CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-40621
SAP PowerDesigner Client - version 16.7, allows an unauthenticated attacker to inject VBScript code in a document and have it opened by an unsuspecting user, to have it executed by the application on behalf of the user. The application has a security option to disable or prompt users before untrusted scripts are executed, but this is not set as default.
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2023-08-17T18:10:44.965Z
2023-09-12T02:10:22.051Z
2023-09-12T02:10:22.051Z
{'Vendor': 'SAP_SE', 'Product': 'SAP PowerDesigner Client', 'Versions': '16.7'}
CVE-2023-40271
In Trusted Firmware-M through TF-Mv1.8.0, for platforms that integrate the CryptoCell accelerator, when the CryptoCell PSA Driver software Interface is selected, and the Authenticated Encryption with Associated Data Chacha20-Poly1305 algorithm is used, with the single-part verification function (defined during the build-time configuration phase) implemented with a dedicated function (i.e., not relying on usage of multipart functions), the buffer comparison during the verification of the authentication tag does not happen on the full 16 bytes but just on the first 4 bytes, thus leading to the possibility that unauthenticated payloads might be identified as authentic. This affects TF-Mv1.6.0, TF-Mv1.6.1, TF-Mv1.7.0, and TF-Mv1.8.
https://tf-m-user-guide.trustedfirmware.org/releases/index.html
2023-08-11T00:00:00
2023-09-08T00:00:00
2023-09-08T01:59:45.526188
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40363
IBM InfoSphere Information Server 11.7 could allow an authenticated user to change installation files due to incorrect file permission settings. IBM X-Force ID: 263332.
https://www.ibm.com/support/pages/node/7070742
2023-08-14T20:12:04.114Z
2023-11-18T17:14:04.546Z
2023-11-18T17:14:04.546Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-40699
IBM InfoSphere Information Server 11.7 could allow a remote attacker to cause a denial of service due to improper input validation. IBM X-Force ID: 265161.
https://www.ibm.com/support/pages/node/7067714
2023-08-18T15:48:17.571Z
2023-12-01T20:59:35.849Z
2023-12-01T20:59:35.849Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-40676
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jason Crouse, VeronaLabs Slimstat Analytics plugin <= 5.0.8 versions.
https://patchstack.com/database/vulnerability/wp-slimstat/wordpress-slimstat-analytics-plugin-5-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-18T15:18:28.337Z
2023-09-27T06:45:17.760Z
2023-09-27T06:45:17.760Z
{'Vendor': 'Jason Crouse, VeronaLabs', 'Product': 'Slimstat Analytics', 'Versions': 'n/a'}
CVE-2023-40898
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter timeZone at /goform/SetSysTimeCfg.
https://github.com/peris-navince/founded-0-days/blob/main/ac8/SetSysTimeCfg/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:07:16.181061
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40932
A Cross-site scripting (XSS) vulnerability in Nagios XI version 5.11.1 and below allows authenticated attackers with access to the custom logo component to inject arbitrary javascript or HTML via the alt-text field. This affects all pages containing the navbar including the login page which means the attacker is able to to steal plaintext credentials.
http://nagios.com
2023-08-22T00:00:00
2023-09-19T00:00:00
2023-09-19T22:28:43.238572
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40461
The ACEManager component of ALEOS 4.16 and earlier allows an authenticated user with Administrator privileges to access a file upload field which does not fully validate the file name, creating a Stored Cross-Site Scripting condition.
https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
2023-08-14T20:59:20.798Z
2023-12-04T22:52:13.650Z
2023-12-04T22:52:13.650Z
{'Vendor': 'SierraWireless', 'Product': 'ALEOS', 'Versions': '4.10, 0'}
CVE-2023-40031
Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer write overflow in `Utf8_16_Read::convert`. This issue may lead to arbitrary code execution. As of time of publication, no known patches are available in existing versions of Notepad++.
https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
2023-08-08T13:46:25.244Z
2023-08-25T19:49:23.433Z
2023-08-25T20:18:23.949Z
{'Vendor': 'notepad-plus-plus', 'Product': 'notepad-plus-plus', 'Versions': '<= 8.5.6'}
CVE-2023-40174
Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. Insufficient session expiration is a web application security vulnerability that occurs when a web application does not properly manage the lifecycle of a user's session. Social media skeleton releases prior to 1.0.5 did not properly limit manage user session lifecycles. This issue has been addressed in version 1.0.5 and users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-cr5c-ggwq-g4hq
2023-08-09T15:26:41.052Z
2023-08-18T21:41:53.666Z
2023-08-18T21:41:53.666Z
{'Vendor': 'fobybus', 'Product': 'social-media-skeleton', 'Versions': '< 1.0.5'}
CVE-2023-40877
DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_edit.php via the title parameter.
