CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-45130 | Frontier is Substrate's Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier's maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain's limit. This is especially an issue for XCM transactions, because they can't be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it's recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It's recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds. | https://github.com/paritytech/frontier/security/advisories/GHSA-gc88-2gvv-gp3v | 2023-10-04T16:02:46.328Z | 2023-10-13T12:14:15.105Z | 2023-10-13T12:14:15.105Z | {'Vendor': 'paritytech', 'Product': 'frontier', 'Versions': '<= 0.1.0'} |
CVE-2023-45075 | A memory leakage vulnerability was reported in the SWSMI_Shadow DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables. | https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-10-03T17:36:49.034Z | 2023-11-08T22:27:32.659Z | 2023-11-08T22:27:32.659Z | {'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'} |
CVE-2023-45167 | IBM AIX's 7.3 Python implementation could allow a non-privileged local user to exploit a vulnerability to cause a denial of service. IBM X-Force ID: 267965. | https://www.ibm.com/support/pages/node/7068084 | 2023-10-05T01:38:44.721Z | 2023-11-10T03:52:10.595Z | 2023-11-10T03:52:10.595Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.3'} |
CVE-2023-45864 | A race condition issue discovered in Samsung Mobile Processor Exynos 9820, 980, 1080, 2100, 2200, 1280, and 1380 allows unintended modifications of values within certain areas. | https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | 2023-10-14T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T01:03:29.295938 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45665 | null | null | 2023-10-10T14:36:40.860Z | null | 2023-10-19T16:52:38.336Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45235 | EDK2's Network Package is susceptible to a buffer overflow vulnerability when
handling Server ID option
from a DHCPv6 proxy Advertise message. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
| https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h | 2023-10-05T20:48:19.879Z | 2024-01-16T16:11:41.215Z | 2024-01-16T16:11:41.215Z | {'Vendor': 'TianoCore', 'Product': 'edk2', 'Versions': 'edk2-stable202308'} |
CVE-2023-45370 | An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. SportsTeams: Special:SportsManagerLogo and Special:SportsTeamsManagerLogo do not check for the sportsteamsmanager user right, and thus an attacker may be able to affect pages that are concerned with sports teams. | https://phabricator.wikimedia.org/T345680 | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T05:32:56.540857 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45059 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Gumroad plugin <= 3.1.0 versions. | https://patchstack.com/database/vulnerability/gumroad/wordpress-gumroad-plugin-3-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:31:00.205Z | 2023-10-18T08:23:02.962Z | 2023-10-18T08:23:02.962Z | {'Vendor': 'Gumroad', 'Product': 'Gumroad', 'Versions': 'n/a'} |
CVE-2023-45798 | In Yettiesoft VestCert versions 2.36 to 2.5.29, a vulnerability exists due to improper validation of third-party modules. This allows malicious actors to load arbitrary third-party modules, leading to remote code execution. | https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&nttId=71008&menuNo=205020 | 2023-10-13T08:01:54.364Z | 2023-10-30T06:17:14.332Z | 2023-10-30T06:17:14.332Z | {'Vendor': 'Yettiesoft', 'Product': 'VestCert', 'Versions': '2.3.6'} |
CVE-2023-45632 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WebDorado SpiderVPlayer plugin <= 1.5.22 versions. | https://patchstack.com/database/vulnerability/player/wordpress-spidervplayer-plugin-1-5-22-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-10T07:47:54.381Z | 2023-10-18T13:35:58.871Z | 2023-10-18T13:35:58.871Z | {'Vendor': 'WebDorado', 'Product': 'SpiderVPlayer', 'Versions': 'n/a'} |
CVE-2023-45327 | null | null | 2023-10-06T21:35:59.764Z | 2023-11-02T13:15:36.249Z | 2024-01-02T20:09:31.555Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45777 | In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to launch arbitrary activities using system privileges due to Parcel Mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6 | 2023-10-12T15:46:50.768Z | 2023-12-04T22:40:55.603Z | 2023-12-22T00:16:55.358Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13'} |
CVE-2023-45624 | An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt | 2023-10-09T16:22:24.804Z | 2023-11-14T22:57:05.727Z | 2023-11-14T22:57:05.727Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'} |
CVE-2023-45274 | Cross-Site Request Forgery (CSRF) vulnerability in SendPulse SendPulse Free Web Push plugin <= 1.3.1 versions. | https://patchstack.com/database/vulnerability/sendpulse-web-push/wordpress-sendpulse-free-web-push-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-06T13:05:32.934Z | 2023-10-16T08:21:37.194Z | 2023-10-16T08:21:37.194Z | {'Vendor': 'SendPulse', 'Product': 'SendPulse Free Web Push', 'Versions': 'n/a'} |
