CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-40621 | SAP PowerDesigner Client - version 16.7, allows an unauthenticated attacker to inject VBScript code in a document and have it opened by an unsuspecting user, to have it executed by the application on behalf of the user. The application has a security option to disable or prompt users before untrusted scripts are executed, but this is not set as default. | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | 2023-08-17T18:10:44.965Z | 2023-09-12T02:10:22.051Z | 2023-09-12T02:10:22.051Z | {'Vendor': 'SAP_SE', 'Product': 'SAP PowerDesigner Client', 'Versions': '16.7'} |
CVE-2023-40271 | In Trusted Firmware-M through TF-Mv1.8.0, for platforms that integrate the CryptoCell accelerator, when the CryptoCell PSA Driver software Interface is selected, and the Authenticated Encryption with Associated Data Chacha20-Poly1305 algorithm is used, with the single-part verification function (defined during the build-time configuration phase) implemented with a dedicated function (i.e., not relying on usage of multipart functions), the buffer comparison during the verification of the authentication tag does not happen on the full 16 bytes but just on the first 4 bytes, thus leading to the possibility that unauthenticated payloads might be identified as authentic. This affects TF-Mv1.6.0, TF-Mv1.6.1, TF-Mv1.7.0, and TF-Mv1.8. | https://tf-m-user-guide.trustedfirmware.org/releases/index.html | 2023-08-11T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T01:59:45.526188 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40363 | IBM InfoSphere Information Server 11.7 could allow an authenticated user to change installation files due to incorrect file permission settings. IBM X-Force ID: 263332. | https://www.ibm.com/support/pages/node/7070742 | 2023-08-14T20:12:04.114Z | 2023-11-18T17:14:04.546Z | 2023-11-18T17:14:04.546Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-40699 |
IBM InfoSphere Information Server 11.7 could allow a remote attacker to cause a denial of service due to improper input validation. IBM X-Force ID: 265161.
| https://www.ibm.com/support/pages/node/7067714 | 2023-08-18T15:48:17.571Z | 2023-12-01T20:59:35.849Z | 2023-12-01T20:59:35.849Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-40676 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jason Crouse, VeronaLabs Slimstat Analytics plugin <= 5.0.8 versions. | https://patchstack.com/database/vulnerability/wp-slimstat/wordpress-slimstat-analytics-plugin-5-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-18T15:18:28.337Z | 2023-09-27T06:45:17.760Z | 2023-09-27T06:45:17.760Z | {'Vendor': 'Jason Crouse, VeronaLabs', 'Product': 'Slimstat Analytics', 'Versions': 'n/a'} |
CVE-2023-40898 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter timeZone at /goform/SetSysTimeCfg. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/SetSysTimeCfg/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:07:16.181061 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40932 | A Cross-site scripting (XSS) vulnerability in Nagios XI version 5.11.1 and below allows authenticated attackers with access to the custom logo component to inject arbitrary javascript or HTML via the alt-text field. This affects all pages containing the navbar including the login page which means the attacker is able to to steal plaintext credentials. | http://nagios.com | 2023-08-22T00:00:00 | 2023-09-19T00:00:00 | 2023-09-19T22:28:43.238572 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40461 |
The ACEManager
component of ALEOS 4.16 and earlier allows an
authenticated user
with Administrator privileges to access a file
upload field which
does not fully validate the file name, creating a
Stored Cross-Site
Scripting condition.
| https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs | 2023-08-14T20:59:20.798Z | 2023-12-04T22:52:13.650Z | 2023-12-04T22:52:13.650Z | {'Vendor': 'SierraWireless', 'Product': 'ALEOS', 'Versions': '4.10, 0'} |
CVE-2023-40031 | Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer write overflow in `Utf8_16_Read::convert`. This issue may lead to arbitrary code execution. As of time of publication, no known patches are available in existing versions of Notepad++. | https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ | 2023-08-08T13:46:25.244Z | 2023-08-25T19:49:23.433Z | 2023-08-25T20:18:23.949Z | {'Vendor': 'notepad-plus-plus', 'Product': 'notepad-plus-plus', 'Versions': '<= 8.5.6'} |
CVE-2023-40174 | Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. Insufficient session expiration is a web application security vulnerability that occurs when a web application does not properly manage the lifecycle of a user's session. Social media skeleton releases prior to 1.0.5 did not properly limit manage user session lifecycles. This issue has been addressed in version 1.0.5 and users are advised to upgrade. There are no known workarounds for this vulnerability.