https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss4.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T14:34:18.918552
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40748
PHPJabbers Food Delivery Script 3.0 has a SQL injection (SQLi) vulnerability in the "q" parameter of index.php.
https://www.phpjabbers.com/food-delivery-script/
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:50:46.509217
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40436
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. An attacker may be able to cause unexpected system termination or read kernel memory.
https://support.apple.com/en-us/HT213940
2023-08-14T20:26:36.261Z
2023-09-26T20:12:06.222Z
2023-09-26T20:12:06.222Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40123
In updateActionViews of PipMenuView.java, there is a possible bypass of a multi user security boundary due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9
2023-08-09T02:29:33.868Z
2023-10-27T20:22:56.908Z
2023-10-27T20:22:56.908Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-40573
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki supports scheduled jobs that contain Groovy scripts. Currently, the job checks the content author of the job for programming right. However, modifying or adding a job script to a document doesn't modify the content author. Together with a CSRF vulnerability in the job scheduler, this can be exploited for remote code execution by an attacker with edit right on the wiki. If the attack is successful, an error log entry with "Job content executed" will be produced. This vulnerability has been patched in XWiki 14.10.9 and 15.4RC1.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8xhr-x3v8-rghj
2023-08-16T18:24:02.390Z
2023-08-24T01:31:14.128Z
2023-08-24T01:31:14.128Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.10.9, >= 1.3, >= 15.0-rc-1, < 15.4-rc-1'}
CVE-2023-40089
In getCredentialManagerPolicy of DevicePolicyManagerService.java, there is a possible method for users to select credential managers without permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e
2023-08-09T02:29:29.982Z
2023-12-04T22:40:52.874Z
2023-12-22T00:16:49.776Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'}
CVE-2023-40420
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.258Z
2023-09-26T20:12:06.706Z
2023-09-26T20:12:06.706Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40135
In applyCustomDescription of SaveUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
2023-08-09T02:29:36.075Z
2023-10-27T20:22:58.641Z
2023-10-27T20:22:58.641Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-40359
xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature.
https://invisible-island.net/xterm/xterm.log.html#xterm_380
2023-08-14T00:00:00
2023-08-14T00:00:00
2023-09-07T05:58:18.896782
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40709
An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02
2023-08-18T19:31:53.417Z
2023-08-24T16:08:47.919Z
2023-08-24T16:08:47.919Z
{'Vendor': 'OPTO 22', 'Product': 'SNAP PAC S1', 'Versions': 'R10.3b'}
CVE-2023-40027
Keystone is an open source headless CMS for Node.js — built with GraphQL and React. When `ui.isAccessAllowed` is set as `undefined`, the `adminMeta` GraphQL query is publicly accessible (no session required). This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible (no session required) if a `session` strategy is not defined. This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, `isAccessAllowed` is not `undefined`). This vulnerability does affect users who believed that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. Users are advised to upgrade. Users unable to upgrade may opt to write their own `isAccessAllowed` functionality to work-around this vulnerability.
https://github.com/keystonejs/keystone/security/advisories/GHSA-9cvc-v7wm-992c
2023-08-08T13:46:25.243Z
2023-08-15T17:45:54.439Z
2023-08-15T17:45:54.439Z
{'Vendor': 'keystonejs', 'Product': 'keystone', 'Versions': '< 5.5.1'}
CVE-2023-40924
SolarView Compact < 6.00 is vulnerable to Directory Traversal.
https://nvd.nist.gov/vuln/detail/CVE-2023-33620
2023-08-22T00:00:00
2023-09-08T00:00:00
2023-09-08T12:32:06.653398
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40532
Path traversal vulnerability in Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with author or higher privilege to obtain partial information of the files on the web server.
https://www.welcart.com/archives/20106.html
2023-09-20T04:37:57.608Z
2023-09-26T08:14:17.836Z
2023-09-26T08:14:17.836Z
{'Vendor': 'Collne Inc.', 'Product': 'Welcart e-Commerce', 'Versions': 'versions 2.7 to 2.8.21'}
CVE-2023-40683
IBM OpenPages with Watson 8.3 and 9.0 could allow remote attacker to bypass security restrictions, caused by insufficient authorization checks. By authenticating as an OpenPages user and using non-public APIs, an attacker could exploit this vulnerability to bypass security and gain unauthorized administrative access to the application. IBM X-Force ID: 264005.
https://www.ibm.com/support/pages/node/7107774
2023-08-18T15:48:06.501Z
2024-01-19T00:54:43.947Z
2024-01-19T00:54:43.947Z
{'Vendor': 'IBM', 'Product': 'OpenPages with Watson', 'Versions': '8.3, 9.0'}
CVE-2023-40729
A vulnerability has been identified in QMS Automotive (All versions < V12.39). The affected application lacks security control to prevent unencrypted communication without HTTPS. An attacker who managed to gain machine-in-the-middle position could manipulate, or steal confidential information.
https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf
2023-08-21T10:57:08.486Z
2023-09-12T09:32:29.661Z
2023-09-12T09:32:29.661Z
{'Vendor': 'Siemens', 'Product': 'QMS Automotive', 'Versions': 'All versions < V12.39'}
CVE-2023-40816
OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Milestone Name Field.
https://www.esecforte.com/cve-2023-40816-html-injection-activity-milestone/
2023-08-22T00:00:00
2023-11-18T00:00:00
2023-11-18T03:12:09.369454
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40953
icms 7.0.16 is vulnerable to Cross Site Request Forgery (CSRF).
https://www.icmsdev.com/
2023-08-22T00:00:00
2023-09-08T00:00:00
2023-09-08T02:12:49.141781
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40400
This issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. A remote user may cause an unexpected app termination or arbitrary code execution.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.254Z
2023-09-26T20:14:30.575Z
2023-09-26T20:14:30.575Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40050
Upload profile either through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec check command with maliciously crafted profile allows remote code execution.
https://docs.chef.io/release_notes_automate/
2023-08-08T19:44:41.112Z
2023-10-31T14:07:59.881Z
2023-10-31T14:07:59.881Z
{'Vendor': 'Progress Software Corporation', 'Product': 'Chef Automate', 'Versions': '4.0.0'}
CVE-2023-40791
extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.
https://lkml.org/lkml/2023/8/3/323
2023-08-22T00:00:00
2023-10-16T00:00:00
2023-11-10T18:06:24.170523
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40841
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "add_white_node,"
https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/5/5.md
2023-08-22T00:00:00
2023-08-30T00:00:00
2023-08-30T16:29:32.808531
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40142
In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-08-09T02:29:36.076Z
2023-10-11T19:27:08.329Z
2023-10-11T19:27:09.716Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-40007
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ujwol Bastakoti CT Commerce plugin <= 2.0.1 versions.
https://patchstack.com/database/vulnerability/ct-commerce/wordpress-ct-commerce-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-08T12:57:23.979Z
2023-09-06T08:29:57.185Z
2023-09-06T08:29:57.185Z
{'Vendor': 'Ujwol Bastakoti', 'Product': 'CT Commerce', 'Versions': 'n/a'}
CVE-2023-40904
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.
https://github.com/peris-navince/founded-0-days/blob/main/ac10/formSetMacFilterCfg/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:23:52.268145
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40338
Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier displays an error message that includes an absolute path of a log file when attempting to access the Scan Organization Folder Log if no logs are available, exposing information about the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109
2023-08-14T16:02:56.435Z
2023-08-16T14:32:50.674Z
2023-10-24T12:51:21.687Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Folders Plugin', 'Versions': '0'}
CVE-2023-40292
Harman Infotainment 20190525031613 and later discloses the IP address via CarPlay CTRL packets.
https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
2023-08-14T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40787
In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
https://sword.bladex.cn/
2023-08-22T00:00:00
2023-08-29T00:00:00
2023-08-29T12:46:39.067352
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40857
Buffer Overflow vulnerability in VirusTotal yara v.4.3.2 allows a remote attacker to execute arbtirary code via the yr_execute_cod function in the exe.c component.
https://github.com/VirusTotal/yara/issues/1945
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T21:09:52.567555
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40441
A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.261Z
2023-09-26T20:14:31.110Z
2023-09-26T20:14:31.110Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40800
The compare_parentcontrol_time function does not authenticate user input parameters, resulting in a post-authentication stack overflow vulnerability in Tenda AC23 v16.03.07.45_cn.
https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time
2023-08-22T00:00:00
2023-08-25T00:00:00
2023-08-25T14:56:32.519752
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40103
In multiple locations, there is a possible way to corrupt memory due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae
2023-08-09T02:29:31.020Z
2023-12-04T22:40:54.653Z
2023-12-22T00:16:53.368Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'}
CVE-2023-40553
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Plausible.Io Plausible Analytics plugin <= 1.3.3 versions.
https://patchstack.com/database/vulnerability/plausible-analytics/wordpress-plausible-analytics-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-16T11:15:05.044Z
2023-09-06T08:20:32.274Z
2023-09-06T08:20:32.274Z
{'Vendor': 'Plausible.io', 'Product': 'Plausible Analytics', 'Versions': 'n/a'}
CVE-2023-40046
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a SQL injection vulnerability exists in the WS_FTP Server manager interface. An attacker may be able to infer information about the structure and contents of the database and execute SQL statements that alter or delete database elements.
https://www.progress.com/ws_ftp
2023-08-08T19:44:41.112Z
2023-09-27T14:50:18.549Z
2023-09-27T15:23:03.495Z
{'Vendor': 'Progress Software Corporation', 'Product': 'WS_FTP Server', 'Versions': '8.8.0, 8.7.0'}
CVE-2023-40416
The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Processing an image may result in disclosure of process memory.
https://support.apple.com/en-us/HT213981
2023-08-14T20:26:36.258Z
2023-10-25T18:31:40.185Z
2023-10-25T18:31:40.185Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40945
Sourcecodester Doctor Appointment System 1.0 is vulnerable to SQL Injection in the variable $userid at doctors\myDetails.php.
https://github.com/KLSEHB/vulnerability-report/blob/main/Doctormms_CVE-2023-40945
2023-08-22T00:00:00
2023-09-11T00:00:00
2023-09-11T19:22:04.955929
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40601
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Estatik Estatik Mortgage Calculator plugin <= 2.0.7 versions.
https://patchstack.com/database/vulnerability/estatik-mortgage-calculator/wordpress-mortgage-calculator-estatik-plugin-2-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-17T10:47:42.477Z
2023-09-06T08:45:41.448Z
2023-09-06T08:45:41.448Z
{'Vendor': 'Estatik', 'Product': 'Estatik Mortgage Calculator', 'Versions': 'n/a'}
CVE-2023-40251
Missing Encryption of Sensitive Data vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Man in the Middle Attack.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.
https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html
2023-08-11T01:54:13.646Z
2023-08-17T06:54:14.152Z
2024-01-23T00:56:07.979Z
{'Vendor': 'Genians', 'Product': 'Genian NAC V4.0', 'Versions': 'V4.0.0'}
CVE-2023-40744
null
null
2023-09-19T15:42:15.229Z
null
2023-10-02T17:15:21.053Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-40314
Cross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Moshe Apelbaum for reporting this issue.
https://github.com/OpenNMS/opennms/pull/6791
2023-08-14T13:02:51.889Z
2023-11-16T21:14:07.488Z
2023-11-16T21:14:07.488Z
{'Vendor': ' The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8'}
CVE-2023-40197
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Devaldi Ltd flowpaper plugin <= 1.9.9 versions.
https://patchstack.com/database/vulnerability/flowpaper-lite-pdf-flipbook/wordpress-flowpaper-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-10T11:31:18.458Z
2023-09-04T11:27:12.862Z
2023-09-04T11:27:12.862Z
{'Vendor': 'Devaldi Ltd', 'Product': 'flowpaper', 'Versions': 'n/a'}
CVE-2023-40894
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetStaticRouteCfg.
https://github.com/peris-navince/founded-0-days/blob/main/ac8/fromSetStaticRouteCfg/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:11:50.641505
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40178
Node-SAML is a SAML library not dependent on any frameworks that runs in Node. The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale. This issue was patched in version 4.0.5.
https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw
2023-08-09T15:26:41.052Z
2023-08-23T20:15:23.057Z
2023-08-23T20:15:23.057Z
{'Vendor': 'node-saml', 'Product': 'node-saml', 'Versions': '< 4.0.5'}
CVE-2023-40528
This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 17, watchOS 10, macOS Sonoma 14, iOS 17 and iPadOS 17, macOS Ventura 13.6.4. An app may be able to bypass Privacy preferences.
https://support.apple.com/en-us/HT213938
2023-08-14T21:54:53.723Z
2024-01-23T00:25:18.752Z
2024-01-23T00:25:18.752Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40206
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in hwk-fr WP 404 Auto Redirect to Similar Post plugin <= 1.0.3 versions.
https://patchstack.com/database/vulnerability/wp-404-auto-redirect-to-similar-post/wordpress-wp-404-auto-redirect-to-similar-post-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-10T13:20:36.816Z
2023-09-04T10:43:04.660Z
2023-09-04T10:43:04.660Z
{'Vendor': 'hwk-fr', 'Product': 'WP 404 Auto Redirect to Similar Post', 'Versions': 'n/a'}
CVE-2023-40656
A reflected XSS vulnerability was discovered in the Quickform component for Joomla.
https://extensions.joomla.org/extension/quickform/
2023-08-18T04:29:42.287Z
2023-12-14T08:51:59.728Z
2023-12-14T08:51:59.728Z
{'Vendor': 'plasma-web.ru', 'Product': 'Quickform component for Joomla', 'Versions': '1.0.0-3.3.01'}
CVE-2023-40343
Jenkins Tuleap Authentication Plugin 1.1.20 and earlier uses a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229
2023-08-14T16:02:56.435Z
2023-08-16T14:32:53.909Z
2023-10-24T12:51:27.502Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Tuleap Authentication Plugin', 'Versions': '0'}
CVE-2023-40969
Senayan Library Management Systems SLIMS 9 Bulian v9.6.1 is vulnerable to Server Side Request Forgery (SSRF) via admin/modules/bibliography/pop_p2p.php.
https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SSRF-pop_p2p.md
2023-08-22T00:00:00
2023-09-01T00:00:00
2023-09-01T10:20:42.668258
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40590
GitPython is a python library used to interact with Git repositories. When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment. GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. There is no fix currently available for windows users, however there are a few mitigations. 1: Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). 2: Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. 3: Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. 4: Resolve the executable manually by only looking into the `PATH` environment variable.
https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4
2023-08-16T18:24:02.392Z
2023-08-28T17:24:09.965Z
2023-08-28T17:24:09.965Z
{'Vendor': 'gitpython-developers', 'Product': 'GitPython', 'Versions': '<= 3.1.32'}
CVE-2023-40986
A stored cross-site scripting (XSS) vulnerability in the Usermin Configuration function of Webmin v2.100 allows attackers to execute arbitrary web sripts or HTML via a crafted payload injected into the Custom field.
http://webmin.com
2023-08-22T00:00:00
2023-09-15T00:00:00
2023-09-15T00:23:09.645281
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40640
In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.632Z
2023-10-08T03:36:00.549Z
2023-10-08T03:36:00.549Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10'}
CVE-2023-40210
Cross-Site Request Forgery (CSRF) vulnerability in Sean Barton (Tortoise IT) SB Child List plugin <= 4.5 versions.
https://patchstack.com/database/vulnerability/sb-child-list/wordpress-sb-child-list-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-10T13:20:36.817Z
2023-10-03T11:27:30.952Z
2023-10-03T11:27:30.952Z
{'Vendor': 'Sean Barton (Tortoise IT)', 'Product': 'SB Child List', 'Versions': 'n/a'}
CVE-2023-40705
Stored cross-site scripting vulnerability in Map setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script.
https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf
2023-08-25T04:25:46.854Z
2023-09-05T08:40:44.612Z
2023-09-05T08:40:44.612Z
{'Vendor': 'i-PRO Co., Ltd.', 'Product': 'VI Web Client', 'Versions': 'prior to 7.9.6'}
CVE-2023-40586
OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers. The application will immediately crash after receiving a malicious request that triggers an error in `mime.ParseMediaType`. This issue was patched in version 3.0.1.
https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h
2023-08-16T18:24:02.392Z
2023-08-25T20:35:27.459Z
2023-08-25T20:35:27.459Z
{'Vendor': 'corazawaf', 'Product': 'coraza', 'Versions': '< 3.0.1'}
CVE-2023-40139
In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
2023-08-09T02:29:36.075Z
2023-10-27T20:22:59.503Z
2023-10-27T20:22:59.503Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-40569
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp
2023-08-16T18:24:02.389Z
2023-08-31T21:41:12.898Z
2023-08-31T21:41:12.898Z
{'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '< 2.11.0, >= 3.0.0-beta1, < 3.0.0-beta3'}
CVE-2023-40617
A reflected cross-site scripting (XSS) vulnerability in OpenKnowledgeMaps Head Start 7 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'file' parameter in 'displayPDF.php'.
