CVE-2023-4279
Description
This User Activity Log WordPress plugin before 1.6.7 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
NVD
Severity: HIGH
CVE ID: CVE-2023-4279
CVSS Score: 7.5
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Proof Of Concept
b0marek
Repository for CVE-2023-4279 vulnerability.
Refrence: GitHub
Content on GitHub
H454NSec | watchers:38
CVE-2023-42793
JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit
Refrence: GitHub
Zenmovie | watchers:5
CVE-2023-42793
PoC of CVE-2023-42793
Refrence: GitHub
Zyad-Elsayed | watchers:4
CVE-2023-42793
JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793
Refrence: GitHub
hotplugin0x01 | watchers:2
CVE-2023-42793
JetBrains TeamCity Unauthenticated Remote Code Execution - Python3 Implementation
Refrence: GitHub
johnossawy | watchers:0
CVE-2023-42793_POC
Refrence: GitHub