CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-45130
Frontier is Substrate's Ethereum compatibility layer. Prior to commit aea528198b3b226e0d20cce878551fd4c0e3d5d0, at the end of a contract execution, when opcode SUICIDE marks a contract to be deleted, the software uses `storage::remove_prefix` (now renamed to `storage::clear_prefix`) to remove all storages associated with it. This is a single IO primitive call passing the WebAssembly boundary. For large contracts, the call (without providing a `limit` parameter) can be slow. In addition, for parachains, all storages to be deleted will be part of the PoV, which easily exceed relay chain PoV size limit. On the other hand, Frontier's maintainers only charge a fixed cost for opcode SUICIDE. The maintainers consider the severity of this issue high, because an attacker can craft a contract with a lot of storage values on a parachain, and then call opcode SUICIDE on the contract. If the transaction makes into a parachain block, the parachain will then stall because the PoV size will exceed relay chain's limit. This is especially an issue for XCM transactions, because they can't be skipped. Commit aea528198b3b226e0d20cce878551fd4c0e3d5d0 contains a patch for this issue. For parachains, it's recommended to issue an emergency runtime upgrade as soon as possible. For standalone chains, the impact is less severe because the issue mainly affects PoV sizes. It's recommended to issue a normal runtime upgrade as soon as possible. There are no known workarounds.
https://github.com/paritytech/frontier/security/advisories/GHSA-gc88-2gvv-gp3v
2023-10-04T16:02:46.328Z
2023-10-13T12:14:15.105Z
2023-10-13T12:14:15.105Z
{'Vendor': 'paritytech', 'Product': 'frontier', 'Versions': '<= 0.1.0'}
CVE-2023-45075
A memory leakage vulnerability was reported in the SWSMI_Shadow DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-10-03T17:36:49.034Z
2023-11-08T22:27:32.659Z
2023-11-08T22:27:32.659Z
{'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'}
CVE-2023-45167
IBM AIX's 7.3 Python implementation could allow a non-privileged local user to exploit a vulnerability to cause a denial of service. IBM X-Force ID: 267965.
https://www.ibm.com/support/pages/node/7068084
2023-10-05T01:38:44.721Z
2023-11-10T03:52:10.595Z
2023-11-10T03:52:10.595Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.3'}
CVE-2023-45864
A race condition issue discovered in Samsung Mobile Processor Exynos 9820, 980, 1080, 2100, 2200, 1280, and 1380 allows unintended modifications of values within certain areas.
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-10-14T00:00:00
2023-12-13T00:00:00
2023-12-13T01:03:29.295938
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45665
null
null
2023-10-10T14:36:40.860Z
null
2023-10-19T16:52:38.336Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45235
EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
2023-10-05T20:48:19.879Z
2024-01-16T16:11:41.215Z
2024-01-16T16:11:41.215Z
{'Vendor': 'TianoCore', 'Product': 'edk2', 'Versions': 'edk2-stable202308'}
CVE-2023-45370
An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. SportsTeams: Special:SportsManagerLogo and Special:SportsTeamsManagerLogo do not check for the sportsteamsmanager user right, and thus an attacker may be able to affect pages that are concerned with sports teams.
https://phabricator.wikimedia.org/T345680
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T05:32:56.540857
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45059
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Gumroad plugin <= 3.1.0 versions.
https://patchstack.com/database/vulnerability/gumroad/wordpress-gumroad-plugin-3-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:31:00.205Z
2023-10-18T08:23:02.962Z
2023-10-18T08:23:02.962Z
{'Vendor': 'Gumroad', 'Product': 'Gumroad', 'Versions': 'n/a'}
CVE-2023-45798
In Yettiesoft VestCert versions 2.36 to 2.5.29, a vulnerability exists due to improper validation of third-party modules. This allows malicious actors to load arbitrary third-party modules, leading to remote code execution.
https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&nttId=71008&menuNo=205020
2023-10-13T08:01:54.364Z
2023-10-30T06:17:14.332Z
2023-10-30T06:17:14.332Z
{'Vendor': 'Yettiesoft', 'Product': 'VestCert', 'Versions': '2.3.6'}
CVE-2023-45632
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WebDorado SpiderVPlayer plugin <= 1.5.22 versions.
