CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-40186 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v | 2023-08-09T15:26:41.053Z | 2023-08-31T21:13:57.792Z | 2023-08-31T21:13:57.792Z | {'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '< 2.11.0, >= 3.0.0-beta1, < 3.0.0-beta3'} |
CVE-2023-40610 | Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data.
| https://lists.apache.org/thread/jvgxpk4dbxyqtsgtl4pdgbd520rc0rot | 2023-08-17T12:56:13.976Z | 2023-11-27T10:22:41.083Z | 2023-11-27T10:22:41.083Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0'} |
CVE-2023-40305 | GNU indent 2.2.13 has a heap-based buffer overflow in search_brace in indent.c via a crafted file. | https://savannah.gnu.org/bugs/index.php?64503 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-09-15T20:06:51.778220 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40755 | There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Callback Widget v1.0. | https://www.phpjabbers.com/callback-widget/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:50:04.058005 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40581 | yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021.04.11. yt-dlp version 2023.09.24 fixes this issue by properly escaping each special character. `\n` will be replaced by `\r` as no way of escaping it has been found. It is recommended to upgrade yt-dlp to version 2023.09.24 as soon as possible. Also, always be careful when using --exec, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous. For Windows users who are not able to upgrade: 1. Avoid using any output template expansion in --exec other than {} (filepath). 2. If expansion in --exec is needed, verify the fields you are using do not contain ", | or &. 3. Instead of using --exec, write the info json and load the fields from it instead.
| https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-42h4-v29r-42qg | 2023-08-16T18:24:02.391Z | 2023-09-25T18:54:00.204Z | 2023-09-25T18:54:00.204Z | {'Vendor': 'yt-dlp', 'Product': 'yt-dlp', 'Versions': '>= 2021.04.11, < 2023.09.24, < nightly 2023.09.24.003044'} |
CVE-2023-40094 | In keyguardGoingAway of ActivityTaskManagerService.java, there is a possible lock screen bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7 | 2023-08-09T02:29:30.482Z | 2023-12-04T22:40:53.676Z | 2023-12-22T00:16:51.365Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'} |
CVE-2023-40997 | Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet. | https://jira.o-ran-sc.org/browse/RIC-991 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-12-14T07:38:42.711118 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40647 | In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.633Z | 2023-10-08T03:36:02.894Z | 2023-10-08T03:36:02.894Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A', 'Versions': 'Android11/Android12'} |
CVE-2023-40217 | An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.) | https://www.python.org/dev/security/ | 2023-08-10T00:00:00 | 2023-08-25T00:00:00 | 2023-10-11T22:06:19.810772 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40352 | McAfee Safe Connect before 2.16.1.126 may allow an adversary with system privileges to achieve privilege escalation by loading arbitrary DLLs. | https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html | 2023-08-14T00:00:00 | 2023-08-21T00:00:00 | 2023-08-21T18:19:45.716818 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40597 | In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk. | https://advisory.splunk.com/advisories/SVD-2023-0806 | 2023-08-16T22:07:52.838Z | 2023-08-30T16:19:44.220Z | 2024-01-24T18:30:11.363Z | {'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'} |
CVE-2023-40082 | In modify_for_next_stage of fdt.rs, there is a possible way to render KASLR ineffective due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Virtualization/+/0cf463e9949db2d30755fc63a79225a6158928d3 | 2023-08-09T02:29:29.267Z | 2023-12-04T22:40:51.922Z | 2023-12-22T00:16:47.695Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-40128 | In several functions of xmlregexp.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/external/libxml2/+/1ccf89b87a3969edd56956e2d447f896037c8be7 | 2023-08-09T02:29:33.869Z | 2023-10-27T20:22:57.517Z | 2023-10-27T20:22:57.517Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40201 | Cross-Site Request Forgery (CSRF) vulnerability in FuturioWP Futurio Extra plugin <= 1.8.4 versions leads to activation of arbitrary plugin. | https://patchstack.com/database/vulnerability/futurio-extra/wordpress-futurio-extra-plugin-1-8-2-cross-site-request-forgery-csrf?_s_id=cve | 2023-08-10T11:31:18.458Z | 2023-10-03T12:20:23.660Z | 2023-10-03T12:20:23.660Z | {'Vendor': 'FuturioWP', 'Product': 'Futurio Extra', 'Versions': 'n/a'} |
CVE-2023-40651 | In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.634Z | 2023-10-08T03:36:04.059Z | 2023-10-08T03:36:04.059Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'} |
CVE-2023-40344 | A missing permission check in Jenkins Delphix Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1) | 2023-08-14T16:02:56.436Z | 2023-08-16T14:32:54.541Z | 2023-10-24T12:51:28.643Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Delphix Plugin', 'Versions': '0'} |
CVE-2023-40893 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/setSmartPowerManagement/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:15:41.306433 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40606 | Improper Control of Generation of Code ('Code Injection') vulnerability in Kanban for WordPress Kanban Boards for WordPress.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21.