| https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-cr5c-ggwq-g4hq | 2023-08-09T15:26:41.052Z | 2023-08-18T21:41:53.666Z | 2023-08-18T21:41:53.666Z | {'Vendor': 'fobybus', 'Product': 'social-media-skeleton', 'Versions': '< 1.0.5'} |
CVE-2023-40877 | DedeCMS up to and including 5.7.110 was discovered to contain a cross-site scripting (XSS) vulnerability at /dede/freelist_edit.php via the title parameter. | https://github.com/DiliLearngent/BugReport/blob/main/php/DedeCMS/xss4.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T14:34:18.918552 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40748 | PHPJabbers Food Delivery Script 3.0 has a SQL injection (SQLi) vulnerability in the "q" parameter of index.php. | https://www.phpjabbers.com/food-delivery-script/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:50:46.509217 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40436 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. An attacker may be able to cause unexpected system termination or read kernel memory. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.261Z | 2023-09-26T20:12:06.222Z | 2023-09-26T20:12:06.222Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40123 | In updateActionViews of PipMenuView.java, there is a possible bypass of a multi user security boundary due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9 | 2023-08-09T02:29:33.868Z | 2023-10-27T20:22:56.908Z | 2023-10-27T20:22:56.908Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40573 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki supports scheduled jobs that contain Groovy scripts. Currently, the job checks the content author of the job for programming right. However, modifying or adding a job script to a document doesn't modify the content author. Together with a CSRF vulnerability in the job scheduler, this can be exploited for remote code execution by an attacker with edit right on the wiki. If the attack is successful, an error log entry with "Job content executed" will be produced. This vulnerability has been patched in XWiki 14.10.9 and 15.4RC1. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8xhr-x3v8-rghj | 2023-08-16T18:24:02.390Z | 2023-08-24T01:31:14.128Z | 2023-08-24T01:31:14.128Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.10.9, >= 1.3, >= 15.0-rc-1, < 15.4-rc-1'} |
CVE-2023-40089 | In getCredentialManagerPolicy of DevicePolicyManagerService.java, there is a possible method for users to select credential managers without permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/e2e05f488da6abc765a62e7faf10cb74e729732e | 2023-08-09T02:29:29.982Z | 2023-12-04T22:40:52.874Z | 2023-12-22T00:16:49.776Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-40420 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.258Z | 2023-09-26T20:12:06.706Z | 2023-09-26T20:12:06.706Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40135 | In applyCustomDescription of SaveUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 | 2023-08-09T02:29:36.075Z | 2023-10-27T20:22:58.641Z | 2023-10-27T20:22:58.641Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40359 | xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature. | https://invisible-island.net/xterm/xterm.log.html#xterm_380 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-09-07T05:58:18.896782 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40709 | An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b | https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | 2023-08-18T19:31:53.417Z | 2023-08-24T16:08:47.919Z | 2023-08-24T16:08:47.919Z | {'Vendor': 'OPTO 22', 'Product': 'SNAP PAC S1', 'Versions': 'R10.3b'} |
CVE-2023-40027 | Keystone is an open source headless CMS for Node.js — built with GraphQL and React. When `ui.isAccessAllowed` is set as `undefined`, the `adminMeta` GraphQL query is publicly accessible (no session required). This is different to the behaviour of the default AdminUI middleware, which by default will only be publicly accessible (no session required) if a `session` strategy is not defined. This vulnerability does not affect developers using the `@keystone-6/auth` package, or any users that have written their own `ui.isAccessAllowed` (that is to say, `isAccessAllowed` is not `undefined`). This vulnerability does affect users who believed that their `session` strategy will, by default, enforce that `adminMeta` is inaccessible by the public in accordance with that strategy; akin to the behaviour of the AdminUI middleware. This vulnerability has been patched in `@keystone-6/core` version `5.5.1`. Users are advised to upgrade. Users unable to upgrade may opt to write their own `isAccessAllowed` functionality to work-around this vulnerability. | https://github.com/keystonejs/keystone/security/advisories/GHSA-9cvc-v7wm-992c | 2023-08-08T13:46:25.243Z | 2023-08-15T17:45:54.439Z | 2023-08-15T17:45:54.439Z | {'Vendor': 'keystonejs', 'Product': 'keystone', 'Versions': '< 5.5.1'} |
CVE-2023-40924 | SolarView Compact < 6.00 is vulnerable to Directory Traversal. | https://nvd.nist.gov/vuln/detail/CVE-2023-33620 | 2023-08-22T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T12:32:06.653398 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40532 | Path traversal vulnerability in Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with author or higher privilege to obtain partial information of the files on the web server. | https://www.welcart.com/archives/20106.html | 2023-09-20T04:37:57.608Z | 2023-09-26T08:14:17.836Z | 2023-09-26T08:14:17.836Z | {'Vendor': 'Collne Inc.', 'Product': 'Welcart e-Commerce', 'Versions': 'versions 2.7 to 2.8.21'} |
CVE-2023-40683 | IBM OpenPages with Watson 8.3 and 9.0 could allow remote attacker to bypass security restrictions, caused by insufficient authorization checks. By authenticating as an OpenPages user and using non-public APIs, an attacker could exploit this vulnerability to bypass security and gain unauthorized administrative access to the application. IBM X-Force ID: 264005. | https://www.ibm.com/support/pages/node/7107774 | 2023-08-18T15:48:06.501Z | 2024-01-19T00:54:43.947Z | 2024-01-19T00:54:43.947Z | {'Vendor': 'IBM', 'Product': 'OpenPages with Watson', 'Versions': '8.3, 9.0'} |
