CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-45166
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the piodmgrsu command to obtain elevated privileges. IBM X-Force ID: 267964.
https://www.ibm.com/support/pages/node/7095022
2023-10-05T01:38:44.721Z
2023-12-13T23:01:25.905Z
2023-12-13T23:01:25.905Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45189
A vulnerability in IBM Robotic Process Automation and IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.10, 23.0.0 through 23.0.10 may result in access to client vault credentials. This difficult to exploit vulnerability could allow a low privileged attacker to programmatically access client vault credentials. IBM X-Force ID: 268752.
https://www.ibm.com/support/pages/node/7065204
2023-10-05T01:39:10.397Z
2023-11-03T22:51:45.475Z
2023-11-03T22:51:45.475Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
CVE-2023-45998
kodbox 1.44 is vulnerable to Cross Site Scripting (XSS). Customizing global HTML results in storing XSS.
https://gist.github.com/fangjiuye/703fdb643db558640f23e4e7c9532348
2023-10-16T00:00:00
2023-10-23T00:00:00
2023-10-23T21:33:38.353451
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45832
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Martin Gibson WP GoToWebinar plugin <= 14.45 versions.
https://patchstack.com/database/vulnerability/wp-gotowebinar/wordpress-wp-gotowebinar-plugin-14-45-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-13T13:20:17.575Z
2023-10-24T12:12:07.040Z
2023-10-24T12:12:07.040Z
{'Vendor': 'Martin Gibson', 'Product': 'WP GoToWebinar', 'Versions': 'n/a'}
CVE-2023-45561
An issue in A-WORLD OIRASE BEER_waiting Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
http://a-world.com
2023-10-09T00:00:00
2024-01-02T00:00:00
2024-01-02T20:44:56.562694
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45131
Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6
2023-10-04T16:02:46.328Z
2023-10-16T21:24:10.688Z
2023-10-16T21:24:10.688Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': ' stable < 3.1.2, beta < 3.2.0.beta2'}
CVE-2023-45074
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Page Visit Counter Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress allows SQL Injection.This issue affects Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress: from n/a through 7.1.1.
https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-7-1-1-sql-injection-vulnerability?_s_id=cve
2023-10-03T13:31:21.244Z
2023-11-06T08:35:02.853Z
2023-11-06T08:35:02.853Z
{'Vendor': 'Page Visit Counter', 'Product': 'Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-45648
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp
2023-10-10T11:31:15.664Z
2023-10-10T18:38:34.097Z
2023-10-10T18:38:34.097Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M1, 10.1.0-M1, 9.0.0-M1, 8.5.0'}
CVE-2023-45127
null
null
2023-10-04T14:28:12.265Z
2023-12-21T18:55:19.200Z
2024-01-02T14:10:06.986Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45577
Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wanid parameter of the H5/speedlimit.data function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug9.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-18T18:53:01.094984
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45062
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Thomas Scholl canvasio3D Light plugin <= 2.4.6 versions.
https://patchstack.com/database/vulnerability/canvasio3d-light/wordpress-canvasio3d-light-plugin-2-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:31:00.205Z
2023-10-18T08:39:59.040Z
2023-10-18T08:39:59.040Z
{'Vendor': 'Thomas Scholl', 'Product': 'canvasio3D Light', 'Versions': 'n/a'}
CVE-2023-45170
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the piobe command to escalate privileges or cause a denial of service. IBM X-Force ID: 267968.
https://www.ibm.com/support/pages/node/7095022
2023-10-05T01:38:44.722Z
2023-12-13T23:05:51.491Z
2023-12-13T23:05:51.491Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45465
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ddnsDomainName parameter in the Dynamic DNS settings.
https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T12:45:42.389358
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45609
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in POWR.Io Contact Form – Custom Builder, Payment Form, and More allows Stored XSS.This issue affects Contact Form – Custom Builder, Payment Form, and More: from n/a through 2.1.0.
