CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-40306 | SAP S/4HANA Manage Catalog Items and Cross-Catalog searches Fiori apps allow an attacker to redirect users to a malicious site due to insufficient URL validation. As a result, it may have a slight impact on confidentiality and integrity. | https://me.sap.com/notes/3156972 | 2023-08-14T07:36:04.796Z | 2023-09-08T21:05:24.877Z | 2023-09-12T01:55:37.558Z | {'Vendor': 'SAP SE', 'Product': 'SAP S/4HANA (Manage Catalog Items and Cross-Catalog search)', 'Versions': '103, 104, 105, 106'} |
CVE-2023-40756 | User enumeration is found in PHPJabbers Callback Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. | https://www.phpjabbers.com/callback-widget/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:49:58.724166 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40097 | In hasPermissionForActivity of PackageManagerHelper.java, there is a possible URI grant due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | https://android.googlesource.com/platform/packages/apps/Launcher3/+/6c9a41117d5a9365cf34e770bbb00138f6bf997e | 2023-08-09T02:29:30.482Z | 2023-12-04T22:40:54.273Z | 2023-12-22T00:16:52.594Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40078 | In a2dp_vendor_opus_decoder_decode_packet of a2dp_vendor_opus_decoder.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/6cdf985a664476659b84d8c74698cb3dfa28f82b | 2023-08-09T02:29:29.266Z | 2023-12-04T22:40:51.150Z | 2023-12-22T00:16:46.130Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-40582 | find-exec is a utility to discover available shell commands. Versions prior to 1.0.3 did not properly escape user input and are vulnerable to Command Injection via an attacker controlled parameter. As a result, attackers may run malicious shell commands in the context of the running process. This issue has been addressed in version 1.0.3. users are advised to upgrade. Users unable to upgrade should ensure that all input passed to find-exec comes from a trusted source. | https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622 | 2023-08-16T18:24:02.391Z | 2023-08-30T17:39:20.849Z | 2023-08-30T17:39:20.849Z | {'Vendor': 'shime', 'Product': 'find-exec', 'Versions': '< 1.0.3'} |
CVE-2023-40428 | The issue was addressed with improved handling of caches. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to access sensitive user data. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.259Z | 2023-09-26T20:14:46.089Z | 2023-09-26T20:14:46.089Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40351 | A cross-site request forgery (CSRF) vulnerability in Jenkins Favorite View Plugin 5.v77a_37f62782d and earlier allows attackers to add or remove views from another user's favorite views tab bar. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3201 | 2023-08-14T16:02:56.436Z | 2023-08-16T14:32:59.006Z | 2023-10-24T12:51:37.802Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Favorite View Plugin', 'Versions': '0'} |
CVE-2023-40644 | In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.633Z | 2023-10-08T03:36:01.781Z | 2023-10-08T03:36:01.781Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A', 'Versions': 'Android11/Android12'} |
CVE-2023-40214 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Vathemes Business Pro theme <= 1.10.4 versions. | https://patchstack.com/database/vulnerability/business-pro/wordpress-business-pro-theme-1-10-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-10T13:20:36.818Z | 2023-09-04T11:22:17.419Z | 2023-09-04T11:22:17.419Z | {'Vendor': 'Vathemes', 'Product': 'Business Pro', 'Versions': 'n/a'} |
CVE-2023-40081 | In loadMediaDataInBgForResumption of MediaDataManager.kt, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/1a42ae5379269b9e4dac9f5fbf803c6c731c655d | 2023-08-09T02:29:29.267Z | 2023-12-04T22:40:51.736Z | 2023-12-22T00:16:47.322Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'} |
