
CVE-2023-40997
https://notcve.org/view.php?id=CVE-2023-40997
28 Aug 2023 — Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet. • https://jira.o-ran-sc.org/browse/RIC-991 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2023-40998
https://notcve.org/view.php?id=CVE-2023-40998
28 Aug 2023 — Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via the packet size component. • https://jira.o-ran-sc.org/browse/RIC-989 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2023-24497
https://notcve.org/view.php?id=CVE-2023-24497
06 Jul 2023 — Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the remote_subnet field of the database • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVE-2023-25428 – Soft-o Free Password Manager 1.1.20 DLL Hijacking
https://notcve.org/view.php?id=CVE-2023-25428
10 May 2023 — A DLL Hijacking issue discovered in Soft-o Free Password Manager 1.1.20 allows attackers to create arbitrary DLLs leading to code execution. Soft-o Free Password Manager version 1.1.20 suffers from a dll hijacking vulnerability. • https://packetstorm.news/files/id/172259 • CWE-427: Uncontrolled Search Path Element •

CVE-2022-4753 – Print-O-Matic < 2.1.8 - Contributor+ Stored XSS via Shortcode
https://notcve.org/view.php?id=CVE-2022-4753
28 Dec 2022 — The Print-O-Matic WordPress plugin before 2.1.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. El complemento Print-O-Matic de WordPress anterior a 2.1.8 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios... • https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-4373 – Quote-O-Matic <= 1.0.5 - Admin+ SQLi
https://notcve.org/view.php?id=CVE-2022-4373
12 Dec 2022 — The Quote-O-Matic WordPress plugin through 1.0.5 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. The Quote-O-Matic plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.0.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administra... • https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2021-24710 – Print-O-Matic < 2.0.3 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2021-24710
11 Oct 2021 — The Print-O-Matic WordPress plugin before 2.0.3 does not escape some of its settings before outputting them in attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. El plugin Print-O-Matic de WordPress versiones anteriores a 2.0.3, no escapa a algunas de sus configuraciones antes de imprimirlas en el atributo, lo que podría permitir a usuarios muy privilegiados llevar a cabo ataques de tipo Cross-Site Scripting inclu... • https://plugins.trac.wordpress.org/changeset/2610060 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-24466 – Verse-O-Matic <= 4.1.1 - CSRF to Stored XSS
https://notcve.org/view.php?id=CVE-2021-24466
19 Jul 2021 — The Verse-O-Matic WordPress plugin through 4.1.1 does not have any CSRF checks in place, allowing attackers to make logged in administrators do unwanted actions, such as add/edit/delete arbitrary verses and change the settings. Due to the lack of sanitisation in the settings and verses, this could also lead to Stored Cross-Site Scripting issues El plugin de WordPress Verse-O-Matic versiones hasta 4.1.1, no presenta ninguna comprobación de tipo CSRF, permitiendo a atacantes hacer a unos administradores regis... • https://wpscan.com/vulnerability/37c7bdbb-f27f-47d3-9886-69d2e83d7581 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2021-3298 – Collabtive 3.1 - 'address' Persistent Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2021-3298
29 Jan 2021 — Collabtive 3.1 allows XSS when an authenticated user enters an XSS payload into the address section of the profile edit page, aka the manageuser.php?action=edit address1 parameter. Collabtive versión 3.1, permite un ataque de tipo XSS cuando un usuario autenticado ingresa una carga útil de tipo XSS en la sección de dirección de la página de edición de perfil, también se conoce como el parámetro address1 de manageuser.php?action=edit • https://www.exploit-db.com/exploits/49468 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-13655
https://notcve.org/view.php?id=CVE-2020-13655
31 Aug 2020 — An issue was discovered in Collabtive 3.0 and later. managefile.php is vulnerable to XSS: when the action parameter is set to movefile and the id parameter corresponds to a project the current user has access to, the file and target parameters are reflected. Se detectó un problema en Collabtive versiones 3.0 y posteriores. El archivo managefile.php es vulnerable a un ataque de tipo XSS: cuando el parámetro action se establece en movefile y el parámetro id corresponde a un proyecto al que el usuario actual t... • http://www.collabtive.o-dyn.de/blog • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •