CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-45166 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the piodmgrsu command to obtain elevated privileges. IBM X-Force ID: 267964. | https://www.ibm.com/support/pages/node/7095022 | 2023-10-05T01:38:44.721Z | 2023-12-13T23:01:25.905Z | 2023-12-13T23:01:25.905Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45189 | A vulnerability in IBM Robotic Process Automation and IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.10, 23.0.0 through 23.0.10 may result in access to client vault credentials. This difficult to exploit vulnerability could allow a low privileged attacker to programmatically access client vault credentials. IBM X-Force ID: 268752. | https://www.ibm.com/support/pages/node/7065204 | 2023-10-05T01:39:10.397Z | 2023-11-03T22:51:45.475Z | 2023-11-03T22:51:45.475Z | {'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'} |
CVE-2023-45998 | kodbox 1.44 is vulnerable to Cross Site Scripting (XSS). Customizing global HTML results in storing XSS. | https://gist.github.com/fangjiuye/703fdb643db558640f23e4e7c9532348 | 2023-10-16T00:00:00 | 2023-10-23T00:00:00 | 2023-10-23T21:33:38.353451 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45832 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Martin Gibson WP GoToWebinar plugin <= 14.45 versions. | https://patchstack.com/database/vulnerability/wp-gotowebinar/wordpress-wp-gotowebinar-plugin-14-45-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-13T13:20:17.575Z | 2023-10-24T12:12:07.040Z | 2023-10-24T12:12:07.040Z | {'Vendor': 'Martin Gibson', 'Product': 'WP GoToWebinar', 'Versions': 'n/a'} |
CVE-2023-45561 | An issue in A-WORLD OIRASE BEER_waiting Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | http://a-world.com | 2023-10-09T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T20:44:56.562694 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45131 | Discourse is an open source platform for community discussion. New chat messages can be read by making an unauthenticated POST request to MessageBus. This issue is patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/discourse/discourse/security/advisories/GHSA-84gf-hhrc-9pw6 | 2023-10-04T16:02:46.328Z | 2023-10-16T21:24:10.688Z | 2023-10-16T21:24:10.688Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': ' stable < 3.1.2, beta < 3.2.0.beta2'} |
CVE-2023-45074 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Page Visit Counter Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress allows SQL Injection.This issue affects Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress: from n/a through 7.1.1.
| https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-7-1-1-sql-injection-vulnerability?_s_id=cve | 2023-10-03T13:31:21.244Z | 2023-11-06T08:35:02.853Z | 2023-11-06T08:35:02.853Z | {'Vendor': 'Page Visit Counter', 'Product': 'Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress', 'Versions': 'n/a'} |
CVE-2023-45648 | Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially
crafted, invalid trailer header could cause Tomcat to treat a single
request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.
Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
| https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp | 2023-10-10T11:31:15.664Z | 2023-10-10T18:38:34.097Z | 2023-10-10T18:38:34.097Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M1, 10.1.0-M1, 9.0.0-M1, 8.5.0'} |
CVE-2023-45127 | null | null | 2023-10-04T14:28:12.265Z | 2023-12-21T18:55:19.200Z | 2024-01-02T14:10:06.986Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45577 | Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wanid parameter of the H5/speedlimit.data function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug9.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-18T18:53:01.094984 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45062 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Thomas Scholl canvasio3D Light plugin <= 2.4.6 versions. | https://patchstack.com/database/vulnerability/canvasio3d-light/wordpress-canvasio3d-light-plugin-2-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:31:00.205Z | 2023-10-18T08:39:59.040Z | 2023-10-18T08:39:59.040Z | {'Vendor': 'Thomas Scholl', 'Product': 'canvasio3D Light', 'Versions': 'n/a'} |
CVE-2023-45170 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the piobe command to escalate privileges or cause a denial of service. IBM X-Force ID: 267968. | https://www.ibm.com/support/pages/node/7095022 | 2023-10-05T01:38:44.722Z | 2023-12-13T23:05:51.491Z | 2023-12-13T23:05:51.491Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45465 | Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ddnsDomainName parameter in the Dynamic DNS settings. | https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T12:45:42.389358 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45609 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in POWR.Io Contact Form – Custom Builder, Payment Form, and More allows Stored XSS.This issue affects Contact Form – Custom Builder, Payment Form, and More: from n/a through 2.1.0.
| https://patchstack.com/database/vulnerability/powr-pack/wordpress-powr-pack-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-09T10:11:54.308Z | 2023-11-30T15:52:28.192Z | 2023-11-30T15:52:28.192Z | {'Vendor': 'POWR.io', 'Product': 'Contact Form – Custom Builder, Payment Form, and More', 'Versions': 'n/a'} |
CVE-2023-45384 | KnowBand supercheckout > 5.0.7 and < 6.0.7 is vulnerable to Unrestricted Upload of File with Dangerous Type. In the module "Module One Page Checkout, Social Login & Mailchimp" (supercheckout), a guest can upload files with extensions .php | https://addons.prestashop.com/fr/processus-rapide-commande/18016-one-page-checkout-social-login-mailchimp.html | 2023-10-09T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T12:20:15.187969 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45042 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
| https://www.qnap.com/en/security-advisory/qsa-23-27 | 2023-10-03T08:58:16.880Z | 2024-01-05T16:18:51.368Z | 2024-01-05T16:18:51.368Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'} |
CVE-2023-45107 | Cross-Site Request Forgery (CSRF) vulnerability in GoodBarber plugin <= 1.0.22 versions. | https://patchstack.com/database/vulnerability/goodbarber/wordpress-goodbarber-plugin-1-0-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-04T14:11:49.848Z | 2023-10-13T12:00:17.567Z | 2023-10-13T12:00:17.567Z | {'Vendor': 'GoodBarber', 'Product': 'GoodBarber', 'Versions': 'n/a'} |
CVE-2023-45804 | null | null | 2023-10-13T12:00:50.436Z | null | 2023-10-30T22:11:53.424Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45279 | Yamcs 5.8.6 allows XSS (issue 1 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload a display referencing a malicious JavaScript file to the bucket. The user can then open the uploaded display by selecting Telemetry from the menu and navigating to the display. | https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7 | 2023-10-06T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T21:47:14.646021 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45629 | Cross-Site Request Forgery (CSRF) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 versions. | https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T07:47:54.381Z | 2023-10-16T08:31:46.081Z | 2023-10-16T08:31:46.081Z | {'Vendor': 'wpdevart', 'Product': 'Gallery – Image and Video Gallery with Thumbnails', 'Versions': 'n/a'} |
CVE-2023-45015 | Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'date' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/oconnor | 2023-10-02T16:00:40.527Z | 2023-11-02T02:14:36.079Z | 2023-11-02T02:14:36.079Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Bus Booking System', 'Versions': '1.0'} |
CVE-2023-45853 | MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API. | https://github.com/madler/zlib/pull/843 | 2023-10-14T00:00:00 | 2023-10-14T00:00:00 | 2024-01-24T21:06:19.795482 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45150 | Nextcloud calendar is a calendar app for the Nextcloud server platform. Due to missing precondition checks the server was trying to validate strings of any length as email addresses even when megabytes of data were provided, eventually making the server busy and unresponsive. It is recommended that the Nextcloud Calendar app is upgraded to 4.4.4. The only workaround for users unable to upgrade is to disable the calendar app. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r936-8gwm-w452 | 2023-10-04T16:02:46.331Z | 2023-10-16T19:06:03.674Z | 2023-10-16T19:06:03.674Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 1.0.0, < 4.4.4'} |
CVE-2023-45280 | Yamcs 5.8.6 allows XSS (issue 2 of 2). It comes with a Bucket as its primary storage mechanism. Buckets allow for the upload of any file. There's a way to upload an HTML file containing arbitrary JavaScript and then navigate to it. Once the user opens the file, the browser will execute the arbitrary JavaScript. | https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7 | 2023-10-06T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T21:50:38.661811 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45003 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins Social Feed | Custom Feed for Social Media Networks plugin <= 2.2.0 versions. | https://patchstack.com/database/vulnerability/wp-social-feed/wordpress-social-feed-plugin-2-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-02T10:33:37.984Z | 2023-10-17T10:59:23.366Z | 2023-10-17T10:59:23.366Z | {'Vendor': 'Arrow Plugins', 'Product': 'Social Feed | Custom Feed for Social Media Networks', 'Versions': 'n/a'} |
CVE-2023-45146 | XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the Netty framework and the Hessian serialization mechanism. When such a configuration is used, attackers may be able to connect to the server and provide malicious serialized objects that, once deserialized, force it to execute arbitrary code. This can be abused to take control of the machine the server is running by way of remote code execution. This issue has not been fixed. | https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/ | 2023-10-04T16:02:46.330Z | 2023-10-18T21:56:55.614Z | 2023-10-18T21:56:55.614Z | {'Vendor': 'xuexueli', 'Product': 'xxl-rpc', 'Versions': '<= 1.7.0'} |
