CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-40186
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v
2023-08-09T15:26:41.053Z
2023-08-31T21:13:57.792Z
2023-08-31T21:13:57.792Z
{'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '< 2.11.0, >= 3.0.0-beta1, < 3.0.0-beta3'}
CVE-2023-40610
Improper authorization check and possible privilege escalation on Apache Superset up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data.
https://lists.apache.org/thread/jvgxpk4dbxyqtsgtl4pdgbd520rc0rot
2023-08-17T12:56:13.976Z
2023-11-27T10:22:41.083Z
2023-11-27T10:22:41.083Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0'}
CVE-2023-40305
GNU indent 2.2.13 has a heap-based buffer overflow in search_brace in indent.c via a crafted file.
https://savannah.gnu.org/bugs/index.php?64503
2023-08-14T00:00:00
2023-08-14T00:00:00
2023-09-15T20:06:51.778220
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40755
There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Callback Widget v1.0.
https://www.phpjabbers.com/callback-widget/
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:50:04.058005
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40581
yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the `%q` conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for `cmd` (the shell used by Python's `subprocess` on Windows) does not properly escape special characters, which can allow for remote code execution if `--exec` is used directly with maliciously crafted remote data. This vulnerability only impacts `yt-dlp` on Windows, and the vulnerability is present regardless of whether `yt-dlp` is run from `cmd` or from `PowerShell`. Support for output template expansion in `--exec`, along with this vulnerable behavior, was added to `yt-dlp` in version 2021.04.11. yt-dlp version 2023.09.24 fixes this issue by properly escaping each special character. `\n` will be replaced by `\r` as no way of escaping it has been found. It is recommended to upgrade yt-dlp to version 2023.09.24 as soon as possible. Also, always be careful when using --exec, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous. For Windows users who are not able to upgrade: 1. Avoid using any output template expansion in --exec other than {} (filepath). 2. If expansion in --exec is needed, verify the fields you are using do not contain ", | or &. 3. Instead of using --exec, write the info json and load the fields from it instead.
https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-42h4-v29r-42qg
2023-08-16T18:24:02.391Z
2023-09-25T18:54:00.204Z
2023-09-25T18:54:00.204Z
{'Vendor': 'yt-dlp', 'Product': 'yt-dlp', 'Versions': '>= 2021.04.11, < 2023.09.24, < nightly 2023.09.24.003044'}
CVE-2023-40094
In keyguardGoingAway of ActivityTaskManagerService.java, there is a possible lock screen bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/1120bc7e511710b1b774adf29ba47106292365e7
2023-08-09T02:29:30.482Z
2023-12-04T22:40:53.676Z
2023-12-22T00:16:51.365Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'}
CVE-2023-40997
Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via a crafted packet.
https://jira.o-ran-sc.org/browse/RIC-991
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-12-14T07:38:42.711118
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40647
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.633Z
2023-10-08T03:36:02.894Z
2023-10-08T03:36:02.894Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A', 'Versions': 'Android11/Android12'}
CVE-2023-40217
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
https://www.python.org/dev/security/
2023-08-10T00:00:00
2023-08-25T00:00:00
2023-10-11T22:06:19.810772
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40352
McAfee Safe Connect before 2.16.1.126 may allow an adversary with system privileges to achieve privilege escalation by loading arbitrary DLLs.
https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html
2023-08-14T00:00:00
2023-08-21T00:00:00
2023-08-21T18:19:45.716818
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40597
In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can exploit an absolute path traversal to execute arbitrary code that is located on a separate disk.
https://advisory.splunk.com/advisories/SVD-2023-0806
2023-08-16T22:07:52.838Z
2023-08-30T16:19:44.220Z
2024-01-24T18:30:11.363Z
{'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'}
CVE-2023-40082
In modify_for_next_stage of fdt.rs, there is a possible way to render KASLR ineffective due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Virtualization/+/0cf463e9949db2d30755fc63a79225a6158928d3
2023-08-09T02:29:29.267Z
2023-12-04T22:40:51.922Z
2023-12-22T00:16:47.695Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'}
CVE-2023-40128
In several functions of xmlregexp.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/external/libxml2/+/1ccf89b87a3969edd56956e2d447f896037c8be7
2023-08-09T02:29:33.869Z
2023-10-27T20:22:57.517Z
2023-10-27T20:22:57.517Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-40201
Cross-Site Request Forgery (CSRF) vulnerability in FuturioWP Futurio Extra plugin <= 1.8.4 versions leads to activation of arbitrary plugin.