CVE-2023-45761 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Joovii Sendle Shipping Plugin plugin <= 5.13 versions. | https://patchstack.com/database/vulnerability/official-sendle-shipping-method/wordpress-sendle-shipping-plugin-5-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-12T12:45:14.808Z | 2023-10-24T11:55:21.724Z | 2023-10-24T11:55:21.724Z | {'Vendor': 'Joovii', 'Product': 'Sendle Shipping Plugin', 'Versions': 'n/a'} |
CVE-2023-45331 | null | null | 2023-10-06T21:35:59.765Z | 2023-11-02T13:21:52.472Z | 2024-01-02T16:30:54.366Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45018 | Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the includes/login.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/oconnor | 2023-10-02T16:00:40.527Z | 2023-11-02T02:17:35.072Z | 2023-11-02T02:17:35.072Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Bus Booking System', 'Versions': '1.0'} |
CVE-2023-45223 | Mattermost fails to properly validate the "Show Full Name" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled.
| https://mattermost.com/security-updates | 2023-11-20T12:06:31.664Z | 2023-11-27T09:06:34.489Z | 2023-11-27T09:06:34.489Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.13, 8.1.4'} |
CVE-2023-45809 | Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 4.1.8 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/wagtail/wagtail/security/advisories/GHSA-fc75-58r8-rm3h | 2023-10-13T12:00:50.436Z | 2023-10-19T18:33:26.176Z | 2023-10-19T18:33:26.176Z | {'Vendor': 'wagtail', 'Product': 'wagtail', 'Versions': '< 4.1.9, >= 5.0.0, < 5.0.5, >= 5.1.0, < 5.1.3'} |
CVE-2023-45467 | Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ntpServIP parameter in the Time Settings. | https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T12:45:43.787448 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45172 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in AIX windows to cause a denial of service. IBM X-Force ID: 267970. | https://www.ibm.com/support/pages/node/7099314 | 2023-10-05T01:38:44.722Z | 2023-12-19T22:12:21.055Z | 2023-12-19T22:12:21.055Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45871 | An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU. | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f | 2023-10-15T00:00:00 | 2023-10-15T00:00:00 | 2024-01-11T19:07:05.019133 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45349 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.34.7, 4000 Assistant V10 R1.42.0, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.34.7, 4000 Manager V10 R1.42.0, and 4000 Manager V10 R0 expose sensitive information that may allow lateral movement to the backup system via AShbr. This is also known as OSFOURK-23722. | https://networks.unify.com/security/advisories/OBSO-2306-01.pdf | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T03:36:50.952663 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45060 | Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com Interactive World Map plugin <= 3.2.0 versions. | https://patchstack.com/database/vulnerability/interactive-world-map/wordpress-interactive-world-map-plugin-3-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-03T13:31:00.205Z | 2023-10-12T12:38:20.389Z | 2023-10-12T12:38:20.389Z | {'Vendor': 'Fla-shop.com', 'Product': 'Interactive World Map', 'Versions': 'n/a'} |
CVE-2023-45826 | Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/Leantime/leantime/security/advisories/GHSA-559g-3h98-g3fj | 2023-10-13T12:00:50.439Z | 2023-10-19T18:28:54.167Z | 2023-10-19T18:28:54.167Z | {'Vendor': 'Leantime', 'Product': 'leantime', 'Versions': '< 2.4-beta-4'} |
CVE-2023-45125 | null | null | 2023-10-04T14:28:12.265Z | 2023-12-21T18:53:53.289Z | 2024-01-02T14:09:44.759Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45575 | Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip parameter of the ip_position.asp function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug5.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-18T18:45:00.944649 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45076 | A memory leakage vulnerability was reported in the 534D0140 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
| https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-10-03T17:36:49.034Z | 2023-11-08T22:28:20.459Z | 2023-11-08T22:28:20.459Z | {'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'} |
CVE-2023-45133 | Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any "polyfill provider" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/[email protected]` and `@babel/[email protected]`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3. | https://github.com/babel/babel/security/advisories/GHSA-67hx-6x53-jw92 | 2023-10-04T16:02:46.328Z | 2023-10-12T16:17:08.624Z | 2023-10-12T16:17:08.624Z | {'Vendor': 'babel', 'Product': 'babel', 'Versions': '< 7.23.2, >= 8.0.0-alpha.0, < 8.0.0-alpha.4'} |
CVE-2023-45830 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.