CVE-2023-40729 | A vulnerability has been identified in QMS Automotive (All versions < V12.39). The affected application lacks security control to prevent unencrypted communication without HTTPS. An attacker who managed to gain machine-in-the-middle position could manipulate, or steal confidential information. | https://cert-portal.siemens.com/productcert/pdf/ssa-147266.pdf | 2023-08-21T10:57:08.486Z | 2023-09-12T09:32:29.661Z | 2023-09-12T09:32:29.661Z | {'Vendor': 'Siemens', 'Product': 'QMS Automotive', 'Versions': 'All versions < V12.39'} |
CVE-2023-40816 | OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Milestone Name Field. | https://www.esecforte.com/cve-2023-40816-html-injection-activity-milestone/ | 2023-08-22T00:00:00 | 2023-11-18T00:00:00 | 2023-11-18T03:12:09.369454 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40953 | icms 7.0.16 is vulnerable to Cross Site Request Forgery (CSRF). | https://www.icmsdev.com/ | 2023-08-22T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T02:12:49.141781 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40400 | This issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. A remote user may cause an unexpected app termination or arbitrary code execution. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.254Z | 2023-09-26T20:14:30.575Z | 2023-09-26T20:14:30.575Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40050 | Upload profile either
through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec
check command with maliciously crafted profile allows remote code execution.
| https://docs.chef.io/release_notes_automate/ | 2023-08-08T19:44:41.112Z | 2023-10-31T14:07:59.881Z | 2023-10-31T14:07:59.881Z | {'Vendor': 'Progress Software Corporation', 'Product': 'Chef Automate', 'Versions': '4.0.0'} |
CVE-2023-40791 | extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page. | https://lkml.org/lkml/2023/8/3/323 | 2023-08-22T00:00:00 | 2023-10-16T00:00:00 | 2023-11-10T18:06:24.170523 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40841 | Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "add_white_node," | https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/5/5.md | 2023-08-22T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T16:29:32.808531 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40142 | In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-08-09T02:29:36.076Z | 2023-10-11T19:27:08.329Z | 2023-10-11T19:27:09.716Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-40007 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ujwol Bastakoti CT Commerce plugin <= 2.0.1 versions. | https://patchstack.com/database/vulnerability/ct-commerce/wordpress-ct-commerce-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-08T12:57:23.979Z | 2023-09-06T08:29:57.185Z | 2023-09-06T08:29:57.185Z | {'Vendor': 'Ujwol Bastakoti', 'Product': 'CT Commerce', 'Versions': 'n/a'} |
CVE-2023-40904 | Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg. | https://github.com/peris-navince/founded-0-days/blob/main/ac10/formSetMacFilterCfg/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:23:52.268145 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40338 | Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier displays an error message that includes an absolute path of a log file when attempting to access the Scan Organization Folder Log if no logs are available, exposing information about the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3109 | 2023-08-14T16:02:56.435Z | 2023-08-16T14:32:50.674Z | 2023-10-24T12:51:21.687Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Folders Plugin', 'Versions': '0'} |
CVE-2023-40292 | Harman Infotainment 20190525031613 and later discloses the IP address via CarPlay CTRL packets. | https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40787 | In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection. | https://sword.bladex.cn/ | 2023-08-22T00:00:00 | 2023-08-29T00:00:00 | 2023-08-29T12:46:39.067352 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40857 | Buffer Overflow vulnerability in VirusTotal yara v.4.3.2 allows a remote attacker to execute arbtirary code via the yr_execute_cod function in the exe.c component. | https://github.com/VirusTotal/yara/issues/1945 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T21:09:52.567555 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40441 | A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.261Z | 2023-09-26T20:14:31.110Z | 2023-09-26T20:14:31.110Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40800 | The compare_parentcontrol_time function does not authenticate user input parameters, resulting in a post-authentication stack overflow vulnerability in Tenda AC23 v16.03.07.45_cn. | https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time | 2023-08-22T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T14:56:32.519752 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40103 | In multiple locations, there is a possible way to corrupt memory due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/e4a821b10a1b020f18fc6fc316b13b90fa450bae | 2023-08-09T02:29:31.020Z | 2023-12-04T22:40:54.653Z | 2023-12-22T00:16:53.368Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-40553 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Plausible.Io Plausible Analytics plugin <= 1.3.3 versions. | https://patchstack.com/database/vulnerability/plausible-analytics/wordpress-plausible-analytics-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-16T11:15:05.044Z | 2023-09-06T08:20:32.274Z | 2023-09-06T08:20:32.274Z | {'Vendor': 'Plausible.io', 'Product': 'Plausible Analytics', 'Versions': 'n/a'} |
CVE-2023-40046 |
In WS_FTP Server versions prior to 8.7.4 and 8.8.2,
a SQL injection vulnerability exists in the WS_FTP Server manager interface. An attacker may be able to infer information about the structure and contents of the database and execute SQL statements that alter or delete database elements.