https://patchstack.com/database/vulnerability/futurio-extra/wordpress-futurio-extra-plugin-1-8-2-cross-site-request-forgery-csrf?_s_id=cve
2023-08-10T11:31:18.458Z
2023-10-03T12:20:23.660Z
2023-10-03T12:20:23.660Z
{'Vendor': 'FuturioWP', 'Product': 'Futurio Extra', 'Versions': 'n/a'}
CVE-2023-40651
In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.634Z
2023-10-08T03:36:04.059Z
2023-10-08T03:36:04.059Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
CVE-2023-40344
A missing permission check in Jenkins Delphix Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(1)
2023-08-14T16:02:56.436Z
2023-08-16T14:32:54.541Z
2023-10-24T12:51:28.643Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Delphix Plugin', 'Versions': '0'}
CVE-2023-40893
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet.
https://github.com/peris-navince/founded-0-days/blob/main/ac8/setSmartPowerManagement/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:15:41.306433
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40606
Improper Control of Generation of Code ('Code Injection') vulnerability in Kanban for WordPress Kanban Boards for WordPress.This issue affects Kanban Boards for WordPress: from n/a through 2.5.21.
https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-21-arbitrary-code-execution-vulnerability?_s_id=cve
2023-08-17T10:47:42.477Z
2023-12-29T08:59:57.593Z
2023-12-29T08:59:57.593Z
{'Vendor': 'Kanban for WordPress', 'Product': 'Kanban Boards for WordPress', 'Versions': 'n/a'}
CVE-2023-40256
A vulnerability was discovered in Veritas NetBackup Snapshot Manager before 10.2.0.1 that allowed untrusted clients to interact with the RabbitMQ service. This was caused by improper validation of the client certificate due to misconfiguration of the RabbitMQ service. Exploiting this impacts the confidentiality and integrity of messages controlling the backup and restore jobs, and could result in the service becoming unavailable. This impacts only the jobs controlling the backup and restore activities, and does not allow access to (or deletion of) the backup snapshot data itself. This vulnerability is confined to the NetBackup Snapshot Manager feature and does not impact the RabbitMQ instance on the NetBackup primary servers.
https://www.veritas.com/content/support/en_US/security/VTS23-011
2023-08-11T00:00:00
2023-08-11T00:00:00
2023-08-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40743
** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an application, it may not have been obvious that looking up a service through "ServiceFactory.getService" allows potentially dangerous lookup mechanisms such as LDAP. When passing untrusted input to this API method, this could expose the application to DoS, SSRF and even attacks leading to RCE. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. As a workaround, you may review your code to verify no untrusted or unsanitized input is passed to "ServiceFactory.getService", or by applying the patch from https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 . The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
2023-08-21T12:06:59.659Z
2023-09-05T14:42:13.317Z
2023-09-05T14:42:13.317Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Axis', 'Versions': '0'}
CVE-2023-40313
A BeanShell interpreter in remote server mode runs in OpenMNS Horizon versions earlier than 32.0.2 and in related Meridian versions which could allow arbitrary remote Java code execution. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
https://docs.opennms.com/horizon/32/releasenotes/changelog.html
2023-08-14T13:02:51.889Z
2023-08-17T18:24:08.866Z
2023-08-17T18:24:08.866Z
{'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '29.0.4, 0'}
CVE-2023-40554
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Blog2Social, Adenion Blog2Social: Social Media Auto Post & Scheduler plugin <= 7.2.0 versions.
https://patchstack.com/database/vulnerability/blog2social/wordpress-blog2social-plugin-7-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-16T11:15:05.044Z
2023-09-06T08:14:39.927Z
2023-09-06T08:14:39.927Z
{'Vendor': 'Blog2Social, Adenion', 'Product': 'Blog2Social: Social Media Auto Post & Scheduler', 'Versions': 'n/a'}
CVE-2023-40942
Tenda AC9 V3.0BR_V15.03.06.42_multi_TD01 was discovered stack overflow via parameter 'firewall_value' at url /goform/SetFirewallCfg.
https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md
2023-08-22T00:00:00
2023-09-07T00:00:00
2023-09-07T14:33:43.109474
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40041
TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code.