| https://patchstack.com/database/vulnerability/online-accessibility/wordpress-accessibility-suite-by-online-ada-plugin-4-11-sql-injection-vulnerability?_s_id=cve | 2023-10-13T13:20:17.574Z | 2023-11-06T08:57:32.818Z | 2023-11-06T08:57:32.818Z | {'Vendor': 'Online ADA', 'Product': 'Accessibility Suite by Online ADA', 'Versions': 'n/a'} |
CVE-2023-45758 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi Amministrazione Trasparente plugin <= 8.0.2 versions. | https://patchstack.com/database/vulnerability/amministrazione-trasparente/wordpress-amministrazione-trasparente-plugin-8-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-12T12:45:14.807Z | 2023-10-24T11:44:12.966Z | 2023-10-24T11:44:12.966Z | {'Vendor': 'Marco Milesi', 'Product': 'Amministrazione Trasparente', 'Versions': 'n/a'} |
CVE-2023-45471 | The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page. | https://github.com/itsAptx/CVE-2023-45471 | 2023-10-09T00:00:00 | 2023-10-20T00:00:00 | 2023-10-20T03:42:30.921001 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45867 | ILIAS (2013-09-12 release) contains a medium-criticality Directory Traversal local file inclusion vulnerability in the ScormAicc module. An attacker with a privileged account, typically holding the tutor role, can exploit this to gain unauthorized access to and potentially retrieve confidential files stored on the web server. The attacker can access files that are readable by the web server user www-data; this may include sensitive configuration files and documents located outside the documentRoot. The vulnerability is exploited by an attacker who manipulates the file parameter in a URL, inserting directory traversal sequences in order to access unauthorized files. This manipulation allows the attacker to retrieve sensitive files, such as /etc/passwd, potentially compromising the system's security. This issue poses a significant risk to confidentiality and is remotely exploitable over the internet. | https://rehmeinfosec.de | 2023-10-14T00:00:00 | 2023-10-26T00:00:00 | 2023-10-26T14:59:11.880529 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45723 | HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability. Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-10-10T21:26:10.163Z | 2024-01-03T02:50:02.258Z | 2024-01-03T02:50:02.258Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-45689 | Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal | https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ | 2023-10-10T19:07:28.771Z | 2023-10-16T16:19:08.287Z | 2023-10-16T16:19:08.287Z | {'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'} |
CVE-2023-45373 | An issue was discovered in the ProofreadPage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. XSS can occur via formatNumNoSeparators. | https://phabricator.wikimedia.org/T345693 | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T05:32:30.576234 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45666 | stb_image is a single file MIT licensed library for processing images. It may look like `stbi__load_gif_main` doesn’t give guarantees about the content of output value `*delays` upon failure. Although it sets `*delays` to zero at the beginning, it doesn’t do it in case the image is not recognized as GIF and a call to `stbi__load_gif_main_outofmem` only frees possibly allocated memory in `*delays` without resetting it to zero. Thus it would be fair to say the caller of `stbi__load_gif_main` is responsible to free the allocated memory in `*delays` only if `stbi__load_gif_main` returns a non null value. However at the same time the function may return null value, but fail to free the memory in `*delays` if internally `stbi__convert_format` is called and fails. Thus the issue may lead to a memory leak if the caller chooses to free `delays` only when `stbi__load_gif_main` didn’t fail or to a double-free if the `delays` is always freed | https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ | 2023-10-10T14:36:40.860Z | 2023-10-20T23:26:42.620Z | 2023-10-20T23:26:42.620Z | {'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 2.28'} |
CVE-2023-45236 |
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality.
