GitLab privilege escalation | CVE-2023-3915
NAME__________GitLab privilege escalationPlatforms Affected:GitLab Community Edition 16.2.4 GitLab Community Edition 16.3.0 GitLab Enterprise Edition 16.3.0 GitLab Enterprise Edition 16.2.4 GitLab...
NAME__________GitLab privilege escalationPlatforms Affected:GitLab Community Edition 16.2.4 GitLab Community Edition 16.3.0 GitLab Enterprise Edition 16.3.0 GitLab Enterprise Edition 16.2.4 GitLab...
NAME__________iframe popup plugin for WordPress cross-site scriptingPlatforms Affected:WordPress iframe popup Plugin for WordPress 3.3Risk Level:5.9Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________iframe popup Login Plugin...
NAME__________Spipu HTML2PDF cross-site scriptingPlatforms Affected:Spipu HTML2PDF 5.2.3 Spipu HTML2PDF 5.2.4 Spipu HTML2PDF 5.2.5 Spipu HTML2PDF 5.2.6 Spipu HTML2PDF 5.2.7Risk Level:6.1Exploitability:HighConsequences:Cross-Site...
NAME__________NeoMind Fusion Platform cross-site scriptingPlatforms Affected:Risk Level:6.1Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________NeoMind Fusion Platform is vulnerable to cross-site scripting, caused by improper validation...
NAME__________Free and Open Source Inventory Management System cross-site scriptingPlatforms Affected:Sourcecodester Free and Open Source Inventory Management System 1.0Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________jupyter-server information disclosurePlatforms Affected:jupyter-server jupyter-server 2.7.1Risk Level:4.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________jupyter-server could allow a remote authetnicated attacker to obtain sensitive information, caused...
NAME__________Metal3 ironic-image security bypassPlatforms Affected:Metal3 ironic-image capm3-v1.4.2Risk Level:7.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Metal3 ironic-image could allow a remote attacker to bypass security restrictions,...
NAME__________Webiny cross-site scriptingPlatforms Affected:webiny webiny 5.37.1Risk Level:7.2Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Webiny is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________giflib buffer overflowPlatforms Affected:GIFLIB GIFLIB 5.2.1Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________giflib is vulnerable to a heap-based buffer overflow, caused by a segmentation...
NAME__________Free and Open Source Inventory Management System cross-site scriptingPlatforms Affected:Sourcecodester Free and Open Source Inventory Management System 1.0Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________Free and Open Source Inventory Management System cross-site scriptingPlatforms Affected:Sourcecodester Free and Open Source Inventory Management System 1.0Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________OpenFGA information disclosurePlatforms Affected:OpenFGA OpenFGA 1.3.0Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________OpenFGA could allow a remote authenticated attacker to obtain sensitive information, caused...
NAME__________FRRouting FRR and Pica8 PICOS denial of servicePlatforms Affected:FRRouting FRRouting 9.0 Pica8 PICOS 4.3.3.2Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________FRRouting FRR and...
NAME__________Samsung Exynos Mobile Processor and Wearable Processor denial of servicePlatforms Affected:Samsung Exynos Mobile Processor Samsung Exynos Wearable ProcessorRisk Level:7.5Exploitability:UnprovenConsequences:Denial of...
NAME__________Spinnaker weak securityPlatforms Affected:Spinnaker Spinnaker 1.31.0 Spinnaker Spinnaker 1.30.2 Spinnaker Spinnaker 1.29.5 Spinnaker Spinnaker 1.28.7Risk Level:4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Spinnaker could provide...
NAME__________Busybox directory traversalPlatforms Affected:Busybox BusyboxRisk Level:6.1Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________Busybox could allow a local attacker to traverse directories on the system, caused...
NAME__________Badaso cross-site scriptingPlatforms Affected:Badaso Badaso 2.9.7Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Badaso is vulnerable to cross-site scripting, caused by improper validation of user-supplied...
NAME__________SpringBlade SQL injectionPlatforms Affected:SpringBlade SpringBlade 3.6.0Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________SpringBlade is vulnerable to SQL injection. A remote attacker could send specially...
NAME__________haraj security bypassPlatforms Affected:haraj haraj 1.1Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________haraj could allow a remote attacker to bypass security restrictions, caused by...
NAME__________MyBB code executionPlatforms Affected:MyBB MyBB 1.8.35Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________MyBB could allow a remote authenticated attacker to execute arbitrary code on...
NAME__________jupyter-server open redirectPlatforms Affected:jupyter-server jupyter-server 2.7.1Risk Level:4.3Exploitability:UnprovenConsequences:Other DESCRIPTION__________jupyter-server could allow a remote attacker to conduct phishing attacks, caused by an...
NAME__________Hitachi HiRDB weak securityPlatforms Affected:Hitachi HiRDB Server Hitachi HiRDB Server With Addtional Function Hitachi HiRDB Structured Data Access FacilityRisk Level:5.3Exploitability:UnprovenConsequences:Gain...
NAME__________Blue-Collar i-Gallery information disclosurePlatforms Affected:Blue-Collar i-Gallery 3.4Risk Level:7.5Exploitability:Proof of ConceptConsequences:Obtain Information DESCRIPTION__________Blue-Collar i-Gallery could allow a remote attacker to obtain...
NAME__________HumHub directory traversalPlatforms Affected:HumHub HumHub 1.3.13Risk Level:7.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________HumHub could allow a remote attacker to traverse directories on the system,...