https://github.com/Korey0sh1/IoT_vuln/blob/main/TOTOLINK/T10_V2/lib-cste_modules-wps.md
2023-08-08T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40411
This issue was addressed with improved data protection. This issue is fixed in macOS Sonoma 14. An app may be able to access user-sensitive data.
https://support.apple.com/en-us/HT213940
2023-08-14T20:26:36.256Z
2024-01-10T22:03:21.172Z
2024-01-10T22:03:21.172Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40368
IBM Storage Protect 8.1.0.0 through 8.1.19.0 could allow a privileged user to obtain sensitive information from the administrative command line client. IBM X-Force ID: 263456.
https://www.ibm.com/support/pages/node/7034288
2023-08-14T20:12:04.115Z
2023-09-20T18:43:43.601Z
2023-09-20T18:43:43.601Z
{'Vendor': 'IBM', 'Product': 'Storage Protect Client', 'Versions': '8.1.0.0'}
CVE-2023-40692
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, 11.5 is vulnerable to denial of service under extreme stress conditions. IBM X-Force ID: 264807.
https://www.ibm.com/support/pages/node/7087157
2023-08-18T15:48:17.570Z
2023-12-03T23:51:06.202Z
2023-12-03T23:57:41.215Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1, 11.5'}
CVE-2023-40850
netentsec NS-ASG 6.3 is vulnerable to Incorrect Access Control. There is a file leak in the website source code of the application security gateway.
https://github.com/flyyue2001/cve/blob/main/NS-ASG-bak-leakage.md
2023-08-22T00:00:00
2023-09-13T00:00:00
2023-09-13T19:33:30.831516
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40153
The affected product is vulnerable to a cross-site scripting vulnerability, which could allow an attacker to access the web application to introduce arbitrary Java Script by injecting an XSS payload into the 'hostname' parameter of the vulnerable software.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02
2023-09-12T23:06:14.672Z
2023-10-19T18:05:42.988Z
2023-10-19T18:05:42.988Z
{'Vendor': 'DEXMA', 'Product': 'DexGate', 'Versions': '20130114'}
CVE-2023-40446
The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing maliciously crafted input may lead to arbitrary code execution in user-installed apps.
https://support.apple.com/en-us/HT213981
2023-08-14T20:26:36.262Z
2023-12-12T00:38:29.093Z
2023-12-12T00:38:29.093Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40915
Tenda AX3 v16.03.12.11 has a stack buffer overflow vulnerability detected at function form_fast_setting_wifi_set. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ssid parameter.
https://github.com/Korey0sh1/IoT_vuln/blob/main/Tenda/AX3/form_fast_setting_wifi_set.md
2023-08-22T00:00:00
2023-08-25T00:00:00
2023-08-25T14:40:46.760912
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40295
libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_strInitUtf8 at string.c.
https://github.com/0branch/boron/issues/3
2023-08-14T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40145
In Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary commands after login to the device.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-12
2023-09-20T14:26:47.028Z
2023-10-19T19:26:20.948Z
2023-10-19T19:26:20.948Z
{'Vendor': 'Weintek', 'Product': 'cMT-FHD', 'Versions': '0'}
CVE-2023-40846
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function sub_90998.
https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/9/9.md
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T13:40:11.315421
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40450
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may bypass Gatekeeper checks.
https://support.apple.com/en-us/HT213940
2023-08-14T20:26:36.268Z
2023-09-26T20:14:35.603Z
2023-09-26T20:14:35.603Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40779
An issue in IceWarp Mail Server Deep Castle 2 v.13.0.1.2 allows a remote attacker to execute arbitrary code via a crafted request to the URL.
https://medium.com/%40muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710
2023-08-22T00:00:00
2023-09-14T00:00:00
2023-09-14T17:09:40.178820
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40283
An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1
2023-08-14T00:00:00
2023-08-14T00:00:00
2024-01-11T19:07:21.176099
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40329
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPZest Custom Admin Login Page | WPZest plugin <= 1.2.0 versions.
https://patchstack.com/database/vulnerability/custom-admin-login-styler-wpzest/wordpress-custom-admin-login-page-wpzest-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-14T14:47:15.113Z
2023-09-06T08:24:13.637Z
2023-09-06T08:24:13.637Z
{'Vendor': 'WPZest', 'Product': 'Custom Admin Login Page | WPZest', 'Versions': 'n/a'}
CVE-2023-40796
Phicomm k2 v22.6.529.216 is vulnerable to command injection.