| https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h | 2023-10-05T20:48:19.879Z | 2024-01-16T16:10:38.262Z | 2024-01-16T16:10:38.262Z | {'Vendor': 'TianoCore', 'Product': 'edk2', 'Versions': 'edk2-stable202308'} |
CVE-2023-45324 | null | null | 2023-10-06T21:35:59.764Z | 2023-11-02T13:11:35.366Z | 2024-01-02T16:18:50.177Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45774 | In fixUpIncomingShortcutInfo of ShortcutService.java, there is a possible way to view another user's image due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb | 2023-10-12T15:46:50.768Z | 2023-12-04T22:40:55.035Z | 2023-12-22T00:16:54.143Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'} |
CVE-2023-45148 | Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\Redis` and install Redis instead of Memcached. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63 | 2023-10-04T16:02:46.330Z | 2023-10-16T18:51:56.827Z | 2023-10-16T18:51:56.827Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.11, >= 26.0.0, < 26.0.6, >= 27.0.0, < 27.1.0'} |
CVE-2023-45762 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Michael Uno (miunosoft) Responsive Column Widgets.This issue affects Responsive Column Widgets: from n/a through 1.2.7.
| https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-open-redirection-vulnerability?_s_id=cve | 2023-10-12T12:45:14.808Z | 2023-12-07T12:17:42.012Z | 2023-12-07T12:17:42.012Z | {'Vendor': 'Michael Uno (miunosoft)', 'Product': 'Responsive Column Widgets', 'Versions': 'n/a'} |
CVE-2023-45332 | null | null | 2023-10-06T21:35:59.765Z | 2023-11-02T13:22:34.723Z | 2024-01-02T16:31:53.950Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45627 | An authenticated Denial-of-Service (DoS) vulnerability exists in the CLI service. Successful exploitation of this vulnerability results in the ability to interrupt the normal
operation of the affected access point.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt | 2023-10-09T16:22:24.804Z | 2023-11-14T22:59:36.788Z | 2023-11-14T22:59:36.788Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'} |
CVE-2023-45277 | Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files. | https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7 | 2023-10-06T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T16:28:18.356831 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45220 | The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. | https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | 2023-10-18T09:35:22.513Z | 2023-10-25T14:15:02.630Z | 2023-10-25T14:15:02.630Z | {'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'} |
CVE-2023-45670 | Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, the `config/save` and `config/set` endpoints of Frigate do not implement any CSRF protection. This makes it possible for a request sourced from another site to update the configuration of the Frigate server (e.g. via "drive-by" attack). Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. This issue can lead to arbitrary configuration updates for the Frigate server, resulting in denial of service and possible data exfiltration. Version 0.13.0 Beta 3 contains a patch. | https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h | 2023-10-10T14:36:40.861Z | 2023-10-30T22:38:19.118Z | 2023-12-13T19:41:30.165Z | {'Vendor': 'blakeblackshear', 'Product': 'frigate', 'Versions': '< 0.13.0-beta3'} |
CVE-2023-45559 | An issue in Tamaki_hamanoki Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | http://tamakihamanoki.com | 2023-10-09T00:00:00 | 2024-01-03T00:00:00 | 2024-01-03T14:11:46.873706 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45109 | Cross-Site Request Forgery (CSRF) vulnerability in ZAKSTAN WhitePage plugin <= 1.1.5 versions. | https://patchstack.com/database/vulnerability/white-page-publication/wordpress-whitepage-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-04T14:11:49.848Z | 2023-10-13T13:18:49.859Z | 2023-10-13T13:18:49.859Z | {'Vendor': 'ZAKSTAN', 'Product': 'WhitePage', 'Versions': 'n/a'} |
CVE-2023-45892 | An issue discovered in the Order and Invoice pages in Floorsight Insights Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information. | https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md | 2023-10-16T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T20:33:10.506891 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45484 | Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGuestBasic. | 2023-10-09T00:00:00 | 2023-11-29T00:00:00 | 2023-11-29T05:16:05.289983 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