CVE-2023-45687 | A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing | https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ | 2023-10-10T19:07:28.771Z | 2023-10-16T16:12:31.582Z | 2023-10-16T16:12:31.582Z | {'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'} |
CVE-2023-45054 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in AWESOME TOGI Product Category Tree plugin <= 2.5 versions. | https://patchstack.com/database/vulnerability/product-category-tree/wordpress-product-category-tree-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:30:39.403Z | 2023-10-18T08:09:01.223Z | 2023-10-18T08:09:01.223Z | {'Vendor': 'AWESOME TOGI', 'Product': 'Product Category Tree', 'Versions': 'n/a'} |
CVE-2023-45957 | A stored cross-site scripting (XSS) vulnerability in the component admin/AdminRequestSqlController.php of thirty bees before 1.5.0 allows attackers to execute arbitrary web script or HTML via $e->getMessage() error mishandling. | https://zigrin.com/advisories/thirty-bees-stored-cross-site-scripting-xss/ | 2023-10-16T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T15:40:15.554520 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45812 | The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when a multi-part response is sent. When users send queries to the router that uses the `@defer` or Subscriptions, the Router will panic. To be vulnerable, users of Router must have a coprocessor with `coprocessor.supergraph.response` configured in their `router.yaml` and also to support either `@defer` or Subscriptions. Apollo Router version 1.33.0 has a fix for this vulnerability which was introduced in PR #4014. Users are advised to upgrade. Users unable to upgrade should avoid using the coprocessor supergraph response or disable defer and subscriptions support and continue to use the coprocessor supergraph response. | https://github.com/apollographql/router/security/advisories/GHSA-r344-xw3p-2frj | 2023-10-13T12:00:50.437Z | 2023-10-18T21:29:32.731Z | 2023-10-18T21:29:32.731Z | {'Vendor': 'apollographql', 'Product': 'router', 'Versions': '>= 1.31.0, < 1.33.0'} |
CVE-2023-45111 | Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/pires | 2023-10-04T14:28:12.263Z | 2023-11-02T01:42:20.337Z | 2023-11-02T01:42:20.337Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'} |
CVE-2023-45756 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline – Application Form Builder and Manager plugin <= 2.5.2 versions. | https://patchstack.com/database/vulnerability/apply-online/wordpress-applyonline-application-form-builder-and-manager-plugin-2-5-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-12T08:27:55.559Z | 2023-10-24T11:40:50.202Z | 2023-10-24T11:40:50.202Z | {'Vendor': 'Spider Teams', 'Product': 'ApplyOnline – Application Form Builder and Manager', 'Versions': 'n/a'} |
CVE-2023-45243 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. | https://security-advisory.acronis.com/advisories/SEC-6019 | 2023-10-05T21:47:00.379Z | 2023-10-05T21:57:49.413Z | 2023-10-05T21:57:49.413Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-45613 | In JetBrains Ktor before 2.3.5 server certificates were not verified | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-10-09T10:14:58.487Z | 2023-10-09T10:20:54.104Z | 2023-10-09T10:20:54.104Z | {'Vendor': 'JetBrains', 'Product': 'Ktor', 'Versions': '0'} |
CVE-2023-45869 | ILIAS 7.25 (2023-09-12) allows any authenticated user to execute arbitrary operating system commands remotely, when a highly privileged account accesses an XSS payload. The injected commands are executed via the exec() function in the execQuoted() method of the ilUtil class (/Services/Utilities/classes/class.ilUtil.php) This allows attackers to inject malicious commands into the system, potentially compromising the integrity, confidentiality, and availability of the ILIAS installation and the underlying operating system. | https://rehmeinfosec.de/report/358ad5f6-f712-4f74-a5ee-476efc856cbc/ | 2023-10-14T00:00:00 | 2023-10-26T00:00:00 | 2023-10-26T14:59:23.403381 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45185 | IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to execute remote code. Due to improper authority checks the attacker could perform operations on the PC under the user's authority. IBM X-Force ID: 268273. | https://www.ibm.com/support/pages/node/7091942 | 2023-10-05T01:39:10.397Z | 2023-12-14T14:04:36.190Z | 2023-12-14T14:04:36.190Z | {'Vendor': 'IBM', 'Product': 'i Access Client Solutions', 'Versions': '1.1.2, 1.1.4.3'} |
CVE-2023-45886 | The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute. | https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling | 2023-10-15T00:00:00 | 2023-11-21T00:00:00 | 2023-11-21T05:56:48.927497 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45701 | HCL Launch could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108645 | 2023-10-10T21:26:06.755Z | 2023-12-28T07:03:01.753Z | 2023-12-28T07:03:01.753Z | {'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.0 - 7.0.5.18, 7.1 - 7.1.2.14, 7.2 - 7.2.3.7, 7.3 - 7.3.2.2'} |