https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2
2023-08-22T00:00:00
2023-08-25T00:00:00
2023-08-25T15:07:44.334863
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40542
When TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
https://my.f5.com/manage/s/article/K000134652
2023-10-05T19:17:25.729Z
2023-10-10T12:33:01.031Z
2023-10-10T12:33:01.031Z
{'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'}
CVE-2023-40407
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. A remote attacker may be able to cause a denial-of-service.
https://support.apple.com/en-us/HT213940
2023-08-14T20:26:36.255Z
2023-09-26T20:14:36.095Z
2023-09-26T20:14:36.095Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40954
A SQL injection vulnerability in Grzegorz Marczynski Dynamic Progress Bar (aka web_progress) v. 11.0 through 11.0.2, v12.0 through v12.0.2, v.13.0 through v13.0.2, v.14.0 through v14.0.2.1, v.15.0 through v15.0.2, and v16.0 through v16.0.2.1 allows a remote attacker to gain privileges via the recency parameter in models/web_progress.py component.
https://github.com/luvsn/OdZoo/tree/main/exploits/web_progress
2023-08-22T00:00:00
2023-12-15T00:00:00
2023-12-15T00:09:09.287482
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40684
IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOne Virtual is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 264019.
https://https://www.ibm.com/support/pages/node/7046226
2023-08-18T15:48:06.501Z
2023-10-04T13:38:40.057Z
2023-10-04T13:38:40.057Z
{'Vendor': 'IBM', 'Product': 'Content Navigator', 'Versions': '3.0.11, 3.0.13, 3.0.14'}
CVE-2023-40391
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, macOS Sonoma 14, Xcode 15. An app may be able to disclose kernel memory.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.253Z
2023-09-26T20:14:37.580Z
2023-09-26T20:14:37.580Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40685
Management Central as part of IBM i 7.2, 7.3, 7.4, and 7.5 Navigator contains a local privilege escalation vulnerability. A malicious actor with command line access to the operating system can exploit this vulnerability to elevate privileges to gain root access to the operating system. IBM X-Force ID: 264116.
https://www.ibm.com/support/pages/node/7060686
2023-08-18T15:48:06.502Z
2023-10-29T01:00:45.310Z
2023-10-29T01:00:45.310Z
{'Vendor': 'IBM', 'Product': 'i', 'Versions': '7.2, 7.3, 7.4, 7.5'}
CVE-2023-40810
OpenCRX version 5.2.0 is vulnerable to HTML injection via Product Name Field.
https://www.esecforte.com/cve-2023-40810-html-injection-product-creation/
2023-08-22T00:00:00
2023-11-18T00:00:00
2023-11-18T03:12:08.546363
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40406
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, macOS Ventura 13.6, macOS Sonoma 14. An app may be able to read arbitrary files.
https://support.apple.com/en-us/HT213932
2023-08-14T20:26:36.255Z
2023-09-26T20:14:38.125Z
2023-09-26T20:14:38.125Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40056
SQL Injection Remote Code Vulnerability was found in the SolarWinds Platform. This vulnerability can be exploited with a low privileged account.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40056
2023-08-08T23:22:08.618Z
2023-11-28T17:51:48.838Z
2023-11-28T17:51:48.838Z
{'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.4.1 and previous versions '}
CVE-2023-40955
A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the select parameter in models/base_client.py component.
https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2
2023-08-22T00:00:00
2023-09-14T00:00:00
2023-09-14T23:58:04.527221
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40282
Improper authentication vulnerability in Rakuten WiFi Pocket all versions allows a network-adjacent attacker to log in to the product's Management Screen. As a result, sensitive information may be obtained and/or the settings may be changed.
https://network.mobile.rakuten.co.jp/product/internet/rakuten-wifi-pocket/support/
2023-08-14T01:52:11.134Z
2023-08-23T03:16:56.417Z
2023-08-23T03:16:56.417Z
{'Vendor': 'Rakuten Mobile, Inc.', 'Product': 'Rakuten WiFi Pocket', 'Versions': 'all versions'}
CVE-2023-40328
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Carrrot plugin <= 1.1.0 versions.
https://patchstack.com/database/vulnerability/carrrot/wordpress-carrot-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-14T14:47:15.113Z
2023-09-06T08:26:46.076Z
2023-09-06T08:26:46.076Z
{'Vendor': 'Carrrot', 'Product': 'Carrrot', 'Versions': 'n/a'}
CVE-2023-40797
In Tenda AC23 v16.03.07.45_cn, the sub_4781A4 function does not validate the parameters entered by the user, resulting in a post-authentication stack overflow vulnerability.
