Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In October 2023
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
CVSS Score
7.2
EPSS Score
0.682
Published
2023-10-30
Peppermint Ticket Management before 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/users/file/download?filepath=./../ POST request.
CVSS Score
7.5
EPSS Score
0.002
Published
2023-10-30
Peppermint Ticket Management through 0.2.4 allows remote attackers to read arbitrary files via a /api/v1/ticket/1/file/download?filepath=../ POST request.
CVSS Score
5.3
EPSS Score
0.002
Published
2023-10-30
HTML and SMTP injections on the registration page of LiquidFiles versions 3.7.13 and below, allow an attacker to perform more advanced phishing attacks against an organization.
CVSS Score
5.4
EPSS Score
0.003
Published
2023-10-30
A vulnerability, which was classified as critical, has been found in The Hackers Diet Plugin up to 0.9.6b on WordPress. This issue affects some unknown processing of the file ajax_blurb.php of the component HTTP POST Request Handler. The manipulation of the argument user leads to sql injection. The attack may be initiated remotely. Upgrading to version 0.9.7b is able to address this issue. The patch is named 7dd8acf7cd8442609840037121074425d363b694. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-243803.
CVSS Score
6.3
EPSS Score
0.001
Published
2023-10-29
A vulnerability, which was classified as critical, was found in almosteffortless secure-files Plugin up to 1.1 on WordPress. Affected is the function sf_downloads of the file secure-files.php. The manipulation of the argument downloadfile leads to path traversal. Upgrading to version 1.2 is able to address this issue. The name of the patch is cab025e5fc2bcdad8032d833ebc38e6bd2a13c92. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-243804.
CVSS Score
5.5
EPSS Score
0.002
Published
2023-10-29
iSulad uses the lcr+lxc runtime (default) to run malicious images, which can cause DOS.
CVSS Score
6.3
EPSS Score
0.0
Published
2023-10-29
When malicious images are pulled by isula pull, attackers can execute arbitrary code.
CVSS Score
9.8
EPSS Score
0.001
Published
2023-10-29
When the isula load command is used to load malicious images, attackers can execute arbitrary code.
CVSS Score
8.4
EPSS Score
0.001
Published
2023-10-29
When the isula export command is used to export a container to an image and the container is controlled by an attacker, the attacker can escape the container.
CVSS Score
8.4
EPSS Score
0.0
Published
2023-10-29


Contact Us

Shodan ® - All rights reserved