Total
6252 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-50902 | 1 Wpexperts | 1 New User Approve | 2024-08-02 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in WPExpertsio New User Approve.This issue affects New User Approve: from n/a through 2.5.1. | ||||
CVE-2023-50931 | 1 Savignano | 1 S\/notify | 2024-08-02 | 8.3 High |
An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | ||||
CVE-2023-50930 | 1 Savignano | 1 S-notify | 2024-08-02 | 8.3 High |
An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | ||||
CVE-2023-50932 | 1 Savignano | 1 S\/notify | 2024-08-02 | 8.3 High |
An issue was discovered in savignano S/Notify before 4.0.2 for Confluence. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Confluence, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | ||||
CVE-2023-50886 | 2024-08-02 | 4.3 Medium | ||
Cross-Site Request Forgery (CSRF), Incorrect Authorization vulnerability in wpWax Legal Pages.This issue affects Legal Pages: from n/a through 1.3.7. | ||||
CVE-2023-50858 | 1 Billminozzi | 1 Anti Hacker | 2024-08-02 | 5.4 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in Bill Minozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan.This issue affects Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan: from n/a through 4.34. | ||||
CVE-2023-50870 | 1 Jetbrains | 1 Teamcity | 2024-08-02 | 4.3 Medium |
In JetBrains TeamCity before 2023.11.1 a CSRF on login was possible | ||||
CVE-2023-50900 | 2024-08-02 | 4.3 Medium | ||
Cross-Site Request Forgery (CSRF) vulnerability in Averta Master Slider.This issue affects Master Slider: from n/a through 3.9.10. | ||||
CVE-2023-50778 | 1 Jenkins | 1 Paaslane Estimate | 2024-08-02 | 8.8 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token. | ||||
CVE-2023-50775 | 1 Jenkins | 1 Deployment Dashboard | 2024-08-02 | 4.3 Medium |
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to copy jobs. | ||||
CVE-2023-50774 | 1 Jenkins | 1 Html Resource | 2024-08-02 | 8.1 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system. | ||||
CVE-2023-50768 | 1 Jenkins | 1 Nexus Platform | 2024-08-02 | 8.8 High |
A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | ||||
CVE-2023-50722 | 1 Xwiki | 1 Xwiki | 2024-08-02 | 9.7 Critical |
XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, there is a reflected XSS or also direct remote code execution vulnerability in the code for displaying configurable admin sections. The code that can be passed through a URL parameter is only executed when the user who is visiting the crafted URL has edit right on at least one configuration section. While any user of the wiki could easily create such a section, this vulnerability doesn't require the attacker to have an account or any access on the wiki. It is sufficient to trick any admin user of the XWiki installation to visit the crafted URL. This vulnerability allows full remote code execution with programming rights and thus impacts the confidentiality, integrity and availability of the whole XWiki installation. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patch can be manually applied to the document `XWiki.ConfigurableClass`. | ||||
CVE-2023-50349 | 1 Hcltech | 1 Sametime | 2024-08-02 | 5.9 Medium |
Sametime is impacted by a Cross Site Request Forgery (CSRF) vulnerability. Some REST APIs in the Sametime Proxy application can allow an attacker to perform malicious actions on the application. | ||||
CVE-2023-50372 | 1 Wpgogo | 1 Custom Post Type Page Template | 2024-08-02 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in Hiroaki Miyashita Custom Post Type Page Template.This issue affects Custom Post Type Page Template: from n/a through 1.1. | ||||
CVE-2023-50017 | 1 Iteachyou | 1 Dreamer Cms | 2024-08-02 | 8.8 High |
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/database/backup | ||||
CVE-2023-49920 | 1 Apache | 1 Airflow | 2024-08-02 | 6.5 Medium |
Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent. Users are advised to upgrade to version 2.8.0 or later which is not affected | ||||
CVE-2023-49844 | 1 Reviewsignal | 1 Wpperformancetester | 2024-08-02 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in Kevin Ohashi WPPerformanceTester.This issue affects WPPerformanceTester: from n/a through 2.0.0. | ||||
CVE-2023-49816 | 1 Whereyoursolutionis | 1 Fix My Feed Rss Repair | 2024-08-02 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in Innovative Solutions Fix My Feed RSS Repair.This issue affects Fix My Feed RSS Repair: from n/a through 1.4. | ||||
CVE-2023-49840 | 1 Palscode | 1 Multi Currency For Woocommerce | 2024-08-02 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in Palscode Multi Currency For WooCommerce.This issue affects Multi Currency For WooCommerce: from n/a through 1.5.5. |