CVE-2023-40982 | A stored cross-site scripting (XSS) vulnerability in Webmin v2.100 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cloned module name parameter. | http://webmin.com | 2023-08-22T00:00:00 | 2023-09-15T00:00:00 | 2023-09-15T02:56:27.452798 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40828 | An issue in pf4j pf4j v.3.9.0 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the expandIfZip method in the extract function. | https://github.com/pf4j/pf4j/pull/537 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T21:09:49.967791 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40594 | In Splunk Enterprise versions lower than 8.2.12, 9.0.6, and 9.1.1, an attacker can use the `printf` SPL function to perform a denial of service (DoS) against the Splunk Enterprise instance. | https://advisory.splunk.com/advisories/SVD-2023-0803 | 2023-08-16T22:07:52.838Z | 2023-08-30T16:19:40.677Z | 2024-01-24T18:29:23.431Z | {'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'} |
CVE-2023-40347 | Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.14 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3153 | 2023-08-14T16:02:56.436Z | 2023-08-16T14:32:56.439Z | 2023-10-24T12:51:33.190Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin', 'Versions': '0'} |
CVE-2023-40717 | A use of hard-coded credentials vulnerability [CWE-798] in FortiTester 2.3.0 through 7.2.3 may allow an attacker who managed to get a shell on the device to access the database via shell commands. | https://fortiguard.com/psirt/FG-IR-22-245 | 2023-08-21T09:03:44.315Z | 2023-09-13T12:29:45.466Z | 2023-09-13T12:29:45.466Z | {'Vendor': 'Fortinet', 'Product': 'FortiTester', 'Versions': '7.2.0, 7.1.0, 7.0.0, 4.2.0, 4.1.0, 4.0.0, 3.9.0, 3.8.0, 3.7.0, 3.6.0, 3.5.0, 3.4.0, 3.3.0, 3.2.0, 3.1.0, 3.0.0, 2.9.0, 2.8.0, 2.7.0, 2.6.0, 2.5.0, 2.4.0, 2.3.0'} |
CVE-2023-40202 | Cross-Site Request Forgery (CSRF) vulnerability in Hannes Etzelstorfer // codemiq WP HTML Mail plugin <= 3.4.1 versions. | https://patchstack.com/database/vulnerability/wp-html-mail/wordpress-email-template-designer-wp-html-mail-plugin-3-4-0-cross-site-request-forgery-csrf?_s_id=cve | 2023-08-10T11:31:18.459Z | 2023-10-03T12:14:15.225Z | 2023-10-03T12:14:15.225Z | {'Vendor': 'Hannes Etzelstorfer // codemiq', 'Product': 'WP HTML Mail', 'Versions': 'n/a'} |
CVE-2023-40652 | In jpg driver, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.634Z | 2023-10-08T03:36:04.349Z | 2023-10-08T03:36:04.349Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'T606/T612/T616', 'Versions': 'Android11'} |
CVE-2023-40039 | An issue was discovered on ARRIS TG852G, TG862G, and TG1672G devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame. | 2023-08-08T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T06:09:23.753384 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
|
CVE-2023-40193 | Deco M4 firmware versions prior to 'Deco M4(JP)_V2_1.5.8 Build 20230619' allows a network-adjacent authenticated attacker to execute arbitrary OS commands. | https://www.tp-link.com/jp/support/download/deco-m4/v2/#Firmware | 2023-08-15T07:33:39.194Z | 2023-09-06T09:22:00.909Z | 2023-09-06T09:22:00.909Z | {'Vendor': 'TP-LINK', 'Product': 'Deco M4', 'Versions': "firmware versions prior to 'Deco M4(JP)_V2_1.5.8 Build 20230619'"} |
CVE-2023-40890 | A stack-based buffer overflow vulnerability exists in the lookup_sequence function of ZBar 0.23.90. Specially crafted QR codes may lead to information disclosure and/or arbitrary code execution. To trigger this vulnerability, an attacker can digitally input the malicious QR code, or prepare it to be physically scanned by the vulnerable scanner. | https://hackmd.io/%40cspl/H1PxPAUnn | 2023-08-22T00:00:00 | 2023-08-29T00:00:00 | 2024-01-18T03:06:47.818727 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40310 | SAP PowerDesigner Client - version 16.7, does not sufficiently validate BPMN2 XML document imported from an untrusted source. As a result, URLs of external entities in BPMN2 file, although not used, would be accessed during import. A successful attack could impact availability of SAP PowerDesigner Client.