https://patchstack.com/database/vulnerability/powr-pack/wordpress-powr-pack-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-09T10:11:54.308Z
2023-11-30T15:52:28.192Z
2023-11-30T15:52:28.192Z
{'Vendor': 'POWR.io', 'Product': 'Contact Form – Custom Builder, Payment Form, and More', 'Versions': 'n/a'}
CVE-2023-45384
KnowBand supercheckout > 5.0.7 and < 6.0.7 is vulnerable to Unrestricted Upload of File with Dangerous Type. In the module "Module One Page Checkout, Social Login & Mailchimp" (supercheckout), a guest can upload files with extensions .php
https://addons.prestashop.com/fr/processus-rapide-commande/18016-one-page-checkout-social-login-mailchimp.html
2023-10-09T00:00:00
2023-10-19T00:00:00
2023-10-19T12:20:15.187969
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45042
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
https://www.qnap.com/en/security-advisory/qsa-23-27
2023-10-03T08:58:16.880Z
2024-01-05T16:18:51.368Z
2024-01-05T16:18:51.368Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'}
CVE-2023-45107
Cross-Site Request Forgery (CSRF) vulnerability in GoodBarber plugin <= 1.0.22 versions.
https://patchstack.com/database/vulnerability/goodbarber/wordpress-goodbarber-plugin-1-0-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-04T14:11:49.848Z
2023-10-13T12:00:17.567Z
2023-10-13T12:00:17.567Z
{'Vendor': 'GoodBarber', 'Product': 'GoodBarber', 'Versions': 'n/a'}
CVE-2023-45804
null
null
2023-10-13T12:00:50.436Z
null
2023-10-30T22:11:53.424Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45279
Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display.
https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7
2023-10-06T00:00:00
2023-10-19T00:00:00
2023-10-19T21:47:14.646021
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45629
Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 versions.
https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T07:47:54.381Z
2023-10-16T08:31:46.081Z
2023-10-16T08:31:46.081Z
{'Vendor': 'wpdevart', 'Product': 'Gallery – Image and Video Gallery with Thumbnails', 'Versions': 'n/a'}
CVE-2023-45015
Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'date' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/oconnor
2023-10-02T16:00:40.527Z
2023-11-02T02:14:36.079Z
2023-11-02T02:14:36.079Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Bus Booking System', 'Versions': '1.0'}
CVE-2023-45853
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
https://github.com/madler/zlib/pull/843
2023-10-14T00:00:00
2023-10-14T00:00:00
2024-01-24T21:06:19.795482
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45150
Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452
2023-10-04T16:02:46.331Z
2023-10-16T19:06:03.674Z
2023-10-16T19:06:03.674Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 1.0.0, < 4.4.4'}
CVE-2023-45280
Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript.
https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7
2023-10-06T00:00:00
2023-10-19T00:00:00
2023-10-19T21:50:38.661811
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45003
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins Social Feed | Custom Feed for Social Media Networks plugin <= 2.2.0 versions.
https://patchstack.com/database/vulnerability/wp-social-feed/wordpress-social-feed-plugin-2-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-02T10:33:37.984Z
2023-10-17T10:59:23.366Z
2023-10-17T10:59:23.366Z
{'Vendor': 'Arrow Plugins', 'Product': 'Social Feed | Custom Feed for Social Media Networks', 'Versions': 'n/a'}
CVE-2023-45146
XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the Netty framework and the Hessian serialization mechanism. When such a configuration is used, attackers may be able to connect to the server and provide malicious serialized objects that, once deserialized, force it to execute arbitrary code. This can be abused to take control of the machine the server is running by way of remote code execution. This issue has not been fixed.
https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/
2023-10-04T16:02:46.330Z
2023-10-18T21:56:55.614Z
2023-10-18T21:56:55.614Z
{'Vendor': 'xuexueli', 'Product': 'xxl-rpc', 'Versions': '<= 1.7.0'}
CVE-2023-45687
A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing
https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
2023-10-10T19:07:28.771Z
2023-10-16T16:12:31.582Z
2023-10-16T16:12:31.582Z
{'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'}
CVE-2023-45054
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in AWESOME TOGI Product Category Tree plugin <= 2.5 versions.
