Security
Headlines
HeadlinesLatestCVEs

Source

CVE

CVE-2023-5045

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Kayisi allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Kayisi: before 1286.

CVE
#sql#vulnerability
CVE-2023-5046

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Procost allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Procost: before 1390.

CVE-2023-23651: WordPress MainWP Google Analytics Extension Plugin <= 4.0.4 - Auth. SQL Injection Vulnerability - Patchstack

Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP Google Analytics Extension plugin <= 4.0.4 versions.

CVE-2023-23737: WordPress MainWP Broken Links Checker Extension Plugin <= 4.0 - Unauthenticated SQL Injection Vulnerability - Patchstack

Unauth. SQL Injection (SQLi) vulnerability in MainWP MainWP Broken Links Checker Extension plugin <= 4.0 versions.

CVE-2023-5555

Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4.

CVE-2023-5556

Cross-site Scripting (XSS) - Reflected in GitHub repository structurizr/onpremises prior to 3194.

CVE-2023-5554

Lack of TLS certificate verification in log transmission of a financial module within LINE prior to 13.16.0.

CVE-2023-45047: WordPress LeadSquared Suite plugin <= 0.7.4 - Cross Site Request Forgery (CSRF) vulnerability - Patchstack

Cross-Site Request Forgery (CSRF) vulnerability in LeadSquared, Inc LeadSquared Suite plugin <= 0.7.4 versions.

CVE-2023-5470: Etsy Shop <= 3.0.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode — Wordfence Intelligence

The Etsy Shop plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'etsy-shop' shortcode in versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.