| https://me.sap.com/notes/3357154 | 2023-08-14T07:36:04.796Z | 2023-10-10T01:35:28.068Z | 2023-10-10T01:35:28.068Z | {'Vendor': 'SAP_SE', 'Product': 'SAP PowerDesigner Client', 'Versions': '16.7'} |
CVE-2023-40605 | Auth. (contributor) Cross-Site Scripting (XSS) vulnerability in 93digital Typing Effect plugin <= 1.3.6 versions. | https://patchstack.com/database/vulnerability/animated-typing-effect/wordpress-typing-effect-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-17T10:47:42.477Z | 2023-09-27T05:31:37.272Z | 2023-09-27T05:31:37.272Z | {'Vendor': '93digital', 'Product': 'Typing Effect', 'Versions': 'n/a'} |
CVE-2023-40042 | TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setStaticDhcpConfig in /lib/cste_modules/lan.so. Attackers can send crafted data in an MQTT packet, via the comment parameter, to control the return address and execute code. | http://www.totolink.cn | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40412 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.256Z | 2023-09-26T20:14:47.601Z | 2023-09-26T20:14:47.601Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40384 | A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.252Z | 2023-09-26T20:14:48.111Z | 2023-09-26T20:14:48.111Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40691 | IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 may reveal sensitive information contained in application configuration to developer and administrator users. IBM X-Force ID: 264805. | https://www.ibm.com/support/pages/node/7096365 | 2023-08-18T15:48:06.502Z | 2023-12-18T20:29:00.344Z | 2023-12-18T20:29:00.344Z | {'Vendor': 'IBM', 'Product': 'Cloud Pak for Business Automation', 'Versions': '18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2'} |
CVE-2023-40445 | The issue was addressed with improved UI handling. This issue is fixed in iOS 17.1 and iPadOS 17.1. A device may persistently fail to lock. | https://support.apple.com/en-us/HT213982 | 2023-08-14T20:26:36.262Z | 2023-10-25T18:32:04.725Z | 2023-10-25T18:32:04.725Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40015 | Vyper is a Pythonic Smart Contract Language. For the following (probably non-exhaustive) list of expressions, the compiler evaluates the arguments from right to left instead of left to right. `unsafe_add, unsafe_sub, unsafe_mul, unsafe_div, pow_mod256, |, &, ^ (bitwise operators), bitwise_or (deprecated), bitwise_and (deprecated), bitwise_xor (deprecated), raw_call, <, >, <=, >=, ==, !=, in, not in (when lhs and rhs are enums)`. This behaviour becomes a problem when the evaluation of one of the arguments produces side effects that other arguments depend on. The following expressions can produce side-effect: state modifying external call , state modifying internal call, `raw_call`, `pop()` when used on a Dynamic Array stored in the storage, `create_minimal_proxy_to`, `create_copy_of`, `create_from_blueprint`. This issue has not yet been patched. Users are advised to make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects. | https://github.com/vyperlang/vyper/security/advisories/GHSA-g2xh-c426-v8mf | 2023-08-08T13:46:25.241Z | 2023-09-04T17:39:12.822Z | 2023-09-04T17:39:12.822Z | {'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '<= 0.3.9'} |
CVE-2023-40150 |
Softneta MedDream PACS does not perform an authentication check and performs some dangerous functionality, which could result in unauthenticated remote code execution.0 | https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-248-01 | 2023-08-18T16:28:34.426Z | 2023-09-11T19:05:00.754Z | 2023-09-11T19:09:00.487Z | {'Vendor': 'Softneta', 'Product': 'MedDream PACS', 'Versions': '0'} |
CVE-2023-40629 | SQLi vulnerability in LMS Lite component for Joomla. | https://extensions.joomla.org/extension/lms-lite/ | 2023-08-17T19:37:15.600Z | 2023-12-14T08:52:00.533Z | 2023-12-14T08:52:00.533Z | {'Vendor': 'king-products.net', 'Product': 'LMS Lite component for Joomla', 'Versions': '1.0.0-3.3.0.1'} |
CVE-2023-40296 | async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in ReceiveFrom and Receive in udpsocket.hpp when processing malformed UDP packets. | https://github.com/eminfedar/async-sockets-cpp/issues/32 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40453 | Docker Machine through 0.16.2 allows an attacker, who has control of a worker node, to provide crafted version data, which might potentially trick an administrator into performing an unsafe action (via escape sequence injection), or might have a data size that causes a denial of service to a bastion node. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://vin01.github.io/piptagole/docker/security/gitlab/docker-machine/2023/07/07/docker-machine-attack-surface.html | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40900 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/formSetQosBand/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:02:32.598868 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40845 | Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function 'sub_34FD0.' In the function, it reads user provided parameters and passes variables to the function without any length checks. | https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/14/14.md | 2023-08-22T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T16:34:37.067472 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40957 | A SQL injection vulnerability in Didotech srl Engineering & Lifecycle Management (aka pdm) v.14.0, v.15.0 and v.16.0 fixed in pdm-14.0.1.0.0, pdm-15.0.1.0.0, and pdm-16.0.1.0.0 allows a remote authenticated attacker to execute arbitrary code via the request parameter in models/base_client.py component. | https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/3 | 2023-08-22T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T23:58:06.618233 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40404 | A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sonoma 14.1. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213984 | 2023-08-14T20:26:36.255Z | 2023-10-25T18:32:05.873Z | 2023-10-25T18:32:05.873Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40054 | The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226 | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40054 | 2023-08-08T23:22:08.618Z | 2023-11-09T15:05:53.355Z | 2023-11-09T15:05:53.355Z | {'Vendor': 'SolarWinds ', 'Product': 'Network Configuration Manager', 'Versions': '2023.4 and previous versions'} |
CVE-2023-40541 | This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14. A shortcut may output sensitive user data without consent. | https://support.apple.com/en-us/HT213940 | 2023-09-14T19:03:36.098Z | 2023-09-26T20:14:48.631Z | 2023-09-26T20:14:48.631Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40812 | OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Group Name Field. | https://www.esecforte.com/cve-2023-40812-html-injection-accounts-group/ | 2023-08-22T00:00:00 | 2023-11-18T00:00:00 | 2023-11-18T03:12:07.879380 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40238 | A LogoFAIL issue was discovered in BmpDecoderDxe in Insyde InsydeH2O with kernel 5.2 before 05.28.47, 5.3 before 05.37.47, 5.4 before 05.45.47, 5.5 before 05.53.47, and 5.6 before 05.60.47 for certain Lenovo devices. Image parsing of crafted BMP logo files can copy data to a specific address during the DXE phase of UEFI execution. This occurs because of an integer signedness error involving PixelHeight and PixelWidth during RLE4/RLE8 compression. | https://www.insyde.com/security-pledge | 2023-08-11T00:00:00 | 2023-12-07T00:00:00 | 2024-01-05T18:06:30.856405 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40668 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd plugin <= 2.16.0 versions. | https://patchstack.com/database/vulnerability/save-as-pdf-by-pdfcrowd/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-2-16-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-18T13:36:33.312Z | 2023-09-27T06:31:06.054Z | 2023-09-27T06:31:06.054Z | {'Vendor': 'Pdfcrowd', 'Product': 'Save as PDF plugin by Pdfcrowd', 'Versions': 'n/a'} |
CVE-2023-40392 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.5. An app may be able to read sensitive location information. | https://support.apple.com/en-us/HT213843 | 2023-08-14T20:26:36.253Z | 2023-09-06T20:48:08.684Z | 2023-09-06T20:48:08.684Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40687 | IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted RUNSTATS command on an 8TB table. IBM X-Force ID: 264809. | https://www.ibm.com/support/pages/node/7087149 | 2023-08-18T15:48:06.502Z | 2023-12-04T01:10:23.988Z | 2023-12-04T01:10:23.988Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1, 11.5'} |
CVE-2023-40166 | Notepad++ is a free and open-source source code editor. Versions 8.5.6 and prior are vulnerable to heap buffer read overflow in `FileManager::detectLanguageFromTextBegining `. The exploitability of this issue is not clear. Potentially, it may be used to leak internal memory allocation information. As of time of publication, no known patches are available in existing versions of Notepad++. | https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/ | 2023-08-09T15:26:41.050Z | 2023-08-25T20:20:20.390Z | 2023-08-25T20:20:20.390Z | {'Vendor': 'notepad-plus-plus', 'Product': 'notepad-plus-plus', 'Versions': '<= 8.5.6'} |
CVE-2023-40023 | yaklang is a programming language designed for cybersecurity. The Yak Engine has been found to contain a local file inclusion (LFI) vulnerability. This vulnerability allows attackers to include files from the server's local file system through the web application. When exploited, this can lead to the unintended exposure of sensitive data, potential remote code execution, or other security breaches. Users utilizing versions of the Yak Engine prior to 1.2.4-sp1 are impacted. This vulnerability has been patched in version 1.2.4-sp1. Users are advised to upgrade. users unable to upgrade may avoid exposing vulnerable versions to untrusted input and to closely monitor any unexpected server behavior until they can upgrade. | https://github.com/yaklang/yaklang/security/advisories/GHSA-xvhg-w6qc-m3qq | 2023-08-08T13:46:25.243Z | 2023-08-14T19:59:44.679Z | 2023-08-14T19:59:44.679Z | {'Vendor': 'yaklang', 'Product': 'yaklang', 'Versions': '< 1.2.4-sp1'} |