https://patchstack.com/database/vulnerability/product-category-tree/wordpress-product-category-tree-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:30:39.403Z
2023-10-18T08:09:01.223Z
2023-10-18T08:09:01.223Z
{'Vendor': 'AWESOME TOGI', 'Product': 'Product Category Tree', 'Versions': 'n/a'}
CVE-2023-45957
A stored cross-site scripting (XSS) vulnerability in the component admin/AdminRequestSqlController.php of thirty bees before 1.5.0 allows attackers to execute arbitrary web script or HTML via $e->getMessage() error mishandling.
https://zigrin.com/advisories/thirty-bees-stored-cross-site-scripting-xss/
2023-10-16T00:00:00
2023-12-22T00:00:00
2023-12-22T15:40:15.554520
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45812
The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when a multi-part response is sent. When users send queries to the router that uses the `@defer` or Subscriptions, the Router will panic. To be vulnerable, users of Router must have a coprocessor with `coprocessor.supergraph.response` configured in their `router.yaml` and also to support either `@defer` or Subscriptions. Apollo Router version 1.33.0 has a fix for this vulnerability which was introduced in PR #4014. Users are advised to upgrade. Users unable to upgrade should avoid using the coprocessor supergraph response or disable defer and subscriptions support and continue to use the coprocessor supergraph response.
https://github.com/apollographql/router/security/advisories/GHSA-r344-xw3p-2frj
2023-10-13T12:00:50.437Z
2023-10-18T21:29:32.731Z
2023-10-18T21:29:32.731Z
{'Vendor': 'apollographql', 'Product': 'router', 'Versions': '>= 1.31.0, < 1.33.0'}
CVE-2023-45111
Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/pires
2023-10-04T14:28:12.263Z
2023-11-02T01:42:20.337Z
2023-11-02T01:42:20.337Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'}
CVE-2023-45756
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline – Application Form Builder and Manager plugin <= 2.5.2 versions.
https://patchstack.com/database/vulnerability/apply-online/wordpress-applyonline-application-form-builder-and-manager-plugin-2-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-12T08:27:55.559Z
2023-10-24T11:40:50.202Z
2023-10-24T11:40:50.202Z
{'Vendor': 'Spider Teams', 'Product': 'ApplyOnline – Application Form Builder and Manager', 'Versions': 'n/a'}
CVE-2023-45243
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
https://security-advisory.acronis.com/advisories/SEC-6019
2023-10-05T21:47:00.379Z
2023-10-05T21:57:49.413Z
2023-10-05T21:57:49.413Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-45613
In JetBrains Ktor before 2.3.5 server certificates were not verified
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-10-09T10:14:58.487Z
2023-10-09T10:20:54.104Z
2023-10-09T10:20:54.104Z
{'Vendor': 'JetBrains', 'Product': 'Ktor', 'Versions': '0'}
CVE-2023-45869
ILIAS 7.25 (2023-09-12) allows any authenticated user to execute arbitrary operating system commands remotely, when a highly privileged account accesses an XSS payload. The injected commands are executed via the exec() function in the execQuoted() method of the ilUtil class (/Services/Utilities/classes/class.ilUtil.php) This allows attackers to inject malicious commands into the system, potentially compromising the integrity, confidentiality, and availability of the ILIAS installation and the underlying operating system.
https://rehmeinfosec.de/report/358ad5f6-f712-4f74-a5ee-476efc856cbc/
2023-10-14T00:00:00
2023-10-26T00:00:00
2023-10-26T14:59:23.403381
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45185
IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273.
https://www.ibm.com/support/pages/node/7091942
2023-10-05T01:39:10.397Z
2023-12-14T14:04:36.190Z
2023-12-14T14:04:36.190Z
{'Vendor': 'IBM', 'Product': 'i Access Client Solutions', 'Versions': '1.1.2, 1.1.4.3'}
CVE-2023-45886
The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute.
https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
2023-10-15T00:00:00
2023-11-21T00:00:00
2023-11-21T05:56:48.927497
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45701
HCL Launch could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108645
2023-10-10T21:26:06.755Z
2023-12-28T07:03:01.753Z
2023-12-28T07:03:01.753Z
{'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.0 - 7.0.5.18, 7.1 - 7.1.2.14, 7.2 - 7.2.3.7, 7.3 - 7.3.2.2'}
CVE-2023-45351
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.1, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.42.1, and 4000 Manager V10 R0 allow Authenticated Command Injection via AShbr. This is also known as OSFOURK-24039.
