🛡️ Vuln Watch
Vulnerabilities Package Scanner
🕐 آخر تحديث:
⏭️ التحديث القادم:
⏳ المتبقي: 00:00
الإجمالي: 242213
نتائج: 242213
ص: 2/4845
📡 المصادر:
4.3/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The Forms Rb plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with contribut...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Forms Rb plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.9. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with contributor-level access and above, to read form submission records, modify form configuration options, and delete records belonging to any form they do not own.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.3/10 متوسطة
📝 إدارة محتوى ⚡ CSRF 🎯 عن بعد ⚪ لم تُستغل
💬 The Woo Commerce Minimum Weight plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 3.0.1. This is due to missing nonce verification on the settings update handler in edit-weight.php. This makes it possible for unauthenticated atta...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Woo Commerce Minimum Weight plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 3.0.1. This is due to missing nonce verification on the settings update handler in edit-weight.php. This makes it possible for unauthenticated attackers to modify the minimum order weight setting by tricking a site administrator into clicking a link or visiting an attacker-controlled page containing a forged POST request.

نوع الثغرة

CWE-352 — CSRF

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Shortcodely plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'widget_area' parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contr...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Shortcodely plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'widget_area' parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

6.1/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Pricing Tables for WP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.1.0. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated atta...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Pricing Tables for WP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.1.0. This is due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3/10 متوسطة
📝 إدارة محتوى ⚡ CSRF 🎯 عن بعد ⚪ لم تُستغل
💬 The Skysa Text Ticker App plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the SkysaApps_Admin_AppPage function. This makes it possible for unauthenticated attackers...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Skysa Text Ticker App plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the SkysaApps_Admin_AppPage function. This makes it possible for unauthenticated attackers to trick a site administrator into making a forged request to modify the plugin's settings, including the scrolling message text and URL, via a forged cross-site request via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

نوع الثغرة

CWE-352 — CSRF

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

4.3/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The Coinbase Commerce for Contact Form 7 plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.1.2. This is due to a missing capability check and missing nonce verification in the save_settings() function, which is registered on the admin_p...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Coinbase Commerce for Contact Form 7 plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.1.2. This is due to a missing capability check and missing nonce verification in the save_settings() function, which is registered on the admin_post_cccf7_save_settings hook. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the plugin's Coinbase Commerce API key option (cccf7_api_key) via a crafted POST request to /wp-admin/admin-post.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

5.3/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The HEL Online Classroom: AI-powered Online Classrooms plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.3. This is due to a missing capability check on a REST API endpoint registered with a permission_callback of '__return_true...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The HEL Online Classroom: AI-powered Online Classrooms plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.3. This is due to a missing capability check on a REST API endpoint registered with a permission_callback of '__return_true', which bypasses all WordPress authentication and authorization checks. This makes it possible for unauthenticated attackers to delete any classroom record by supplying its ID in the request, resulting in permanent data loss.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7.2/10 عالية
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The LifePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'n' parameter of the lp_update_mds AJAX action in all versions up to, and including, 2.2.2. This is due to the `wp_ajax_nopriv_lp_update_mds` action being registered without nonce verification...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The LifePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'n' parameter of the lp_update_mds AJAX action in all versions up to, and including, 2.2.2. This is due to the `wp_ajax_nopriv_lp_update_mds` action being registered without nonce verification or capability checks, combined with insufficient input sanitization and output escaping when the series name is rendered in the admin settings page. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

4.8/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The GWD Connect plugin for WordPress is vulnerable to missing authorization to limited code execution in all versions up to, and including, 2.9. This is due to the plugin's standalone agent endpoints (gwd-backup.php and gwd-logs.php) not verifying authentication when the API key ...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The GWD Connect plugin for WordPress is vulnerable to missing authorization to limited code execution in all versions up to, and including, 2.9. This is due to the plugin's standalone agent endpoints (gwd-backup.php and gwd-logs.php) not verifying authentication when the API key has not been configured, which is the default state. This makes it possible for unauthenticated attackers - on unregistered installations only, in certain environments - to execute arbitrary code on the server via the update_agent action, which writes attacker-supplied PHP code to the agent file.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