| https://www.progress.com/ws_ftp | 2023-08-08T19:44:41.112Z | 2023-09-27T14:50:18.549Z | 2023-09-27T15:23:03.495Z | {'Vendor': 'Progress Software Corporation', 'Product': 'WS_FTP Server', 'Versions': '8.8.0, 8.7.0'} |
CVE-2023-40416 | The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. Processing an image may result in disclosure of process memory. | https://support.apple.com/en-us/HT213981 | 2023-08-14T20:26:36.258Z | 2023-10-25T18:31:40.185Z | 2023-10-25T18:31:40.185Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40945 | Sourcecodester Doctor Appointment System 1.0 is vulnerable to SQL Injection in the variable $userid at doctors\myDetails.php. | https://github.com/KLSEHB/vulnerability-report/blob/main/Doctormms_CVE-2023-40945 | 2023-08-22T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T19:22:04.955929 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40601 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Estatik Estatik Mortgage Calculator plugin <= 2.0.7 versions. | https://patchstack.com/database/vulnerability/estatik-mortgage-calculator/wordpress-mortgage-calculator-estatik-plugin-2-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-17T10:47:42.477Z | 2023-09-06T08:45:41.448Z | 2023-09-06T08:45:41.448Z | {'Vendor': 'Estatik', 'Product': 'Estatik Mortgage Calculator', 'Versions': 'n/a'} |
CVE-2023-40251 | Missing Encryption of Sensitive Data vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Man in the Middle Attack.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.
| https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html | 2023-08-11T01:54:13.646Z | 2023-08-17T06:54:14.152Z | 2024-01-23T00:56:07.979Z | {'Vendor': 'Genians', 'Product': 'Genian NAC V4.0', 'Versions': 'V4.0.0'} |
CVE-2023-40744 | null | null | 2023-09-19T15:42:15.229Z | null | 2023-10-02T17:15:21.053Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-40314 |
Cross-site scripting in bootstrap.jsp in multiple versions of OpenNMS Meridian and Horizon allows an attacker access to confidential session information. The solution is to upgrade to Horizon 32.0.5 or newer and Meridian 2023.1.9 or newer
Meridian
and Horizon installation instructions state that they are intended for
installation within an organization's private networks and should not be
directly accessible from the Internet.
OpenNMS thanks
Moshe Apelbaum
for reporting this issue.
| https://github.com/OpenNMS/opennms/pull/6791 | 2023-08-14T13:02:51.889Z | 2023-11-16T21:14:07.488Z | 2023-11-16T21:14:07.488Z | {'Vendor': ' The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8'} |
CVE-2023-40197 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Devaldi Ltd flowpaper plugin <= 1.9.9 versions. | https://patchstack.com/database/vulnerability/flowpaper-lite-pdf-flipbook/wordpress-flowpaper-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-10T11:31:18.458Z | 2023-09-04T11:27:12.862Z | 2023-09-04T11:27:12.862Z | {'Vendor': 'Devaldi Ltd', 'Product': 'flowpaper', 'Versions': 'n/a'} |
CVE-2023-40894 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetStaticRouteCfg. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/fromSetStaticRouteCfg/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:11:50.641505 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40178 | Node-SAML is a SAML library not dependent on any frameworks that runs in Node. The lack of checking of current timestamp allows a LogoutRequest XML to be reused multiple times even when the current time is past the NotOnOrAfter. This could impact the user where they would be logged out from an expired LogoutRequest. In bigger contexts, if LogoutRequests are sent out in mass to different SPs, this could impact many users on a large scale. This issue was patched in version 4.0.5.