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-40617
2023-08-17T00:00:00
2023-09-13T00:00:00
2023-09-13T21:14:16.610521
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40302
NETSCOUT nGeniusPULSE 3.8 has Weak File Permissions Vulnerability
https://www.netscout.com/securityadvisories
2023-08-14T00:00:00
2023-12-07T00:00:00
2023-12-07T17:31:27.906831
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40752
There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Make an Offer Widget v1.0.
https://www.phpjabbers.com/make-an-offer-widget
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:50:24.395544
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40181
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8
2023-08-09T15:26:41.052Z
2023-08-31T21:06:14.883Z
2023-08-31T21:06:14.883Z
{'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '< 2.11.0, >= 3.0.0-beta1, < 3.0.0-beta3'}
CVE-2023-40759
User enumeration is found in PHP Jabbers Restaurant Booking Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
https://www.phpjabbers.com/restaurant-booking-system/
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:49:42.505742
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40309
SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.
https://me.sap.com/notes/3340576
2023-08-14T07:36:04.796Z
2023-09-12T02:21:19.058Z
2023-09-12T02:21:19.058Z
{'Vendor': 'SAP_SE', 'Product': 'SAP CommonCryptoLib', 'Versions': '8'}
CVE-2023-40923
MyPrestaModules ordersexport before v5.0 was discovered to contain multiple SQL injection vulnerabilities at send.php via the key and save_setting parameters.
https://security.friendsofpresta.org/modules/2023/11/09/ordersexport.html
2023-08-22T00:00:00
2023-11-15T00:00:00
2023-11-15T05:22:54.441412
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40889
A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner.
https://hackmd.io/%40cspl/B1ZkFZv23
2023-08-22T00:00:00
2023-08-29T00:00:00
2024-01-18T03:06:46.329522
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40020
PrivateUploader is an open source image hosting server written in Vue and TypeScript. In affected versions `app/routes/v3/admin.controller.ts` did not correctly verify whether the user was an administrator (High Level) or moderator (Low Level) causing the request to continue processing. The response would be a 403 with ADMIN_ONLY, however, next() would call leading to any updates/changes in the route to process. This issue has been addressed in version 3.2.49. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/PrivateUploader/PrivateUploader/security/advisories/GHSA-vhrw-2472-rrjx
2023-08-08T13:46:25.242Z
2023-08-14T20:03:10.231Z
2023-08-14T20:03:10.231Z
{'Vendor': 'PrivateUploader', 'Product': 'PrivateUploader', 'Versions': '< 3.2.49'}
CVE-2023-40165
rubygems.org is the Ruby community's primary gem (library) hosting service. Insufficient input validation allowed malicious actors to replace any uploaded gem version that had a platform, version number, or gem name matching `/-\d/`, permanently replacing the legitimate upload in the canonical gem storage bucket, and triggering an immediate CDN purge so that the malicious gem would be served immediately. The maintainers have checked all gems matching the `/-\d/` pattern and can confirm that no unexpected `.gem`s were found. As a result, we believe this vulnerability was _not_ exploited. The easiest way to ensure that a user's applications were not exploited by this vulnerability is to check that all of your downloaded .gems have a checksum that matches the checksum recorded in the RubyGems.org database. RubyGems contributor Maciej Mensfeld wrote a tool to automatically check that all downloaded .gem files match the checksums recorded in the RubyGems.org database. You can use it by running: `bundle add bundler-integrity` followed by `bundle exec bundler-integrity`. Neither this tool nor anything else can prove you were not exploited, but the can assist your investigation by quickly comparing RubyGems API-provided checksums with the checksums of files on your disk. The issue has been patched with improved input validation and the changes are live. No action is required on the part of the user. Users are advised to validate their local gems.
https://github.com/rubygems/rubygems.org/security/advisories/GHSA-rxcq-2m4f-94wm
2023-08-09T15:26:41.050Z
2023-08-17T17:06:32.593Z
2023-08-17T17:06:32.593Z
{'Vendor': 'rubygems', 'Product': 'rubygems.org', 'Versions': '< 2023-08-14'}
CVE-2023-40535
Stored cross-site scripting vulnerability in View setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script.
https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf
2023-08-25T04:25:47.622Z
2023-09-05T08:39:42.741Z
2023-09-05T08:39:42.741Z
{'Vendor': 'i-PRO Co., Ltd.', 'Product': 'VI Web Client', 'Versions': 'prior to 7.9.6'}
CVE-2023-40427
The issue was addressed with improved handling of caches. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.259Z
2023-09-26T20:14:33.099Z
2023-09-26T20:14:33.099Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40077
In multiple functions of MetaDataBase.cpp, there is a possible UAF write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/av/+/58fd993a89a3a22fa5a4a1a4548125c6783ec80c
2023-08-09T02:29:29.266Z
2023-12-04T22:40:50.938Z
2023-12-22T00:16:45.713Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'}
CVE-2023-40098
In mOnDone of NotificationConversationInfo.java, there is a possible way to access app notification data of another user due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0
2023-08-09T02:29:30.482Z
2023-12-04T22:40:54.464Z
2023-12-22T00:16:52.976Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12'}
CVE-2023-40718
A interpretation conflict in Fortinet IPS Engine versions 7.321, 7.166 and 6.158 allows attacker to evade IPS features via crafted TCP packets.
https://fortiguard.com/psirt/FG-IR-23-090
2023-08-21T09:03:44.315Z
2023-10-10T16:49:04.727Z
2023-10-10T16:49:04.727Z
{'Vendor': 'Fortinet', 'Product': 'IPS Engine', 'Versions': '7.321, 7.166, 6.158'}
CVE-2023-40348
The webhook endpoint in Jenkins Gogs Plugin 1.0.15 and earlier provides unauthenticated attackers information about the existence of jobs in its output.
https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894
2023-08-14T16:02:56.436Z
2023-08-16T14:32:57.072Z
2023-10-24T12:51:34.328Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Gogs Plugin', 'Versions': '0'}
CVE-2023-40061
 Insecure job execution mechanism vulnerability. This vulnerability can lead to other attacks as a result.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40061
2023-08-08T23:22:08.619Z
2023-11-01T15:30:29.512Z
2023-12-28T17:09:02.482Z
{'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.3.1 and previous versions '}
CVE-2023-40431
The issue was addressed with improved memory handling. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.260Z
2023-09-26T20:14:33.583Z
2023-09-26T20:14:33.583Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40574
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `writePixelBGRX` function. This issue is likely down to incorrect calculations of the `nHeight` and `srcStep` variables. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw
2023-08-16T18:24:02.390Z
2023-08-31T21:39:17.151Z
2023-08-31T21:39:17.151Z
{'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '>= 3.0.0-beta1, < 3.0.0-beta3'}
CVE-2023-40827
An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter.
https://github.com/pf4j/pf4j/issues/536
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T21:09:46.410712
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40036
Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `CharDistributionAnalysis::HandleOneChar`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++.
https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
2023-08-08T13:46:25.245Z
2023-08-25T19:58:33.936Z
2023-08-25T20:18:01.997Z
{'Vendor': 'notepad-plus-plus', 'Product': 'notepad-plus-plus', 'Versions': '<= 8.5.6'}
CVE-2023-40173
Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. Prior to version 1.0.5 Social media skeleton did not properly salt passwords leaving user passwords susceptible to cracking should an attacker gain access to hashed passwords. This issue has been addressed in version 1.0.5 and users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-rfmv-7m7g-v628
2023-08-09T15:26:41.051Z
2023-08-18T21:47:17.987Z
2023-08-18T21:47:17.987Z
{'Vendor': 'fobybus', 'Product': 'social-media-skeleton', 'Versions': '< 1.0.5'}
CVE-2023-40221
The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
2023-09-06T15:41:16.552Z
2023-09-18T19:59:17.900Z
2023-09-18T19:59:17.900Z
{'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'}
CVE-2023-40671
Cross-Site Request Forgery (CSRF) vulnerability in 大侠wp DX-auto-save-images plugin <= 1.4.0 versions.
https://patchstack.com/database/vulnerability/dx-auto-save-images/wordpress-dx-auto-save-images-plugin-1-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-18T13:36:33.312Z
2023-10-06T12:38:30.516Z
2023-10-06T12:38:30.516Z
{'Vendor': '大侠wp', 'Product': 'DX-auto-save-images', 'Versions': 'n/a'}
CVE-2023-40558
Cross-Site Request Forgery (CSRF) vulnerability in eMarket Design YouTube Video Gallery by YouTube Showcase plugin <= 3.3.5 versions.
https://patchstack.com/database/vulnerability/youtube-showcase/wordpress-video-gallery-management-plugin-3-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-16T11:15:05.045Z
2023-10-03T13:29:35.332Z
2023-10-03T13:29:35.332Z
{'Vendor': 'eMarket Design', 'Product': 'YouTube Video Gallery by YouTube Showcase', 'Versions': 'n/a'}
CVE-2023-40763
User enumeration is found in PHPJabbers Taxi Booking Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
https://www.phpjabbers.com/taxi-booking-script/
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:49:21.097729
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40299
Kong Insomnia 2023.4.0 on macOS allows attackers to execute code and access restricted files, or make requests for TCC permissions, by using the DYLD_INSERT_LIBRARIES environment variable.
https://insomnia.rest/changelog
2023-08-14T00:00:00
2023-10-04T00:00:00
2023-10-04T21:09:40.732699
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40333
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Qode Interactive Bridge Core plugin <= 3.0.9 versions.
https://patchstack.com/database/vulnerability/bridge-core/wordpress-bridge-core-plugin-3-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-14T14:47:15.113Z
2023-09-27T11:25:35.617Z
2023-09-27T11:25:35.617Z
{'Vendor': 'Qode Interactive', 'Product': 'Bridge Core', 'Versions': 'n/a'}
CVE-2023-40626
The language file parsing process could be manipulated to expose environment variables. Environment variables might contain sensible information.
https://developer.joomla.org/security-centre/919-20231101-core-exposure-of-environment-variables.html
2023-08-17T19:37:15.600Z
2023-11-29T12:28:47.787Z
2023-11-29T12:28:47.787Z
{'Vendor': 'Joomla! Project', 'Product': 'Joomla! CMS', 'Versions': '1.6.0-4.4.0, 5.0.0'}
CVE-2023-40260
EmpowerID before 7.205.0.1 allows an attacker to bypass an MFA (multi factor authentication) requirement if the first factor (username and password) is known, because the first factor is sufficient to change an account's email address, and the product would then send MFA codes to the new email address (which may be attacker-controlled). NOTE: this is different from CVE-2023-4177, which claims to be about "some unknown processing of the component Multi-Factor Authentication Code Handler" and thus cannot be correlated with other vulnerability information.
https://seclists.org/fulldisclosure/2023/Aug/3
2023-08-11T00:00:00
2023-08-11T00:00:00
2023-09-20T20:12:20.918736
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40630
Unauthenticated LFI/SSRF in JCDashboards component for Joomla.
https://extensions.joomla.org/extension/jcdashboards/
2023-08-17T19:37:15.600Z
2023-12-14T08:51:55.669Z
2023-12-14T08:51:55.669Z
{'Vendor': 'joomcode.com', 'Product': 'JCDashboards component for Joomla', 'Versions': '1.0.0-1.1.30'}
CVE-2023-40519
A cross-site scripting (XSS) vulnerability in the bpk-common/auth/login/index.html login portal in Broadpeak Centralized Accounts Management Auth Agent 01.01.00.19219575_ee9195b0, 01.01.01.30097902_fd999e76, and 00.12.01.9565588_1254b459 allows remote attackers to inject arbitrary web script or HTML via the disconnectMessage parameter.
https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa
2023-08-14T00:00:00
2023-10-03T00:00:00
2023-10-03T20:59:18.516992
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40372
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to denial of service with a specially crafted SQL statement using External Tables. IBM X-Force ID: 263499.
https://www.ibm.com/support/pages/node/7047561
2023-08-14T20:12:04.115Z
2023-10-16T23:02:30.073Z
2023-10-16T23:02:30.073Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'}
CVE-2023-40667
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lasso Simple URLs plugin <= 117 versions.
https://patchstack.com/database/vulnerability/simple-urls/wordpress-simple-urls-plugin-117-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-18T13:36:33.311Z
2023-09-27T06:40:05.376Z
2023-09-27T06:40:05.376Z
{'Vendor': 'Lasso', 'Product': 'Simple URLs', 'Versions': 'n/a'}
CVE-2023-40958
A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the query parameter in models/base_client.py component.
https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1
2023-08-22T00:00:00
2023-09-14T00:00:00
2023-09-14T23:58:07.864944
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}