Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-40869

EPSS 5.59% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-40869

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cross Site Scripting vulnerability in mooSocial mooSocial Software 3.1.6 and 3.1.7 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functions.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
mooSocial 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
mooSocial是mooSocial公司的一个多平台、移动就绪、用户友好的脚本。用于构建社区驱动的内容共享和社交网络网站。 mooSocial Software 3.1.6 和 3.1.7版本存在跨站脚本漏洞,该漏洞源于允许远程攻击者通过精心设计的脚本对 edit_menu、copuon 和 group_categorias 函数执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-40869

#POC DescriptionSource LinkShenlong Link
1 Cross Site Scripting vulnerability in mooSocial mooSocial Software v.3.1.6 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functionshttps://github.com/MinoTauro2020/CVE-2023-40869POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-40869

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-09-14 · 41 CVEs total

CVE-2023-261417.5 HIGHMike Perham sidekiq 数据伪造问题漏洞
CVE-2023-255846.3 MEDIUMOut of bounds read in parse_module function in bfd/vms-alpha.c
CVE-2023-326115.5 MEDIUMG_variant_byteswap() can take a long time with some non-normal inputs
CVE-2023-294995.5 MEDIUMGvariant offset table entry size is not checked in is_normal()
CVE-2023-326655.5 MEDIUMGvariant deserialisation does not match spec for non-normal data
CVE-2023-255854.7 MEDIUMField `file_table` of `struct module *module` is uninitialized
CVE-2023-255864.7 MEDIUMLocal variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitial
CVE-2023-255884.7 MEDIUMField `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab
CVE-2023-49652.7 LOWphpipam Header redirect
CVE-2023-37739i-doit 路径遍历漏洞
CVE-2023-37755i-doit 信任管理问题漏洞
CVE-2023-41011China Mobile Intelligent Home Gateway 命令注入漏洞
CVE-2023-39286Mitel Connect Mobility Router 跨站请求伪造漏洞
CVE-2023-39285Mitel MiVoice Connect 跨站请求伪造漏洞
CVE-2023-41010China Telecom Tianyi Home Gateway 安全漏洞
CVE-2023-40779IceWarp Mail Server 输入验证错误漏洞
CVE-2023-36250GNOME Time Tracker 注入漏洞
CVE-2023-42180Lenosp 代码问题漏洞
CVE-2023-42178Lenosp SQL注入漏洞
CVE-2021-28485Ericsson Mobile Switching Center Server 路径遍历漏洞

Showing top 20 of 41 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-40869

No comments yet


Leave a comment