| https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-21-arbitrary-code-execution-vulnerability?_s_id=cve | 2023-08-17T10:47:42.477Z | 2023-12-29T08:59:57.593Z | 2023-12-29T08:59:57.593Z | {'Vendor': 'Kanban for WordPress', 'Product': 'Kanban Boards for WordPress', 'Versions': 'n/a'} |
CVE-2023-40256 | A vulnerability was discovered in Veritas NetBackup Snapshot Manager before 10.2.0.1 that allowed untrusted clients to interact with the RabbitMQ service. This was caused by improper validation of the client certificate due to misconfiguration of the RabbitMQ service. Exploiting this impacts the confidentiality and integrity of messages controlling the backup and restore jobs, and could result in the service becoming unavailable. This impacts only the jobs controlling the backup and restore activities, and does not allow access to (or deletion of) the backup snapshot data itself. This vulnerability is confined to the NetBackup Snapshot Manager feature and does not impact the RabbitMQ instance on the NetBackup primary servers. | https://www.veritas.com/content/support/en_US/security/VTS23-011 | 2023-08-11T00:00:00 | 2023-08-11T00:00:00 | 2023-08-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40743 | ** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE.
As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
| https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 | 2023-08-21T12:06:59.659Z | 2023-09-05T14:42:13.317Z | 2023-09-05T14:42:13.317Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Axis', 'Versions': '0'} |
CVE-2023-40313 | A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. | https://docs.opennms.com/horizon/32/releasenotes/changelog.html | 2023-08-14T13:02:51.889Z | 2023-08-17T18:24:08.866Z | 2023-08-17T18:24:08.866Z | {'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '29.0.4, 0'} |
CVE-2023-40554 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Blog2Social, Adenion Blog2Social: Social Media Auto Post & Scheduler plugin <= 7.2.0 versions. | https://patchstack.com/database/vulnerability/blog2social/wordpress-blog2social-plugin-7-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-16T11:15:05.044Z | 2023-09-06T08:14:39.927Z | 2023-09-06T08:14:39.927Z | {'Vendor': 'Blog2Social, Adenion', 'Product': 'Blog2Social: Social Media Auto Post & Scheduler', 'Versions': 'n/a'} |
CVE-2023-40942 | Tenda AC9 V3.0BR_V15.03.06.42_multi_TD01 was discovered stack overflow via parameter 'firewall_value' at url /goform/SetFirewallCfg. | https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md | 2023-08-22T00:00:00 | 2023-09-07T00:00:00 | 2023-09-07T14:33:43.109474 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40041 | TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code. | https://github.com/Korey0sh1/IoT_vuln/blob/main/TOTOLINK/T10_V2/lib-cste_modules-wps.md | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40411 | This issue was addressed with improved data protection. This issue is fixed in macOS Sonoma 14. An app may be able to access user-sensitive data. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.256Z | 2024-01-10T22:03:21.172Z | 2024-01-10T22:03:21.172Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40368 | IBM Storage Protect 8.1.0.0 through 8.1.19.0 could allow a privileged user to obtain sensitive information from the administrative command line client. IBM X-Force ID: 263456. | https://www.ibm.com/support/pages/node/7034288 | 2023-08-14T20:12:04.115Z | 2023-09-20T18:43:43.601Z | 2023-09-20T18:43:43.601Z | {'Vendor': 'IBM', 'Product': 'Storage Protect Client', 'Versions': '8.1.0.0'} |
