPress plugin through 0.10 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/097acd6f-3291-4cdc-a054-4432b6350411
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0076.md
Normal file
17
2023/CVE-2023-0076.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0076)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Download Attachments WordPress plugin before 1.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/a0a44f8a-877c-40df-a3ba-b9b806ffb772/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0078.md
Normal file
17
2023/CVE-2023-0078.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0078)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Resume Builder WordPress plugin through 3.1.1 does not sanitize and escape some parameters related to Resume, which could allow users with a role as low as subscriber to perform Stored XSS attacks against higher privilege users
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e667854f-56f8-4dbe-9573-6652a8aacc2c
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0079.md
Normal file
17
2023/CVE-2023-0079.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0079](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0079)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Customer Reviews for WooCommerce WordPress plugin before 5.17.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/fdaba4d1-950d-4512-95de-cd43fe9e73e5/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0080.md
Normal file
17
2023/CVE-2023-0080.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0080)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Customer Reviews for WooCommerce WordPress plugin before 5.16.0 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0081.md
Normal file
17
2023/CVE-2023-0081.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0081)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The MonsterInsights WordPress plugin before 8.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/76d2963c-ebff-498f-9484-3c3008750c14
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0082.md
Normal file
17
2023/CVE-2023-0082.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0082)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The ExactMetrics WordPress plugin before 7.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e1ba5047-0c39-478f-89c7-b0bb638efdff
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0094.md
Normal file
17
2023/CVE-2023-0094.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0094)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/1453471f-164d-4487-a736-8cea086212fe/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0095.md
Normal file
17
2023/CVE-2023-0095.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0095](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0095)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Page View Count WordPress plugin before 2.6.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0096.md
Normal file
17
2023/CVE-2023-0096.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0096](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0096)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Happyforms WordPress plugin before 1.22.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/b28150e7-214b-4bcd-85c0-e819c4223484
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0097.md
Normal file
17
2023/CVE-2023-0097.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0097)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Post Grid, Post Carousel, & List Category Posts WordPress plugin before 2.4.19 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/19379f08-d667-4b1e-a774-0f4a17ad7bff
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -11,6 +11,7 @@ The Simple URLs WordPress plugin before 115 does not sanitise and escape some pa
|
||||
|
||||
#### Reference
|
||||
- http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html
|
||||
- https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
|
||||
21
2023/CVE-2023-0118.md
Normal file
21
2023/CVE-2023-0118.md
Normal file
@@ -0,0 +1,21 @@
|
||||
### [CVE-2023-0118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0118)
|
||||

|
||||

|
||||

|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
An arbitrary code execution flaw was found in Foreman. This flaw allows an admin user to bypass safe mode in templates and execute arbitrary code on the underlying operating system.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
18
2023/CVE-2023-0119.md
Normal file
18
2023/CVE-2023-0119.md
Normal file
@@ -0,0 +1,18 @@
|
||||
### [CVE-2023-0119](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0119)
|
||||