CVE-2023-45351 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.1, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.42.1, and 4000 Manager V10 R0 allow Authenticated Command Injection via AShbr. This is also known as OSFOURK-24039. | https://networks.unify.com/security/advisories/OBSO-2306-01.pdf | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T03:35:47.276246 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45644 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anurag Deshmukh CPT Shortcode Generator plugin <= 1.0 versions. | https://patchstack.com/database/vulnerability/cpt-shortcode/wordpress-cpt-shortcode-generator-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-10T09:58:47.168Z | 2023-10-24T11:10:03.498Z | 2023-10-24T11:10:03.498Z | {'Vendor': 'Anurag Deshmukh', 'Product': 'CPT Shortcode Generator', 'Versions': 'n/a'} |
CVE-2023-45582 | An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker to perform a brute force attack on the affected endpoints via repeated login attempts. | https://fortiguard.com/psirt/FG-IR-23-287 | 2023-10-09T08:01:29.296Z | 2023-11-14T18:05:34.247Z | 2023-11-14T18:05:34.247Z | {'Vendor': 'Fortinet', 'Product': 'FortiMail', 'Versions': '7.4.0, 7.2.0, 7.0.0, 6.4.0, 6.2.0'} |
CVE-2023-45078 | A memory leakage vulnerability was reported in the DustFilterAlertSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables. | https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-10-03T17:36:49.034Z | 2023-11-08T22:30:49.077Z | 2023-11-08T22:30:49.077Z | {'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'} |
CVE-2023-45347 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_verified' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.768Z | 2023-11-02T14:04:17.696Z | 2023-11-02T14:04:17.696Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45202 | Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
| https://fluidattacks.com/advisories/uchida | 2023-10-05T13:51:36.875Z | 2023-11-01T22:02:45.250Z | 2023-11-01T22:12:29.348Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'} |
CVE-2023-45740 | Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:50.226Z | 2023-12-26T07:20:42.853Z | 2023-12-26T07:20:42.853Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v4.1.3'} |
CVE-2023-45605 | Cross-Site Request Forgery (CSRF) vulnerability in Christopher Finke Feed Statistics plugin <= 4.1 versions. | https://patchstack.com/database/vulnerability/wordpress-feed-statistics/wordpress-feed-statistics-plugin-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-09T10:11:54.307Z | 2023-10-16T08:26:25.962Z | 2023-10-16T08:26:25.962Z | {'Vendor': 'Christopher Finke', 'Product': 'Feed Statistics', 'Versions': 'n/a'} |
CVE-2023-45039 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
| https://www.qnap.com/en/security-advisory/qsa-23-27 | 2023-10-03T08:58:16.879Z | 2024-01-05T16:18:37.227Z | 2024-01-05T16:18:37.227Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QTS', 'Versions': '5.1.x'} |
CVE-2023-45193 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 federated server is vulnerable to a denial of service when a specially crafted cursor is used. IBM X-Force ID: 268759. | https://www.ibm.com/support/pages/node/7105501 | 2023-10-05T01:39:10.398Z | 2024-01-22T19:02:09.851Z | 2024-01-22T19:02:09.851Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'} |
CVE-2023-45468 | Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the pingWdogIp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T12:45:45.174431 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45741 | VR-S1000 firmware Ver. 2.37 and earlier allows an attacker with access to the product's web management page to execute arbitrary OS commands. | https://www.buffalo.jp/news/detail/20231225-01.html | 2023-10-25T07:08:54.707Z | 2023-12-26T07:28:42.765Z | 2023-12-26T07:28:42.765Z | {'Vendor': 'BUFFALO INC.', 'Product': 'VR-S1000', 'Versions': 'firmware Ver. 2.37 and earlier'} |
CVE-2023-45311 | fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary. NOTE: some sources feel that this means that no version is affected any longer, because the URL is not controlled by an adversary. | https://github.com/fsevents/fsevents/compare/v1.2.10...v1.2.11 | 2023-10-06T00:00:00 | 2023-10-06T00:00:00 | 2023-11-28T07:03:17.341448 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45604 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Scott Reilly Get Custom Field Values plugin <= 4.0.1 versions. | https://patchstack.com/database/vulnerability/get-custom-field-values/wordpress-get-custom-field-values-plugin-4-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-09T10:11:54.307Z | 2023-10-18T13:17:22.890Z | 2023-10-18T13:17:22.890Z | {'Vendor': 'Scott Reilly', 'Product': 'Get Custom Field Values', 'Versions': 'n/a'} |
CVE-2023-45829 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in HappyBox Newsletter & Bulk Email Sender – Email Newsletter Plugin for WordPress plugin <= 2.0.1 versions. | https://patchstack.com/database/vulnerability/newsletter-bulk-email/wordpress-newsletter-bulk-email-sender-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-13T13:20:17.574Z | 2023-10-24T12:24:08.080Z | 2023-10-24T12:24:08.080Z | {'Vendor': 'HappyBox', 'Product': 'Newsletter & Bulk Email Sender – Email Newsletter Plugin for WordPress', 'Versions': 'n/a'} |
CVE-2023-45346 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_role' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.768Z | 2023-11-02T14:03:34.706Z | 2023-11-02T14:03:34.706Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45203 | Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
| https://fluidattacks.com/advisories/uchida | 2023-10-05T13:51:36.876Z | 2023-11-01T22:11:49.439Z | 2023-11-01T22:11:49.439Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'} |
CVE-2023-45653 | Cross-Site Request Forgery (CSRF) vulnerability in Galaxy Weblinks Video Playlist For YouTube plugin <= 6.0 versions. | https://patchstack.com/database/vulnerability/video-playlist-for-youtube/wordpress-video-playlist-for-youtube-plugin-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T12:38:22.832Z | 2023-10-16T08:43:54.081Z | 2023-10-16T08:43:54.081Z | {'Vendor': 'Galaxy Weblinks', 'Product': 'Video Playlist For YouTube', 'Versions': 'n/a'} |
CVE-2023-45079 | A memory leakage vulnerability was reported in the NvmramSmm SMM driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
| https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-10-03T17:36:49.034Z | 2023-11-08T22:32:37.592Z | 2023-11-08T22:32:37.592Z | {'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'} |
CVE-2023-45700 | HCL Launch is vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108644 | 2023-10-10T21:26:06.755Z | 2023-12-21T00:10:11.246Z | 2023-12-21T00:10:11.246Z | {'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.1 - 7.1.2.14, 7.2 - 7.2.3.7, 7.3 - 7.3.2.2'} |
CVE-2023-45350 | Atos Unify OpenScape 4000 Manager V10 R1 before V10 R1.42.1 and 4000 Manager V10 R0 allow Privilege escalation that may lead to the ability of an authenticated attacker to run arbitrary code via AScm. This is also known as OSFOURK-24034. | https://networks.unify.com/security/advisories/OBSO-2306-01.pdf | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T03:36:16.723508 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45645 | Cross-Site Request Forgery (CSRF) vulnerability in InfoD74 WP Open Street Map plugin <= 1.25 versions. | https://patchstack.com/database/vulnerability/wp-open-street-map/wordpress-wp-open-street-map-plugin-1-25-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T09:58:47.168Z | 2023-10-16T09:53:35.938Z | 2023-10-16T09:53:35.938Z | {'Vendor': 'InfoD74', 'Product': 'WP Open Street Map', 'Versions': 'n/a'} |
CVE-2023-45868 | The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable. | https://rehmeinfosec.de | 2023-10-14T00:00:00 | 2023-10-26T00:00:00 | 2023-10-26T14:59:16.826734 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45184 | IBM i Access Client Solutions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.3 could allow an attacker to obtain a decryption key due to improper authority checks. IBM X-Force ID: 268270. | https://www.ibm.com/support/pages/node/7091942 | 2023-10-05T01:39:10.396Z | 2023-12-14T01:42:01.018Z | 2023-12-14T01:42:01.018Z | {'Vendor': 'IBM', 'Product': 'i Access Client Solutions', 'Versions': '1.1.2, 1.1.4.3'} |
CVE-2023-45887 | DS Wireless Communication (DWC) with DWC_VERSION_3 and DWC_VERSION_11 allows remote attackers to execute arbitrary code on a game-playing client's machine via a modified GPCM message. | https://github.com/MikeIsAStar/DS-Wireless-Communication-Remote-Code-Execution | 2023-10-15T00:00:00 | 2023-12-19T00:00:00 | 2023-12-19T23:14:53.821923 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45757 | Security vulnerability in Apache bRPC <=1.6.0 on all platforms allows attackers to inject XSS code to the builtin rpcz page.
An attacker that can send http request to bRPC server with rpcz enabled can inject arbitrary XSS code to the builtin rpcz page.
Solution (choose one of three):
1. upgrade to bRPC > 1.6.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.6.1/
2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2411
3. disable rpcz feature | https://lists.apache.org/thread/6syxv32fqgl30brfpttrk4rfsb983hl4 | 2023-10-12T09:28:16.458Z | 2023-10-16T08:01:41.036Z | 2023-10-16T08:01:41.036Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache bRPC', 'Versions': '0.9.0'} |
CVE-2023-45242 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. | https://security-advisory.acronis.com/advisories/SEC-6018 | 2023-10-05T21:47:00.378Z | 2023-10-05T21:57:35.406Z | 2023-10-05T21:57:35.406Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-45612 | In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-10-09T10:14:58.150Z | 2023-10-09T10:20:53.533Z | 2023-10-09T10:20:53.533Z | {'Vendor': 'JetBrains', 'Product': 'Ktor', 'Versions': '0'} |
CVE-2023-45055 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in InspireUI MStore API allows SQL Injection.This issue affects MStore API: from n/a through 4.0.6.
| https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-4-0-6-sql-injection-vulnerability?_s_id=cve | 2023-10-03T13:31:00.204Z | 2023-11-06T08:30:45.352Z | 2023-11-06T08:30:45.352Z | {'Vendor': 'InspireUI', 'Product': 'MStore API', 'Versions': 'n/a'} |
CVE-2023-45956 | An issue discovered in Govee LED Strip v3.00.42 allows attackers to cause a denial of service via crafted Move and MoveWithOnoff commands. | https://github.com/IoT-Fuzz/IoT-Fuzz/blob/main/Govee%20LED%20Strip%20Vulnerability%20Report.pdf | 2023-10-16T00:00:00 | 2023-10-30T00:00:00 | 2023-10-30T21:40:11.522812 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45813 | Torbot is an open source tor network intelligence tool. In affected versions the `torbot.modules.validators.validate_link function` uses the python-validators URL validation regex. This particular regular expression has an exponential complexity which allows an attacker to cause an application crash using a well-crafted argument. An attacker can use a well-crafted URL argument to exploit the vulnerability in the regular expression and cause a Denial of Service on the system. The validators file has been removed in version 4.0.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff | 2023-10-13T12:00:50.437Z | 2023-10-18T20:26:44.531Z | 2023-10-18T20:26:44.531Z | {'Vendor': 'DedSecInside', 'Product': 'TorBot', 'Versions': '< 4.0.0'} |
CVE-2023-45540 | An issue in Jorani Leave Management System 1.0.3 allows a remote attacker to execute arbitrary HTML code via a crafted script to the comment field of the List of Leave requests page. | https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T21:11:09.537000 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45239 | A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server. | https://github.com/facebook/tac_plus/pull/41 | 2023-10-05T21:36:59.884Z | 2023-10-06T17:16:16.797Z | 2023-10-06T17:16:16.797Z | {'Vendor': 'Meta', 'Product': 'tac_plus', 'Versions': '0'} |
CVE-2023-45393 | An indirect object reference (IDOR) in GRANDING UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to access sensitive information via a crafted cookie. | https://the-it-wonders.blogspot.com/2023/10/granding-utime-master-idor.html | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T13:24:13.824084 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45669 | WebAuthn4J Spring Security provides Web Authentication specification support for Spring applications. Affected versions are subject to improper signature counter value handling. A flaw was found in webauthn4j-spring-security-core. When an authneticator returns an incremented signature counter value during authentication, webauthn4j-spring-security-core does not properly persist the value, which means cloned authenticator detection does not work. An attacker who cloned valid authenticator in some way can use the cloned authenticator without being detected. This issue has been addressed in version `0.9.1.RELEASE`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| https://github.com/webauthn4j/webauthn4j-spring-security/security/advisories/GHSA-v9hx-v6vf-g36j | 2023-10-10T14:36:40.860Z | 2023-10-16T18:20:50.301Z | 2023-10-16T18:20:50.301Z | {'Vendor': 'webauthn4j', 'Product': 'webauthn4j-spring-security', 'Versions': '< 0.9.1.RELEASE'} |
CVE-2023-45686 | Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal | https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ | 2023-10-10T19:07:28.770Z | 2023-10-16T16:10:10.084Z | 2023-10-16T16:10:10.084Z | {'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'} |
CVE-2023-45901 | Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin\/category\/add. | https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20column%20of%20column%20management.md | 2023-10-16T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T13:12:03.998282 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45147 | Discourse is an open source community platform. In affected versions any user can create a topic and add arbitrary custom fields to a topic. The severity of this vulnerability depends on what plugins are installed and how the plugins uses topic custom fields. For a default Discourse installation with the default plugins, this vulnerability has no impact. The problem has been patched in the latest version of Discourse. Users are advised to update to version 3.1.1 if they are on the stable branch or 3.2.0.beta2 if they are on the beta branch. Users unable to upgrade should disable any plugins that access topic custom fields. | https://github.com/discourse/discourse/security/advisories/GHSA-wm89-m359-f9qv | 2023-10-04T16:02:46.330Z | 2023-10-16T20:26:25.200Z | 2023-10-16T20:26:25.200Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '<= 3.1.1, beta: <= 3.2.0.beta2'} |
CVE-2023-45844 | The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug). | https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | 2023-10-18T09:35:22.486Z | 2023-10-25T13:07:15.053Z | 2023-10-25T13:07:15.053Z | {'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'} |
CVE-2023-45794 | A vulnerability has been identified in Mendix Applications using Mendix 10 (All versions < V10.4.0), Mendix Applications using Mendix 7 (All versions < V7.23.37), Mendix Applications using Mendix 8 (All versions < V8.18.27), Mendix Applications using Mendix 9 (All versions < V9.24.10). A capture-replay flaw in the platform could have an impact to apps built with the platform, if certain preconditions are met that depend on the app's model and access control design.