https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_4781A4
2023-08-22T00:00:00
2023-08-25T00:00:00
2023-08-25T15:02:27.452301
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40144
OS command injection vulnerability in the CBC products allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter its settings. As for the affected products/versions, see the detailed information provided by the vendor. Note that NR4H, NR8H, NR16H series and DR-16F, DR-8F, DR-4F, DR-16H, DR-8H, DR-4H, DR-4M41 series are no longer supported, therefore updates for those products are not provided.
https://download.ganzsecurity.pl/
2023-08-10T08:28:15.173Z
2023-08-23T03:09:26.960Z
2023-08-23T03:09:26.960Z
{'Vendor': 'CBC Co.,Ltd.', 'Product': 'NR4H, NR8H, NR16H series', 'Versions': 'firmware all versions'}
CVE-2023-40847
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via the function "initIpAddrInfo." In the function, it reads in a user-provided parameter, and the variable is passed to the function without any length check.
https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/12/12.md
2023-08-22T00:00:00
2023-08-30T00:00:00
2023-08-30T16:35:55.856159
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40902
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.
https://github.com/peris-navince/founded-0-days/blob/main/ac10/SetIpMacBind/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:21:22.365154
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40451
This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code.
https://support.apple.com/en-us/HT213941
2023-08-14T20:26:36.268Z
2023-09-26T20:14:38.617Z
2023-09-26T20:14:38.617Z
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
CVE-2023-40294
libboron in Boron 2.0.8 has a heap-based buffer overflow in ur_parseBlockI at i_parse_blk.c.
https://github.com/0branch/boron/issues/3
2023-08-14T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40781
Buffer Overflow vulnerability in Libming Libming v.0.4.8 allows a remote attacker to cause a denial of service via a crafted .swf file to the makeswf function.
https://github.com/libming/libming/issues/288
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T21:09:43.200384
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40851
Cross Site Scripting (XSS) vulnerability in Phpgurukul User Registration & Login and User Management System With admin panel 3.0 allows attackers to run arbitrary code via fname, lname, email, and contact fields of the user registration page.
https://www.exploit-db.com/exploits/51694
2023-08-22T00:00:00
2023-10-16T00:00:00
2023-10-16T20:29:33.533409
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40152
When Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file an out of bounds write may occur.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02
2023-08-18T17:42:07.401Z
2023-11-22T00:42:49.608Z
2023-11-22T00:42:49.608Z
{'Vendor': 'Fuji Electric', 'Product': 'Tellus Lite V-Simulator', 'Versions': '0'}
CVE-2023-40447
The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213981
2023-08-14T20:26:36.262Z
2023-10-25T18:31:48.984Z
2023-10-25T18:31:48.984Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40017
GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. In versions 3.2.0 through 4.1.2, the endpoint `/proxy/?url=` does not properly protect against server-side request forgery. This allows an attacker to port scan internal hosts and request information from internal hosts. A patch is available at commit a9eebae80cb362009660a1fd49e105e7cdb499b9.
https://github.com/GeoNode/geonode/security/advisories/GHSA-rmxg-6qqf-x8mr
2023-08-08T13:46:25.242Z
2023-08-24T22:45:48.502Z
2023-08-24T22:45:48.502Z
{'Vendor': 'GeoNode', 'Product': 'geonode', 'Versions': '>= 3.2.0, <= 4.1.2'}
CVE-2023-40386
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to access Notes attachments.
https://support.apple.com/en-us/HT213940
2023-08-14T20:26:36.252Z
2023-09-26T20:14:39.588Z
2023-09-26T20:14:39.588Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40555
Deserialization of Untrusted Data vulnerability in UX-themes Flatsome | Multi-Purpose Responsive WooCommerce Theme.This issue affects Flatsome | Multi-Purpose Responsive WooCommerce Theme: from n/a through 3.17.5.