5.3/10 متوسطة
🌐 متصفح ⚡ CWE-749 🎯 عن بعد ⚪ لم تُستغل
💬 webpack-dev-server versions up to and including 5.2.3 are vulnerable to cross-origin source code exposure when serving over a non-potentially trustworthy origin such as plain HTTP. The previous fix relied on the Sec-Fetch-Mode and Sec-Fetch-Site request headers, which browsers om...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

webpack-dev-server versions up to and including 5.2.3 are vulnerable to cross-origin source code exposure when serving over a non-potentially trustworthy origin such as plain HTTP. The previous fix relied on the Sec-Fetch-Mode and Sec-Fetch-Site request headers, which browsers omit for non-trustworthy origins, allowing a malicious site to load the bundled source as a script and read it across origins. Impact: an attacker controlling a website visited by a developer running webpack-dev-server can recover the application source code when the dev server runs over HTTP at a guessable host and port. Chromium based browsers from Chrome 142 onward are not affected due to local network access restrictions. Upgrade to webpack-dev-server 5.2.4 or later, which sets Cross-Origin-Resource-Policy: same-origin on responses.

نوع الثغرة

CWE-749 — CWE-749

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Credits Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'link' attribute of the 'credits' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Credits Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'link' attribute of the 'credits' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The scratchblocks for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'element' attribute of the 'scratchblocks' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attribut...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The scratchblocks for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'element' attribute of the 'scratchblocks' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Quick Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'style' attribute of the 'qtbl' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it po...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Quick Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'style' attribute of the 'qtbl' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Voyage Plus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the 'post-content' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This mak...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Voyage Plus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the 'post-content' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

5.3/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The Smart Appointment & Booking plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check and a nonce validation logic flaw in the saab_cancel_booking() function in all versions up to, and including, 1.0.8. The nonce check uses && (...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Smart Appointment & Booking plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check and a nonce validation logic flaw in the saab_cancel_booking() function in all versions up to, and including, 1.0.8. The nonce check uses && (AND) instead of || (OR), which means providing any value for the security parameter causes the entire check to be skipped. This makes it possible for unauthenticated attackers to cancel arbitrary bookings by supplying a predictable booking ID.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Fancy Image Show plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `fancy-img-show` shortcode in all versions up to, and including, 9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possi...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Fancy Image Show plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `fancy-img-show` shortcode in all versions up to, and including, 9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

6.5/10 متوسطة
📝 إدارة محتوى ⚡ SQL Injection 🎯 عن بعد ⚪ لم تُستغل
💬 The Eight Day Week Print Workflow plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'title' parameter in the `pp-get-articles` AJAX action in all versions up to, and including, 1.2.6. This is due to insufficient escaping on the user supplied parameter a...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Eight Day Week Print Workflow plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'title' parameter in the `pp-get-articles` AJAX action in all versions up to, and including, 1.2.6. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

نوع الثغرة

CWE-89 — SQL Injection

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The Next Date plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'default' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authe...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Next Date plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'default' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The SP Blog Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'design' attribute of the `wpsbd_post_carousel` shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible ...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The SP Blog Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'design' attribute of the `wpsbd_post_carousel` shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

5.3/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The iPOSpays Gateways WC plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.3.7. This is due to the plugin exposing a REST API endpoint /wp-json/ipospays/v1/save_settings with 'permission_callback' set to '__return_true', which allows un...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The iPOSpays Gateways WC plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.3.7. This is due to the plugin exposing a REST API endpoint /wp-json/ipospays/v1/save_settings with 'permission_callback' set to '__return_true', which allows unauthenticated access without any capability checks or nonce verification. This makes it possible for unauthenticated attackers to update plugin settings, specifically allowing them to overwrite critical payment gateway settings including live API keys, secret keys, and payment tokens stored in the 'woocommerce_ipospays_settings' option.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

4.3/10 متوسطة
📝 إدارة محتوى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr_review() AJAX handler lacks both capability checks and nonce verification. The only access control is an ...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Rate Star Review Vote - AJAX Reviews, Votes, Star Ratings plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. The vwrsr_review() AJAX handler lacks both capability checks and nonce verification. The only access control is an is_user_logged_in() check. When the 'form' parameter is set to 'update', the function takes an arbitrary post ID from the user-supplied 'rating_id' GET parameter, sets it as the post ID in the update array, and passes it directly to wp_update_post(). This overwrites the target post's title, content, author (changed to the attacker's user ID), post_type (changed to the plugin's custom post type, default 'review'), and status. Additionally, update_post_meta() is called on the arbitrary post ID at lines 758-763, modifying its metadata. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title, content, author, post type, and metadata of arbitrary posts and pages on the site via the 'rating_id' parameter, effectively allowing full post content takeover.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.9/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The WP SEO Structured Data Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `_kcseo_ative_tab` parameter in all versions up to, and including, 2.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticate...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The WP SEO Structured Data Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `_kcseo_ative_tab` parameter in all versions up to, and including, 2.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N

