
CVE-2024-24015
https://notcve.org/view.php?id=CVE-2024-24015
06 Feb 2024 — A SQL injection vulnerability exists in Novel-Plus v4.3.0-RC1 and prior versions. An attacker can pass in crafted offset, limit, and sort parameters to perform SQL via /sys/user/exit Existe una vulnerabilidad de inyección SQL en Novel-Plus v4.3.0-RC1 y versiones anteriores. Un atacante puede pasar parámetros de compensación, límite y clasificación manipulados para ejecutar SQL a través de /sys/user/exit • https://github.com/201206030/novel-plus • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-7171 – Novel-Plus Friendly Link FriendLinkController.java cross site scripting
https://notcve.org/view.php?id=CVE-2023-7171
29 Dec 2023 — A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. • https://github.com/201206030/novel-plus/commit/d6093d8182362422370d7eaf6c53afde9ee45215 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-7166 – Novel-Plus HTTP POST Request updateUserInfo cross site scripting
https://notcve.org/view.php?id=CVE-2023-7166
29 Dec 2023 — A vulnerability classified as problematic has been found in Novel-Plus up to 4.2.0. This affects an unknown part of the file /user/updateUserInfo of the component HTTP POST Request Handler. The manipulation of the argument nickName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/201206030/novel-plus/commit/c62da9bb3a9b3603014d0edb436146512631100d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-30058
https://notcve.org/view.php?id=CVE-2023-30058
11 Sep 2023 — novel-plus 3.6.2 is vulnerable to SQL Injection. novel-plus 3.6.2 es vulnerable a la inyección SQL. • https://github.com/201206030/novel-plus • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-37847
https://notcve.org/view.php?id=CVE-2023-37847
14 Aug 2023 — novel-plus v3.6.2 was discovered to contain a SQL injection vulnerability. • http://novel-plus.com • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-2041 – novel-plus sql injection
https://notcve.org/view.php?id=CVE-2023-2041
14 Apr 2023 — A vulnerability classified as critical was found in novel-plus 3.6.2. Affected by this vulnerability is an unknown functionality of the file /category/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. • https://github.com/langove/llov/blob/main/Novel-Plus%20code%20audit.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-2040 – novel-plus sql injection
https://notcve.org/view.php?id=CVE-2023-2040
14 Apr 2023 — A vulnerability classified as critical has been found in novel-plus 3.6.2. Affected is an unknown function of the file /news/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. • https://github.com/morty-py/morty/blob/main/Novel-Plus3.6.2%20sqli.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-2039 – novel-plus sql injection
https://notcve.org/view.php?id=CVE-2023-2039
14 Apr 2023 — A vulnerability was found in novel-plus 3.6.2. It has been rated as critical. This issue affects some unknown processing of the file /author/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. • https://github.com/yece688/yece/blob/main/Novel-Plus%20Code%20audit2.0.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-1607 – novel-plus list sql injection
https://notcve.org/view.php?id=CVE-2023-1607
23 Mar 2023 — A vulnerability was found in novel-plus 3.6.2. It has been classified as critical. This affects an unknown part of the file /common/sysFile/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/1610349395/novel-plus-v3.6.2----SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20%20SQL%20Injection%20Vulnerability%20.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-1606 – novel-plus DictController.java sql injection
https://notcve.org/view.php?id=CVE-2023-1606
23 Mar 2023 — A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •