CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-45684
Northern.tech CFEngine Enterprise before 3.21.3 allows SQL Injection. The fixed versions are 3.18.6 and 3.21.3. The earliest affected version is 3.6.0. The issue is in the Mission Portal login page in the CFEngine hub.
https://cfengine.com/blog/2023/cve-2023-45684/
2023-10-10T00:00:00
2023-11-14T00:00:00
2023-11-14T14:45:21.677019
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45391
A stored cross-site scripting (XSS) vulnerability in the Create A New Employee function of Granding UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter.
https://the-it-wonders.blogspot.com/2023/10/granding-utime-master-stored-xss.html
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T13:24:12.470910
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45542
Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function.
https://github.com/ahrixia/CVE-2023-45542
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-16T20:57:52.778218
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45112
null
null
2023-10-04T14:28:12.263Z
2023-11-02T01:44:00.473Z
2024-01-02T19:26:25.801Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45811
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `[email protected]`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags
https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
2023-10-13T12:00:50.437Z
2023-10-17T22:37:20.249Z
2023-10-17T22:37:20.249Z
{'Vendor': 'relative', 'Product': 'synchrony', 'Versions': '>= 2.0.1, < 2.4.4'}
CVE-2023-45057
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hitsteps Web Analytics plugin <= 5.86 versions.
https://patchstack.com/database/vulnerability/hitsteps-visitor-manager/wordpress-hitsteps-web-analytics-plugin-5-85-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:31:00.205Z
2023-10-18T08:18:39.406Z
2023-10-18T08:18:39.406Z
{'Vendor': 'Hitsteps', 'Product': 'Hitsteps Web Analytics', 'Versions': 'n/a'}
CVE-2023-45240
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
https://security-advisory.acronis.com/advisories/SEC-5904
2023-10-05T21:47:00.378Z
2023-10-05T21:57:11.962Z
2023-10-05T21:57:11.962Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-45755
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in BuddyBoss BuddyPress Global Search plugin <= 1.2.1 versions.
https://patchstack.com/database/vulnerability/buddypress-global-search/wordpress-buddypress-global-search-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-12T08:27:55.558Z
2023-10-24T11:34:08.866Z
2023-10-24T11:34:08.866Z
{'Vendor': 'BuddyBoss', 'Product': 'BuddyPress Global Search', 'Versions': 'n/a'}
CVE-2023-45885
Cross Site Scripting (XSS) vulnerability in NASA Open MCT (aka openmct) through 3.1.0 allows attackers to run arbitrary code via the new component feature in the flexibleLayout plugin.
https://www.linkedin.com/pulse/xss-nasas-open-mct-v302-visionspace-technologies-ubg4f
2023-10-15T00:00:00
2023-11-09T00:00:00
2023-11-09T16:51:10.211274
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45539
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
https://lists.w3.org/Archives/Public/ietf-http-wg/2023JulSep/0070.html
2023-10-09T00:00:00
2023-11-28T00:00:00
2023-12-14T17:06:29.095966
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45169
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the pmsvcs kernel extension to cause a denial of service. IBM X-Force ID: 267967.
https://www.ibm.com/support/pages/node/7105282
2023-10-05T01:38:44.722Z
2024-01-11T02:03:17.669Z
2024-01-11T02:03:17.669Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45647
Cross-Site Request Forgery (CSRF) vulnerability in MailMunch Constant Contact Forms by MailMunch plugin <= 2.0.10 versions.
https://patchstack.com/database/vulnerability/constant-contact-forms-by-mailmunch/wordpress-constant-contact-forms-by-mailmunch-plugin-2-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T09:58:47.170Z
2023-10-16T09:58:02.307Z
2023-10-16T09:58:02.307Z
{'Vendor': 'MailMunch', 'Product': 'Constant Contact Forms by MailMunch', 'Versions': 'n/a'}
CVE-2023-45702
An HCL UrbanCode Deploy Agent installed as a Windows service in a non-standard location could be subject to a denial of service attack by local accounts..
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108646
2023-10-10T21:26:06.755Z
2023-12-28T07:29:22.062Z
2023-12-28T07:29:22.062Z
{'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.2 - 7.2.3.7, 7.3 - 7.3.2.2'}
CVE-2023-45352
Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system via a Common Management Portal web interface Path traversal vulnerability allowing write access outside the intended folders. This is also known as OCMP-6592.
https://networks.unify.com/security/advisories/OBSO-2306-02.pdf
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T03:33:50.080810
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45201
Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
https://fluidattacks.com/advisories/uchida
2023-10-05T13:51:36.875Z
2023-11-01T21:53:07.852Z
2023-11-01T21:53:07.852Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'}
CVE-2023-45651
Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi WP Attachments plugin <= 5.0.6 versions.
https://patchstack.com/database/vulnerability/wp-attachments/wordpress-wp-attachments-plugin-5-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T12:38:22.832Z
2023-10-16T08:41:39.143Z
2023-10-16T08:41:39.143Z
{'Vendor': 'Marco Milesi', 'Product': 'WP Attachments', 'Versions': 'n/a'}
CVE-2023-45344
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_balance' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.767Z
2023-11-02T13:57:07.765Z
2023-11-02T13:57:07.765Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45578
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the pap_en/chap_en parameter of the pppoe_base.asp function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug4.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-18T19:22:48.996130
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45128
Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to inject arbitrary values and forge malicious requests on behalf of a user. This vulnerability can allow an attacker to inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This issue has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes as defense in depth measures. There are no known workarounds for this vulnerability.