CVE-2023-40920 | Prixan prixanconnect up to v1.62 was discovered to contain a SQL injection vulnerability via the component CartsGuruCatalogModuleFrontController::importProducts(). | https://security.friendsofpresta.org/modules/2023/10/05/prixanconnect.html | 2023-08-22T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T19:22:20.087683 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40218 | An issue was discovered in the NPU kernel driver in Samsung Exynos Mobile Processor 9820, 980, 2100, 2200, 1280, and 1380. An integer overflow can bypass detection of error cases via a crafted application. | https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | 2023-08-10T00:00:00 | 2023-09-12T00:00:00 | 2023-09-12T14:35:37.692271 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40648 | In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.634Z | 2023-10-08T03:36:03.195Z | 2023-10-08T03:36:03.195Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A', 'Versions': 'Android11/Android12'} |
CVE-2023-40561 | Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Enhanced Ecommerce Google Analytics for WooCommerce plugin <= 3.7.1 versions. | https://patchstack.com/database/vulnerability/woo-ecommerce-tracking-for-google-and-facebook/wordpress-enhanced-ecommerce-google-analytics-for-woocommerce-plugin-3-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-16T11:15:05.045Z | 2023-10-04T13:55:25.415Z | 2023-10-04T13:55:25.415Z | {'Vendor': 'theDotstore', 'Product': 'Enhanced Ecommerce Google Analytics for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-40131 | In GpuService of GpuService.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/native/+/0cda11569dd256ff3220b4fe44f861f8081d7116 | 2023-08-09T02:29:33.869Z | 2023-10-27T20:22:58.077Z | 2023-10-27T20:22:58.077Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'} |
CVE-2023-40998 | Buffer Overflow vulnerability in O-RAN Software Community ric-plt-lib-rmr v.4.9.0 allows a remote attacker to cause a denial of service via the packet size component. | https://jira.o-ran-sc.org/browse/RIC-989 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-12-14T07:53:44.959975 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40424 | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access user-sensitive data. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.259Z | 2023-09-26T20:14:50.127Z | 2023-09-26T20:14:50.127Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40074 | In saveToXml of PersistableBundle.java, invalid data could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/40e4ea759743737958dde018f3606d778f7a53f3 | 2023-08-09T02:29:29.266Z | 2023-12-04T22:40:50.334Z | 2023-12-22T00:16:44.452Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40127 | In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/providers/MediaProvider/+/747431250612507e8289ae8eb1a56303e79ab678 | 2023-08-09T02:29:33.869Z | 2023-10-27T20:22:57.293Z | 2023-10-27T20:22:57.293Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40577 | Alertmanager handles alerts sent by client applications such as the Prometheus server. An attacker with the permission to perform POST requests on the /api/v1/alerts endpoint could be able to execute arbitrary JavaScript code on the users of Prometheus Alertmanager. This issue has been fixed in Alertmanager version 0.2.51. | https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j | 2023-08-16T18:24:02.390Z | 2023-08-25T00:12:13.045Z | 2023-08-25T00:12:13.045Z | {'Vendor': 'prometheus', 'Product': 'alertmanager', 'Versions': '<= 0.25.0'} |
CVE-2023-40062 | SolarWinds Platform Incomplete List of Disallowed Inputs Remote Code Execution Vulnerability. If executed, this vulnerability would allow a low-privileged user to execute commands with SYSTEM privileges. | https://documentation.solarwinds.com/en/success_center/hco/content/release_notes/hco_2023-4_release_notes.htm | 2023-08-08T23:22:08.619Z | 2023-11-01T15:29:56.898Z | 2023-11-01T15:29:56.898Z | {'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.3.1 and previous versions '} |
CVE-2023-40598 | In Splunk Enterprise versions below 8.2.12, 9.0.6, and 9.1.1, an attacker can create an external lookup that calls a legacy internal function. The attacker can use this internal function to insert code into the Splunk platform installation directory. From there, a user can execute arbitrary code on the Splunk platform Instance. | https://advisory.splunk.com/advisories/SVD-2023-0807 | 2023-08-16T22:07:52.838Z | 2023-08-30T16:19:28.135Z | 2024-01-24T18:29:24.727Z | {'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'} |
CVE-2023-40432 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.260Z | 2023-09-26T20:14:51.119Z | 2023-09-26T20:14:51.119Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40609 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aiyaz, maheshpatel Contact form 7 Custom validation allows SQL Injection.This issue affects Contact form 7 Custom validation: from n/a through 1.1.3.
