Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50573 | In the module "Product Tag Icons Pro" (ticons) before 1.8.4 from MyPresta.eu for PrestaShop, a guest can perform SQL injection. The method TiconProduct::getTiconByProductAndTicon() has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection. |
Tue, 26 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-11-26T15:45:32.462Z
Reserved: 2023-10-23T00:00:00.000Z
Link: CVE-2023-46353
Updated: 2024-08-02T20:45:40.901Z
Status : Modified
Published: 2023-12-06T23:15:07.243
Modified: 2024-11-21T08:28:21.140
Link: CVE-2023-46353
No data.
OpenCVE Enrichment
No data.
EUVD