This could allow authenticated attackers to access or modify objects without proper authorization, or escalate privileges in the context of the vulnerable app. | https://cert-portal.siemens.com/productcert/pdf/ssa-084182.pdf | 2023-10-12T17:15:59.195Z | 2023-11-14T11:04:16.602Z | 2023-11-14T11:04:16.602Z | {'Vendor': 'Siemens', 'Product': 'Mendix Applications using Mendix 10', 'Versions': 'All versions < V10.4.0'} |
CVE-2023-45281 | An issue in Yamcs 5.8.6 allows attackers to obtain the session cookie via upload of crafted HTML file. | https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies | 2023-10-06T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T16:49:54.642088 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45014 | null | null | 2023-10-02T16:00:40.527Z | 2023-11-02T02:13:44.582Z | 2024-01-02T19:01:32.660Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45852 | In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method. | https://connectivity.viessmann.com/gb/mp-fp/vitogate/vitogate-300-bn-mb.html | 2023-10-14T00:00:00 | 2023-10-14T00:00:00 | 2023-10-14T01:30:21.360223 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45151 | Nextcloud server is an open source home cloud platform. Affected versions of Nextcloud stored OAuth2 tokens in plaintext which allows an attacker who has gained access to the server to potentially elevate their privilege. This issue has been addressed and users are recommended to upgrade their Nextcloud Server to version 25.0.8, 26.0.3 or 27.0.1. There are no known workarounds for this vulnerability. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhgv-jcg9-p4m9 | 2023-10-04T16:02:46.331Z | 2023-10-16T18:41:28.713Z | 2023-10-16T18:41:28.713Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.8, >= 26.0.0, < 26.0.3, >= 27.0.0, < 27.0.1'} |
CVE-2023-45278 | Directory Traversal vulnerability in the storage functionality of the API in Yamcs 5.8.6 allows attackers to delete arbitrary files via crafted HTTP DELETE request. | https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7 | 2023-10-06T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T16:33:08.513646 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45628 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in QROkes QR Twitter Widget plugin <= 0.2.3 versions. | https://patchstack.com/database/vulnerability/qr-twitter-widget/wordpress-qr-twitter-widget-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-10T07:47:54.380Z | 2023-10-18T13:28:45.142Z | 2023-10-18T13:28:45.142Z | {'Vendor': 'QROkes', 'Product': 'QR Twitter Widget', 'Versions': 'n/a'} |
CVE-2023-45043 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
| https://www.qnap.com/en/security-advisory/qsa-23-27 | 2023-10-03T08:58:16.880Z | 2024-01-05T16:18:56.178Z | 2024-01-05T16:18:56.178Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'} |
CVE-2023-45106 | Cross-Site Request Forgery (CSRF) vulnerability in Fedor Urvanov, Aram Kocharyan Urvanov Syntax Highlighter plugin <= 2.8.33 versions. | https://patchstack.com/database/vulnerability/urvanov-syntax-highlighter/wordpress-urvanov-syntax-highlighter-plugin-2-8-33-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-04T14:11:49.848Z | 2023-10-12T14:57:04.186Z | 2023-10-12T14:57:04.186Z | {'Vendor': 'Fedor Urvanov, Aram Kocharyan', 'Product': 'Urvanov Syntax Highlighter', 'Versions': 'n/a'} |
CVE-2023-45556 | Cross Site Scripting vulnerability in Mybb Mybb Forums v.1.8.33 allows a local attacker to execute arbitrary code via the theme Name parameter in the theme management component. | https://github.com/Or4ngm4n/Mybb/blob/main/MyBB%201.8.33%20Cross%20Site%20Scripting.txt | 2023-10-09T00:00:00 | 2023-11-06T00:00:00 | 2023-11-06T21:40:52.545582 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45805 | pdm is a Python package and dependency manager supporting the latest PEP standards. It's possible to craft a malicious `pdm.lock` file that could allow e.g. an insider or a malicious open source project to appear to depend on a trusted PyPI project, but actually install another project. A project `foo` can be targeted by creating the project `foo-2` and uploading the file `foo-2-2.tar.gz` to pypi.org. PyPI will see this as project `foo-2` version `2`, while PDM will see this as project `foo` version `2-2`. The version must only be `parseable as a version` and the filename must be a prefix of the project name, but it's not verified to match the version being installed. Version `2-2` is also not a valid normalized version per PEP 440. Matching the project name exactly (not just prefix) would fix the issue. When installing dependencies with PDM, what's actually installed could differ from what's listed in `pyproject.toml` (including arbitrary code execution on install). It could also be used for downgrade attacks by only changing the version. This issue has been addressed in commit `6853e2642df` which is included in release version `2.9.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 | 2023-10-13T12:00:50.436Z | 2023-10-20T18:12:24.701Z | 2023-10-20T18:12:24.701Z | {'Vendor': 'pdm-project', 'Product': 'pdm', 'Versions': '>= 2.0.0,< 2.9.4'} |
