WAFPlanet

CVE Database - Low Severity

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

770
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2024-0052

LOW
3.30 CVSS 3.1

In multiple functions of healthconnect, there is a possible leakage of exercise route data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Missing Authorization
WAF: Low

CVE-2024-23262

LOW
3.30 CVSS 3.1

This issue was addressed with additional entitlement checks. This issue is fixed in visionOS 1.1, iOS 17.4 and iPadOS 17.4, iOS 16.7.6 and iPadOS 16.7.6. An app may be able to spoof system notifications and UI.

Incorrect Authorization
WAF: Low

CVE-2024-23255

LOW
2.40 CVSS 3.1

An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.4, iOS 17.4 and iPadOS 17.4. Photos in the Hidden Photos Album may be viewed without authentication.

Improper Authentication Incorrect Authorization
WAF: Low

CVE-2024-23253

LOW
3.30 CVSS 3.1

A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.4. An app may be able to access a user's Photos Library.

Improper Privilege Management
WAF: Low

CVE-2024-27288

LOW
3.10 CVSS 3.1

1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.10.1-lts, users can use Burp to obtain unauthorized access to the console page. The vulnerability has been fixed in v1.10.1-lts. There are no known workarounds.

Incorrect Authorization
WAF: Low

CVE-2024-1128

LOW
3.50 CVSS 3.1

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 2.6.0. This is due to insufficient sanitization of HTML input in the Q&A functionality. This makes it possible for authenticated attackers, with Student access and above, to inject arbitrary HTML onto a site, though it does not allow Cross-Site Scripting

Cross-Site Scripting (XSS)
WAF: High

CVE-2023-50955

LOW
2.70 CVSS 3.1

IBM InfoSphere Information Server 11.7 could allow an authenticated privileged user to obtain the absolute path of the web server installation which could aid in further attacks against the system. IBM X-Force ID: 275777.

Path Traversal
WAF: High

CVE-2024-0037

LOW
3.30 CVSS 3.1

In applyCustomDescription of SaveUi.java, there is a possible way to view images belonging to a different user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.

Missing Authorization
WAF: Low

CVE-2024-23603

LOW
3.80 CVSS 3.1

An SQL injection vulnerability exists in an undisclosed page of the BIG-IP Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated

SQL Injection
WAF: High

CVE-2023-26592

LOW
3.80 CVSS 3.1

Deserialization of untrusted data in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable a denial of service via local access.

Insecure Deserialization
WAF: Medium

CVE-2024-1433

LOW
3.70 CVSS 3.1

A vulnerability, which was classified as problematic, was found in KDE Plasma Workspace up to 5.93.0. This affects the function EventPluginsManager::enabledPlugins of the file components/calendar/eventpluginsmanager.cpp of the component Theme File Handler. The manipulation of the argument pluginId leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6cdf42916369ebf4ad5bd876c4dfa0170d7b2f01. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-253407. NOTE: This requires write access to user's home or the installation of third party global themes.

Path Traversal
WAF: High

CVE-2024-23319

LOW
3.50 CVSS 3.1

Mattermost Jira Plugin fails to protect against logout CSRF allowing an attacker to post a specially crafted message that would disconnect a user's Jira connection in Mattermost only by viewing the message.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2024-0628

LOW
3.80 CVSS 3.1

The WP RSS Aggregator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.23.5 via the RSS feed source in admin settings. This makes it possible for authenticated attackers, with administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2024-23824

LOW
2.70 CVSS 3.1

mailcow is a dockerized email package, with multiple containers linked in one bridged network. The application is vulnerable to pixel flood attack, once the payload has been successfully uploaded in the logo the application goes slow and doesn't respond in the admin page. It is tested on the versions 2023-12a and prior and patched in version 2024-01.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2023-50785

LOW
2.70 CVSS 3.1

Zoho ManageEngine ADAudit Plus before 7270 allows admin users to view names of arbitrary directories via path traversal.

