CVE-2023-22254 – AEM Reflected XSS Arbitrary code execution
https://notcve.org/view.php?id=CVE-2023-22254
Experience Manager versions 6.5.15.0 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. • https://helpx.adobe.com/security/products/experience-manager/apsb23-18.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-22252 – AEM Reflected XSS Arbitrary code execution
https://notcve.org/view.php?id=CVE-2023-22252
Experience Manager versions 6.5.15.0 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. • https://helpx.adobe.com/security/products/experience-manager/apsb23-18.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-1306 – Rapid7 InsightCloudSec resource.db() method access
https://notcve.org/view.php?id=CVE-2023-1306
An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec. • https://docs.divvycloud.com/changelog/23321-release-notes https://nephosec.com/exploiting-rapid7s-insightcloudsec • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-1304 – Rapid7 InsightCloudSec getattr() method access
https://notcve.org/view.php?id=CVE-2023-1304
An authenticated attacker can leverage an exposed getattr() method via a Jinja template to smuggle OS commands and perform other actions that are normally expected to be private methods. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec. • https://docs.divvycloud.com/changelog/23321-release-notes https://nephosec.com/exploiting-rapid7s-insightcloudsec • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2023-24709 – Paradox Security Systems IPR512 - Denial Of Service
https://notcve.org/view.php?id=CVE-2023-24709
An issue found in Paradox Security Systems IPR512 allows attackers to cause a denial of service via the login.html and login.xml parameters. Paradox Security Systems version IPR512 suffers from a denial of service vulnerability. • https://www.exploit-db.com/exploits/51356 https://github.com/DRAGOWN/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC http://packetstormsecurity.com/files/171783/Paradox-Security-Systems-IPR512-Denial-Of-Service.html https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 • CWE-94: Improper Control of Generation of Code ('Code Injection') •