https://networks.unify.com/security/advisories/OBSO-2306-01.pdf
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T03:35:47.276246
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45644
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anurag Deshmukh CPT Shortcode Generator plugin <= 1.0 versions.
https://patchstack.com/database/vulnerability/cpt-shortcode/wordpress-cpt-shortcode-generator-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-10T09:58:47.168Z
2023-10-24T11:10:03.498Z
2023-10-24T11:10:03.498Z
{'Vendor': 'Anurag Deshmukh', 'Product': 'CPT Shortcode Generator', 'Versions': 'n/a'}
CVE-2023-45582
An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker to  perform a brute force attack on the affected endpoints via repeated login attempts.
https://fortiguard.com/psirt/FG-IR-23-287
2023-10-09T08:01:29.296Z
2023-11-14T18:05:34.247Z
2023-11-14T18:05:34.247Z
{'Vendor': 'Fortinet', 'Product': 'FortiMail', 'Versions': '7.4.0, 7.2.0, 7.0.0, 6.4.0, 6.2.0'}
CVE-2023-45078
A memory leakage vulnerability was reported in the DustFilterAlertSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-10-03T17:36:49.034Z
2023-11-08T22:30:49.077Z
2023-11-08T22:30:49.077Z
{'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'}
CVE-2023-45347
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_verified' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.768Z
2023-11-02T14:04:17.696Z
2023-11-02T14:04:17.696Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45202
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
https://fluidattacks.com/advisories/uchida
2023-10-05T13:51:36.875Z
2023-11-01T22:02:45.250Z
2023-11-01T22:12:29.348Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'}
CVE-2023-45740
Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:50.226Z
2023-12-26T07:20:42.853Z
2023-12-26T07:20:42.853Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v4.1.3'}
CVE-2023-45605
Cross-Site Request Forgery (CSRF) vulnerability in Christopher Finke Feed Statistics plugin <= 4.1 versions.
https://patchstack.com/database/vulnerability/wordpress-feed-statistics/wordpress-feed-statistics-plugin-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-09T10:11:54.307Z
2023-10-16T08:26:25.962Z
2023-10-16T08:26:25.962Z
{'Vendor': 'Christopher Finke', 'Product': 'Feed Statistics', 'Versions': 'n/a'}
CVE-2023-45039
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
https://www.qnap.com/en/security-advisory/qsa-23-27
2023-10-03T08:58:16.879Z
2024-01-05T16:18:37.227Z
2024-01-05T16:18:37.227Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QTS', 'Versions': '5.1.x'}
CVE-2023-45193
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used. IBM X-Force ID: 268759.
https://www.ibm.com/support/pages/node/7105501
2023-10-05T01:39:10.398Z
2024-01-22T19:02:09.851Z
2024-01-22T19:02:09.851Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'}
CVE-2023-45468
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the pingWdogIp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T12:45:45.174431
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45741
VR-S1000 firmware Ver. 2.37 and earlier allows an attacker with access to the product's web management page to execute arbitrary OS commands.
https://www.buffalo.jp/news/detail/20231225-01.html
2023-10-25T07:08:54.707Z
2023-12-26T07:28:42.765Z
2023-12-26T07:28:42.765Z
{'Vendor': 'BUFFALO INC.', 'Product': 'VR-S1000', 'Versions': 'firmware Ver. 2.37 and earlier'}
CVE-2023-45311
fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary.
https://github.com/fsevents/fsevents/compare/v1.2.10...v1.2.11
2023-10-06T00:00:00
2023-10-06T00:00:00
2023-11-28T07:03:17.341448
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45604
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Scott Reilly Get Custom Field Values plugin <= 4.0.1 versions.