CVE-2023-40692 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, 11.5 is vulnerable to denial of service under extreme stress conditions. IBM X-Force ID: 264807. | https://www.ibm.com/support/pages/node/7087157 | 2023-08-18T15:48:17.570Z | 2023-12-03T23:51:06.202Z | 2023-12-03T23:57:41.215Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1, 11.5'} |
CVE-2023-40850 | netentsec NS-ASG 6.3 is vulnerable to Incorrect Access Control. There is a file leak in the website source code of the application security gateway. | https://github.com/flyyue2001/cve/blob/main/NS-ASG-bak-leakage.md | 2023-08-22T00:00:00 | 2023-09-13T00:00:00 | 2023-09-13T19:33:30.831516 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40153 |
The affected product is vulnerable to a cross-site scripting vulnerability, which could allow an attacker to access the web application to introduce arbitrary Java Script by injecting an XSS payload into the 'hostname' parameter of the vulnerable software.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02 | 2023-09-12T23:06:14.672Z | 2023-10-19T18:05:42.988Z | 2023-10-19T18:05:42.988Z | {'Vendor': 'DEXMA', 'Product': 'DexGate', 'Versions': '20130114'} |
CVE-2023-40446 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing maliciously crafted input may lead to arbitrary code execution in user-installed apps. | https://support.apple.com/en-us/HT213981 | 2023-08-14T20:26:36.262Z | 2023-12-12T00:38:29.093Z | 2023-12-12T00:38:29.093Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40915 | Tenda AX3 v16.03.12.11 has a stack buffer overflow vulnerability detected at function form_fast_setting_wifi_set. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ssid parameter. | https://github.com/Korey0sh1/IoT_vuln/blob/main/Tenda/AX3/form_fast_setting_wifi_set.md | 2023-08-22T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T14:40:46.760912 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40295 | libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_strInitUtf8 at string.c. | https://github.com/0branch/boron/issues/3 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40145 |
In Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary commands after login to the device.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-12 | 2023-09-20T14:26:47.028Z | 2023-10-19T19:26:20.948Z | 2023-10-19T19:26:20.948Z | {'Vendor': 'Weintek', 'Product': 'cMT-FHD', 'Versions': '0'} |
CVE-2023-40846 | Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function sub_90998. | https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/9/9.md | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T13:40:11.315421 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40450 | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may bypass Gatekeeper checks. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.268Z | 2023-09-26T20:14:35.603Z | 2023-09-26T20:14:35.603Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40779 | An issue in IceWarp Mail Server Deep Castle 2 v.13.0.1.2 allows a remote attacker to execute arbitrary code via a crafted request to the URL. | https://medium.com/%40muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710 | 2023-08-22T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T17:09:40.178820 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40283 | An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2024-01-11T19:07:21.176099 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40329 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPZest Custom Admin Login Page | WPZest plugin <= 1.2.0 versions. | https://patchstack.com/database/vulnerability/custom-admin-login-styler-wpzest/wordpress-custom-admin-login-page-wpzest-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-14T14:47:15.113Z | 2023-09-06T08:24:13.637Z | 2023-09-06T08:24:13.637Z | {'Vendor': 'WPZest', 'Product': 'Custom Admin Login Page | WPZest', 'Versions': 'n/a'} |