https://patchstack.com/database/vulnerability/player/wordpress-spidervplayer-plugin-1-5-22-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-10T07:47:54.381Z
2023-10-18T13:35:58.871Z
2023-10-18T13:35:58.871Z
{'Vendor': 'WebDorado', 'Product': 'SpiderVPlayer', 'Versions': 'n/a'}
CVE-2023-45327
null
null
2023-10-06T21:35:59.764Z
2023-11-02T13:15:36.249Z
2024-01-02T20:09:31.555Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45777
In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to launch arbitrary activities using system privileges due to Parcel Mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6
2023-10-12T15:46:50.768Z
2023-12-04T22:40:55.603Z
2023-12-22T00:16:55.358Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13'}
CVE-2023-45624
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
2023-10-09T16:22:24.804Z
2023-11-14T22:57:05.727Z
2023-11-14T22:57:05.727Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'}
CVE-2023-45274
Cross-Site Request Forgery (CSRF) vulnerability in SendPulse SendPulse Free Web Push plugin <= 1.3.1 versions.
https://patchstack.com/database/vulnerability/sendpulse-web-push/wordpress-sendpulse-free-web-push-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-06T13:05:32.934Z
2023-10-16T08:21:37.194Z
2023-10-16T08:21:37.194Z
{'Vendor': 'SendPulse', 'Product': 'SendPulse Free Web Push', 'Versions': 'n/a'}
CVE-2023-45761
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Joovii Sendle Shipping Plugin plugin <= 5.13 versions.
https://patchstack.com/database/vulnerability/official-sendle-shipping-method/wordpress-sendle-shipping-plugin-5-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-12T12:45:14.808Z
2023-10-24T11:55:21.724Z
2023-10-24T11:55:21.724Z
{'Vendor': 'Joovii', 'Product': 'Sendle Shipping Plugin', 'Versions': 'n/a'}
CVE-2023-45331
null
null
2023-10-06T21:35:59.765Z
2023-11-02T13:21:52.472Z
2024-01-02T16:30:54.366Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45018
Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the includes/login.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/oconnor
2023-10-02T16:00:40.527Z
2023-11-02T02:17:35.072Z
2023-11-02T02:17:35.072Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Bus Booking System', 'Versions': '1.0'}
CVE-2023-45223
Mattermost fails to properly validate the "Show Full Name" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled. 
https://mattermost.com/security-updates
2023-11-20T12:06:31.664Z
2023-11-27T09:06:34.489Z
2023-11-27T09:06:34.489Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.13, 8.1.4'}
CVE-2023-45809
Wagtail is an open source content management system built on Django. A user with a limited-permission editor account for the Wagtail admin can make a direct URL request to the admin view that handles bulk actions on user accounts. While authentication rules prevent the user from making any changes, the error message discloses the display names of user accounts, and by modifying URL parameters, the user can retrieve the display name for any user. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 4.1.8 (LTS), 5.0.5 and 5.1.3. The fix is also included in Release Candidate 1 of the forthcoming Wagtail 5.2 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/wagtail/wagtail/security/advisories/GHSA-fc75-58r8-rm3h
2023-10-13T12:00:50.436Z
2023-10-19T18:33:26.176Z
2023-10-19T18:33:26.176Z
{'Vendor': 'wagtail', 'Product': 'wagtail', 'Versions': '< 4.1.9, >= 5.0.0, < 5.0.5, >= 5.1.0, < 5.1.3'}
CVE-2023-45467
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ntpServIP parameter in the Time Settings.
https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T12:45:43.787448
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45172
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in AIX windows to cause a denial of service. IBM X-Force ID: 267970.
https://www.ibm.com/support/pages/node/7099314
2023-10-05T01:38:44.722Z
2023-12-19T22:12:21.055Z
2023-12-19T22:12:21.055Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45871
An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
2023-10-15T00:00:00
2023-10-15T00:00:00
2024-01-11T19:07:05.019133
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45349
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.34.7, 4000 Assistant V10 R1.42.0, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.34.7, 4000 Manager V10 R1.42.0, and 4000 Manager V10 R0 expose sensitive information that may allow lateral movement to the backup system via AShbr. This is also known as OSFOURK-23722.
https://networks.unify.com/security/advisories/OBSO-2306-01.pdf
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T03:36:50.952663
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45060
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com Interactive World Map plugin <= 3.2.0 versions.