https://patchstack.com/database/vulnerability/get-custom-field-values/wordpress-get-custom-field-values-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-09T10:11:54.307Z
2023-10-18T13:17:22.890Z
2023-10-18T13:17:22.890Z
{'Vendor': 'Scott Reilly', 'Product': 'Get Custom Field Values', 'Versions': 'n/a'}
CVE-2023-45829
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in HappyBox Newsletter & Bulk Email Sender – Email Newsletter Plugin for WordPress plugin <= 2.0.1 versions.
https://patchstack.com/database/vulnerability/newsletter-bulk-email/wordpress-newsletter-bulk-email-sender-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-13T13:20:17.574Z
2023-10-24T12:24:08.080Z
2023-10-24T12:24:08.080Z
{'Vendor': 'HappyBox', 'Product': 'Newsletter & Bulk Email Sender – Email Newsletter Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-45346
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_role' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.768Z
2023-11-02T14:03:34.706Z
2023-11-02T14:03:34.706Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45203
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
https://fluidattacks.com/advisories/uchida
2023-10-05T13:51:36.876Z
2023-11-01T22:11:49.439Z
2023-11-01T22:11:49.439Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'}
CVE-2023-45653
Cross-Site Request Forgery (CSRF) vulnerability in Galaxy Weblinks Video Playlist For YouTube plugin <= 6.0 versions.
https://patchstack.com/database/vulnerability/video-playlist-for-youtube/wordpress-video-playlist-for-youtube-plugin-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T12:38:22.832Z
2023-10-16T08:43:54.081Z
2023-10-16T08:43:54.081Z
{'Vendor': 'Galaxy Weblinks', 'Product': 'Video Playlist For YouTube', 'Versions': 'n/a'}
CVE-2023-45079
A memory leakage vulnerability was reported in the NvmramSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-10-03T17:36:49.034Z
2023-11-08T22:32:37.592Z
2023-11-08T22:32:37.592Z
{'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'}
CVE-2023-45700
HCL Launch is vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108644
2023-10-10T21:26:06.755Z
2023-12-21T00:10:11.246Z
2023-12-21T00:10:11.246Z
{'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.1 - 7.1.2.14, 7.2 - 7.2.3.7, 7.3 - 7.3.2.2'}
CVE-2023-45350
Atos Unify OpenScape 4000 Manager V10 R1 before V10 R1.42.1 and 4000 Manager V10 R0 allow Privilege escalation that may lead to the ability of an authenticated attacker to run arbitrary code via AScm. This is also known as OSFOURK-24034.
https://networks.unify.com/security/advisories/OBSO-2306-01.pdf
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T03:36:16.723508
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45645
Cross-Site Request Forgery (CSRF) vulnerability in InfoD74 WP Open Street Map plugin <= 1.25 versions.
https://patchstack.com/database/vulnerability/wp-open-street-map/wordpress-wp-open-street-map-plugin-1-25-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T09:58:47.168Z
2023-10-16T09:53:35.938Z
2023-10-16T09:53:35.938Z
{'Vendor': 'InfoD74', 'Product': 'WP Open Street Map', 'Versions': 'n/a'}
CVE-2023-45868
The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable.
https://rehmeinfosec.de
2023-10-14T00:00:00
2023-10-26T00:00:00
2023-10-26T14:59:16.826734
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45184
IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to obtain a decryption key due to improper authority checks. IBM X-Force ID: 268270.
https://www.ibm.com/support/pages/node/7091942
2023-10-05T01:39:10.396Z
2023-12-14T01:42:01.018Z
2023-12-14T01:42:01.018Z
{'Vendor': 'IBM', 'Product': 'i Access Client Solutions', 'Versions': '1.1.2, 1.1.4.3'}
CVE-2023-45887
DS Wireless Communication (DWC) with DWC_VERSION_3 and DWC_VERSION_11 allows remote attackers to execute arbitrary code on a game-playing client's machine via a modified GPCM message.