| https://patchstack.com/database/vulnerability/cf7-field-validation/wordpress-contact-form-7-custom-validation-plugin-1-1-3-unauth-sql-injection-vulnerability?_s_id=cve | 2023-08-17T10:47:42.478Z | 2023-11-06T08:15:24.225Z | 2023-11-06T08:15:24.225Z | {'Vendor': 'Aiyaz, maheshpatel', 'Product': 'Contact form 7 Custom validation', 'Versions': 'n/a'} |
CVE-2023-40520 | The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to access edited photos saved to a temporary directory. | https://support.apple.com/en-us/HT213938 | 2023-08-14T21:26:18.710Z | 2023-09-26T20:14:51.609Z | 2023-09-26T20:14:51.609Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40170 | jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit `87a49272728` which has been included in release `2.7.2`. Users are advised to upgrade. Users unable to upgrade may use the lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks. | https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-64x5-55rw-9974 | 2023-08-09T15:26:41.051Z | 2023-08-28T20:01:57.156Z | 2023-08-28T20:01:57.156Z | {'Vendor': 'jupyter-server', 'Product': 'jupyter_server', 'Versions': '< 2.7.2'} |
CVE-2023-40936 | null | null | 2023-08-22T00:00:00 | null | 2023-09-05T03:57:14.788215 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-40465 |
Several versions of
ALEOS, including ALEOS 4.16.0, include an opensource
third-party
component which can be exploited from the local
area network,
resulting in a Denial of Service condition for the captive portal.
| https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs | 2023-08-14T20:59:20.798Z | 2023-12-04T23:02:04.103Z | 2023-12-04T23:02:04.103Z | {'Vendor': 'SierraWireless', 'Product': 'ALEOS', 'Versions': '4.10, 0'} |
CVE-2023-40035 | Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the validatePath function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution). This issue has been patched in version 4.4.15 and version 3.8.15.
| https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw | 2023-08-08T13:46:25.245Z | 2023-08-23T20:05:57.455Z | 2023-08-23T20:05:57.455Z | {'Vendor': 'craftcms', 'Product': 'cms', 'Versions': '>= 4.0.0-RC1, < 4.4.15, >= 3.0.0, < 3.8.15'} |
CVE-2023-40388 | A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. Safari may save photos to an unprotected location. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.252Z | 2023-09-26T20:14:52.089Z | 2023-09-26T20:14:52.089Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40367 | IBM QRadar SIEM 7.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 263376. | https://www.ibm.com/support/pages/node/7049133 | 2023-08-14T20:12:04.114Z | 2023-10-14T16:46:07.154Z | 2023-10-14T16:46:07.154Z | {'Vendor': 'IBM', 'Product': 'QRadar SIEM', 'Versions': '7.5.0'} |
CVE-2023-40625 | S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.
| https://me.sap.com/notes/3326361 | 2023-08-17T18:10:44.968Z | 2023-09-12T02:00:13.727Z | 2023-09-12T02:00:13.727Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Manage Purchase Contracts App', 'Versions': 'S4CORE 102, S4CORE 103, S4CORE 104, S4CORE 105, S4CORE 106, S4CORE 107'} |
CVE-2023-40760 | User enumeration is found in PHP Jabbers Hotel Booking System v4.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users. | https://www.phpjabbers.com/hotel-booking-system/ | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T12:49:36.964254 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40330 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Milan Petrovic GD Security Headers plugin <= 1.6.1 versions. | https://patchstack.com/database/vulnerability/gd-security-headers/wordpress-gd-security-headers-plugin-1-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-14T14:47:15.113Z | 2023-09-27T05:35:16.564Z | 2023-09-27T05:35:16.564Z | {'Vendor': 'Milan Petrovic', 'Product': 'GD Security Headers', 'Versions': 'n/a'} |
CVE-2023-40019 | FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.10, FreeSWITCH allows authorized users to cause a denial of service attack by sending re-INVITE with SDP containing duplicate codec names. When a call in FreeSWITCH completes codec negotiation, the `codec_string` channel variable is set with the result of the negotiation. On a subsequent re-negotiation, if an SDP is offered that contains codecs with the same names but with different formats, there may be too many codec matches detected by FreeSWITCH leading to overflows of its internal arrays. By abusing this vulnerability, an attacker is able to corrupt stack of FreeSWITCH leading to an undefined behavior of the system or simply crash it. Version 1.10.10 contains a patch for this issue. | https://github.com/signalwire/freeswitch/security/advisories/GHSA-gjj5-79p2-9g3q | 2023-08-08T13:46:25.242Z | 2023-09-15T19:34:32.429Z | 2023-09-15T19:34:32.429Z | {'Vendor': 'signalwire', 'Product': 'freeswitch', 'Versions': '< 1.10.10'} |
CVE-2023-40449 | The issue was addressed with improved memory handling. This issue is fixed in iOS 17.1 and iPadOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to cause a denial-of-service. | https://support.apple.com/en-us/HT213981 | 2023-08-14T20:26:36.267Z | 2023-10-25T18:32:07.197Z | 2023-10-25T18:32:07.197Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40799 | Tenda AC23 Vv16.03.07.45_cn is vulnerable to Buffer Overflow via sub_450A4C function. | https://github.com/lst-oss/Vulnerability/blob/main/Tenda/AC23/sub_450A4C | 2023-08-22T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T15:04:23.243944 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40633 | In phasecheckserver, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.631Z | 2023-10-08T03:35:58.412Z | 2023-10-08T03:35:58.412Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'} |
CVE-2023-40664 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao Donations Made Easy – Smart Donations plugin <= 4.0.12 versions. | https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-18T13:36:33.311Z | 2023-09-27T05:50:09.514Z | 2023-09-27T05:50:09.514Z | {'Vendor': 'RedNao', 'Product': 'Donations Made Easy – Smart Donations', 'Versions': 'n/a'} |
CVE-2023-40371 | IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non-privileged local user to access files outside of those allowed due to improper access controls. IBM X-Force ID: 263476. | https://www.ibm.com/support/pages/node/7028420 | 2023-08-14T20:12:04.115Z | 2023-08-24T13:00:56.021Z | 2023-08-24T13:00:56.021Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-40058 | Sensitive data was added to our public-facing knowledgebase that, if exploited, could be used to access components of Access Rights Manager (ARM) if the threat actor is in the same environment.