https://patchstack.com/database/vulnerability/interactive-world-map/wordpress-interactive-world-map-plugin-3-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-03T13:31:00.205Z
2023-10-12T12:38:20.389Z
2023-10-12T12:38:20.389Z
{'Vendor': 'Fla-shop.com', 'Product': 'Interactive World Map', 'Versions': 'n/a'}
CVE-2023-45826
Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/Leantime/leantime/security/advisories/GHSA-559g-3h98-g3fj
2023-10-13T12:00:50.439Z
2023-10-19T18:28:54.167Z
2023-10-19T18:28:54.167Z
{'Vendor': 'Leantime', 'Product': 'leantime', 'Versions': '< 2.4-beta-4'}
CVE-2023-45125
null
null
2023-10-04T14:28:12.265Z
2023-12-21T18:53:53.289Z
2024-01-02T14:09:44.759Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45575
Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip parameter of the ip_position.asp function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug5.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-18T18:45:00.944649
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45076
A memory leakage vulnerability was reported in the 534D0140 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-10-03T17:36:49.034Z
2023-11-08T22:28:20.459Z
2023-11-08T22:28:20.459Z
{'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'}
CVE-2023-45133
Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any "polyfill provider" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/[email protected]` and `@babel/[email protected]`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3.
https://github.com/babel/babel/security/advisories/GHSA-67hx-6x53-jw92
2023-10-04T16:02:46.328Z
2023-10-12T16:17:08.624Z
2023-10-12T16:17:08.624Z
{'Vendor': 'babel', 'Product': 'babel', 'Versions': '< 7.23.2, >= 8.0.0-alpha.0, < 8.0.0-alpha.4'}
CVE-2023-45830
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.
https://patchstack.com/database/vulnerability/online-accessibility/wordpress-accessibility-suite-by-online-ada-plugin-4-11-sql-injection-vulnerability?_s_id=cve
2023-10-13T13:20:17.574Z
2023-11-06T08:57:32.818Z
2023-11-06T08:57:32.818Z
{'Vendor': 'Online ADA', 'Product': 'Accessibility Suite by Online ADA', 'Versions': 'n/a'}
CVE-2023-45758
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi Amministrazione Trasparente plugin <= 8.0.2 versions.
https://patchstack.com/database/vulnerability/amministrazione-trasparente/wordpress-amministrazione-trasparente-plugin-8-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-12T12:45:14.807Z
2023-10-24T11:44:12.966Z
2023-10-24T11:44:12.966Z
{'Vendor': 'Marco Milesi', 'Product': 'Amministrazione Trasparente', 'Versions': 'n/a'}
CVE-2023-45471
The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.
https://github.com/itsAptx/CVE-2023-45471
2023-10-09T00:00:00
2023-10-20T00:00:00
2023-10-20T03:42:30.921001
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45867
ILIAS (2013-09-12 release) contains a medium-criticality Directory Traversal local file inclusion vulnerability in the ScormAicc module. An attacker with a privileged account, typically holding the tutor role, can exploit this to gain unauthorized access to and potentially retrieve confidential files stored on the web server. The attacker can access files that are readable by the web server user www-data; this may include sensitive configuration files and documents located outside the documentRoot. The vulnerability is exploited by an attacker who manipulates the file parameter in a URL, inserting directory traversal sequences in order to access unauthorized files. This manipulation allows the attacker to retrieve sensitive files, such as /etc/passwd, potentially compromising the system's security. This issue poses a significant risk to confidentiality and is remotely exploitable over the internet.
https://rehmeinfosec.de
2023-10-14T00:00:00
2023-10-26T00:00:00
2023-10-26T14:59:11.880529
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45723
HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability.  Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-10-10T21:26:10.163Z
2024-01-03T02:50:02.258Z
2024-01-03T02:50:02.258Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-45689
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal
https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
2023-10-10T19:07:28.771Z
2023-10-16T16:19:08.287Z
2023-10-16T16:19:08.287Z
{'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'}
CVE-2023-45373
An issue was discovered in the ProofreadPage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. XSS can occur via formatNumNoSeparators.