https://github.com/MikeIsAStar/DS-Wireless-Communication-Remote-Code-Execution
2023-10-15T00:00:00
2023-12-19T00:00:00
2023-12-19T23:14:53.821923
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45757
Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page. An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page. Solution (choose one of three): 1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2411 3. disable rpcz feature
https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4
2023-10-12T09:28:16.458Z
2023-10-16T08:01:41.036Z
2023-10-16T08:01:41.036Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache bRPC', 'Versions': '0.9.0'}
CVE-2023-45242
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
https://security-advisory.acronis.com/advisories/SEC-6018
2023-10-05T21:47:00.378Z
2023-10-05T21:57:35.406Z
2023-10-05T21:57:35.406Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-45612
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-10-09T10:14:58.150Z
2023-10-09T10:20:53.533Z
2023-10-09T10:20:53.533Z
{'Vendor': 'JetBrains', 'Product': 'Ktor', 'Versions': '0'}
CVE-2023-45055
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in InspireUI MStore API allows SQL Injection.This issue affects MStore API: from n/a through 4.0.6.
https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-4-0-6-sql-injection-vulnerability?_s_id=cve
2023-10-03T13:31:00.204Z
2023-11-06T08:30:45.352Z
2023-11-06T08:30:45.352Z
{'Vendor': 'InspireUI', 'Product': 'MStore API', 'Versions': 'n/a'}
CVE-2023-45956
An issue discovered in Govee LED Strip v3.00.42 allows attackers to cause a denial of service via crafted Move and MoveWithOnoff commands.
https://github.com/IoT-Fuzz/IoT-Fuzz/blob/main/Govee%20LED%20Strip%20Vulnerability%20Report.pdf
2023-10-16T00:00:00
2023-10-30T00:00:00
2023-10-30T21:40:11.522812
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45813
Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
2023-10-13T12:00:50.437Z
2023-10-18T20:26:44.531Z
2023-10-18T20:26:44.531Z
{'Vendor': 'DedSecInside', 'Product': 'TorBot', 'Versions': '< 4.0.0'}
CVE-2023-45540
An issue in Jorani Leave Management System 1.0.3 allows a remote attacker to execute arbitrary HTML code via a crafted script to the comment field of the List of Leave requests page.
https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-16T21:11:09.537000
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45239
A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
https://github.com/facebook/tac_plus/pull/41
2023-10-05T21:36:59.884Z
2023-10-06T17:16:16.797Z
2023-10-06T17:16:16.797Z
{'Vendor': 'Meta', 'Product': 'tac_plus', 'Versions': '0'}
CVE-2023-45393
An indirect object reference (IDOR) in GRANDING UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to access sensitive information via a crafted cookie.
https://the-it-wonders.blogspot.com/2023/10/granding-utime-master-idor.html
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T13:24:13.824084
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45669
WebAuthn4J Spring Security provides Web Authentication specification support for Spring applications. Affected versions are subject to improper signature counter value handling. A flaw was found in webauthn4j-spring-security-core. When an authneticator returns an incremented signature counter value during authentication, webauthn4j-spring-security-core does not properly persist the value, which means cloned authenticator detection does not work. An attacker who cloned valid authenticator in some way can use the cloned authenticator without being detected. This issue has been addressed in version `0.9.1.RELEASE`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/webauthn4j/webauthn4j-spring-security/security/advisories/GHSA-v9hx-v6vf-g36j
2023-10-10T14:36:40.860Z
2023-10-16T18:20:50.301Z
2023-10-16T18:20:50.301Z
{'Vendor': 'webauthn4j', 'Product': 'webauthn4j-spring-security', 'Versions': '< 0.9.1.RELEASE'}
CVE-2023-45686
Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal
https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
2023-10-10T19:07:28.770Z
2023-10-16T16:10:10.084Z
2023-10-16T16:10:10.084Z
{'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'}
CVE-2023-45901
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin\/category\/add.
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20column%20of%20column%20management.md
2023-10-16T00:00:00
2023-10-17T00:00:00
2023-10-17T13:12:03.998282
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45147
Discourse is an open source community platform. In affected versions any user can create a topic and add arbitrary custom fields to a topic. The severity of this vulnerability depends on what plugins are installed and how the plugins uses topic custom fields. For a default Discourse installation with the default plugins, this vulnerability has no impact. The problem has been patched in the latest version of Discourse. Users are advised to update to version 3.1.1 if they are on the stable branch or 3.2.0.beta2 if they are on the beta branch. Users unable to upgrade should disable any plugins that access topic custom fields.
https://github.com/discourse/discourse/security/advisories/GHSA-wm89-m359-f9qv
2023-10-04T16:02:46.330Z
2023-10-16T20:26:25.200Z
2023-10-16T20:26:25.200Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '<= 3.1.1, beta: <= 3.2.0.beta2'}
CVE-2023-45844
The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug).