CVE-2023-45690 | Default file permissions on South River Technologies' Titan MFT and Titan SFTP servers on Linux allows a user that's authentication to the OS to read sensitive files on the filesystem | https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ | 2023-10-10T19:07:28.771Z | 2023-10-16T16:20:52.656Z | 2023-10-16T16:20:52.656Z | {'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'} |
CVE-2023-45608 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Nicola Modugno Smart Cookie Kit plugin <= 2.3.1 versions. | https://patchstack.com/database/vulnerability/smart-cookie-kit/wordpress-smart-cookie-kit-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-09T10:11:54.307Z | 2023-10-18T12:56:48.314Z | 2023-10-18T12:56:48.314Z | {'Vendor': 'Nicola Modugno', 'Product': 'Smart Cookie Kit', 'Versions': 'n/a'} |
CVE-2023-45171 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to cause a denial of service. IBM X-Force ID: 267969. | https://www.ibm.com/support/pages/node/7105282 | 2023-10-05T01:38:44.722Z | 2024-01-11T02:07:18.677Z | 2024-01-11T02:07:18.677Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45464 | Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the servDomain parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T12:45:41.618187 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45126 | null | null | 2023-10-04T14:28:12.265Z | 2023-12-21T18:54:32.617Z | 2024-01-02T14:10:00.725Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45576 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the remove_ext_proto/remove_ext_port parameter of the upnp_ctrl.asp function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug3.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-18T19:03:19.724593 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45825 | ydb-go-sdk is a pure Go native and database/sql driver for the YDB platform. Since ydb-go-sdk v3.48.6 if you use a custom credentials object (implementation of interface Credentials it may leak into logs. This happens because this object could be serialized into an error message using `fmt.Errorf("something went wrong (credentials: %q)", credentials)` during connection to the YDB server. If such logging occurred, a malicious user with access to logs could read sensitive information (i.e. credentials) information and use it to get access to the database. ydb-go-sdk contains this problem in versions from v3.48.6 to v3.53.2. The fix for this problem has been released in version v3.53.3. Users are advised to upgrade. Users unable to upgrade should implement the `fmt.Stringer` interface in your custom credentials type with explicit stringify of object state. | https://github.com/ydb-platform/ydb-go-sdk/security/advisories/GHSA-q24m-6h38-5xj8 | 2023-10-13T12:00:50.438Z | 2023-10-19T18:22:31.034Z | 2023-10-19T18:22:31.034Z | {'Vendor': 'ydb-platform', 'Product': 'ydb-go-sdk', 'Versions': '>= 3.48.6, < 3.53.3'} |
CVE-2023-45960 | null | null | 2023-10-16T00:00:00 | null | 2023-11-22T15:49:15.654363 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45063 | Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <= 1.1.5 versions. | https://patchstack.com/database/vulnerability/ai-content-writing-assistant/wordpress-ai-content-writing-assistant-content-writer-chatgpt-image-generator-all-in-one-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-03T13:31:00.206Z | 2023-10-12T12:41:25.690Z | 2023-10-12T12:41:25.690Z | {'Vendor': 'ReCorp', 'Product': 'AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One', 'Versions': 'n/a'} |
CVE-2023-45219 |
Exposure of Sensitive Information vulnerability exist in an undisclosed BIG-IP TMOS shell (tmsh) command which may allow an authenticated attacker with resource administrator role privileges to view sensitive information.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| https://my.f5.com/manage/s/article/K20307245 | 2023-10-05T19:17:34.514Z | 2023-10-10T12:39:11.420Z | 2023-10-10T12:39:11.420Z | {'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'} |
CVE-2023-45833 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in LeadSquared Suite plugin <= 0.7.4 versions. | https://patchstack.com/database/vulnerability/leadsquared-suite/wordpress-leadsquared-suite-plugin-0-7-4-cross-site-scripting-xss?_s_id=cve | 2023-10-13T15:14:01.754Z | 2023-10-24T12:28:22.227Z | 2023-10-24T12:28:22.227Z | {'Vendor': 'LeadSquared, Inc', 'Product': 'LeadSquared Suite', 'Versions': 'n/a'} |
CVE-2023-45560 | An issue in Yasukawa memberscard v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45560.md | 2023-10-09T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T02:42:53.513723 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.