https://phabricator.wikimedia.org/T345693
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T05:32:30.576234
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45666
stb_image is a single file MIT licensed library for processing images. It may look like `stbi__load_gif_main` doesn’t give guarantees about the content of output value `*delays` upon failure. Although it sets `*delays` to zero at the beginning, it doesn’t do it in case the image is not recognized as GIF and a call to `stbi__load_gif_main_outofmem` only frees possibly allocated memory in `*delays` without resetting it to zero. Thus it would be fair to say the caller of `stbi__load_gif_main` is responsible to free the allocated memory in `*delays` only if `stbi__load_gif_main` returns a non null value. However at the same time the function may return null value, but fail to free the memory in `*delays` if internally `stbi__convert_format` is called and fails. Thus the issue may lead to a memory leak if the caller chooses to free `delays` only when `stbi__load_gif_main` didn’t fail or to a double-free if the `delays` is always freed
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
2023-10-10T14:36:40.860Z
2023-10-20T23:26:42.620Z
2023-10-20T23:26:42.620Z
{'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 2.28'}
CVE-2023-45236
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
2023-10-05T20:48:19.879Z
2024-01-16T16:10:38.262Z
2024-01-16T16:10:38.262Z
{'Vendor': 'TianoCore', 'Product': 'edk2', 'Versions': 'edk2-stable202308'}
CVE-2023-45324
null
null
2023-10-06T21:35:59.764Z
2023-11-02T13:11:35.366Z
2024-01-02T16:18:50.177Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45774
In fixUpIncomingShortcutInfo of ShortcutService.java, there is a possible way to view another user's image due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/f229f0e55b07416badaca0e3493db5af0943c9eb
2023-10-12T15:46:50.768Z
2023-12-04T22:40:55.035Z
2023-12-22T00:16:54.143Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'}
CVE-2023-45148
Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\OC\Memcache\Redis` and install Redis instead of Memcached.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-xmhp-7vr4-hp63
2023-10-04T16:02:46.330Z
2023-10-16T18:51:56.827Z
2023-10-16T18:51:56.827Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.11, >= 26.0.0, < 26.0.6, >= 27.0.0, < 27.1.0'}
CVE-2023-45762
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Michael Uno (miunosoft) Responsive Column Widgets.This issue affects Responsive Column Widgets: from n/a through 1.2.7.
https://patchstack.com/database/vulnerability/responsive-column-widgets/wordpress-responsive-column-widgets-plugin-1-2-7-open-redirection-vulnerability?_s_id=cve
2023-10-12T12:45:14.808Z
2023-12-07T12:17:42.012Z
2023-12-07T12:17:42.012Z
{'Vendor': 'Michael Uno (miunosoft)', 'Product': 'Responsive Column Widgets', 'Versions': 'n/a'}
CVE-2023-45332
null
null
2023-10-06T21:35:59.765Z
2023-11-02T13:22:34.723Z
2024-01-02T16:31:53.950Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45627
An authenticated Denial-of-Service (DoS) vulnerability exists in the CLI service. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
2023-10-09T16:22:24.804Z
2023-11-14T22:59:36.788Z
2023-11-14T22:59:36.788Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'}
CVE-2023-45277
Yamcs 5.8.6 is vulnerable to directory traversal (issue 1 of 2). The vulnerability is in the storage functionality of the API and allows one to escape the base directory of the buckets, freely navigate system directories, and read arbitrary files.
https://github.com/yamcs/yamcs/compare/yamcs-5.8.6...yamcs-5.8.7
2023-10-06T00:00:00
2023-10-19T00:00:00
2023-10-19T16:28:18.356831
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45220
The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user.
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
2023-10-18T09:35:22.513Z
2023-10-25T14:15:02.630Z
2023-10-25T14:15:02.630Z
{'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'}
CVE-2023-45670
Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, the `config/save` and `config/set` endpoints of Frigate do not implement any CSRF protection. This makes it possible for a request sourced from another site to update the configuration of the Frigate server (e.g. via "drive-by" attack). Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. This issue can lead to arbitrary configuration updates for the Frigate server, resulting in denial of service and possible data exfiltration. Version 0.13.0 Beta 3 contains a patch.
https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h
2023-10-10T14:36:40.861Z
2023-10-30T22:38:19.118Z
2023-12-13T19:41:30.165Z
{'Vendor': 'blakeblackshear', 'Product': 'frigate', 'Versions': '< 0.13.0-beta3'}
CVE-2023-45559
An issue in Tamaki_hamanoki Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
http://tamakihamanoki.com
2023-10-09T00:00:00
2024-01-03T00:00:00
2024-01-03T14:11:46.873706
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45109
Cross-Site Request Forgery (CSRF) vulnerability in ZAKSTAN WhitePage plugin <= 1.1.5 versions.