| https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw | 2023-08-09T15:26:41.052Z | 2023-08-23T20:15:23.057Z | 2023-08-23T20:15:23.057Z | {'Vendor': 'node-saml', 'Product': 'node-saml', 'Versions': '< 4.0.5'} |
CVE-2023-40528 | This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 17, watchOS 10, macOS Sonoma 14, iOS 17 and iPadOS 17, macOS Ventura 13.6.4. An app may be able to bypass Privacy preferences. | https://support.apple.com/en-us/HT213938 | 2023-08-14T21:54:53.723Z | 2024-01-23T00:25:18.752Z | 2024-01-23T00:25:18.752Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40206 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in hwk-fr WP 404 Auto Redirect to Similar Post plugin <= 1.0.3 versions. | https://patchstack.com/database/vulnerability/wp-404-auto-redirect-to-similar-post/wordpress-wp-404-auto-redirect-to-similar-post-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-10T13:20:36.816Z | 2023-09-04T10:43:04.660Z | 2023-09-04T10:43:04.660Z | {'Vendor': 'hwk-fr', 'Product': 'WP 404 Auto Redirect to Similar Post', 'Versions': 'n/a'} |
CVE-2023-40656 | A reflected XSS vulnerability was discovered in the Quickform component for Joomla. | https://extensions.joomla.org/extension/quickform/ | 2023-08-18T04:29:42.287Z | 2023-12-14T08:51:59.728Z | 2023-12-14T08:51:59.728Z | {'Vendor': 'plasma-web.ru', 'Product': 'Quickform component for Joomla', 'Versions': '1.0.0-3.3.01'} |
CVE-2023-40343 | Jenkins Tuleap Authentication Plugin 1.1.20 and earlier uses a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3229 | 2023-08-14T16:02:56.435Z | 2023-08-16T14:32:53.909Z | 2023-10-24T12:51:27.502Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Tuleap Authentication Plugin', 'Versions': '0'} |
CVE-2023-40969 | Senayan Library Management Systems SLIMS 9 Bulian v9.6.1 is vulnerable to Server Side Request Forgery (SSRF) via admin/modules/bibliography/pop_p2p.php. | https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SSRF-pop_p2p.md | 2023-08-22T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T10:20:42.668258 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40590 | GitPython is a python library used to interact with Git repositories. When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment. GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. There is no fix currently available for windows users, however there are a few mitigations. 1: Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). 2: Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. 3: Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. 4: Resolve the executable manually by only looking into the `PATH` environment variable. | https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4 | 2023-08-16T18:24:02.392Z | 2023-08-28T17:24:09.965Z | 2023-08-28T17:24:09.965Z | {'Vendor': 'gitpython-developers', 'Product': 'GitPython', 'Versions': '<= 3.1.32'} |
CVE-2023-40986 | A stored cross-site scripting (XSS) vulnerability in the Usermin Configuration function of Webmin v2.100 allows attackers to execute arbitrary web sripts or HTML via a crafted payload injected into the Custom field. | http://webmin.com | 2023-08-22T00:00:00 | 2023-09-15T00:00:00 | 2023-09-15T00:23:09.645281 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40640 | In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.632Z | 2023-10-08T03:36:00.549Z | 2023-10-08T03:36:00.549Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10'} |
CVE-2023-40210 | Cross-Site Request Forgery (CSRF) vulnerability in Sean Barton (Tortoise IT) SB Child List plugin <= 4.5 versions. | https://patchstack.com/database/vulnerability/sb-child-list/wordpress-sb-child-list-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-10T13:20:36.817Z | 2023-10-03T11:27:30.952Z | 2023-10-03T11:27:30.952Z | {'Vendor': 'Sean Barton (Tortoise IT)', 'Product': 'SB Child List', 'Versions': 'n/a'} |
CVE-2023-40705 | Stored cross-site scripting vulnerability in Map setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script. | https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf | 2023-08-25T04:25:46.854Z | 2023-09-05T08:40:44.612Z | 2023-09-05T08:40:44.612Z | {'Vendor': 'i-PRO Co., Ltd.', 'Product': 'VI Web Client', 'Versions': 'prior to 7.9.6'} |
CVE-2023-40586 | OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers. The application will immediately crash after receiving a malicious request that triggers an error in `mime.ParseMediaType`. This issue was patched in version 3.0.1.