| https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40058 | 2023-08-08T23:22:08.618Z | 2023-12-21T16:14:48.077Z | 2024-01-04T13:33:57.792Z | {'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'} |
CVE-2023-40408 | An inconsistent user interface issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Hide My Email may be deactivated unexpectedly. | https://support.apple.com/en-us/HT213981 | 2023-08-14T20:26:36.255Z | 2023-10-25T18:32:09.663Z | 2023-10-25T18:32:09.663Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40395 | The issue was addressed with improved handling of caches. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access contacts. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.253Z | 2023-09-26T20:14:53.746Z | 2023-09-26T20:14:53.746Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40680 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Team Yoast Yoast SEO allows Stored XSS.This issue affects Yoast SEO: from n/a through 21.0.
| https://patchstack.com/database/vulnerability/wordpress-seo/wordpress-yoast-seo-plugin-21-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-18T15:18:28.338Z | 2023-11-30T12:21:54.791Z | 2023-11-30T12:21:54.791Z | {'Vendor': 'Team Yoast', 'Product': 'Yoast SEO', 'Versions': 'n/a'} |
CVE-2023-40403 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may disclose sensitive information. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.254Z | 2023-09-26T20:14:54.697Z | 2023-09-26T20:14:54.697Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40053 | A vulnerability has been identified within Serv-U 15.4 that allows an authenticated actor to insert content on the file share function feature of Serv-U, which could be used maliciously. | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40053 | 2023-08-08T23:22:08.618Z | 2023-12-06T03:23:59.651Z | 2023-12-28T17:06:54.418Z | {'Vendor': 'SolarWinds', 'Product': 'Serv-U', 'Versions': '15.4 and previous versions'} |
CVE-2023-40815 | OpenCRX version 5.2.0 is vulnerable to HTML injection via the Category Creation Name Field. | https://www.esecforte.com/cve-2023-40815-html-injection-category/ | 2023-08-22T00:00:00 | 2023-11-18T00:00:00 | 2023-11-18T03:12:11.277691 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40116 | In onTaskAppeared of PipTaskOrganizer.java, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/18c3b194642f3949d09e48c21da5658fa04994c8 | 2023-08-09T02:29:31.890Z | 2023-10-27T20:22:56.201Z | 2023-10-27T20:22:56.201Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '12L, 12, 11'} |
CVE-2023-40638 | In Telecom service, there is a possible missing permission check. This could lead to local denial of service with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.631Z | 2023-10-08T03:35:59.919Z | 2023-10-08T03:35:59.919Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'T760/T770/T820/S8000', 'Versions': 'Android11'} |
CVE-2023-40454 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to delete files for which it does not have permission. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:43:13.546Z | 2023-09-26T20:14:55.171Z | 2023-09-26T20:14:55.171Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40141 | In temp_residency_name_store of thermal_metrics.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-08-09T02:29:36.076Z | 2023-10-11T19:26:45.729Z | 2023-10-11T19:26:45.729Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-40842 | Tengda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "R7WebsSecurityHandler." | https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/4/4.md | 2023-08-22T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T16:30:35.082841 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40784 | DedeCMS 5.7.102 has a File Upload vulnerability via uploads/dede/module_make.php. | https://www.cnblogs.com/SFYHAC/articles/17619123.html | 2023-08-22T00:00:00 | 2023-09-12T00:00:00 | 2023-09-12T14:53:40.052478 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40291 | Harman Infotainment 20190525031613 allows root access via SSH over a USB-to-Ethernet dongle with a password that is an internal project name. | https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/ | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40442 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8. An app may be able to read sensitive location information. | https://support.apple.com/en-us/HT213842 | 2023-08-14T20:26:36.261Z | 2023-09-11T23:29:27.492Z | 2023-09-21T18:23:50.586Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40012 | uthenticode is a small cross-platform library for partially verifying Authenticode digital signatures. Versions of uthenticode prior to the 2.x series did not check Extended Key Usages in certificates, in violation of the Authenticode X.509 certificate profile. As a result, a malicious user could produce a "signed" PE file that uthenticode would verify and consider valid using an X.509 certificate that isn't entitled to produce code signatures (e.g., a SSL certificate). By design, uthenticode does not perform full-chain validation. However, the absence of EKU validation was an unintended oversight. The 2.0.0 release series includes EKU checks. There are no workarounds to this vulnerability. | https://github.com/trailofbits/uthenticode/security/advisories/GHSA-gm2f-j4rj-6xqj | 2023-08-08T13:46:25.241Z | 2023-08-09T15:33:54.406Z | 2023-08-09T15:33:54.406Z | {'Vendor': 'trailofbits', 'Product': 'uthenticode', 'Versions': '< 2.0.0'} |
CVE-2023-40383 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. An app may be able to access user-sensitive data. | https://support.apple.com/en-us/HT213670 | 2023-08-14T20:26:36.252Z | 2024-01-10T22:03:41.602Z | 2024-01-10T22:03:41.602Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40946 | Schoolmate 1.3 is vulnerable to SQL Injection in the variable $username from SESSION in ValidateLogin.php. | https://github.com/KLSEHB/vulnerability-report/blob/main/Schoolmate_CVE-2023-40946 | 2023-08-22T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T19:25:39.783652 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40045 |
In WS_FTP Server versions prior to 8.7.4 and 8.8.2,
a reflected cross-site scripting (XSS) vulnerability exists in WS_FTP Server's Ad Hoc Transfer module. An attacker could leverage this vulnerability to target WS_FTP Server users with a specialized payload which results in the execution of malicious JavaScript within the context of the victims browser.
| https://www.progress.com/ws_ftp | 2023-08-08T19:44:41.112Z | 2023-09-27T14:49:45.334Z | 2023-09-27T15:21:31.211Z | {'Vendor': 'Progress Software Corporation', 'Product': 'WS_FTP Server', 'Versions': '8.8.0, 8.7.0'} |
CVE-2023-40602 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Doofinder Doofinder WP & WooCommerce Search.This issue affects Doofinder WP & WooCommerce Search: from n/a through 1.5.49.
| https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-for-woocommerce-plugin-1-5-49-open-redirection-vulnerability?_s_id=cve | 2023-08-17T10:47:42.477Z | 2023-12-19T19:54:43.220Z | 2023-12-19T19:54:43.220Z | {'Vendor': 'Doofinder', 'Product': 'Doofinder WP & WooCommerce Search', 'Versions': 'n/a'} |
CVE-2023-40252 | Improper Control of Generation of Code ('Code Injection') vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Replace Trusted Executable.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.
| https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html | 2023-08-11T01:54:13.646Z | 2023-08-17T06:41:53.096Z | 2023-08-29T01:51:40.680Z | {'Vendor': 'Genians', 'Product': 'Genian NAC V4.0', 'Versions': 'V4.0.0'} |
CVE-2023-40897 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter mac at /goform/GetParentControlInfo. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/GetParentControlInfo/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:08:26.962066 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40194 | An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to mistreatment of whitespace characters. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833 | 2023-08-15T19:59:27.595Z | 2023-11-27T15:25:11.538Z | 2023-11-27T18:00:06.062Z | {'Vendor': 'Foxit', 'Product': 'Foxit Reader', 'Versions': '12.1.3.15356'} |
CVE-2023-40340 | Jenkins NodeJS Plugin 1.6.0 and earlier does not properly mask (i.e., replace with asterisks) credentials specified in the Npm config file in Pipeline build logs. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3196 | 2023-08-14T16:02:56.435Z | 2023-08-16T14:32:51.990Z | 2023-10-24T12:51:24.023Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins NodeJS Plugin', 'Versions': '0'} |
CVE-2023-40710 | An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-02 | 2023-08-18T19:31:53.418Z | 2023-08-24T16:09:25.235Z | 2023-08-24T16:09:25.235Z | {'Vendor': 'OPTO 22', 'Product': 'SNAP PAC S1', 'Versions': 'R10.3b'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.