https://patchstack.com/database/vulnerability/flatsome/wordpress-flatsome-theme-3-17-5-unauthenticated-php-object-injection-vulnerability?_s_id=cve
2023-08-16T11:15:05.044Z
2023-12-20T13:45:19.115Z
2023-12-20T13:45:19.115Z
{'Vendor': 'UX-themes', 'Product': 'Flatsome | Multi-Purpose Responsive WooCommerce Theme', 'Versions': 'n/a'}
CVE-2023-40943
null
null
2023-08-22T00:00:00
null
2023-10-30T13:34:24.107415
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-40040
An issue was discovered in the MyCrops HiGrade "THC Testing & Cannabi" application 1.0.337 for Android. A remote attacker can start the camera feed via the com.cordovaplugincamerapreview.CameraActivity component in some situations. NOTE: this is only exploitable on Android versions that lack runtime permission checks, and of those only Android SDK 5.1.1 API 22 is consistent with the manifest. Thus, this applies only to Android Lollipop, affecting less than five percent of Android devices as of 2023.
https://github.com/actuator/cve/blob/main/CVE-2023-40040
2023-08-08T00:00:00
2023-09-11T00:00:00
2023-09-11T05:59:07.526132
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40410
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to disclose kernel memory.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.255Z
2023-09-26T20:14:40.088Z
2023-09-26T20:14:40.088Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40607
Cross-Site Request Forgery (CSRF) vulnerability in CLUEVO CLUEVO LMS, E-Learning Platform plugin <= 1.10.0 versions.
https://patchstack.com/database/vulnerability/cluevo-lms/wordpress-cluevo-lms-plugin-1-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-17T10:47:42.477Z
2023-10-06T14:51:15.772Z
2023-10-06T14:51:15.772Z
{'Vendor': 'CLUEVO', 'Product': 'CLUEVO LMS, E-Learning Platform', 'Versions': 'n/a'}
CVE-2023-40312
Multiple reflected XSS were found on different JSP files with unsanitized parameters in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms that an attacker can modify to craft a malicious XSS payload. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Jordi Miralles Comins for reporting this issue.
https://docs.opennms.com/horizon/32/releasenotes/changelog.html
2023-08-14T13:02:51.889Z
2023-08-14T17:35:26.710Z
2023-08-14T17:35:26.710Z
{'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8, 0'}
CVE-2023-40892
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter schedStartTime and schedEndTime at /goform/openSchedWifi.
https://github.com/peris-navince/founded-0-days/blob/main/ac8/setSchedEWifi/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:16:44.903432
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40650
In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.634Z
2023-10-08T03:36:03.774Z
2023-10-08T03:36:03.774Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-40345
Jenkins Delphix Plugin 3.0.2 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Overall/Read permission to access and capture credentials they are not entitled to.
https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3214%20(2)
2023-08-14T16:02:56.436Z
2023-08-16T14:32:55.174Z
2023-10-24T12:51:29.812Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Delphix Plugin', 'Versions': '0'}
CVE-2023-40715
A cleartext storage of sensitive information vulnerability [CWE-312] in FortiTester 2.3.0 through 7.2.3 may allow an attacker with access to the DB contents to retrieve the plaintext password of external servers configured in the device.
https://fortiguard.com/psirt/FG-IR-22-465
2023-08-21T09:03:44.315Z
2023-09-13T12:29:50.478Z
2023-09-13T12:29:50.478Z
{'Vendor': 'Fortinet', 'Product': 'FortiTester', 'Versions': '7.2.0, 7.1.0, 7.0.0, 4.2.0, 4.1.0, 4.0.0, 3.9.0, 3.8.0, 3.7.0, 3.6.0, 3.5.0, 3.4.0, 3.3.0, 3.2.0, 3.1.0, 3.0.0, 2.9.0, 2.8.0, 2.7.0, 2.6.0, 2.5.0, 2.4.0, 2.3.0'}
CVE-2023-40596
In Splunk Enterprise versions earlier than 8.2.12, 9.0.6, and 9.1.1, a dynamic link library (DLL) that ships with Splunk Enterprise references an insecure path for the OPENSSLDIR build definition. An attacker can abuse this reference and subsequently install malicious code to achieve privilege escalation on the Windows machine.
https://advisory.splunk.com/advisories/SVD-2023-0805
2023-08-16T22:07:52.838Z
2023-08-30T16:19:43.630Z
2024-01-24T18:29:31.252Z
{'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'}
CVE-2023-40980
File Upload vulnerability in DWSurvey DWSurvey-OSS v.3.2.0 and before allows a remote attacker to execute arbitrary code via the saveimage method and savveFile in the action/UploadAction.java file.
https://github.com/wkeyuan/DWSurvey/issues/107
2023-08-22T00:00:00
2023-09-01T00:00:00
2023-09-01T15:04:08.791580
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40579
OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. Some end users of OpenFGA v1.3.0 or earlier are vulnerable to authorization bypass when calling the ListObjects API. The vulnerability affects customers using `ListObjects` with specific models. The affected models contain expressions of type `rel1 from type1`. This issue has been patched in version 1.3.1.
https://github.com/openfga/openfga/security/advisories/GHSA-jcf2-mxr2-gmqp
2023-08-16T18:24:02.391Z
2023-08-25T19:46:40.700Z
2023-08-25T19:46:40.700Z
{'Vendor': 'openfga', 'Product': 'openfga', 'Versions': '< 1.3.1'}
CVE-2023-40083
In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6
2023-08-09T02:29:29.982Z
2023-12-04T22:40:52.110Z
2023-12-22T00:16:48.102Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12'}
CVE-2023-40129
In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c0151aa3ba76c785b32c7f9d16c98febe53017b1
2023-08-09T02:29:33.869Z
2023-10-27T20:22:57.693Z
2023-10-27T20:22:57.693Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'}
CVE-2023-40646
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.633Z
2023-10-08T03:36:02.579Z
2023-10-08T03:36:02.579Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A', 'Versions': 'Android11/Android12'}
CVE-2023-40216
OpenBSD 7.3 before errata 014 is missing an argument-count bounds check in console terminal emulation. This could cause incorrect memory access and a kernel crash after receiving crafted DCS or CSI terminal escape sequences.
https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/014_wscons.patch.sig
2023-08-10T00:00:00
2023-08-10T00:00:00
2023-08-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40703
Mattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing a attacker to consume excessive resources, possibly leading to Denial of Service, by patching the field of a block using a specially crafted string. 
https://mattermost.com/security-updates
2023-11-22T11:18:57.610Z
2023-11-27T09:08:31.251Z
2023-11-27T09:08:31.251Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.1.1, 9.0.2, 7.8.13, 8.1.4'}
CVE-2023-40353
An issue was discovered in Exynos Mobile Processor 980 and 2100. An integer overflow at a buffer index can prevent the execution of requested services via a crafted application.
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-08-14T00:00:00
2023-09-08T00:00:00
2023-09-08T02:05:30.635208
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40580
Freighter is a Stellar chrome extension. It may be possible for a malicious website to access the recovery mnemonic phrase when the Freighter wallet is unlocked. This vulnerability impacts access control to the mnemonic recovery phrase. This issue was patched in version 5.3.1.
https://github.com/stellar/freighter/security/advisories/GHSA-vqr6-hwg2-775w
2023-08-16T18:24:02.391Z
2023-08-25T19:51:17.535Z
2023-08-25T19:51:17.535Z
{'Vendor': 'stellar', 'Product': 'freighter', 'Versions': '< 5.3.1'}
CVE-2023-40095
In createDontSendToRestrictedAppsBundle of PendingIntentUtils.java, there is a possible background activity launch due to a missing check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/d98abeef8f870b60510feafbadcea0c2f9cbae65
2023-08-09T02:29:30.482Z
2023-12-04T22:40:53.888Z
2023-12-22T00:16:51.799Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'}
CVE-2023-40611
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. Users should upgrade to version 2.7.1 or later which has removed the vulnerability.
https://github.com/apache/airflow/pull/33413
2023-08-17T14:01:13.240Z
2023-09-12T11:05:22.841Z
2023-09-12T11:05:22.841Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-40754
In PHPJabbers Car Rental Script 3.0, lack of verification when changing an email address and/or password (on the Profile Page) allows remote attackers to take over accounts.
https://www.phpjabbers.com/car-rental-script/
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:50:12.491914
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40187
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f
2023-08-09T15:26:41.053Z
2023-08-31T21:21:12.787Z
2023-08-31T21:21:12.787Z
{'Vendor': 'FreeRDP', 'Product': 'FreeRDP', 'Versions': '>= 3.0.0-beta1, < 3.0.0-beta3'}
CVE-2023-40168
TurboWarp is a desktop application that compiles scratch projects to JavaScript. TurboWarp Desktop versions prior to version 1.8.0 allowed a malicious project or custom extension to read arbitrary files from disk and upload them to a remote server. The only required user interaction is opening the sb3 file or loading the extension. The web version of TurboWarp is not affected. This bug has been addressed in commit `55e07e99b59` after an initial fix which was reverted. Users are advised to upgrade to version 1.8.0 or later. Users unable to upgrade should avoid opening sb3 files or loading extensions from untrusted sources.