|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
|
||||
17
2023/CVE-2023-0143.md
Normal file
17
2023/CVE-2023-0143.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0143](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0143)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Send PDF for Contact Form 7 WordPress plugin before 0.9.9.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/c4cd3d98-9678-49cb-9d1a-551ef8a810b9
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0144.md
Normal file
17
2023/CVE-2023-0144.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0144](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0144)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Event Manager and Tickets Selling Plugin for WooCommerce WordPress plugin before 3.8.0 does not validate and escape some of its post meta before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d7b3917a-d11f-4216-9d2c-30771d83a7b4
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0145.md
Normal file
17
2023/CVE-2023-0145.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0145)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Saan World Clock WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/f4e4b4a2-c7cb-42ce-9d5b-bd84efcbf54d
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0146.md
Normal file
17
2023/CVE-2023-0146.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0146](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0146)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Naver Map WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d1218c69-4f6a-4b2d-a537-5cc16a46ba7b
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0147.md
Normal file
17
2023/CVE-2023-0147.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0147](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0147)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Flexible Captcha WordPress plugin through 4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/af9cbb4a-42fc-43c5-88f3-349b417f1a6a
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0148.md
Normal file
17
2023/CVE-2023-0148.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0148)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Gallery Factory Lite WordPress plugin through 2.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/f15f2f2c-2053-4b93-8064-15b5243a4021
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0149.md
Normal file
17
2023/CVE-2023-0149.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0149)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WordPrezi WordPress plugin before 0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/6b6f9e42-7f7f-4daa-99c9-14a24a6d76b0
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0150.md
Normal file
17
2023/CVE-2023-0150.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0150](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0150)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Cloak Front End Email WordPress plugin before 1.9.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/517154dc-d6bd-462d-b955-061a7b7f8da5
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0151.md
Normal file
17
2023/CVE-2023-0151.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0151](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0151)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The uTubeVideo Gallery WordPress plugin before 2.0.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d9fc6f5f-efc1-4e23-899b-e9a49330ed13
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0152.md
Normal file
17
2023/CVE-2023-0152.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0152](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0152)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WP Multi Store Locator WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/8281fce2-6f24-4d3f-895f-4d8694806609
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0153.md
Normal file
17
2023/CVE-2023-0153.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0153)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Vimeo Video Autoplay Automute WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/f3459868-28aa-4a5d-94d8-bbc17e3ce653
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0154.md
Normal file
17
2023/CVE-2023-0154.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0154)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The GamiPress WordPress plugin before 1.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/5e66e173-776d-4423-b4a2-eb7316b2502f
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -10,7 +10,7 @@ The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not limit what
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f2360a759
|
||||
|
||||
#### Github
|
||||
- https://github.com/b0marek/CVE-2023-0156
|
||||
|
||||
@@ -10,7 +10,7 @@ The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not escape the
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://wpscan.com/vulnerability/8248b550-6485-4108-a701-8446ffa35f06
|
||||
|
||||
#### Github
|
||||
- https://github.com/b0marek/CVE-2023-0157
|
||||
|
||||
@@ -10,7 +10,7 @@ The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809
|
||||
|
||||
#### Github
|
||||
- https://github.com/im-hanzou/EVCer
|
||||
|
||||
17
2023/CVE-2023-0165.md
Normal file
17
2023/CVE-2023-0165.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0165)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Cost Calculator WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/f00b82f7-d8ad-4f6b-b791-81cc16b6336b
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0166.md
Normal file
17
2023/CVE-2023-0166.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0166)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Product Slider for WooCommerce by PickPlugins WordPress plugin before 1.13.42 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/f5d43062-4ef3-4dd1-b916-0127f0016f5c
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0167.md
Normal file
17
2023/CVE-2023-0167.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0167)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The GetResponse for WordPress plugin through 5.5.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/fafbf666-b908-48ef-9041-fea653e9bfeb
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0168.md
Normal file
17
2023/CVE-2023-0168.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0168)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Olevmedia Shortcodes WordPress plugin through 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e854efee-16fc-4379-9e66-d2883e01fb32
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0169.md
Normal file
17
2023/CVE-2023-0169.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0169)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Zoho Forms WordPress plugin before 3.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/178d71f2-4666-4f7e-ada5-cb72a50fd663
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0170.md
Normal file
17
2023/CVE-2023-0170.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0170)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Html5 Audio Player WordPress plugin before 2.1.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/19ee5e33-acc8-40c5-8f54-c9cb0fa491f0
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0171.md
Normal file
17
2023/CVE-2023-0171.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0171)
|
||||
%20Countdown%20Widget&color=blue)
|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The jQuery T(-) Countdown Widget WordPress plugin before 2.3.24 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/32324655-ff91-4a53-a2c5-ebe6678d4a9d
