Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-33725

Description: Broadleaf 5.x and 6.x (including 5.2.25-GA and 6.2.6-GA) was discovered to contain a cross-site scripting (XSS) vulnerability via a customer signup with a crafted email address. This is fixed in 6.2.6.1-GA.

CVSS: LOW (0.0)

EPSS Score: 0.07%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33591

Description: User Registration & Login and User Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/search-result.php.

CVSS: LOW (0.0)

EPSS Score: 0.08%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33405

Description: Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect.

CVSS: LOW (0.0)

EPSS Score: 0.13%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33387

Description: A reflected cross-site scripting (XSS) vulnerability in DATEV eG Personal-Management System Comfort/Comfort Plus v15.1.0 to v16.1.1 P4 allows attackers to steal targeted users' login data by sending a crafted link.

CVSS: LOW (0.0)

EPSS Score: 0.09%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-33289

Description: The urlnorm crate through 0.1.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to lib.rs.

CVSS: LOW (0.0)

EPSS Score: 0.12%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-32571

Description: Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.

CVSS: LOW (0.0)

EPSS Score: 0.47%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-31868

Description: Sage X3 version 12.14.0.50-0 is vulnerable to Cross Site Scripting (XSS). Some parts of the Web application are dynamically built using user's inputs. Yet, those inputs are not verified nor filtered by the application, so they mathed the expected format. Therefore, when HTML/JavaScript code is injected into those fields, this code will be saved by the application and executed by the web browser of the user viewing the web page. Several injection points have been identified on the application. The major one requires the user to be authenticated with a common account, he can then target an Administrator. All others endpoints need the malicious user to be authenticated as an Administrator. Therefore, the impact is diminished.

CVSS: LOW (0.0)

EPSS Score: 0.06%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-31867

Description: Sage X3 version 12.14.0.50-0 is vulnerable to CSV Injection.

CVSS: LOW (0.0)

EPSS Score: 0.13%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-30347

Description: Cross Site Scripting (XSS) vulnerability in Neox Contact Center 2.3.9, via the serach_sms_api_name parameter to the SMA API search.

CVSS: LOW (0.0)

EPSS Score: 0.06%

Source: CVE
December 7th, 2024 (5 months ago)

CVE-2023-29931

Description: laravel-s 3.7.35 is vulnerable to Local File Inclusion via /src/Illuminate/Laravel.php.

CVSS: LOW (0.0)

EPSS Score: 0.23%

Source: CVE
December 7th, 2024 (5 months ago)