cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-24023,https://securityvulnerability.io/vulnerability/CVE-2024-24023,SQL Injection Vulnerability in Novel Plus v4.3.0-RC1 and Prior,"A SQL injection vulnerability exists in the Novel-Plus application, specifically affecting versions v4.3.0-RC1 and earlier. This vulnerability allows an attacker to manipulate SQL queries by sending specially crafted parameters such as offset, limit, and sort through the endpoint /novel/bookContent/list. Such exploitation may lead to unauthorized access to sensitive data or database manipulation, posing significant risks to the integrity and confidentiality of the application’s database.",Novel,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T01:15:00.000Z,0 CVE-2024-24026,https://securityvulnerability.io/vulnerability/CVE-2024-24026,Arbitrary File Upload Vulnerability,"An arbitrary file upload vulnerability is present in the Novel-Plus software, specifically in versions 4.3.0-RC1 and prior. This vulnerability is located within the SysUserController at the uploadImg() method, allowing attackers to exploit it by providing a crafted filename parameter. Successfully exploiting this flaw can enable unauthorized file downloads, resulting in potential exposure of sensitive data or system compromise. It is crucial for users and administrators of Novel-Plus to address this issue by updating to the latest software version and reviewing their security postures to mitigate any risks associated with this vulnerability.",Novel-Plus,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T01:15:00.000Z,0 CVE-2024-24024,https://securityvulnerability.io/vulnerability/CVE-2024-24024,Arbitrary File Download Vulnerability Discovered in Novel-Plus v4.3.0-RC1 and Prior,"An arbitrary file download vulnerability has been identified in the Novel-Plus applications prior to version 4.3.0-RC1. This vulnerability occurs due to improper validation of input parameters within the fileDownload() method located in the FileController class. By crafting specific filePath and fileName parameters, an attacker may exploit this flaw to gain unauthorized access to files on the server, potentially compromising sensitive information. Organizations using affected versions of Novel-Plus should review their security measures and apply necessary patches or updates to mitigate this risk.",Novel-Plus,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T01:15:00.000Z,0 CVE-2024-24021,https://securityvulnerability.io/vulnerability/CVE-2024-24021,SQL Injection Vulnerability in Novel Plus v4.3.0-RC1 and Prior,"The vulnerability in Novel-Plus allows for SQL injection attacks due to improper handling of user-supplied parameters in the user feedback listing feature. An attacker exploiting this flaw can manipulate the offset, limit, and sort parameters to execute arbitrary SQL queries, potentially leading to unauthorized access to sensitive data or database corruption. This issue affects version 4.3.0-RC1 and previous versions, necessitating immediate attention from users to find the necessary patches or mitigations.",Novel,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T00:00:00.000Z,0 CVE-2024-24014,https://securityvulnerability.io/vulnerability/CVE-2024-24014,SQL Injection Vulnerability Affects Novel-Plus Products,"A SQL injection vulnerability has been identified in Novel-Plus versions up to and including v4.3.0-RC1. Attackers can exploit this vulnerability by sending specially crafted offset, limit, and sort parameters to the endpoint /novel/author/list. This can enable unauthorized access to the database, allowing malicious actors to perform manipulations such as data extraction or alteration. It is crucial for users of affected versions to implement mitigation strategies or upgrade to secure versions to prevent exploitation.",Novel-Plus,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T00:00:00.000Z,0 CVE-2024-24025,https://securityvulnerability.io/vulnerability/CVE-2024-24025,Arbitrary File Upload Vulnerability,"An arbitrary file upload vulnerability is present in Novel-Plus versions up to and including v4.3.0-RC1, located in the 'upload()' method of FileController within the com.java2nb.common.controller package. This vulnerability permits an attacker to manipulate specially crafted filename parameters, resulting in the potential for arbitrary file downloads. This poses significant risks to the integrity and security of the affected systems, making timely action for remediation a priority.",Novel-Plus,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T00:00:00.000Z,0 CVE-2024-24017,https://securityvulnerability.io/vulnerability/CVE-2024-24017,Novell-Plus SQL Injection Vulnerability,"A SQL injection vulnerability impacts Novel-Plus versions 4.3.0-RC1 and earlier. This flaw enables attackers to craft specific offset, limit, and sort parameters leading to SQL injection attacks through the /common/dict/list endpoint. Successful exploitation may allow unauthorized data access or manipulation, posing significant security risks to users of affected versions.",Novell,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T00:00:00.000Z,0 CVE-2024-24018,https://securityvulnerability.io/vulnerability/CVE-2024-24018,Novell-Plus SQL Injection Vulnerability,"A SQL injection vulnerability has been identified in the Novel-Plus application, specifically affecting version 4.3.0-RC1 and earlier releases. An attacker may exploit this vulnerability by supplying specially crafted parameters, such as offset, limit, and sort commands, through the /system/dataPerm/list endpoint. Successful exploitation can lead to unauthorized access to database information, making it crucial for users of affected versions to apply necessary security patches or mitigations.",Novell,Novel-plus,9.8,CRITICAL,0.0015999999595806003,false,,false,false,false,,,false,false,,2024-02-08T00:00:00.000Z,0 CVE-2024-24019,https://securityvulnerability.io/vulnerability/CVE-2024-24019,Novell-Plus SQL Injection Vulnerability,"A SQL injection vulnerability has been identified in the Novel-Plus application, affecting versions up to v4.3.0-RC1. This weakness allows attackers to manipulate SQL queries by passing crafted offset, limit, and sort parameters through the endpoint /system/roleDataPerm/list. If exploited, this vulnerability could lead to unauthorized access to sensitive data, data corruption, and other malicious activities. It is crucial for users of affected versions to apply necessary updates or mitigations to safeguard against potential attacks.",Novell,Novel-plus,9.8,CRITICAL,0.0013500000350177288,false,,false,false,false,,,false,false,,2024-02-07T00:00:00.000Z,0 CVE-2023-37847,https://securityvulnerability.io/vulnerability/CVE-2023-37847,SQL Injection Vulnerability in Novel-Plus by KingBangQ,"A SQL injection vulnerability has been identified in Novel-Plus version 3.6.2, which allows attackers to manipulate database queries, potentially leading to unauthorized access to sensitive data. This flaw arises from improper input validation, enabling the execution of detrimental SQL commands on the application's database. Users of Novel-Plus are urged to apply security updates and ensure their systems are safeguarded against potential exploitation.",Novel-plus,Novel-plus,9.8,CRITICAL,0.0018599999602884054,false,,false,false,false,,,false,false,,2023-08-14T00:00:00.000Z,0 CVE-2021-30048,https://securityvulnerability.io/vulnerability/CVE-2021-30048,Directory Traversal in Novel-plus Affects File Download Features,"The vulnerability in Novel-plus version 3.5.1 allows an attacker to exploit a directory traversal flaw in the fileDownload function within the FileController. By manipulating the filePath parameter, unauthorized users can read arbitrary files on the server, potentially exposing sensitive information. This issue poses significant risks to data confidentiality and integrity, making it imperative for users of affected versions to apply security updates.",Novel Boutique House-plus Project,Novel Boutique House-plus,5.3,MEDIUM,0.050119999796152115,false,,false,false,false,,,false,false,,2021-04-29T16:21:09.000Z,0