https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q
2023-08-09T15:26:41.051Z
2023-08-17T19:05:18.113Z
2023-08-17T19:05:18.113Z
{'Vendor': 'TurboWarp', 'Product': 'desktop', 'Versions': '< 1.8.0'}
CVE-2023-40373
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to denial of service with a specially crafted query containing common table expressions. IBM X-Force ID: 263574.
https://www.ibm.com/support/pages/node/7047563
2023-08-14T20:12:05.635Z
2023-10-16T23:08:25.937Z
2023-10-16T23:08:25.937Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1, 11.5'}
CVE-2023-40236
In Pexip VMR self-service portal before 3, the same SSH host key is used across different customers' installations, which allows authentication bypass.
https://docs.pexip.com/admin/security_bulletins.htm
2023-08-10T00:00:00
2023-12-25T00:00:00
2023-12-25T06:07:35.220685
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40518
LiteSpeed OpenLiteSpeed before 1.7.18 does not strictly validate HTTP request headers.
https://www.litespeedtech.com/products/litespeed-web-server/release-log
2023-08-14T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40631
In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.630Z
2023-10-08T03:35:57.807Z
2023-10-08T03:35:57.807Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12'}
CVE-2023-40918
KnowStreaming 3.3.0 is vulnerable to Escalation of Privileges. Unauthorized users can create a new user with an admin role.
https://github.com/didi/KnowStreaming/issues/1128
2023-08-22T00:00:00
2023-09-05T00:00:00
2023-09-05T17:57:14.593146
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40762
User enumeration is found in PHPJabbers Fundraising Script v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
https://www.phpjabbers.com/fundraising-script/
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T12:49:26.230244
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40627
A reflected XSS vulnerability was discovered in the LivingWord component for Joomla.
https://extensions.joomla.org/extension/livingword/
2023-08-17T19:37:15.600Z
2023-12-14T08:52:05.011Z
2023-12-14T08:52:05.011Z
{'Vendor': 'https://github.com/MLWebTechnologies', 'Product': 'LivingWord component for Joomla', 'Versions': '1.0.0-3.0.0'}
CVE-2023-40559
Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Dynamic Pricing and Discount Rules for WooCommerce plugin <= 2.4.0 versions.
https://patchstack.com/database/vulnerability/woo-conditional-discount-rules-for-checkout/wordpress-dynamic-pricing-and-discount-rules-for-woocommerce-plugin-2-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-16T11:15:05.045Z
2023-10-04T14:11:08.528Z
2023-10-04T14:11:08.528Z
{'Vendor': 'theDotstore', 'Product': 'Dynamic Pricing and Discount Rules for WooCommerce', 'Versions': 'n/a'}
CVE-2023-40735
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BUTTERFLY BUTTON PROJECT - BUTTERFLY BUTTON (Architecture flaw) allows loss of plausible deniability and confidentiality. This issue affects BUTTERFLY BUTTON: As of 2023-08-21.
https://www.vulsec.org/advisories
2023-08-21T11:18:05.563Z
2023-08-21T11:35:44.087Z
2023-08-22T06:12:04.222Z
{'Vendor': 'BUTTERFLY BUTTON PROJECT', 'Product': 'BUTTERFLY BUTTON', 'Versions': 'As of 2023-08-21'}
CVE-2023-40220
Improper buffer restrictions in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable information disclosure via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html
2023-08-23T03:00:02.607Z
2023-11-14T19:05:05.694Z
2023-11-14T19:05:05.694Z
{'Vendor': 'n/a', 'Product': 'Intel(R) NUC BIOS firmware', 'Versions': 'See references'}
CVE-2023-40037
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.
https://nifi.apache.org/security.html#CVE-2023-40037
2023-08-08T16:31:31.220Z
2023-08-18T21:54:52.454Z
2023-08-18T21:54:52.454Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '1.21.0'}
CVE-2023-40934
A SQL injection vulnerability in Nagios XI 5.11.1 and below allows authenticated attackers with privileges to manage host escalations in the Core Configuration Manager to execute arbitrary SQL commands via the host escalation notification settings.
http://nagios.com
2023-08-22T00:00:00
2023-09-19T00:00:00
2023-09-19T22:54:53.987312
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}