https://patchstack.com/database/vulnerability/white-page-publication/wordpress-whitepage-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-04T14:11:49.848Z
2023-10-13T13:18:49.859Z
2023-10-13T13:18:49.859Z
{'Vendor': 'ZAKSTAN', 'Product': 'WhitePage', 'Versions': 'n/a'}
CVE-2023-45892
An issue discovered in the Order and Invoice pages in Floorsight Insights Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information.
https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md
2023-10-16T00:00:00
2024-01-02T00:00:00
2024-01-02T20:33:10.506891
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45484
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the shareSpeed parameter in the function fromSetWifiGuestBasic.
https://github.com/l3m0n…stBasic_code.png
2023-10-09T00:00:00
2023-11-29T00:00:00
2023-11-29T05:16:05.289983
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45607
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin <= 6.3.2 versions.
https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-6-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-09T10:11:54.307Z
2023-10-18T13:13:17.797Z
2023-10-18T13:13:17.797Z
{'Vendor': 'Hector Cabrera', 'Product': 'WordPress Popular Posts', 'Versions': 'n/a'}
CVE-2023-45312
In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.
https://medium.com/%40_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b
2023-10-06T00:00:00
2023-10-10T00:00:00
2023-10-10T20:34:31.476705
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45083
An Improper Privilege Management vulnerability exists in HyperCloud that will impact the ability for a user to authenticate against the management plane. An authenticated admin-level user may be able to delete the "admin" or "serveradmin" users, which prevents authentication from subsequently succeeding. This issue affects HyperCloud versions 1.0 to any release before 2.1.
https://advisories.softiron.cloud
2023-10-03T19:37:55.180Z
2023-12-05T16:15:07.027Z
2023-12-05T18:16:19.841Z
{'Vendor': 'SoftIron', 'Product': 'HyperCloud', 'Versions': '1.0'}
CVE-2023-45579
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the ip/type parameter of the jingx.asp function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug8.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-18T19:34:20.604248
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45129
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API.
https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4
2023-10-04T16:02:46.328Z
2023-10-10T17:17:11.146Z
2023-10-10T17:17:11.146Z
{'Vendor': 'matrix-org', 'Product': 'synapse', 'Versions': '< 1.94.0'}
CVE-2023-45650
Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <= 1.7.1.4 versions.
https://patchstack.com/database/vulnerability/html5-maps/wordpress-html5-maps-plugin-1-7-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T12:38:22.832Z
2023-10-16T08:39:17.380Z
2023-10-16T08:39:17.380Z
{'Vendor': 'Fla-shop.com', 'Product': 'HTML5 Maps', 'Versions': 'n/a'}
CVE-2023-45345
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.767Z
2023-11-02T14:02:52.659Z
2023-11-02T14:02:52.659Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45580
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wild/mx and other parameters of the ddns.asp function
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug6.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-19T21:06:46.625577
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45996
SQL injection vulnerability in Senayan Library Management Systems Slims v.9 and Bulian v.9.6.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the reborrowLimit parameter in the member_type.php.
https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-member_type.md
2023-10-16T00:00:00
2023-10-31T00:00:00
2023-10-31T05:27:48.515687
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45646
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Henryholtgeerts PDF Block plugin <= 1.1.0 versions.
https://patchstack.com/database/vulnerability/pdf-block/wordpress-pdf-block-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-10T09:58:47.168Z
2023-10-24T11:22:16.621Z
2023-10-24T11:22:16.621Z
{'Vendor': 'Henryholtgeerts', 'Product': 'PDF Block', 'Versions': 'n/a'}
CVE-2023-45703
HCL Launch may mishandle input validation of an uploaded archive file leading to a denial of service due to resource exhaustion.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108649
2023-10-10T21:26:06.755Z
2023-12-20T23:33:08.651Z
2023-12-20T23:33:08.651Z
{'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.0 - 7.0.5.18, 7.1 - 7.1.2.14, 7.2 - 7.2.3.7, 7.3 - 7.3.2.2'}
CVE-2023-45353
Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system by leveraging the Common Management Portal web interface for Authenticated remote upload and creation of arbitrary files affecting the underlying operating system. This is also known as OCMP-6591.