CVE-2023-40796 | Phicomm k2 v22.6.529.216 is vulnerable to command injection. | https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2 | 2023-08-22T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T15:07:44.334863 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40542 |
When TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | https://my.f5.com/manage/s/article/K000134652 | 2023-10-05T19:17:25.729Z | 2023-10-10T12:33:01.031Z | 2023-10-10T12:33:01.031Z | {'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'} |
CVE-2023-40407 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. A remote attacker may be able to cause a denial-of-service. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.255Z | 2023-09-26T20:14:36.095Z | 2023-09-26T20:14:36.095Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40954 | A SQL injection vulnerability in Grzegorz Marczynski Dynamic Progress Bar (aka web_progress) v. 11.0 through 11.0.2, v12.0 through v12.0.2, v.13.0 through v13.0.2, v.14.0 through v14.0.2.1, v.15.0 through v15.0.2, and v16.0 through v16.0.2.1 allows a remote attacker to gain privileges via the recency parameter in models/web_progress.py component. | https://github.com/luvsn/OdZoo/tree/main/exploits/web_progress | 2023-08-22T00:00:00 | 2023-12-15T00:00:00 | 2023-12-15T00:09:09.287482 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40684 | IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOne Virtual is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 264019. | https://https://www.ibm.com/support/pages/node/7046226 | 2023-08-18T15:48:06.501Z | 2023-10-04T13:38:40.057Z | 2023-10-04T13:38:40.057Z | {'Vendor': 'IBM', 'Product': 'Content Navigator', 'Versions': '3.0.11, 3.0.13, 3.0.14'} |
CVE-2023-40391 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, macOS Sonoma 14, Xcode 15. An app may be able to disclose kernel memory. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.253Z | 2023-09-26T20:14:37.580Z | 2023-09-26T20:14:37.580Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40685 | Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain root access to the operating system. IBM X-Force ID: 264116. | https://www.ibm.com/support/pages/node/7060686 | 2023-08-18T15:48:06.502Z | 2023-10-29T01:00:45.310Z | 2023-10-29T01:00:45.310Z | {'Vendor': 'IBM', 'Product': 'i', 'Versions': '7.2, 7.3, 7.4, 7.5'} |
CVE-2023-40810 | OpenCRX version 5.2.0 is vulnerable to HTML injection via Product Name Field. | https://www.esecforte.com/cve-2023-40810-html-injection-product-creation/ | 2023-08-22T00:00:00 | 2023-11-18T00:00:00 | 2023-11-18T03:12:08.546363 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40406 | The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, macOS Ventura 13.6, macOS Sonoma 14. An app may be able to read arbitrary files. | https://support.apple.com/en-us/HT213932 | 2023-08-14T20:26:36.255Z | 2023-09-26T20:14:38.125Z | 2023-09-26T20:14:38.125Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40056 |
SQL Injection Remote Code Vulnerability was found in the SolarWinds
Platform. This vulnerability can be exploited with a low privileged account.
| https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40056 | 2023-08-08T23:22:08.618Z | 2023-11-28T17:51:48.838Z | 2023-11-28T17:51:48.838Z | {'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.4.1 and previous versions '} |
CVE-2023-40955 | A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the select parameter in models/base_client.py component. | https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2 | 2023-08-22T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T23:58:04.527221 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40282 | Improper authentication vulnerability in Rakuten WiFi Pocket all versions allows a network-adjacent attacker to log in to the product's Management Screen. As a result, sensitive information may be obtained and/or the settings may be changed. | https://network.mobile.rakuten.co.jp/product/internet/rakuten-wifi-pocket/support/ | 2023-08-14T01:52:11.134Z | 2023-08-23T03:16:56.417Z | 2023-08-23T03:16:56.417Z | {'Vendor': 'Rakuten Mobile, Inc.', 'Product': 'Rakuten WiFi Pocket', 'Versions': 'all versions'} |
CVE-2023-40328 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Carrrot plugin <= 1.1.0 versions. | https://patchstack.com/database/vulnerability/carrrot/wordpress-carrot-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-14T14:47:15.113Z | 2023-09-06T08:26:46.076Z | 2023-09-06T08:26:46.076Z | {'Vendor': 'Carrrot', 'Product': 'Carrrot', 'Versions': 'n/a'} |
CVE-2023-40797 | In Tenda AC23 v16.03.07.45_cn, the sub_4781A4 function does not validate the parameters entered by the user, resulting in a post-authentication stack overflow vulnerability. | https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_4781A4 | 2023-08-22T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T15:02:27.452301 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40144 | OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided. | https://download.ganzsecurity.pl/ | 2023-08-10T08:28:15.173Z | 2023-08-23T03:09:26.960Z | 2023-08-23T03:09:26.960Z | {'Vendor': 'CBC Co.,Ltd.', 'Product': 'NR4H, NR8H, NR16H series', 'Versions': 'firmware all versions'} |
CVE-2023-40847 | Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via the function "initIpAddrInfo." In the function, it reads in a user-provided parameter, and the variable is passed to the function without any length check. | https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/12/12.md | 2023-08-22T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T16:35:55.856159 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40902 | Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind. | https://github.com/peris-navince/founded-0-days/blob/main/ac10/SetIpMacBind/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:21:22.365154 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40451 | This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code. | https://support.apple.com/en-us/HT213941 | 2023-08-14T20:26:36.268Z | 2023-09-26T20:14:38.617Z | 2023-09-26T20:14:38.617Z | {'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'} |
CVE-2023-40294 | libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_parseBlockI at i_parse_blk.c. | https://github.com/0branch/boron/issues/3 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40781 | Buffer Overflow vulnerability in Libming Libming v.0.4.8 allows a remote attacker to cause a denial of service via a crafted .swf file to the makeswf function. | https://github.com/libming/libming/issues/288 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T21:09:43.200384 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40851 | Cross Site Scripting (XSS) vulnerability in Phpgurukul User Registration & Login and User Management System With admin panel 3.0 allows attackers to run arbitrary code via fname, lname, email, and contact fields of the user registration page. | https://www.exploit-db.com/exploits/51694 | 2023-08-22T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T20:29:33.533409 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40152 | When Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file an out of bounds write may occur. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02 | 2023-08-18T17:42:07.401Z | 2023-11-22T00:42:49.608Z | 2023-11-22T00:42:49.608Z | {'Vendor': 'Fuji Electric', 'Product': 'Tellus Lite V-Simulator', 'Versions': '0'} |
CVE-2023-40447 | The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213981 | 2023-08-14T20:26:36.262Z | 2023-10-25T18:31:48.984Z | 2023-10-25T18:31:48.984Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40017 | GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9. | https://github.com/GeoNode/geonode/security/advisories/GHSA-rmxg-6qqf-x8mr | 2023-08-08T13:46:25.242Z | 2023-08-24T22:45:48.502Z | 2023-08-24T22:45:48.502Z | {'Vendor': 'GeoNode', 'Product': 'geonode', 'Versions': '>= 3.2.0, <= 4.1.2'} |
CVE-2023-40386 | A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to access Notes attachments. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.252Z | 2023-09-26T20:14:39.588Z | 2023-09-26T20:14:39.588Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40555 | Deserialization of Untrusted Data vulnerability in UX-themes Flatsome | Multi-Purpose Responsive WooCommerce Theme.This issue affects Flatsome | Multi-Purpose Responsive WooCommerce Theme: from n/a through 3.17.5.
| https://patchstack.com/database/vulnerability/flatsome/wordpress-flatsome-theme-3-17-5-unauthenticated-php-object-injection-vulnerability?_s_id=cve | 2023-08-16T11:15:05.044Z | 2023-12-20T13:45:19.115Z | 2023-12-20T13:45:19.115Z | {'Vendor': 'UX-themes', 'Product': 'Flatsome | Multi-Purpose Responsive WooCommerce Theme', 'Versions': 'n/a'} |
CVE-2023-40943 | null | null | 2023-08-22T00:00:00 | null | 2023-10-30T13:34:24.107415 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-40040 | An issue was discovered in the MyCrops HiGrade "THC Testing & Cannabi" application 1.0.337 for Android. A remote attacker can start the camera feed via the com.cordovaplugincamerapreview.CameraActivity component in some situations. NOTE: this is only exploitable on Android versions that lack runtime permission checks, and of those only Android SDK 5.1.1 API 22 is consistent with the manifest. Thus, this applies only to Android Lollipop, affecting less than five percent of Android devices as of 2023. | https://github.com/actuator/cve/blob/main/CVE-2023-40040 | 2023-08-08T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T05:59:07.526132 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40410 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to disclose kernel memory. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.255Z | 2023-09-26T20:14:40.088Z | 2023-09-26T20:14:40.088Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40607 | Cross-Site Request Forgery (CSRF) vulnerability in CLUEVO CLUEVO LMS, E-Learning Platform plugin <= 1.10.0 versions. | https://patchstack.com/database/vulnerability/cluevo-lms/wordpress-cluevo-lms-plugin-1-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-17T10:47:42.477Z | 2023-10-06T14:51:15.772Z | 2023-10-06T14:51:15.772Z | {'Vendor': 'CLUEVO', 'Product': 'CLUEVO LMS, E-Learning Platform', 'Versions': 'n/a'} |
CVE-2023-40312 | Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
| https://docs.opennms.com/horizon/32/releasenotes/changelog.html | 2023-08-14T13:02:51.889Z | 2023-08-14T17:35:26.710Z | 2023-08-14T17:35:26.710Z | {'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8, 0'} |
CVE-2023-40892 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter schedStartTime and schedEndTime at /goform/openSchedWifi. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/setSchedEWifi/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:16:44.903432 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40650 | In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.634Z | 2023-10-08T03:36:03.774Z | 2023-10-08T03:36:03.774Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'} |
CVE-2023-40345 | Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Overall/Read permission to access and capture credentials they are not entitled to. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2) | 2023-08-14T16:02:56.436Z | 2023-08-16T14:32:55.174Z | 2023-10-24T12:51:29.812Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Delphix Plugin', 'Versions': '0'} |
CVE-2023-40715 | A cleartext storage of sensitive information vulnerability [CWE-312] in FortiTester 2.3.0 through 7.2.3 may allow an attacker with access to the DB contents to retrieve the plaintext password of external servers configured in the device. | https://fortiguard.com/psirt/FG-IR-22-465 | 2023-08-21T09:03:44.315Z | 2023-09-13T12:29:50.478Z | 2023-09-13T12:29:50.478Z | {'Vendor': 'Fortinet', 'Product': 'FortiTester', 'Versions': '7.2.0, 7.1.0, 7.0.0, 4.2.0, 4.1.0, 4.0.0, 3.9.0, 3.8.0, 3.7.0, 3.6.0, 3.5.0, 3.4.0, 3.3.0, 3.2.0, 3.1.0, 3.0.0, 2.9.0, 2.8.0, 2.7.0, 2.6.0, 2.5.0, 2.4.0, 2.3.0'} |
CVE-2023-40596 | In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege escalation on the Windows machine. | https://advisory.splunk.com/advisories/SVD-2023-0805 | 2023-08-16T22:07:52.838Z | 2023-08-30T16:19:43.630Z | 2024-01-24T18:29:31.252Z | {'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'} |
CVE-2023-40980 | File Upload vulnerability in DWSurvey DWSurvey-OSS v.3.2.0 and before allows a remote attacker to execute arbitrary code via the saveimage method and savveFile in the action/UploadAction.java file. | https://github.com/wkeyuan/DWSurvey/issues/107 | 2023-08-22T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T15:04:08.791580 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40579 | OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1. | https://github.com/openfga/openfga/security/advisories/GHSA-jcf2-mxr2-gmqp | 2023-08-16T18:24:02.391Z | 2023-08-25T19:46:40.700Z | 2023-08-25T19:46:40.700Z | {'Vendor': 'openfga', 'Product': 'openfga', 'Versions': '< 1.3.1'} |
CVE-2023-40083 | In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6 | 2023-08-09T02:29:29.982Z | 2023-12-04T22:40:52.110Z | 2023-12-22T00:16:48.102Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12'} |
CVE-2023-40129 | In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c0151aa3ba76c785b32c7f9d16c98febe53017b1 | 2023-08-09T02:29:33.869Z | 2023-10-27T20:22:57.693Z | 2023-10-27T20:22:57.693Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'} |
CVE-2023-40646 | In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.633Z | 2023-10-08T03:36:02.579Z | 2023-10-08T03:36:02.579Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A', 'Versions': 'Android11/Android12'} |
CVE-2023-40216 | OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences. | https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/014_wscons.patch.sig | 2023-08-10T00:00:00 | 2023-08-10T00:00:00 | 2023-08-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40703 | Mattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing a attacker to consume excessive resources, possibly leading to Denial of Service, by patching the field of a block using a specially crafted string.
| https://mattermost.com/security-updates | 2023-11-22T11:18:57.610Z | 2023-11-27T09:08:31.251Z | 2023-11-27T09:08:31.251Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.1.1, 9.0.2, 7.8.13, 8.1.4'} |
CVE-2023-40353 | An issue was discovered in Exynos Mobile Processor 980 and 2100. An integer overflow at a buffer index can prevent the execution of requested services via a crafted application. | https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | 2023-08-14T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T02:05:30.635208 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40580 | Freighter is a Stellar chrome extension. It may be possible for a malicious website to access the recovery mnemonic phrase when the Freighter wallet is unlocked. This vulnerability impacts access control to the mnemonic recovery phrase. This issue was patched in version 5.3.1. | https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w | 2023-08-16T18:24:02.391Z | 2023-08-25T19:51:17.535Z | 2023-08-25T19:51:17.535Z | {'Vendor': 'stellar', 'Product': 'freighter', 'Versions': '< 5.3.1'} |
CVE-2023-40095 | In createDontSendToRestrictedAppsBundle of PendingIntentUtils.java, there is a possible background activity launch due to a missing check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65 | 2023-08-09T02:29:30.482Z | 2023-12-04T22:40:53.888Z | 2023-12-22T00:16:51.799Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'} |
CVE-2023-40611 | Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.
Users should upgrade to version 2.7.1 or later which has removed the vulnerability.
| https://github.com/apache/airflow/pull/33413 | 2023-08-17T14:01:13.240Z | 2023-09-12T11:05:22.841Z | 2023-09-12T11:05:22.841Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'} |
CVE-2023-40754 | In PHPJabbers Car Rental Script 3.0, lack of verification when changing an email address and/or password (on the Profile Page) allows remote attackers to take over accounts. | https://www.phpjabbers.com/car-rental-script/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:50:12.491914 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40187 | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f | 2023-08-09T15:26:41.053Z | 2023-08-31T21:21:12.787Z | 2023-08-31T21:21:12.787Z | {'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '>= 3.0.0-beta1, < 3.0.0-beta3'} |
CVE-2023-40168 | TurboWarp is a desktop application that compiles scratch projects to JavaScript. TurboWarp Desktop versions prior to version 1.8.0 allowed a malicious project or custom extension to read arbitrary files from disk and upload them to a remote server. The only required user interaction is opening the sb3 file or loading the extension. The web version of TurboWarp is not affected. This bug has been addressed in commit `55e07e99b59` after an initial fix which was reverted. Users are advised to upgrade to version 1.8.0 or later. Users unable to upgrade should avoid opening sb3 files or loading extensions from untrusted sources. | https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q | 2023-08-09T15:26:41.051Z | 2023-08-17T19:05:18.113Z | 2023-08-17T19:05:18.113Z | {'Vendor': 'TurboWarp', 'Product': 'desktop', 'Versions': '< 1.8.0'} |
CVE-2023-40373 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to denial of service with a specially crafted query containing common table expressions. IBM X-Force ID: 263574. | https://www.ibm.com/support/pages/node/7047563 | 2023-08-14T20:12:05.635Z | 2023-10-16T23:08:25.937Z | 2023-10-16T23:08:25.937Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1, 11.5'} |