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0172.md
Normal file
17
2023/CVE-2023-0172.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0172](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0172)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Juicer WordPress plugin before 1.11 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/c8982b8d-985f-4a5d-840d-e8be7c3405bd
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0173.md
Normal file
17
2023/CVE-2023-0173.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0173)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Drag & Drop Sales Funnel Builder for WordPress plugin before 2.6.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/c543b6e2-a7c0-4ba7-a308-e9951dd59fb9
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0174.md
Normal file
17
2023/CVE-2023-0174.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0174)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The WP VR WordPress plugin before 8.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0175.md
Normal file
17
2023/CVE-2023-0175.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0175](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0175)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Responsive Clients Logo Gallery Plugin for WordPress plugin through 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/cdcd3c2c-cb29-4b21-8d3d-7eafbc1d3098
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0176.md
Normal file
17
2023/CVE-2023-0176.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0176)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Giveaways and Contests by RafflePress WordPress plugin before 1.11.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/a762c25b-5c47-400e-8964-407cf4c94e9f
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0177.md
Normal file
17
2023/CVE-2023-0177.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0177)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Social Like Box and Page by WpDevArt WordPress plugin before 0.8.41 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/712c2154-37f4-424c-ba3b-26ba6aa95bca
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0178.md
Normal file
17
2023/CVE-2023-0178.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0178)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Annual Archive WordPress plugin before 1.6.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/cc308e15-7937-4d41-809d-74f8c13bee23
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -34,5 +34,7 @@ A buffer overflow vulnerability was found in the Netfilter subsystem in the Linu
|
||||
- https://github.com/nomi-sec/PoC-in-GitHub
|
||||
- https://github.com/taielab/awesome-hacking-lists
|
||||
- https://github.com/tanjiti/sec_profile
|
||||
- https://github.com/whoforget/CVE-POC
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/youwizard/CVE-POC
|
||||
|
||||
|
||||
17
2023/CVE-2023-0212.md
Normal file
17
2023/CVE-2023-0212.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0212)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Advanced Recent Posts WordPress plugin through 0.6.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/5fdd44aa-7f3f-423a-9fb0-dc9dc36f33a3
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0219.md
Normal file
17
2023/CVE-2023-0219.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0219)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The FluentSMTP WordPress plugin before 2.2.3 does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/71662b72-311c-42db-86c5-a0276d25535c
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0220.md
Normal file
17
2023/CVE-2023-0220.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0220](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0220)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The Pinpoint Booking System WordPress plugin before 2.9.9.2.9 does not validate and escape one of its shortcode attributes before using it in a SQL statement, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0224.md
Normal file
17
2023/CVE-2023-0224.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0224](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0224)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The GiveWP WordPress plugin before 2.24.1 does not properly escape user input before it reaches SQL queries, which could let unauthenticated attackers perform SQL Injection attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d8da539d-0a1b-46ef-b48d-710c59cf68e1/
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0230.md
Normal file
17
2023/CVE-2023-0230.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0230)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The VK All in One Expansion Unit WordPress plugin before 9.86.0.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/a4ad73b2-6a70-48ff-bf4c-28f81b193748
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0231.md
Normal file
17
2023/CVE-2023-0231.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0231)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The ShopLentor WordPress plugin before 2.5.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/533c19d5-219c-4389-a8bf-8b3a35b33b20
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0233.md
Normal file
17
2023/CVE-2023-0233.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0233)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The ActiveCampaign WordPress plugin before 8.1.12 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0234.md
Normal file
17
2023/CVE-2023-0234.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0234](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0234)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The SiteGround Security WordPress plugin before 1.3.1 does not properly sanitize user input before using it in an SQL query, leading to an authenticated SQL injection issue.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/acf3e369-1290-4b3f-83bf-2209b9dd06e1
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0252.md
Normal file
17
2023/CVE-2023-0252.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0252)
|
||||

|
||||

|
||||
&color=brighgreen)
|
||||
|
||||
### Description
|
||||
|
||||
The Contextual Related Posts WordPress plugin before 3.3.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/5754a4fd-1adf-47aa-976f-3b28750058c2
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
@@ -10,7 +10,7 @@ The Enable Media Replace WordPress plugin before 4.0.2 does not prevent authors
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
- https://wpscan.com/vulnerability/b0239208-1e23-4774-9b8c-9611704a07a0
|
||||
|
||||
#### Github
|
||||
- https://github.com/codeb0ss/CVE-2023-0255-PoC
|
||||
|
||||
17
2023/CVE-2023-0259.md
Normal file
17
2023/CVE-2023-0259.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0259)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The WP Google Review Slider WordPress plugin before 11.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/d3bb0eac-1f4e-4191-8f3b-104a5bb54558
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
17
2023/CVE-2023-0260.md
Normal file
17
2023/CVE-2023-0260.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2023-0260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0260)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The WP Review Slider WordPress plugin before 12.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://wpscan.com/vulnerability/9165d46b-2a27-4e83-a096-73ffe9057c80
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user