https://networks.unify.com/security/advisories/OBSO-2306-02.pdf
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T03:33:30.724520
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45884
Cross Site Request Forgery (CSRF) vulnerability in NASA Open MCT (aka openmct) through 3.1.0 allows attackers to view sensitive information via the flexibleLayout plugin.
https://www.linkedin.com/pulse/xss-nasas-open-mct-v302-visionspace-technologies-ubg4f
2023-10-15T00:00:00
2023-11-09T00:00:00
2023-11-09T16:36:49.298815
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45168
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command to execute arbitrary commands. IBM X-Force ID: 267966.
https://www.ibm.com/support/pages/node/7086090
2023-10-05T01:38:44.721Z
2023-12-01T14:10:24.508Z
2023-12-01T14:10:24.508Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45241
Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
https://security-advisory.acronis.com/advisories/SEC-5999
2023-10-05T21:47:00.378Z
2023-10-05T21:57:23.228Z
2023-10-05T21:57:23.228Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-45754
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Easy Testimonial Slider and Form plugin <= 1.0.18 versions.
https://patchstack.com/database/vulnerability/easy-testimonial-rotator/wordpress-easy-testimonial-slider-and-form-plugin-1-0-18-cross-site-scripting-xss?_s_id=cve
2023-10-12T08:27:55.558Z
2023-10-24T11:31:09.558Z
2023-10-24T11:31:09.558Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'Easy Testimonial Slider and Form', 'Versions': 'n/a'}
CVE-2023-45113
null
null
2023-10-04T14:28:12.263Z
2023-11-02T01:45:28.083Z
2024-01-02T19:26:38.318Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45810
OpenFGA is a flexible authorization/permission engine built for developers and inspired by Google Zanzibar. Affected versions of OpenFGA are vulnerable to a denial of service attack. When a number of `ListObjects` calls are executed, in some scenarios, those calls are not releasing resources even after a response has been sent, and given a sufficient call volume the service as a whole becomes unresponsive. This issue has been addressed in version 1.3.4 and the upgrade is considered backwards compatible. There are no known workarounds for this vulnerability.
https://github.com/openfga/openfga/security/advisories/GHSA-hr4f-6jh8-f2vq
2023-10-13T12:00:50.436Z
2023-10-17T22:29:00.293Z
2023-10-17T22:29:00.293Z
{'Vendor': 'openfga', 'Product': 'openfga', 'Versions': '< 1.3.4'}
CVE-2023-45955
An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands.
https://github.com/IoT-Fuzz/IoT-Fuzz/blob/main/Nanoleaf%20Lightstrip%20Vulnerability%20Report.pdf
2023-10-16T00:00:00
2023-10-31T00:00:00
2023-10-31T17:24:37.268031
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45056
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 100plugins Open User Map plugin <= 1.3.26 versions.
https://patchstack.com/database/vulnerability/open-user-map/wordpress-open-user-map-plugin-1-3-24-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:31:00.205Z
2023-10-18T08:14:22.853Z
2023-10-18T08:14:22.853Z
{'Vendor': '100plugins', 'Product': 'Open User Map', 'Versions': 'n/a'}
CVE-2023-45685
Insufficient path validation when extracting a zip archive in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal
https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
2023-10-10T19:07:28.770Z
2023-10-16T16:08:25.668Z
2023-10-16T16:08:25.668Z
{'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'}
CVE-2023-45847
Mattermost fails to to check the length when setting the title in a run checklist in Playbooks, allowing an attacker to send a specially crafted request and crash the Playbooks plugin
https://mattermost.com/security-updates
2023-12-05T08:04:35.036Z
2023-12-12T08:17:10.088Z
2023-12-12T08:17:10.088Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.2.2, 8.1.6, 9.0.4, 9.1.3'}
CVE-2023-45144
com.xwiki.identity-oauth:identity-oauth-ui is a package to aid in building identity and service providers based on OAuth authorizations. When a user logs in via the OAuth method, the identityOAuth parameters sent in the GET request is vulnerable to cross site scripting (XSS) and XWiki syntax injection. This allows remote code execution via the groovy macro and thus affects the confidentiality, integrity and availability of the whole XWiki installation. The issue has been fixed in Identity OAuth version 1.6. There are no known workarounds for this vulnerability and users are advised to upgrade.