CVE-2023-40236 | In Pexip VMR self-service portal before 3, the same SSH host key is used across different customers' installations, which allows authentication bypass. | https://docs.pexip.com/admin/security_bulletins.htm | 2023-08-10T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T06:07:35.220685 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40518 | LiteSpeed OpenLiteSpeed before 1.7.18 does not strictly validate HTTP request headers. | https://www.litespeedtech.com/products/litespeed-web-server/release-log | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40631 | In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.630Z | 2023-10-08T03:35:57.807Z | 2023-10-08T03:35:57.807Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12'} |
CVE-2023-40918 | KnowStreaming 3.3.0 is vulnerable to Escalation of Privileges. Unauthorized users can create a new user with an admin role. | https://github.com/didi/KnowStreaming/issues/1128 | 2023-08-22T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T17:57:14.593146 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40762 | User enumeration is found in PHPJabbers Fundraising Script v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. | https://www.phpjabbers.com/fundraising-script/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:49:26.230244 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40627 | A reflected XSS vulnerability was discovered in the LivingWord component for Joomla. | https://extensions.joomla.org/extension/livingword/ | 2023-08-17T19:37:15.600Z | 2023-12-14T08:52:05.011Z | 2023-12-14T08:52:05.011Z | {'Vendor': 'https://github.com/MLWebTechnologies', 'Product': 'LivingWord component for Joomla', 'Versions': '1.0.0-3.0.0'} |
CVE-2023-40559 | Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Dynamic Pricing and Discount Rules for WooCommerce plugin <= 2.4.0 versions. | https://patchstack.com/database/vulnerability/woo-conditional-discount-rules-for-checkout/wordpress-dynamic-pricing-and-discount-rules-for-woocommerce-plugin-2-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-16T11:15:05.045Z | 2023-10-04T14:11:08.528Z | 2023-10-04T14:11:08.528Z | {'Vendor': 'theDotstore', 'Product': 'Dynamic Pricing and Discount Rules for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-40735 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BUTTERFLY BUTTON PROJECT - BUTTERFLY BUTTON (Architecture flaw) allows loss of plausible deniability and confidentiality.
This issue affects BUTTERFLY BUTTON: As of 2023-08-21.
| https://www.vulsec.org/advisories | 2023-08-21T11:18:05.563Z | 2023-08-21T11:35:44.087Z | 2023-08-22T06:12:04.222Z | {'Vendor': 'BUTTERFLY BUTTON PROJECT', 'Product': 'BUTTERFLY BUTTON', 'Versions': 'As of 2023-08-21'} |
CVE-2023-40220 | Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable information disclosure via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html | 2023-08-23T03:00:02.607Z | 2023-11-14T19:05:05.694Z | 2023-11-14T19:05:05.694Z | {'Vendor': 'n/a', 'Product': 'Intel(R) NUC BIOS firmware', 'Versions': 'See references'} |
CVE-2023-40037 | Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
| https://nifi.apache.org/security.html#CVE-2023-40037 | 2023-08-08T16:31:31.220Z | 2023-08-18T21:54:52.454Z | 2023-08-18T21:54:52.454Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '1.21.0'} |
CVE-2023-40934 | A SQL injection vulnerability in Nagios XI 5.11.1 and below allows authenticated attackers with privileges to manage host escalations in the Core Configuration Manager to execute arbitrary SQL commands via the host escalation notification settings. | http://nagios.com | 2023-08-22T00:00:00 | 2023-09-19T00:00:00 | 2023-09-19T22:54:53.987312 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.