| https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h | 2023-08-16T18:24:02.392Z | 2023-08-25T20:35:27.459Z | 2023-08-25T20:35:27.459Z | {'Vendor': 'corazawaf', 'Product': 'coraza', 'Versions': '< 3.0.1'} |
CVE-2023-40139 | In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33 | 2023-08-09T02:29:36.075Z | 2023-10-27T20:22:59.503Z | 2023-10-27T20:22:59.503Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40569 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability. | https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp | 2023-08-16T18:24:02.389Z | 2023-08-31T21:41:12.898Z | 2023-08-31T21:41:12.898Z | {'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '< 2.11.0, >= 3.0.0-beta1, < 3.0.0-beta3'} |
CVE-2023-40617 | A reflected cross-site scripting (XSS) vulnerability in OpenKnowledgeMaps Head Start 7 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'file' parameter in 'displayPDF.php'. | https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-40617 | 2023-08-17T00:00:00 | 2023-09-13T00:00:00 | 2023-09-13T21:14:16.610521 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40302 | NETSCOUT nGeniusPULSE 3.8 has Weak File Permissions Vulnerability | https://www.netscout.com/securityadvisories | 2023-08-14T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T17:31:27.906831 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40752 | There is a Cross Site Scripting (XSS) vulnerability in the "action" parameter of index.php in PHPJabbers Make an Offer Widget v1.0. | https://www.phpjabbers.com/make-an-offer-widget | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:50:24.395544 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40181 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8 | 2023-08-09T15:26:41.052Z | 2023-08-31T21:06:14.883Z | 2023-08-31T21:06:14.883Z | {'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '< 2.11.0, >= 3.0.0-beta1, < 3.0.0-beta3'} |
CVE-2023-40759 | User enumeration is found in PHP Jabbers Restaurant Booking Script v3.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. | https://www.phpjabbers.com/restaurant-booking-system/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:49:42.505742 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40309 | SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.
| https://me.sap.com/notes/3340576 | 2023-08-14T07:36:04.796Z | 2023-09-12T02:21:19.058Z | 2023-09-12T02:21:19.058Z | {'Vendor': 'SAP_SE', 'Product': 'SAP CommonCryptoLib', 'Versions': '8'} |
CVE-2023-40923 | MyPrestaModules ordersexport before v5.0 was discovered to contain multiple SQL injection vulnerabilities at send.php via the key and save_setting parameters. | https://security.friendsofpresta.org/modules/2023/11/09/ordersexport.html | 2023-08-22T00:00:00 | 2023-11-15T00:00:00 | 2023-11-15T05:22:54.441412 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40889 | A heap-based buffer overflow exists in the qr_reader_match_centers function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. | https://hackmd.io/%40cspl/B1ZkFZv23 | 2023-08-22T00:00:00 | 2023-08-29T00:00:00 | 2024-01-18T03:06:46.329522 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40020 | PrivateUploader is an open source image hosting server written in Vue and TypeScript. In affected versions `app/routes/v3/admin.controller.ts` did not correctly verify whether the user was an administrator (High Level) or moderator (Low Level) causing the request to continue processing. The response would be a 403 with ADMIN_ONLY, however, next() would call leading to any updates/changes in the route to process. This issue has been addressed in version 3.2.49. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| https://github.com/PrivateUploader/PrivateUploader/security/advisories/GHSA-vhrw-2472-rrjx | 2023-08-08T13:46:25.242Z | 2023-08-14T20:03:10.231Z | 2023-08-14T20:03:10.231Z | {'Vendor': 'PrivateUploader', 'Product': 'PrivateUploader', 'Versions': '< 3.2.49'} |
CVE-2023-40165 | rubygems.org is the Ruby community's primary gem (library) hosting service. Insufficient input validation allowed malicious actors to replace any uploaded gem version that had a platform, version number, or gem name matching `/-\d/`, permanently replacing the legitimate upload in the canonical gem storage bucket, and triggering an immediate CDN purge so that the malicious gem would be served immediately. The maintainers have checked all gems matching the `/-\d/` pattern and can confirm that no unexpected `.gem`s were found. As a result, we believe this vulnerability was _not_ exploited. The easiest way to ensure that a user's applications were not exploited by this vulnerability is to check that all of your downloaded .gems have a checksum that matches the checksum recorded in the RubyGems.org database. RubyGems contributor Maciej Mensfeld wrote a tool to automatically check that all downloaded .gem files match the checksums recorded in the RubyGems.org database. You can use it by running: `bundle add bundler-integrity` followed by `bundle exec bundler-integrity`. Neither this tool nor anything else can prove you were not exploited, but the can assist your investigation by quickly comparing RubyGems API-provided checksums with the checksums of files on your disk. The issue has been patched with improved input validation and the changes are live. No action is required on the part of the user. Users are advised to validate their local gems. | https://github.com/rubygems/rubygems.org/security/advisories/GHSA-rxcq-2m4f-94wm | 2023-08-09T15:26:41.050Z | 2023-08-17T17:06:32.593Z | 2023-08-17T17:06:32.593Z | {'Vendor': 'rubygems', 'Product': 'rubygems.org', 'Versions': '< 2023-08-14'} |