8.2/10 عالية
📦 Timetics 🏢 Arraytics 📎 أخرى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Timetics: from n/a through 1.0.53.
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Timetics: from n/a through 1.0.53.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

7.5/10 عالية
📝 إدارة محتوى ⚡ SQL Injection 🎯 عن بعد ⚪ لم تُستغل
💬 The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing SQL query in the getListForTbl() f...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing SQL query in the getListForTbl() function. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This issue is partially mitigated by a patch in version 1.4.11 that adds a nonce check for a nonce that is only available to administrators.

نوع الثغرة

CWE-89 — SQL Injection

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

المراجع

https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/controller.php#L104
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/controller.php#L114
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/controller.php#L132
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/controller.php#L154
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/controller.php#L157
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/frame.php#L282
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/model.php#L162
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/req.php#L194
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/tags/1.4.6/classes/table.php#L265
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/controller.php#L104
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/controller.php#L114
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/controller.php#L132
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/controller.php#L154
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/controller.php#L157
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/frame.php#L282
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/model.php#L162
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/req.php#L194
https://plugins.trac.wordpress.org/browser/ai-copilot-content-generator/trunk/classes/table.php#L265
https://www.wordfence.com/threat-intel/vulnerabilities/id/74c71541-6706-43d2-af3d-0655e59f997c?source=cve
6.4/10 متوسطة
📝 إدارة محتوى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 The BJ Lazy Load plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `filter_images()` function in all versions up to, and including, 1.0.9. This is due to the use of regex-based HTML processing (`preg_replace`) that does not properly handle HTML attribute b...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The BJ Lazy Load plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `filter_images()` function in all versions up to, and including, 1.0.9. This is due to the use of regex-based HTML processing (`preg_replace`) that does not properly handle HTML attribute boundaries when replacing `src` attributes, allowing crafted content inside a `class` attribute value to be promoted to real DOM attributes after processing. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

8.2/10 عالية
📎 أخرى ⚡ CWE-772 🎯 عن بعد ⚪ لم تُستغل
💬 An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections.
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections.

نوع الثغرة

CWE-772 — CWE-772

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

6.1/10 متوسطة
📎 أخرى ⚡ CWE-674 🎯 محلي ⚪ لم تُستغل
💬 Issuing an ICMP ping via the `net ping` shell command to a device's own IPv4 address causes the network stack to recursively re-enter the input path on the same system work-queue stack. Because the destination is recognized as a local address, both the echo request and the result...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

Issuing an ICMP ping via the `net ping` shell command to a device's own IPv4 address causes the network stack to recursively re-enter the input path on the same system work-queue stack. Because the destination is recognized as a local address, both the echo request and the resulting echo reply are processed inline before the current frame returns. The nested input-path frames exceed the work-queue stack and trigger a stack overflow.

نوع الثغرة

CWE-674 — CWE-674

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

5.4/10 متوسطة
📎 أخرى ⚡ Incorrect Permissions 🎯 عن بعد ⚪ لم تُستغل
💬 A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH.
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH.

نوع الثغرة

CWE-732 — Incorrect Permissions

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

6.7/10 متوسطة
📎 أخرى ⚡ CWE-35 🎯 محلي ⚪ لم تُستغل
💬 An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, a...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

نوع الثغرة

CWE-35 — CWE-35

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6/10 متوسطة
📎 أخرى ⚡ CWE-1287 🎯 محلي ⚪ لم تُستغل
💬 An ACAP configuration file lacked sufficient input validation, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and ...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

An ACAP configuration file lacked sufficient input validation, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

نوع الثغرة

CWE-1287 — CWE-1287

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

6.7/10 متوسطة
📎 أخرى ⚡ Incorrect Permissions 🎯 محلي ⚪ لم تُستغل
💬 ACAP applications can gain elevated privileges due to improper input validation during the installation process, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP appli...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

ACAP applications can gain elevated privileges due to improper input validation during the installation process, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

نوع الثغرة

CWE-732 — Incorrect Permissions

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

9.1/10 حرجة
📎 أخرى ⚡ Certificate Validation 🎯 عن بعد ⚪ لم تُستغل
💬 "Kura Sushi Official App" provided by EPG, Inc. is vulnerable to improper certificate validation. A man-in-the-middle attack may allow eavesdropping on, or altering, the communication on push notifications between the affected application and the relevant server.
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

"Kura Sushi Official App" provided by EPG, Inc. is vulnerable to improper certificate validation. A man-in-the-middle attack may allow eavesdropping on, or altering, the communication on push notifications between the affected application and the relevant server.

