4 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BoxyStudio Booked - Appointment Booking for WordPress | Calendars.This issue affects Booked - Appointment Booking for WordPress | Calendars: from n/a before 2.4.4. Vulnerabilidad de exposición de información confidencial a un actor no autorizado en BoxyStudio Booked - Appointment Booking for WordPress | Calendars. Este problema afecta a Booked - Appointment Booking for WordPress | Calendars: desde n/a antes de 2.4.4. The Booked plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.4. This can allow unauthenticated attackers to extract sensitive appointment-related data from the database. • https://patchstack.com/database/vulnerability/booked/wordpress-booked-plugin-2-4-unauth-appointment-data-exposure-vulnerability?_s_id=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 3

Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, LabArchives Scheduler (Sep 6, 2022 Feature Release) is affected. Booked Scheduler 2.5.5 permite a los usuarios autenticados crear y programar eventos para cualquier otro usuario a través de un valor de ID de usuario modificado en reservation_save.php. NOTA: 2.5.5 es una versión de 2014; la última versión de Booked Scheduler no se ve afectada. • https://github.com/LibreBooking/app/blob/0a6cb1a9eb84835553c8caf93db2791f8655140f/Pages/Ajax/ReservationSavePage.php#L234-L237 https://github.com/LibreBooking/app/blob/0a6cb1a9eb84835553c8caf93db2791f8655140f/Web/ajax/reservation_save.php https://github.com/LibreBooking/app/tags?after=2.7.1 https://s1n1st3r.gitbook.io/theb10g/booked-scheduler-v2.5.5-vulnerability https://www.bookedscheduler.com/the-future-of-booked https://www.labarchives.com/labarchives-knowledge-base/2022-feature-releases-2 https://www.limswiki.org/index •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Open redirect vulnerability in Booked versions prior to 3.3 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL. Una vulnerabilidad de redireccionamiento abierto en Booked versiones anteriores a 3.3, permite a un atacante remoto no autenticado redirigir a un usuario a un sitio web arbitrario y conducir un ataque de phishing haciendo que el usuario acceda a una URL especialmente diseñada. • https://jvn.jp/en/jp/JVN75063798 https://www.bookedscheduler.com • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 4

phpscheduleit Booked Scheduler 2.7.5 allows arbitrary file upload via the Favicon field, leading to execution of arbitrary Web/custom-favicon.php PHP code, because Presenters/Admin/ManageThemePresenter.php does not ensure an image file extension. phpscheduleit Booked Scheduler 2.7.5 permite la subida de archivos arbitrarios mediante el campo Favicon, lo que conduce a la ejecución de código PHP arbitrario en Web/custom-favicon.php. Esto se debe a que Presenters/Admin/ManageThemePresenter.php no asegura una extensión de archivo de imagen. • https://www.exploit-db.com/exploits/50594 https://www.exploit-db.com/exploits/46486 http://packetstormsecurity.com/files/165263/Booked-Scheduler-2.7.5-Shell-Upload.html https://pentest.com.tr/exploits/Booked-2-7-5-Remote-Command-Execution-Metasploit.html https://sourceforge.net/p/phpscheduleit/source/ci/c5a86a279d888bd4362e4b4f61acedc054f99c39 • CWE-434: Unrestricted Upload of File with Dangerous Type •