Path Traversal
WAF: High

CVE-2024-23676

LOW
3.50 CVSS 3.1

In Splunk versions below 9.0.8 and 9.1.3, the “mrollup” SPL command lets a low-privileged user view metrics on an index that they do not have permission to view. This vulnerability requires user interaction from a high-privileged user to exploit.

Improper Input Validation
WAF: Medium

CVE-2024-23329

LOW
3.70 CVSS 3.1

changedetection.io is an open source tool designed to monitor websites for content changes. In affected versions the API endpoint `/api/v1/watch/<uuid>/history` can be accessed by any unauthorized user. As a result any unauthorized user can check one's watch history. However, because unauthorized party first needs to know a watch UUID, and the watch history endpoint itself returns only paths to the snapshot on the server, an impact on users' data privacy is minimal. This issue has been addressed in version 0.45.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Incorrect Authorization
WAF: Low

CVE-2023-2252

LOW
2.70 CVSS 3.1

The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.

Path Traversal
WAF: High

CVE-2023-40439

LOW
3.30 CVSS 3.1

A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to read sensitive location information.

Path Traversal
WAF: High

CVE-2023-40394

LOW
3.30 CVSS 3.1

The issue was addressed with improved validation of environment variables. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to access sensitive user data.

Improper Input Validation
WAF: Medium

CVE-2023-40383

LOW
3.30 CVSS 3.1

A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data.

Path Traversal
WAF: High

CVE-2020-26625

LOW
3.80 CVSS 3.1

A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the 'user_id' parameter after the login portal.

SQL Injection
WAF: High

CVE-2020-26624

LOW
3.80 CVSS 3.1

A SQL injection vulnerability was discovered in Gila CMS 1.15.4 and earlier which allows a remote attacker to execute arbitrary web scripts via the ID parameter after the login portal.

SQL Injection
WAF: High

CVE-2020-26623

LOW
3.80 CVSS 3.1

SQL Injection vulnerability discovered in Gila CMS 1.15.4 and earlier allows a remote attacker to execute arbitrary web scripts via the Area parameter under the Administration>Widget tab after the login portal.

SQL Injection
WAF: High

CVE-2023-52275

LOW
2.10 CVSS 3.1

Gallery3d on Tecno Camon X CA7 devices allows attackers to view hidden images by navigating to data/com.android.gallery3d/.privatealbum/.encryptfiles and guessing the correct image file extension.

Missing Authorization
WAF: Low

CVE-2023-51386

LOW
3.30 CVSS 3.1

Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0.

Improper Privilege Management
WAF: Low

CVE-2023-51651

LOW
3.30 CVSS 3.1

AWS SDK for PHP is the Amazon Web Services software development kit for PHP. Within the scope of requests to S3 object keys and/or prefixes containing a Unix double-dot, a URI path traversal is possible. The issue exists in the `buildEndpoint` method in the RestSerializer component of the AWS SDK for PHP v3 prior to 3.288.1. The `buildEndpoint` method relies on the Guzzle Psr7 UriResolver utility, which strips dot segments from the request path in accordance with RFC 3986. Under certain conditions, this could lead to an arbitrary object being accessed. This issue has been patched in version 3.288.1.

Path Traversal
WAF: High

CVE-2023-3511

LOW
3.50 CVSS 3.1

An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they're not a member of.

Incorrect Authorization
WAF: Low

CVE-2023-6793

LOW
2.70 CVSS 3.1

An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.

Improper Privilege Management
WAF: Low

CVE-2023-6766

LOW
3.50 CVSS 3.1

A vulnerability classified as problematic has been found in PHPGurukul Teacher Subject Allocation Management System 1.0. Affected is an unknown function of the file /admin/course.php of the component Delete Course Handler. The manipulation of the argument delid leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247896.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2023-6120

LOW
2.70 CVSS 3.1

The Welcart e-Commerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.9.6 via the upload_certificate_file function. This makes it possible for administrators to upload .pem or .crt files to arbitrary locations on the server.