نوع الثغرة

CWE-295 — Certificate Validation

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

4.6/10 متوسطة
📎 أخرى ⚡ Path Traversal 🎯 محلي ⚪ لم تُستغل
💬 The automatic folder creation feature of Lhaz and Lhaz+ provided by Chitora soft contains a path traversal vulnerability. When the affected product is configured with the automatic folder creation feature enabled, and a product user tries to extract an archive file which has a cr...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The automatic folder creation feature of Lhaz and Lhaz+ provided by Chitora soft contains a path traversal vulnerability. When the affected product is configured with the automatic folder creation feature enabled, and a product user tries to extract an archive file which has a crafted file name, then the archived files may be extracted to an unexpected folder.

نوع الثغرة

CWE-22 — Path Traversal

CVSS Vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

حرجة
📦 housecallpro 📌 1.0.1 ⛓️‍💥 هجوم سلسلة التوريد 🟨 مكتبة JavaScript npm ⚡ Malicious Code 🎯 supply chain ☠️ كود خبيث 🔴 مستغلة
💬 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ossf-package-analysis (6e95d04cb7977b9da45686f61f19767b33fb3e4fd1af5081b1a27acfd9ee9337) The OpenSSF Package Analysis project identified 'housecallpro' @ 1.0.1 (npm) as malicious. It is considered malicious...
📅 2026-05-12 OSV/npm 🔗 التفاصيل

الوصف الكامل

--- _-= Per source details. Do not edit below this line.=-_ ## Source: ossf-package-analysis (6e95d04cb7977b9da45686f61f19767b33fb3e4fd1af5081b1a27acfd9ee9337) The OpenSSF Package Analysis project identified 'housecallpro' @ 1.0.1 (npm) as malicious. It is considered malicious because: - The package communicates with a domain associated with malicious activity.

الإصدارات المتأثرة

1.0.1

المراجع

حرجة
📦 ml-toolkit-ts 📌 1.0.4, 1.0.5 ⛓️‍💥 هجوم سلسلة التوريد 🟨 مكتبة JavaScript npm ⚡ Malicious Code 🎯 supply chain ☠️ كود خبيث 🔴 مستغلة
💬 --- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The pac...
📅 2026-05-12 OSV/npm 🔗 التفاصيل

الوصف الكامل

--- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The package will steal credentials and then propogate it to every package it has access to. The package also attempts to remain persistent.

الإصدارات المتأثرة

1.0.4, 1.0.5

🚨 مؤشرات الاختراق (IOCs)

Domains: git-tanstack.com, filev2.getsession.org, api.masscan.cloud, seed1.getsession.org

حرجة
📦 agentwork-cli 📌 All versions < 0.1.4, 0.1.5 ⛓️‍💥 هجوم سلسلة التوريد 🟨 مكتبة JavaScript npm ⚡ Malicious Code 🎯 supply chain ☠️ كود خبيث 🔴 مستغلة
💬 --- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The pac...
📅 2026-05-12 OSV/npm 🔗 التفاصيل

الوصف الكامل

--- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The package will steal credentials and then propogate it to every package it has access to. The package also attempts to remain persistent.

الإصدارات المتأثرة

All versions < 0.1.4, 0.1.5

🚨 مؤشرات الاختراق (IOCs)

Domains: git-tanstack.com, filev2.getsession.org, api.masscan.cloud, seed1.getsession.org

حرجة
📦 mistralai 📌 2.4.6 ⛓️‍💥 هجوم سلسلة التوريد 🐍 مكتبة Python PyPI ⚡ Malicious Code 🎯 supply chain ☠️ كود خبيث 🔴 مستغلة
💬 --- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The pac...
📅 2026-05-12 OSV/PyPI 🔗 التفاصيل

الوصف الكامل

--- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The package will steal credentials and then propogate it to every package it has access to. The package also attempts to remain persistent.