|
CVE-2023-45607 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin <= 6.3.2 versions. | https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-09T10:11:54.307Z | 2023-10-18T13:13:17.797Z | 2023-10-18T13:13:17.797Z | {'Vendor': 'Hector Cabrera', 'Product': 'WordPress Popular Posts', 'Versions': 'n/a'} |
CVE-2023-45312 | In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability. | https://medium.com/%40_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b | 2023-10-06T00:00:00 | 2023-10-10T00:00:00 | 2023-10-10T20:34:31.476705 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45083 | An Improper Privilege Management vulnerability exists in HyperCloud that will impact the ability for a user to authenticate against the management plane.
An authenticated admin-level user may be able to delete the "admin" or "serveradmin" users, which prevents authentication from subsequently succeeding.
This issue affects HyperCloud versions 1.0 to any release before 2.1.
| https://advisories.softiron.cloud | 2023-10-03T19:37:55.180Z | 2023-12-05T16:15:07.027Z | 2023-12-05T18:16:19.841Z | {'Vendor': 'SoftIron', 'Product': 'HyperCloud', 'Versions': '1.0'} |
CVE-2023-45579 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip/type parameter of the jingx.asp function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug8.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-18T19:34:20.604248 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45129 | Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API. | https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4 | 2023-10-04T16:02:46.328Z | 2023-10-10T17:17:11.146Z | 2023-10-10T17:17:11.146Z | {'Vendor': 'matrix-org', 'Product': 'synapse', 'Versions': '< 1.94.0'} |
CVE-2023-45650 | Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <= 1.7.1.4 versions. | https://patchstack.com/database/vulnerability/html5-maps/wordpress-html5-maps-plugin-1-7-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T12:38:22.832Z | 2023-10-16T08:39:17.380Z | 2023-10-16T08:39:17.380Z | {'Vendor': 'Fla-shop.com', 'Product': 'HTML5 Maps', 'Versions': 'n/a'} |
CVE-2023-45345 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.767Z | 2023-11-02T14:02:52.659Z | 2023-11-02T14:02:52.659Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45580 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx and other parameters of the ddns.asp function | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-19T21:06:46.625577 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45996 | SQL injection vulnerability in Senayan Library Management Systems Slims v.9 and Bulian v.9.6.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the reborrowLimit parameter in the member_type.php. | https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md | 2023-10-16T00:00:00 | 2023-10-31T00:00:00 | 2023-10-31T05:27:48.515687 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45646 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Henryholtgeerts PDF Block plugin <= 1.1.0 versions. | https://patchstack.com/database/vulnerability/pdf-block/wordpress-pdf-block-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-10T09:58:47.168Z | 2023-10-24T11:22:16.621Z | 2023-10-24T11:22:16.621Z | {'Vendor': 'Henryholtgeerts', 'Product': 'PDF Block', 'Versions': 'n/a'} |
CVE-2023-45703 | HCL Launch may mishandle input validation of an uploaded archive file leading to a denial of service due to resource exhaustion.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108649 | 2023-10-10T21:26:06.755Z | 2023-12-20T23:33:08.651Z | 2023-12-20T23:33:08.651Z | {'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.0 - 7.0.5.18, 7.1 - 7.1.2.14, 7.2 - 7.2.3.7, 7.3 - 7.3.2.2'} |