Path Traversal
WAF: High

CVE-2023-42569

LOW
3.30 CVSS 3.1

Improper authorization verification vulnerability in AR Emoji prior to SMR Dec-2023 Release 1 allows attackers to read sandbox data of AR Emoji.

Incorrect Authorization
WAF: Low

CVE-2023-4658

LOW
3.10 CVSS 3.1

An issue has been discovered in GitLab EE affecting all versions starting from 8.13 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the `Allowed to merge` permission as a guest user, when granted the permission through a group.

Incorrect Authorization
WAF: Low

CVE-2023-49652

LOW
2.70 CVSS 3.1

Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.

Missing Authorization
WAF: Low

CVE-2023-29066

LOW
3.50 CVSS 3.1

The FACSChorus software does not properly assign data access privileges for operating system user accounts. A non-administrative OS account can modify information stored in the local application data folders.

Improper Privilege Management
WAF: Low

CVE-2023-29062

LOW
3.80 CVSS 3.1

The Operating System hosting the FACSChorus application is configured to allow transmission of hashed user credentials upon user action without adequately validating the identity of the requested resource. This is possible through the use of LLMNR, MBT-NS, or MDNS and will result in NTLMv2 hashes being sent to a malicious entity position on the local network. These hashes can subsequently be attacked through brute force and cracked if a weak password is used. This attack would only apply to domain joined systems.

Improper Authentication
WAF: Low

CVE-2023-48711

LOW
3.70 CVSS 3.1

google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://[email protected]/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue has been addressed in release version 4.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2023-6251

LOW
3.50 CVSS 3.1

Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2023-48226

LOW
3.50 CVSS 3.1

OpenReplay is a self-hosted session replay suite. In version 1.14.0, due to lack of validation Name field - Account Settings (for registration looks like validation is correct), a bad actor can send emails with HTML injected code to the victims. Bad actors can use this to phishing actions for example. Email is really send from OpenReplay, but bad actors can add there HTML code injected (content spoofing). Please notice that during Registration steps for FullName looks like is validated correct - can not type there, but using this kind of bypass/workaround - bad actors can achieve own goal. As of time of publication, no known fixes or workarounds are available.

Improper Input Validation Code Injection
WAF: Medium

CVE-2023-22329

LOW
3.50 CVSS 3.1

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.

Improper Input Validation
WAF: Medium

CVE-2023-36016

LOW
3.40 CVSS 3.1

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

Cross-Site Scripting (XSS)
WAF: High

CVE-2023-37833

LOW
2.70 CVSS 3.1

Improper access control in Elenos ETG150 FM transmitter v3.12 allows attackers to make arbitrary configuration edits that are only accessed by privileged users.

Improper Input Validation
WAF: Medium

CVE-2023-43295

LOW
3.50 CVSS 3.1

Cross Site Request Forgery vulnerability in Click Studios (SA) Pty Ltd Passwordstate v.Build 9785 and before allows a local attacker to execute arbitrary code via a crafted request.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2023-5862

LOW
3.30 CVSS 3.1

Missing Authorization in GitHub repository hamza417/inure prior to Build95.

Missing Authorization
WAF: Low

CVE-2023-5752

LOW
3.30 CVSS 3.1

When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.

Command Injection
WAF: High

CVE-2023-45152

LOW
2.30 CVSS 3.1

Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2023-5193

LOW
2.70 CVSS 3.1

Mattermost fails to properly check permissions when retrieving a post allowing for a System Role with the permission to manage channels to read the posts of a DM conversation.

Incorrect Authorization
WAF: Low

CVE-2023-5159

LOW
2.70 CVSS 3.1

Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots.

Incorrect Authorization
WAF: Low

CVE-2023-41310

LOW
3.30 CVSS 3.1

Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2023-35990

LOW
3.30 CVSS 3.1

The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.

Incorrect Authorization
WAF: Low
Page 5 of 16 (770 CVEs)