الإصدارات المتأثرة

2.4.6

🚨 مؤشرات الاختراق (IOCs)

Domains: git-tanstack.com, filev2.getsession.org, api.masscan.cloud, seed1.getsession.org

حرجة
📦 guardrails-ai 📌 All versions < 0.10.1 ⛓️‍💥 هجوم سلسلة التوريد 🐍 مكتبة Python PyPI ⚡ Malicious Code 🎯 supply chain ☠️ كود خبيث 🔴 مستغلة
💬 --- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The pac...
📅 2026-05-12 OSV/PyPI 🔗 التفاصيل

الوصف الكامل

--- _-= Per source details. Do not edit below this line.=-_ ## Source: google-open-source-security (5e1924464368f0c5816ee84e000cc47017f44045140feafbbc9e685d847ed5a5) This package was compromised as part of the "Mini Shai-Hulud is back" worm by the TeamPCP threat actor. The package will steal credentials and then propogate it to every package it has access to. The package also attempts to remain persistent.

الإصدارات المتأثرة

All versions < 0.10.1

🚨 مؤشرات الاختراق (IOCs)

Domains: git-tanstack.com, filev2.getsession.org, api.masscan.cloud, seed1.getsession.org

حرجة
📦 hedwig-tsconfig 📌 99.8.1 ⛓️‍💥 هجوم سلسلة التوريد 🟨 مكتبة JavaScript npm ⚡ Malicious Code 🎯 supply chain ☠️ كود خبيث 🔴 مستغلة
💬 --- _-= Per source details. Do not edit below this line.=-_ ## Source: ossf-package-analysis (1a650b67b76184573f147a7b286249b1de734cfa85647aea9a9bea3284e155f8) The OpenSSF Package Analysis project identified 'hedwig-tsconfig' @ 99.8.1 (npm) as malicious. It is considered malic...
📅 2026-05-12 OSV/npm 🔗 التفاصيل

الوصف الكامل

--- _-= Per source details. Do not edit below this line.=-_ ## Source: ossf-package-analysis (1a650b67b76184573f147a7b286249b1de734cfa85647aea9a9bea3284e155f8) The OpenSSF Package Analysis project identified 'hedwig-tsconfig' @ 99.8.1 (npm) as malicious. It is considered malicious because: - The package communicates with a domain associated with malicious activity. - The package executes one or more commands associated with malicious behavior.

الإصدارات المتأثرة

99.8.1

المراجع

7.5/10 عالية
📟 جهاز ⚡ Buffer Overflow 🎯 عن بعد ⚪ لم تُستغل
💬 ** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C0 could allow an attacker to trigger ...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C0 could allow an attacker to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request to a vulnerable device.

نوع الثغرة

CWE-120 — Buffer Overflow

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

4.4/10 متوسطة
📟 جهاز ⚡ CWE-922 🎯 محلي ⚪ لم تُستغل
💬 ** UNSUPPORTED WHEN ASSIGNED ** An insecure storage of sensitive information vulnerability in the configuration file of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow a local attacker with administrator privileges to download and decrypt a backup configuration file...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

** UNSUPPORTED WHEN ASSIGNED ** An insecure storage of sensitive information vulnerability in the configuration file of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow a local attacker with administrator privileges to download and decrypt a backup configuration file.

نوع الثغرة

CWE-922 — CWE-922

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

8.8/10 عالية
📟 جهاز ⚡ OS Command Injection 🎯 شبكة محلية ⚪ لم تُستغل
💬 ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device by sending a crafted HTTP request...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device by sending a crafted HTTP request.

نوع الثغرة

CWE-78 — OS Command Injection

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.5/10 متوسطة
📟 جهاز ⚡ CWE-307 🎯 شبكة محلية ⚪ لم تُستغل
💬 ** UNSUPPORTED WHEN ASSIGNED ** An improper restriction of excessive authentication attempts vulnerability in the web management interface of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to brute-force the password and bypass authe...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

** UNSUPPORTED WHEN ASSIGNED ** An improper restriction of excessive authentication attempts vulnerability in the web management interface of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to brute-force the password and bypass authentication.

نوع الثغرة

CWE-307 — CWE-307

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.1/10 عالية
📎 أخرى ⚡ CSRF 🎯 عن بعد ⚪ لم تُستغل
💬 The Salesforce module before 1.x-1.0.1 for Backdrop CMS does not properly use a random state parameter to protect the authorization flow against CSRF attacks.
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

The Salesforce module before 1.x-1.0.1 for Backdrop CMS does not properly use a random state parameter to protect the authorization flow against CSRF attacks.