CVE-2023-45353 | Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system by leveraging the Common Management Portal web interface for Authenticated remote upload and creation of arbitrary files affecting the underlying operating system. This is also known as OCMP-6591. | https://networks.unify.com/security/advisories/OBSO-2306-02.pdf | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T03:33:30.724520 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45884 | Cross Site Request Forgery (CSRF) vulnerability in NASA Open MCT (aka openmct) through 3.1.0 allows attackers to view sensitive information via the flexibleLayout plugin. | https://www.linkedin.com/pulse/xss-nasas-open-mct-v302-visionspace-technologies-ubg4f | 2023-10-15T00:00:00 | 2023-11-09T00:00:00 | 2023-11-09T16:36:49.298815 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45168 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command to execute arbitrary commands. IBM X-Force ID: 267966. | https://www.ibm.com/support/pages/node/7086090 | 2023-10-05T01:38:44.721Z | 2023-12-01T14:10:24.508Z | 2023-12-01T14:10:24.508Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45241 | Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. | https://security-advisory.acronis.com/advisories/SEC-5999 | 2023-10-05T21:47:00.378Z | 2023-10-05T21:57:23.228Z | 2023-10-05T21:57:23.228Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-45754 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Easy Testimonial Slider and Form plugin <= 1.0.18 versions. | https://patchstack.com/database/vulnerability/easy-testimonial-rotator/wordpress-easy-testimonial-slider-and-form-plugin-1-0-18-cross-site-scripting-xss?_s_id=cve | 2023-10-12T08:27:55.558Z | 2023-10-24T11:31:09.558Z | 2023-10-24T11:31:09.558Z | {'Vendor': 'I Thirteen Web Solution', 'Product': 'Easy Testimonial Slider and Form', 'Versions': 'n/a'} |
CVE-2023-45113 | null | null | 2023-10-04T14:28:12.263Z | 2023-11-02T01:45:28.083Z | 2024-01-02T19:26:38.318Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45810 | OpenFGA is a flexible authorization/permission engine built for developers and inspired by Google Zanzibar. Affected versions of OpenFGA are vulnerable to a denial of service attack. When a number of `ListObjects` calls are executed, in some scenarios, those calls are not releasing resources even after a response has been sent, and given a sufficient call volume the service as a whole becomes unresponsive. This issue has been addressed in version 1.3.4 and the upgrade is considered backwards compatible. There are no known workarounds for this vulnerability. | https://github.com/openfga/openfga/security/advisories/GHSA-hr4f-6jh8-f2vq | 2023-10-13T12:00:50.436Z | 2023-10-17T22:29:00.293Z | 2023-10-17T22:29:00.293Z | {'Vendor': 'openfga', 'Product': 'openfga', 'Versions': '< 1.3.4'} |
CVE-2023-45955 | An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands. | https://github.com/IoT-Fuzz/IoT-Fuzz/blob/main/Nanoleaf%20Lightstrip%20Vulnerability%20Report.pdf | 2023-10-16T00:00:00 | 2023-10-31T00:00:00 | 2023-10-31T17:24:37.268031 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45056 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 100plugins Open User Map plugin <= 1.3.26 versions. | https://patchstack.com/database/vulnerability/open-user-map/wordpress-open-user-map-plugin-1-3-24-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:31:00.205Z | 2023-10-18T08:14:22.853Z | 2023-10-18T08:14:22.853Z | {'Vendor': '100plugins', 'Product': 'Open User Map', 'Versions': 'n/a'} |
CVE-2023-45685 | Insufficient path validation when extracting a zip archive in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal | https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ | 2023-10-10T19:07:28.770Z | 2023-10-16T16:08:25.668Z | 2023-10-16T16:08:25.668Z | {'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'} |
CVE-2023-45847 | Mattermost fails to to check the length when setting the title in a run checklist in Playbooks, allowing an attacker to send a specially crafted request and crash the Playbooks plugin
| https://mattermost.com/security-updates | 2023-12-05T08:04:35.036Z | 2023-12-12T08:17:10.088Z | 2023-12-12T08:17:10.088Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.2.2, 8.1.6, 9.0.4, 9.1.3'} |
CVE-2023-45144 | com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade. | https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh | 2023-10-04T16:02:46.330Z | 2023-10-16T20:32:50.376Z | 2023-10-16T20:32:50.376Z | {'Vendor': 'xwikisas', 'Product': 'identity-oauth', 'Versions': '>= 1.0, < 1.6'} |
CVE-2023-45001 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Castos Seriously Simple Stats allows SQL Injection.This issue affects Seriously Simple Stats: from n/a through 1.5.0.
