Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
webkul qloapps vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2023-36235
An issue in webkul qloapps before v1.6.0 allows an malicious user to obtain sensitive information via the id_order parameter.
Webkul Qloapps
6.1
CVSSv3
CVE-2023-30256
Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remote malicious user to obtain sensitive information via the back and email_create parameters in the AuthController.php file.
Webkul Qloapps 1.5.2
1 Github repository
7.5
CVSSv3
CVE-2023-36284
An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote malicious user to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire data...
Webkul Qloapps 1.6.0
6.1
CVSSv3
CVE-2023-36287
An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an malicious user to obtain a user's session cookie and then impersonate that user via POST controller parameter.
Webkul Qloapps 1.6.0
5.4
CVSSv3
CVE-2023-36288
An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an malicious user to obtain a user's session cookie and then impersonate that user via GET configure parameter.
Webkul Qloapps 1.6.0
6.1
CVSSv3
CVE-2023-36289
An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an malicious user to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.
Webkul Qloapps 1.6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38002
CVE-2006-4304
CVE-2024-4336
CVE-2024-33437
CVE-2024-4340
CVE-2024-27956
privilege
insecure direct object reference
XSS
item search icon">CVE-2024-25938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started