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
2023-10-18T09:35:22.486Z
2023-10-25T13:07:15.053Z
2023-10-25T13:07:15.053Z
{'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'}
CVE-2023-45794
A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.4.0), Mendix Applications using Mendix 7 (All versions < V7.23.37), Mendix Applications using Mendix 8 (All versions < V8.18.27), Mendix Applications using Mendix 9 (All versions < V9.24.10). A capture-replay flaw in the platform could have an impact to apps built with the platform, if certain preconditions are met that depend on the app's model and access control design. This could allow authenticated attackers to access or modify objects without proper authorization, or escalate privileges in the context of the vulnerable app.
https://cert-portal.siemens.com/productcert/pdf/ssa-084182.pdf
2023-10-12T17:15:59.195Z
2023-11-14T11:04:16.602Z
2023-11-14T11:04:16.602Z
{'Vendor': 'Siemens', 'Product': 'Mendix Applications using Mendix 10', 'Versions': 'All versions < V10.4.0'}
CVE-2023-45281
An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file.
https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
2023-10-06T00:00:00
2023-10-19T00:00:00
2023-10-19T16:49:54.642088
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45014
null
null
2023-10-02T16:00:40.527Z
2023-11-02T02:13:44.582Z
2024-01-02T19:01:32.660Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45852
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.
https://connectivity.viessmann.com/gb/mp-fp/vitogate/vitogate-300-bn-mb.html
2023-10-14T00:00:00
2023-10-14T00:00:00
2023-10-14T01:30:21.360223
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45151
Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9
2023-10-04T16:02:46.331Z
2023-10-16T18:41:28.713Z
2023-10-16T18:41:28.713Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.8, >= 26.0.0, < 26.0.3, >= 27.0.0, < 27.0.1'}
CVE-2023-45278
Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request.
https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7
2023-10-06T00:00:00
2023-10-19T00:00:00
2023-10-19T16:33:08.513646
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45628
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in QROkes QR Twitter Widget plugin <= 0.2.3 versions.
https://patchstack.com/database/vulnerability/qr-twitter-widget/wordpress-qr-twitter-widget-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-10T07:47:54.380Z
2023-10-18T13:28:45.142Z
2023-10-18T13:28:45.142Z
{'Vendor': 'QROkes', 'Product': 'QR Twitter Widget', 'Versions': 'n/a'}
CVE-2023-45043
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
https://www.qnap.com/en/security-advisory/qsa-23-27
2023-10-03T08:58:16.880Z
2024-01-05T16:18:56.178Z
2024-01-05T16:18:56.178Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'}
CVE-2023-45106
Cross-Site Request Forgery (CSRF) vulnerability in Fedor Urvanov, Aram Kocharyan Urvanov Syntax Highlighter plugin <= 2.8.33 versions.
https://patchstack.com/database/vulnerability/urvanov-syntax-highlighter/wordpress-urvanov-syntax-highlighter-plugin-2-8-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-04T14:11:49.848Z
2023-10-12T14:57:04.186Z
2023-10-12T14:57:04.186Z
{'Vendor': 'Fedor Urvanov, Aram Kocharyan', 'Product': 'Urvanov Syntax Highlighter', 'Versions': 'n/a'}
CVE-2023-45556
Cross Site Scripting vulnerability in Mybb Mybb Forums v.1.8.33 allows a local attacker to execute arbitrary code via the theme Name parameter in the theme management component.