نوع الثغرة

CWE-352 — CSRF

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L

6.1/10 متوسطة
📎 أخرى ⚡ XSS 🎯 عن بعد ⚪ لم تُستغل
💬 SAP TAF_APPLAUNCHER within Business Server Pages allows an unauthenticated attacker to craft malicious links that, when clicked by a victim, redirects them to attacker?controlled sites, potentially exposing or altering sensitive information in the victim�s browser. This results i...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

SAP TAF_APPLAUNCHER within Business Server Pages allows an unauthenticated attacker to craft malicious links that, when clicked by a victim, redirects them to attacker?controlled sites, potentially exposing or altering sensitive information in the victim�s browser. This results in a low impact on confidentiality and integrity, with no impact on the availability of the application.

نوع الثغرة

CWE-79 — XSS

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3/10 متوسطة
📎 أخرى ⚡ CWE-404 🎯 عن بعد ⚪ لم تُستغل
💬 SAP Financial Consolidation allows an authenticated attacker to disconnect other users by terminating their sessions temporarily preventing access. However, the application itself cannot be compromised resulting in a low impact on availability. There is no impact on confidentiali...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

SAP Financial Consolidation allows an authenticated attacker to disconnect other users by terminating their sessions temporarily preventing access. However, the application itself cannot be compromised resulting in a low impact on availability. There is no impact on confidentiality and integrity of the data

نوع الثغرة

CWE-404 — CWE-404

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

6.5/10 متوسطة
📎 أخرى ⚡ Command Injection 🎯 عن بعد ⚪ لم تُستغل
💬 An OS Command Injection vulnerability exists in the SAP NetWeaver Application Server for ABAP and ABAP Platform that allows an authenticated attacker with administrative access to execute specially crafted shell commands on the server, bypassing the logging mechanism. This allows...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

An OS Command Injection vulnerability exists in the SAP NetWeaver Application Server for ABAP and ABAP Platform that allows an authenticated attacker with administrative access to execute specially crafted shell commands on the server, bypassing the logging mechanism. This allows the execution of unintended OS commands without detection, potentially impacting the integrity and availability of the application, with no impact on confidentiality.

نوع الثغرة

CWE-77 — Command Injection

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

4.3/10 متوسطة
📎 أخرى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 Due to insufficient authorization checks in the SAP Incentive and Commission Management application, authenticated users could invoke a remote-enabled function module to perform table update operations. This vulnerability has a low impact on integrity with no impact on confidenti...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

Due to insufficient authorization checks in the SAP Incentive and Commission Management application, authenticated users could invoke a remote-enabled function module to perform table update operations. This vulnerability has a low impact on integrity with no impact on confidentiality and availability of the application.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

6.3/10 متوسطة
📎 أخرى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 Due to missing authorization check in SAP S/4HANA Condition Maintenance, an authenticated attacker could gain unauthorized access to view and modify condition table records, resulting in low impact on the confidentiality and integrity of the data. Additionally, this vulnerability...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

Due to missing authorization check in SAP S/4HANA Condition Maintenance, an authenticated attacker could gain unauthorized access to view and modify condition table records, resulting in low impact on the confidentiality and integrity of the data. Additionally, this vulnerability may prevent the legitimate user from accessing the records, causing low impact on application availability.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

5.4/10 متوسطة
📎 أخرى ⚡ Missing Authorization 🎯 عن بعد ⚪ لم تُستغل
💬 Due to missing authorization check in SAP Strategic Enterprise Management (Scorecard Wizard in Business Server Pages), an authenticated attacker could access information that they are otherwise unauthorized to view. This vulnerability also enables the attacker to change the defau...
📅 2026-05-12 NVD 🔗 التفاصيل

الوصف الكامل

Due to missing authorization check in SAP Strategic Enterprise Management (Scorecard Wizard in Business Server Pages), an authenticated attacker could access information that they are otherwise unauthorized to view. This vulnerability also enables the attacker to change the default settings and modify value fields, which will mislead risk evaluations and falsely lower assessed risk levels. This results in a low impact on the confidentiality and integrity of the data. There is no impact on the application�s availability.

نوع الثغرة

CWE-862 — Missing Authorization

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N