Show filters
440 Total Results
Displaying 61-70 of 440
Sort by:
Attacker Value
Unknown

CVE-2023-50878

Disclosure Date: December 29, 2023 (last updated January 06, 2024)
Cross-Site Request Forgery (CSRF) vulnerability in InspireUI MStore API.This issue affects MStore API: from n/a through 4.10.1.
Attacker Value
Unknown

CVE-2019-25158

Disclosure Date: December 19, 2023 (last updated December 29, 2023)
A vulnerability has been found in pedroetb tts-api up to 2.1.4 and classified as critical. This vulnerability affects the function onSpeechDone of the file app.js. The manipulation leads to os command injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 29d9c25415911ea2f8b6de247cb5c4607d13d434. It is recommended to upgrade the affected component. VDB-248278 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-6911

Disclosure Date: December 18, 2023 (last updated December 23, 2023)
Multiple WSO2 products have been identified as vulnerable due to improper output encoding, a Stored Cross Site Scripting (XSS) attack can be carried out by an attacker injecting a malicious payload into the Registry feature of the Management Console.
Attacker Value
Unknown

CVE-2023-6839

Disclosure Date: December 15, 2023 (last updated December 22, 2023)
Due to improper error handling, a REST API resource could expose a server side error containing an internal WSO2 specific package name in the HTTP response.
Attacker Value
Unknown

CVE-2023-6838

Disclosure Date: December 15, 2023 (last updated December 20, 2023)
Reflected XSS vulnerability can be exploited by tampering a request parameter in Authentication Endpoint. This can be performed in both authenticated and unauthenticated requests.
Attacker Value
Unknown

CVE-2023-6837

Disclosure Date: December 15, 2023 (last updated January 04, 2025)
Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met: * An IDP configured for federated authentication and JIT provisioning enabled with the "Prompt for username, password and consent" option. * A service provider that uses the above IDP for federated authentication and has the "Assert identity using mapped local subject identifier" flag enabled. Attacker should have: * A fresh valid user account in the federated IDP that has not been used earlier. * Knowledge of the username of a valid user in the local IDP. When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
Attacker Value
Unknown

CVE-2023-6836

Disclosure Date: December 15, 2023 (last updated December 20, 2023)
Multiple WSO2 products have been identified as vulnerable due to an XML External Entity (XXE) attack abuses a widely available but rarely used feature of XML parsers to access sensitive information.
Attacker Value
Unknown

CVE-2023-6835

Disclosure Date: December 15, 2023 (last updated December 29, 2023)
Multiple WSO2 products have been identified as vulnerable due to lack of server-side input validation in the Forum feature, API rating could be manipulated.
Attacker Value
Unknown

CVE-2023-49172

Disclosure Date: December 14, 2023 (last updated December 19, 2023)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BrainCert BrainCert – HTML5 Virtual Classroom allows Reflected XSS.This issue affects BrainCert – HTML5 Virtual Classroom: from n/a through 1.30.
Attacker Value
Unknown

CVE-2023-47722

Disclosure Date: December 09, 2023 (last updated December 13, 2023)
IBM API Connect V10.0.5.3 and V10.0.6.0 stores user credentials in browser cache which can be read by a local user. IBM X-Force ID: 271912.