CVE-2023-40535 | Stored cross-site scripting vulnerability in View setting page of VI Web Client prior to 7.9.6 allows a remote authenticated attacker to inject an arbitrary script. | https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf | 2023-08-25T04:25:47.622Z | 2023-09-05T08:39:42.741Z | 2023-09-05T08:39:42.741Z | {'Vendor': 'i-PRO Co., Ltd.', 'Product': 'VI Web Client', 'Versions': 'prior to 7.9.6'} |
CVE-2023-40427 | The issue was addressed with improved handling of caches. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.259Z | 2023-09-26T20:14:33.099Z | 2023-09-26T20:14:33.099Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40077 | In multiple functions of MetaDataBase.cpp, there is a possible UAF write due to a race condition. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/av/+/58fd993a89a3a22fa5a4a1a4548125c6783ec80c | 2023-08-09T02:29:29.266Z | 2023-12-04T22:40:50.938Z | 2023-12-22T00:16:45.713Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'} |
CVE-2023-40098 | In mOnDone of NotificationConversationInfo.java, there is a possible way to access app notification data of another user due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/d21ffbe8a2eeb2a5e6da7efbb1a0430ba6b022e0 | 2023-08-09T02:29:30.482Z | 2023-12-04T22:40:54.464Z | 2023-12-22T00:16:52.976Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12'} |
CVE-2023-40718 | A interpretation conflict in Fortinet IPS Engine versions 7.321, 7.166 and 6.158 allows attacker to evade IPS features via crafted TCP packets. | https://fortiguard.com/psirt/FG-IR-23-090 | 2023-08-21T09:03:44.315Z | 2023-10-10T16:49:04.727Z | 2023-10-10T16:49:04.727Z | {'Vendor': 'Fortinet', 'Product': 'IPS Engine', 'Versions': '7.321, 7.166, 6.158'} |
CVE-2023-40348 | The webhook endpoint in Jenkins Gogs Plugin 1.0.15 and earlier provides unauthenticated attackers information about the existence of jobs in its output. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-2894 | 2023-08-14T16:02:56.436Z | 2023-08-16T14:32:57.072Z | 2023-10-24T12:51:34.328Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Gogs Plugin', 'Versions': '0'} |
CVE-2023-40061 | Insecure
job execution mechanism vulnerability. This
vulnerability can lead to other attacks as a result.
| https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40061 | 2023-08-08T23:22:08.619Z | 2023-11-01T15:30:29.512Z | 2023-12-28T17:09:02.482Z | {'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.3.1 and previous versions '} |
CVE-2023-40431 | The issue was addressed with improved memory handling. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.260Z | 2023-09-26T20:14:33.583Z | 2023-09-26T20:14:33.583Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40574 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `writePixelBGRX` function. This issue is likely down to incorrect calculations of the `nHeight` and `srcStep` variables. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw | 2023-08-16T18:24:02.390Z | 2023-08-31T21:39:17.151Z | 2023-08-31T21:39:17.151Z | {'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '>= 3.0.0-beta1, < 3.0.0-beta3'} |
CVE-2023-40827 | An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the loadpluginPath parameter. | https://github.com/pf4j/pf4j/issues/536 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T21:09:46.410712 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40036 | Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to global buffer read overflow in `CharDistributionAnalysis::HandleOneChar`. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++. | https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ | 2023-08-08T13:46:25.245Z | 2023-08-25T19:58:33.936Z | 2023-08-25T20:18:01.997Z | {'Vendor': 'notepad-plus-plus', 'Product': 'notepad-plus-plus', 'Versions': '<= 8.5.6'} |
CVE-2023-40173 | Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. Prior to version 1.0.5 Social media skeleton did not properly salt passwords leaving user passwords susceptible to cracking should an attacker gain access to hashed passwords. This issue has been addressed in version 1.0.5 and users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-rfmv-7m7g-v628 | 2023-08-09T15:26:41.051Z | 2023-08-18T21:47:17.987Z | 2023-08-18T21:47:17.987Z | {'Vendor': 'fobybus', 'Product': 'social-media-skeleton', 'Versions': '< 1.0.5'} |
CVE-2023-40221 |
The absence of filters when loading some sections in the web application of the vulnerable device allows potential attackers to inject malicious code that will be interpreted when a legitimate user accesses the web section (MAIL SERVER) where the information is displayed. Injection can be done on parameter MAIL_RCV. When a legitimate user attempts to review NOTIFICATION/MAIL SERVER, the injected code will be executed.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | 2023-09-06T15:41:16.552Z | 2023-09-18T19:59:17.900Z | 2023-09-18T19:59:17.900Z | {'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'} |