| https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-0-sql-injection-vulnerability?_s_id=cve | 2023-10-02T09:38:28.136Z | 2023-11-06T08:20:44.318Z | 2023-11-06T08:20:44.318Z | {'Vendor': 'Castos', 'Product': 'Seriously Simple Stats', 'Versions': 'n/a'} |
CVE-2023-45902 | Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/attachment/delete. | https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20attachment%20management%20deletion%20function.md | 2023-10-16T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T13:12:03.395652 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45282 | In NASA Open MCT (aka openmct) before 3.1.0, prototype pollution can occur via an import action. | https://nasa.github.io/openmct/ | 2023-10-06T00:00:00 | 2023-10-06T00:00:00 | 2023-10-15T18:10:16.211059 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45328 | null | null | 2023-10-06T21:35:59.764Z | 2023-11-02T13:16:36.004Z | 2024-01-02T20:08:45.338Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45797 | A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. | https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&nttId=71023&menuNo=205020 | 2023-10-13T08:01:54.363Z | 2023-10-30T06:16:42.457Z | 2023-10-30T18:54:00.000Z | {'Vendor': 'Dream Security', 'Product': 'MagicLine4NX', 'Versions': '1.0.0.1'} |
CVE-2023-45152 | Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication. | https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf | 2023-10-04T16:02:46.331Z | 2023-10-16T23:34:28.735Z | 2023-10-16T23:34:28.735Z | {'Vendor': 'engelsystem', 'Product': 'engelsystem', 'Versions': '< ee7d30b33'} |
CVE-2023-45851 | The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.
This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device | https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | 2023-10-18T09:35:22.524Z | 2023-10-25T14:18:08.811Z | 2023-10-25T14:18:08.811Z | {'Vendor': 'Bosch Rexroth AG', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'} |
CVE-2023-45017 | null | null | 2023-10-02T16:00:40.527Z | 2023-11-02T02:16:29.192Z | 2024-01-02T19:05:50.297Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45781 | In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6 | 2023-10-12T15:46:50.769Z | 2023-12-04T22:40:55.978Z | 2023-12-22T00:16:56.183Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12'} |
CVE-2023-45806 | Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, if a user has been quoted and uses a `|` in their full name, they might be able to trigger a bug that generates a lot of duplicate content in all the posts they've been quoted by updating their full name again. Version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches contain a patch for this issue. No known workaround exists, although one can stop the "bleeding" by ensuring users only use alphanumeric characters in their full name field. | https://github.com/discourse/discourse/security/advisories/GHSA-hcgf-hg2g-mw78 | 2023-10-13T12:00:50.436Z | 2023-11-10T14:43:37.657Z | 2023-11-10T15:11:12.245Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.3, >= 3.2.0.beta0, < 3.2.0.beta3'} |
CVE-2023-45105 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in SERVIT Software Solutions affiliate-toolkit – WordPress Affiliate Plugin.This issue affects affiliate-toolkit – WordPress Affiliate Plugin: from n/a through 3.3.9.