https://github.com/Or4ngm4n/Mybb/blob/main/MyBB%201.8.33%20Cross%20Site%20Scripting.txt
2023-10-09T00:00:00
2023-11-06T00:00:00
2023-11-06T21:40:52.545582
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45805
pdm is a Python package and dependency manager supporting the latest PEP standards. It's possible to craft a malicious `pdm.lock` file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project. A project `foo` can be targeted by creating the project `foo-2` and uploading the file `foo-2-2.tar.gz` to pypi.org. PyPI will see this as project `foo-2` version `2`, while PDM will see this as project `foo` version `2-2`. The version must only be `parseable as a version` and the filename must be a prefix of the project name, but it's not verified to match the version being installed. Version `2-2` is also not a valid normalized version per PEP 440. Matching the project name exactly (not just prefix) would fix the issue. When installing dependencies with PDM, what's actually installed could differ from what's listed in `pyproject.toml` (including arbitrary code execution on install). It could also be used for downgrade attacks by only changing the version. This issue has been addressed in commit `6853e2642df` which is included in release version `2.9.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9
2023-10-13T12:00:50.436Z
2023-10-20T18:12:24.701Z
2023-10-20T18:12:24.701Z
{'Vendor': 'pdm-project', 'Product': 'pdm', 'Versions': '>= 2.0.0,< 2.9.4'}
CVE-2023-45690
Default file permissions on South River Technologies' Titan MFT and Titan SFTP servers on Linux allows a user that's authentication to the OS to read sensitive files on the filesystem
https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
2023-10-10T19:07:28.771Z
2023-10-16T16:20:52.656Z
2023-10-16T16:20:52.656Z
{'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'}
CVE-2023-45608
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Nicola Modugno Smart Cookie Kit plugin <= 2.3.1 versions.
https://patchstack.com/database/vulnerability/smart-cookie-kit/wordpress-smart-cookie-kit-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-09T10:11:54.307Z
2023-10-18T12:56:48.314Z
2023-10-18T12:56:48.314Z
{'Vendor': 'Nicola Modugno', 'Product': 'Smart Cookie Kit', 'Versions': 'n/a'}
CVE-2023-45171
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to cause a denial of service. IBM X-Force ID: 267969.
https://www.ibm.com/support/pages/node/7105282
2023-10-05T01:38:44.722Z
2024-01-11T02:07:18.677Z
2024-01-11T02:07:18.677Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45464
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the servDomain parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T12:45:41.618187
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45126
null
null
2023-10-04T14:28:12.265Z
2023-12-21T18:54:32.617Z
2024-01-02T14:10:00.725Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45576
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the remove_ext_proto/remove_ext_port parameter of the upnp_ctrl.asp function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug3.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-18T19:03:19.724593
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45825
ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong (credentials: %q)", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state.
https://github.com/ydb-platform/ydb-go-sdk/security/advisories/GHSA-q24m-6h38-5xj8
2023-10-13T12:00:50.438Z
2023-10-19T18:22:31.034Z
2023-10-19T18:22:31.034Z
{'Vendor': 'ydb-platform', 'Product': 'ydb-go-sdk', 'Versions': '>= 3.48.6, < 3.53.3'}
CVE-2023-45960
null
null
2023-10-16T00:00:00
null
2023-11-22T15:49:15.654363
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45063
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <= 1.1.5 versions.
https://patchstack.com/database/vulnerability/ai-content-writing-assistant/wordpress-ai-content-writing-assistant-content-writer-chatgpt-image-generator-all-in-one-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-03T13:31:00.206Z
2023-10-12T12:41:25.690Z
2023-10-12T12:41:25.690Z
{'Vendor': 'ReCorp', 'Product': 'AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One', 'Versions': 'n/a'}
CVE-2023-45219
Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K20307245
2023-10-05T19:17:34.514Z
2023-10-10T12:39:11.420Z
2023-10-10T12:39:11.420Z
{'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'}
CVE-2023-45833
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in LeadSquared Suite plugin <= 0.7.4 versions.
https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-scripting-xss?_s_id=cve
2023-10-13T15:14:01.754Z
2023-10-24T12:28:22.227Z
2023-10-24T12:28:22.227Z
{'Vendor': 'LeadSquared, Inc', 'Product': 'LeadSquared Suite', 'Versions': 'n/a'}
CVE-2023-45560
An issue in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45560.md
2023-10-09T00:00:00
2023-11-14T00:00:00
2023-11-14T02:42:53.513723
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}