CVE-2023-40671 | Cross-Site Request Forgery (CSRF) vulnerability in 大侠wp DX-auto-save-images plugin <= 1.4.0 versions. | https://patchstack.com/database/vulnerability/dx-auto-save-images/wordpress-dx-auto-save-images-plugin-1-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-18T13:36:33.312Z | 2023-10-06T12:38:30.516Z | 2023-10-06T12:38:30.516Z | {'Vendor': '大侠wp', 'Product': 'DX-auto-save-images', 'Versions': 'n/a'} |
CVE-2023-40558 | Cross-Site Request Forgery (CSRF) vulnerability in eMarket Design YouTube Video Gallery by YouTube Showcase plugin <= 3.3.5 versions. | https://patchstack.com/database/vulnerability/youtube-showcase/wordpress-video-gallery-management-plugin-3-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-16T11:15:05.045Z | 2023-10-03T13:29:35.332Z | 2023-10-03T13:29:35.332Z | {'Vendor': 'eMarket Design', 'Product': 'YouTube Video Gallery by YouTube Showcase', 'Versions': 'n/a'} |
CVE-2023-40763 | User enumeration is found in PHPJabbers Taxi Booking Script v2.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. | https://www.phpjabbers.com/taxi-booking-script/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:49:21.097729 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40299 | Kong Insomnia 2023.4.0 on macOS allows attackers to execute code and access restricted files, or make requests for TCC permissions, by using the DYLD_INSERT_LIBRARIES environment variable. | https://insomnia.rest/changelog | 2023-08-14T00:00:00 | 2023-10-04T00:00:00 | 2023-10-04T21:09:40.732699 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40333 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Qode Interactive Bridge Core plugin <= 3.0.9 versions. | https://patchstack.com/database/vulnerability/bridge-core/wordpress-bridge-core-plugin-3-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-14T14:47:15.113Z | 2023-09-27T11:25:35.617Z | 2023-09-27T11:25:35.617Z | {'Vendor': 'Qode Interactive', 'Product': 'Bridge Core', 'Versions': 'n/a'} |
CVE-2023-40626 | The language file parsing process could be manipulated to expose environment variables. Environment variables might contain sensible information. | https://developer.joomla.org/security-centre/919-20231101-core-exposure-of-environment-variables.html | 2023-08-17T19:37:15.600Z | 2023-11-29T12:28:47.787Z | 2023-11-29T12:28:47.787Z | {'Vendor': 'Joomla! Project', 'Product': 'Joomla! CMS', 'Versions': '1.6.0-4.4.0, 5.0.0'} |
CVE-2023-40260 | EmpowerID before 7.205.0.1 allows an attacker to bypass an MFA (multi factor authentication) requirement if the first factor (username and password) is known, because the first factor is sufficient to change an account's email address, and the product would then send MFA codes to the new email address (which may be attacker-controlled). NOTE: this is different from CVE-2023-4177, which claims to be about "some unknown processing of the component Multi-Factor Authentication Code Handler" and thus cannot be correlated with other vulnerability information. | https://seclists.org/fulldisclosure/2023/Aug/3 | 2023-08-11T00:00:00 | 2023-08-11T00:00:00 | 2023-09-20T20:12:20.918736 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40630 | Unauthenticated LFI/SSRF in JCDashboards component for Joomla. | https://extensions.joomla.org/extension/jcdashboards/ | 2023-08-17T19:37:15.600Z | 2023-12-14T08:51:55.669Z | 2023-12-14T08:51:55.669Z | {'Vendor': 'joomcode.com', 'Product': 'JCDashboards component for Joomla', 'Versions': '1.0.0-1.1.30'} |
CVE-2023-40519 | A cross-site scripting (XSS) vulnerability in the bpk-common/auth/login/index.html login portal in Broadpeak Centralized Accounts Management Auth Agent 01.01.00.19219575_ee9195b0, 01.01.01.30097902_fd999e76, and 00.12.01.9565588_1254b459 allows remote attackers to inject arbitrary web script or HTML via the disconnectMessage parameter. | https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa | 2023-08-14T00:00:00 | 2023-10-03T00:00:00 | 2023-10-03T20:59:18.516992 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40372 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to denial of service with a specially crafted SQL statement using External Tables. IBM X-Force ID: 263499. | https://www.ibm.com/support/pages/node/7047561 | 2023-08-14T20:12:04.115Z | 2023-10-16T23:02:30.073Z | 2023-10-16T23:02:30.073Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'} |
CVE-2023-40667 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lasso Simple URLs plugin <= 117 versions. | https://patchstack.com/database/vulnerability/simple-urls/wordpress-simple-urls-plugin-117-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-18T13:36:33.311Z | 2023-09-27T06:40:05.376Z | 2023-09-27T06:40:05.376Z | {'Vendor': 'Lasso', 'Product': 'Simple URLs', 'Versions': 'n/a'} |
CVE-2023-40958 | A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the query parameter in models/base_client.py component. | https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1 | 2023-08-22T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T23:58:07.864944 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.