
CVE-2023-1607 – novel-plus list sql injection
https://notcve.org/view.php?id=CVE-2023-1607
23 Mar 2023 — A vulnerability was found in novel-plus 3.6.2. It has been classified as critical. This affects an unknown part of the file /common/sysFile/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/1610349395/novel-plus-v3.6.2----SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20%20SQL%20Injection%20Vulnerability%20.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-1606 – novel-plus DictController.java sql injection
https://notcve.org/view.php?id=CVE-2023-1606
23 Mar 2023 — A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-1595 – novel-plus list sql injection
https://notcve.org/view.php?id=CVE-2023-1595
23 Mar 2023 — A vulnerability has been found in novel-plus 3.6.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the file common/log/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-1594 – novel-plus list MenuService sql injection
https://notcve.org/view.php?id=CVE-2023-1594
23 Mar 2023 — A vulnerability, which was classified as critical, was found in novel-plus 3.6.2. Affected is the function MenuService of the file sys/menu/list. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-36672
https://notcve.org/view.php?id=CVE-2022-36672
01 Sep 2022 — Novel-Plus v3.6.2 was discovered to contain a hard-coded JWT key located in the project config file. This vulnerability allows attackers to create a custom user session. Se ha detectado que Novel-Plus versión v3.6.2, contiene una clave JWT embebida en el archivo de configuración del proyecto. Esta vulnerabilidad permite a atacantes crear una sesión de usuario personalizada • https://www.mesec.cn/archives/296 • CWE-798: Use of Hard-coded Credentials •

CVE-2022-36671
https://notcve.org/view.php?id=CVE-2022-36671
01 Sep 2022 — Novel-Plus v3.6.2 was discovered to contain an arbitrary file download vulnerability via the background file download API. Se ha detectado que Novel-Plus versión v3.6.2, contiene una vulnerabilidad de descarga de archivos arbitraria por medio de la API de descarga de archivos en segundo plano • https://www.mesec.cn/archives/291 • CWE-494: Download of Code Without Integrity Check •

CVE-2022-35121
https://notcve.org/view.php?id=CVE-2022-35121
17 Aug 2022 — Novel-Plus v3.6.1 was discovered to contain a SQL injection vulnerability via the keyword parameter at /service/impl/BookServiceImpl.java. Se ha detectado que Novel-Plus versión v3.6.1, contiene una vulnerabilidad de inyección SQL por medio del parámetro keyword en el archivo/service/impl/BookServiceImpl.java. • https://github.com/201206030/novel-plus/issues/92 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-28462
https://notcve.org/view.php?id=CVE-2022-28462
05 May 2022 — novel-plus 3.6.0 suffers from an Arbitrary file reading vulnerability. novel-plus versión 3.6.0, sufre una vulnerabilidad de lectura arbitraria de archivos • https://github.com/201206030/novel-plus/issues/85 • CWE-552: Files or Directories Accessible to External Parties •

CVE-2021-41921
https://notcve.org/view.php?id=CVE-2021-41921
28 Apr 2022 — novel-plus V3.6.1 allows unrestricted file uploads. Unrestricted file suffixes and contents can lead to server attacks and arbitrary code execution. novel-plus versión V3.6.1, permite una carga de archivos sin restricciones. Los sufijos y contenidos de los archivos sin restricciones pueden conllevar a ataques al servidor y una ejecución de código arbitrario • https://github.com/201206030/novel-plus/issues/62 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2022-24568
https://notcve.org/view.php?id=CVE-2022-24568
10 Feb 2022 — Novel-plus v3.6.0 was discovered to be vulnerable to Server-Side Request Forgery (SSRF) via user-supplied crafted input. Se ha detectado que Novel-plus versión v3.6.0, es vulnerable a un ataque de tipo Server-Side Request Forgery (SSRF) por medio de una entrada diseñada por el usuario • https://github.com/201206030/novel-plus/issues/80 • CWE-918: Server-Side Request Forgery (SSRF) •