https://github.com/xwikisas/identity-oauth/security/advisories/GHSA-h2rm-29ch-wfmh
2023-10-04T16:02:46.330Z
2023-10-16T20:32:50.376Z
2023-10-16T20:32:50.376Z
{'Vendor': 'xwikisas', 'Product': 'identity-oauth', 'Versions': '>= 1.0, < 1.6'}
CVE-2023-45001
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Castos Seriously Simple Stats allows SQL Injection.This issue affects Seriously Simple Stats: from n/a through 1.5.0.
https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-0-sql-injection-vulnerability?_s_id=cve
2023-10-02T09:38:28.136Z
2023-11-06T08:20:44.318Z
2023-11-06T08:20:44.318Z
{'Vendor': 'Castos', 'Product': 'Seriously Simple Stats', 'Versions': 'n/a'}
CVE-2023-45902
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/attachment/delete.
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20attachment%20management%20deletion%20function.md
2023-10-16T00:00:00
2023-10-17T00:00:00
2023-10-17T13:12:03.395652
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45282
In NASA Open MCT (aka openmct) before 3.1.0, prototype pollution can occur via an import action.
https://nasa.github.io/openmct/
2023-10-06T00:00:00
2023-10-06T00:00:00
2023-10-15T18:10:16.211059
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45328
null
null
2023-10-06T21:35:59.764Z
2023-11-02T13:16:36.004Z
2024-01-02T20:08:45.338Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45797
A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code.
https://www.boho.or.kr/kr/bbs/view.do?bbsId=B0000133&nttId=71023&menuNo=205020
2023-10-13T08:01:54.363Z
2023-10-30T06:16:42.457Z
2023-10-30T18:54:00.000Z
{'Vendor': 'Dream Security', 'Product': 'MagicLine4NX', 'Versions': '1.0.0.1'}
CVE-2023-45152
Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf
2023-10-04T16:02:46.331Z
2023-10-16T23:34:28.735Z
2023-10-16T23:34:28.735Z
{'Vendor': 'engelsystem', 'Product': 'engelsystem', 'Versions': '< ee7d30b33'}
CVE-2023-45851
The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.  This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
2023-10-18T09:35:22.524Z
2023-10-25T14:18:08.811Z
2023-10-25T14:18:08.811Z
{'Vendor': 'Bosch Rexroth AG', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'}
CVE-2023-45017
null
null
2023-10-02T16:00:40.527Z
2023-11-02T02:16:29.192Z
2024-01-02T19:05:50.297Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45781
In parse_gap_data of utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/a218e5be5e4049eae3b321f2a535a128d65d00b6
2023-10-12T15:46:50.769Z
2023-12-04T22:40:55.978Z
2023-12-22T00:16:56.183Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12'}
CVE-2023-45806
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, if a user has been quoted and uses a `|` in their full name, they might be able to trigger a bug that generates a lot of duplicate content in all the posts they've been quoted by updating their full name again. Version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches contain a patch for this issue. No known workaround exists, although one can stop the "bleeding" by ensuring users only use alphanumeric characters in their full name field.
https://github.com/discourse/discourse/security/advisories/GHSA-hcgf-hg2g-mw78
2023-10-13T12:00:50.436Z
2023-11-10T14:43:37.657Z
2023-11-10T15:11:12.245Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.3, >= 3.2.0.beta0, < 3.2.0.beta3'}
CVE-2023-45105
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in SERVIT Software Solutions affiliate-toolkit – WordPress Affiliate Plugin.This issue affects affiliate-toolkit – WordPress Affiliate Plugin: from n/a through 3.3.9.
https://patchstack.com/database/vulnerability/affiliate-toolkit-starter/wordpress-affiliate-toolkit-wordpress-affiliate-plugin-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve
2023-10-04T14:11:49.848Z
2023-12-19T19:48:25.903Z
2023-12-19T19:48:25.903Z
{'Vendor': 'SERVIT Software Solutions', 'Product': 'affiliate-toolkit – WordPress Affiliate Plugin', 'Versions': 'n/a'}
CVE-2023-45555
File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker to execute arbitrary code via a crafted file to the down_url function in zzz.php file.
