CVE-2023-25433 |
|
CVE-2023-25304 |
|
CVE-2023-2482 |
Description: The Responsive CSS EDITOR WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admin.
CVSS: LOW (0.0) EPSS Score: 0.1%
November 28th, 2024 (5 months ago)
|
CVE-2023-24734 |
|
CVE-2023-23570 |
Description:
Client-Side enforcement of Server-Side security for the Command Centre server could be bypassed and lead to invalid configuration with undefined behavior.
This issue affects: Gallagher Command Centre 8.90 prior to vEL8.90.1620 (MR2), all versions of 8.80 and prior.
CVSS: MEDIUM (5.4) EPSS Score: 0.07%
November 28th, 2024 (5 months ago)
|
CVE-2023-23432 |
|
CVE-2023-23424 |
|
CVE-2023-2326 |
Description: The Gravity Forms Google Sheet Connector WordPress plugin before 1.3.5, gsheetconnector-gravityforms-pro WordPress plugin through 1.3.5 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack
CVSS: LOW (0.0) EPSS Score: 0.07%
November 28th, 2024 (5 months ago)
|
CVE-2023-23163 |
|
CVE-2023-22939 |
Description: In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘map’ search processing language (SPL) command lets a search bypass SPL safeguards for risky commands. The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled.
CVSS: HIGH (8.1) EPSS Score: 0.22%
November 28th, 2024 (5 months ago)
|