16 results (0.005 seconds)

CVSS: 6.1EPSS: %CPEs: 1EXPL: 0

The Naver Blog plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The Android Mobile Whale browser app before 3.0.1.2 allows the attacker to bypass its browser unlock function via 'Open in Whale' feature. La aplicación de navegador Android Mobile Whale anterior a 3.0.1.2 permite al atacante eludir la función de desbloqueo del navegador mediante la función "Abrir en Whale". • https://cve.naver.com/detail/cve-2023-25632.html • CWE-284: Improper Access Control CWE-359: Exposure of Private Personal Information to an Unauthorized Actor •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Naver Map WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. The Naver Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page • https://wpscan.com/vulnerability/d1218c69-4f6a-4b2d-a537-5cc16a46ba7b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Naver Cloud Explorer Beta allows the attacker to execute arbitrary code as System privilege via malicious DLL injection. Naver Cloud Explorer Beta permite al atacante ejecutar código arbitrario como privilegio del sistema por medio de una inyección de DLL maliciosa • https://cve.naver.com/detail/cve-2022-24077.html • CWE-269: Improper Privilege Management CWE-427: Uncontrolled Search Path Element •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

NAVER Toolbar before 4.0.30.323 allows remote attackers to execute arbitrary code via a crafted upgrade.xml file. Special characters in filename parameter can be the cause of bypassing code signing check function. NAVER Toolbar versiones anteriores a 4.0.30.323, permite a atacantes remotos ejecutar código arbitrario por medio de un archivo upgrade.xml diseñado. Los caracteres especiales en el parámetro filename pueden ser la causa de la omisión de la función de comprobación de la firma del código • https://cve.naver.com/detail/cve-2021-33592 • CWE-20: Improper Input Validation •