https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md
2023-10-09T00:00:00
2023-10-24T00:00:00
2023-10-24T22:06:07.858113
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45040
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
https://www.qnap.com/en/security-advisory/qsa-23-27
2023-10-03T08:58:16.879Z
2024-01-05T16:18:41.220Z
2024-01-05T16:18:41.220Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QTS', 'Versions': '5.1.x'}
CVE-2023-45369
An issue was discovered in the PageTriage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. Usernames of hidden users are exposed.
https://phabricator.wikimedia.org/T344359
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T05:33:06.717784
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45386
In the module extratabspro before version 2.2.8 from MyPresta.eu for PrestaShop, a guest can perform SQL injection via `extratabspro::searchcategory()`, `extratabspro::searchproduct()` and `extratabspro::searchmanufacturer().'
https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html
2023-10-09T00:00:00
2023-10-17T00:00:00
2023-10-17T04:59:30.936295
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45387
In the module "Product Catalog (CSV, Excel, XML) Export PRO" (exportproducts) in versions up to 5.0.0 from MyPrestaModules for PrestaShop, a guest can perform SQL injection via `exportProduct::_addDataToDb().`
https://addons.prestashop.com/en/data-import-export/18662-product-catalog-csv-excel-xml-export-pro.html
2023-10-09T00:00:00
2023-11-17T00:00:00
2023-11-17T01:50:04.494146
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45807
OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana following the license change in early 2021. There is an issue with the implementation of tenant permissions in OpenSearch Dashboards where authenticated users with read-only access to a tenant can perform create, edit and delete operations on index metadata of dashboards and visualizations in that tenant, potentially rendering them unavailable. This issue does not affect index data, only metadata. Dashboards correctly enforces read-only permissions when indexing and updating documents. This issue does not provide additional read access to data users don’t already have. This issue can be mitigated by disabling the tenants functionality for the cluster. Versions 1.3.14 and 2.11.0 contain a fix for this issue.
https://github.com/opensearch-project/security/security/advisories/GHSA-72q2-gwwf-6hrv
2023-10-13T12:00:50.436Z
2023-10-16T21:33:23.124Z
2023-10-16T21:33:23.124Z
{'Vendor': 'opensearch-project', 'Product': 'security', 'Versions': '< 1.3.14.0, >= 2.0.0.0, < 2.11.0.0'}
CVE-2023-45554
File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker to execute arbitrary code via modification of the imageext parameter from jpg, jpeg,gif, and png to jpg, jpeg,gif, png, pphphp.
https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md
2023-10-09T00:00:00
2023-10-24T00:00:00
2023-10-24T22:01:23.140430
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45041
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
https://www.qnap.com/en/security-advisory/qsa-23-27
2023-10-03T08:58:16.880Z
2024-01-05T16:18:46.583Z
2024-01-05T16:18:46.583Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'}
CVE-2023-45780
In Print Service, there is a possible background activity launch due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
https://source.android.com/docs/security/bulletin/android-14
2023-10-12T15:46:50.769Z
2023-10-30T17:01:39.813Z
2023-10-30T17:01:39.813Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'}
CVE-2023-45016
null
null
2023-10-02T16:00:40.527Z
2023-11-02T02:15:45.269Z
2024-01-02T19:02:50.498Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45283
The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other effects). The previous behavior has been restored.
https://go.dev/issue/63713
2023-10-06T17:06:26.220Z
2023-11-09T16:30:12.395Z
2023-12-06T16:27:23.552Z
{'Vendor': 'Go standard library', 'Product': 'path/filepath', 'Versions': '0, 1.21.0-0'}
CVE-2023-45779
In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/2023-12-01
2023-10-12T15:46:50.769Z
2023-12-04T22:40:55.784Z
2024-01-26T22:08:13.929Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'}
CVE-2023-45329
null
null
2023-10-06T21:35:59.764Z
2023-11-02T13:18:42.114Z
2024-01-02T16:28:27.178Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx
2023-10-04T16:02:46.330Z
2023-10-18T20:17:08.588Z
2023-10-18T20:17:08.588Z
{'Vendor': 'redis', 'Product': 'redis', 'Versions': '>= 2.6.0-rc1, < 6.2.14, >= 7.0.0, < 7.0.14, >= 7.1.0, < 7.2.2'}
CVE-2023-45903
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/label/delete.
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20label%20management%20deletion%20function.md
2023-10-16T00:00:00
2023-10-17T00:00:00
2023-10-17T13:12:02.597883
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}