Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-3849.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-3848 | 3.5 LOW | mooSocial mooDating URL view cross site scripting |
| CVE-2023-3847 | 3.5 LOW | mooSocial mooDating URL users cross site scripting |
| CVE-2023-3846 | 3.5 LOW | mooSocial mooDating URL pages cross site scripting |
| CVE-2023-3845 | 3.5 LOW | mooSocial mooDating URL ajax_invite cross site scripting |
| CVE-2023-3844 | 3.5 LOW | mooSocial mooDating URL friends cross site scripting |
| CVE-2023-3843 | 3.5 LOW | mooSocial mooDating URL question cross site scripting |
No comments yet