| https://patchstack.com/database/vulnerability/affiliate-toolkit-starter/wordpress-affiliate-toolkit-wordpress-affiliate-plugin-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve | 2023-10-04T14:11:49.848Z | 2023-12-19T19:48:25.903Z | 2023-12-19T19:48:25.903Z | {'Vendor': 'SERVIT Software Solutions', 'Product': 'affiliate-toolkit – WordPress Affiliate Plugin', 'Versions': 'n/a'} |
CVE-2023-45555 | File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker to execute arbitrary code via a crafted file to the down_url function in zzz.php file. | https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md | 2023-10-09T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T22:06:07.858113 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45040 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
| https://www.qnap.com/en/security-advisory/qsa-23-27 | 2023-10-03T08:58:16.879Z | 2024-01-05T16:18:41.220Z | 2024-01-05T16:18:41.220Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QTS', 'Versions': '5.1.x'} |
CVE-2023-45369 | An issue was discovered in the PageTriage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. Usernames of hidden users are exposed. | https://phabricator.wikimedia.org/T344359 | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T05:33:06.717784 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45386 | In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().' | https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html | 2023-10-09T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T04:59:30.936295 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45387 | In the module "Product Catalog (CSV, Excel, XML) Export PRO" (exportproducts) in versions up to 5.0.0 from MyPrestaModules for PrestaShop, a guest can perform SQL injection via `exportProduct::_addDataToDb().` | https://addons.prestashop.com/en/data-import-export/18662-product-catalog-csv-excel-xml-export-pro.html | 2023-10-09T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T01:50:04.494146 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45807 | OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue. | https://github.com/opensearch-project/security/security/advisories/GHSA-72q2-gwwf-6hrv | 2023-10-13T12:00:50.436Z | 2023-10-16T21:33:23.124Z | 2023-10-16T21:33:23.124Z | {'Vendor': 'opensearch-project', 'Product': 'security', 'Versions': '< 1.3.14.0, >= 2.0.0.0, < 2.11.0.0'} |
CVE-2023-45554 | File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker to execute arbitrary code via modification of the imageext parameter from jpg, jpeg,gif, and png to jpg, jpeg,gif, png, pphphp. | https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md | 2023-10-09T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T22:01:23.140430 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45041 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
| https://www.qnap.com/en/security-advisory/qsa-23-27 | 2023-10-03T08:58:16.880Z | 2024-01-05T16:18:46.583Z | 2024-01-05T16:18:46.583Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'} |
CVE-2023-45780 | In Print Service, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | https://source.android.com/docs/security/bulletin/android-14 | 2023-10-12T15:46:50.769Z | 2023-10-30T17:01:39.813Z | 2023-10-30T17:01:39.813Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-45016 | null | null | 2023-10-02T16:00:40.527Z | 2023-11-02T02:15:45.269Z | 2024-01-02T19:02:50.498Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45283 | The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other effects). The previous behavior has been restored. | https://go.dev/issue/63713 | 2023-10-06T17:06:26.220Z | 2023-11-09T16:30:12.395Z | 2023-12-06T16:27:23.552Z | {'Vendor': 'Go standard library', 'Product': 'path/filepath', 'Versions': '0, 1.21.0-0'} |
CVE-2023-45779 | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://source.android.com/security/bulletin/2023-12-01 | 2023-10-12T15:46:50.769Z | 2023-12-04T22:40:55.784Z | 2024-01-26T22:08:13.929Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'} |
CVE-2023-45329 | null | null | 2023-10-06T21:35:59.764Z | 2023-11-02T13:18:42.114Z | 2024-01-02T16:28:27.178Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45145 | Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory. | https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx | 2023-10-04T16:02:46.330Z | 2023-10-18T20:17:08.588Z | 2023-10-18T20:17:08.588Z | {'Vendor': 'redis', 'Product': 'redis', 'Versions': '>= 2.6.0-rc1, < 6.2.14, >= 7.0.0, < 7.0.14, >= 7.1.0, < 7.2.2'} |
CVE-2023-45903 | Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/label/delete. | https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20label%20management%20deletion%20function.md | 2023-10-16T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T13:12:02.597883 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.