https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368
2023-10-04T16:02:46.327Z
2023-10-16T20:45:07.068Z
2023-10-16T20:46:19.342Z
{'Vendor': 'gofiber', 'Product': 'fiber', 'Versions': '< 2.50.0'}
CVE-2023-45606
Cross-Site Request Forgery (CSRF) vulnerability in Lasso Simple URLs plugin <= 120 versions.
https://patchstack.com/database/vulnerability/simple-urls/wordpress-simple-urls-plugin-120-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-09T10:11:54.307Z
2023-10-16T08:29:08.932Z
2023-10-16T08:29:08.932Z
{'Vendor': 'Lasso', 'Product': 'Simple URLs', 'Versions': 'n/a'}
CVE-2023-45893
An indirect Object Reference (IDOR) in the Order and Invoice pages in Floorsight Customer Portal Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information.
https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45893.md
2023-10-16T00:00:00
2024-01-02T00:00:00
2024-01-02T20:39:03.844535
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45485
null
null
2023-10-09T00:00:00
null
2024-01-19T19:48:15.003043
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45558
An issue in Golden v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45558.md
2023-10-09T00:00:00
2023-11-14T00:00:00
2023-11-14T02:32:26.618365
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45108
Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin <= 2.1.1 versions.
https://patchstack.com/database/vulnerability/mailrelay/wordpress-mailrelay-plugin-2-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-04T14:11:49.848Z
2023-10-13T12:03:15.049Z
2023-10-13T12:03:15.049Z
{'Vendor': 'Mailrelay', 'Product': 'Mailrelay', 'Versions': 'n/a'}
CVE-2023-45364
An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information.
https://phabricator.wikimedia.org/T264765
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-11T01:06:18.082273
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45671
Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, there is a reflected cross-site scripting vulnerability in any API endpoints reliant on the `/<camera_name>` base path as values provided for the path are not sanitized. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. As the reflected values included in the URL are not sanitized or escaped, this permits execution arbitrary Javascript payloads. Version 0.13.0 Beta 3 contains a patch for this issue.
https://github.com/blakeblackshear/frigate/security/advisories/GHSA-jjxc-m35j-p56f
2023-10-10T14:36:40.861Z
2023-10-30T22:41:17.276Z
2023-12-13T19:41:08.602Z
{'Vendor': 'blakeblackshear', 'Product': 'frigate', 'Versions': '< 0.13.0-beta3'}
CVE-2023-45763
Cross-Site Request Forgery (CSRF) vulnerability in Taggbox plugin <= 2.9 versions.
https://patchstack.com/database/vulnerability/taggbox-widget/wordpress-taggbox-ugc-galleries-social-media-widgets-user-reviews-analytics-plugin-2-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-12T12:45:14.808Z
2023-10-16T10:15:29.093Z
2023-10-16T10:15:29.093Z
{'Vendor': 'Taggbox', 'Product': 'Taggbox', 'Versions': 'n/a'}
CVE-2023-45333
null
null
2023-10-06T21:35:59.765Z
2023-11-02T13:23:50.739Z
2024-01-02T16:32:46.267Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45626
An authenticated vulnerability has been identified allowing an attacker to effectively establish highly privileged persistent arbitrary code execution across boot cycles.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
2023-10-09T16:22:24.804Z
2023-11-14T22:58:35.705Z
2023-11-14T22:58:35.705Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'}
CVE-2023-45276
Cross-Site Request Forgery (CSRF) vulnerability in automatededitor.Com Automated Editor plugin <= 1.3 versions.
https://patchstack.com/database/vulnerability/automated-editor/wordpress-automated-editor-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-06T13:05:32.935Z
2023-10-13T15:10:15.357Z
2023-10-13T15:10:15.357Z
{'Vendor': 'automatededitor.com', 'Product': 'Automated Editor', 'Versions': 'n/a'}
CVE-2023-45149
Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv
2023-10-04T16:02:46.331Z
2023-10-16T19:03:20.324Z
2023-10-16T19:03:20.324Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 15.0.0, < 15.0.8, >= 16.0.0, < 16.0.6, >= 17.0.0, < 17.1.1'}
CVE-2023-45325
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'address' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.764Z
2023-11-02T13:12:58.449Z
2023-11-02T13:12:58.449Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45775
In CreateAudioBroadcast of broadcaster.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b
2023-10-12T15:46:50.768Z
2023-12-04T22:40:55.237Z
2023-12-22T00:16:54.514Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'}
CVE-2023-45630
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 versions.
https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-10T07:47:54.381Z
2023-10-18T13:31:49.297Z
2023-10-18T13:31:49.297Z
{'Vendor': 'wpdevart', 'Product': 'Gallery – Image and Video Gallery with Thumbnails', 'Versions': 'n/a'}
CVE-2023-45958
Thirty Bees Core v1.4.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the backup_pagination parameter at /controller/AdminController.php. This vulnerability allows attackers to execute arbitrary JavaScript in the web browser of a user via a crafted payload.
https://zigrin.com/advisories/thirty-bees-reflected-cross-site-scripting-xss/
2023-10-16T00:00:00
2023-10-18T00:00:00
2023-10-18T21:55:53.704389
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45722
HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory.  The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-10-10T21:26:10.163Z
2024-01-03T02:59:05.745Z
2024-01-03T02:59:05.745Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-45688
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command
https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
2023-10-10T19:07:28.771Z
2023-10-16T16:14:41.841Z
2023-10-16T16:15:00.585Z
{'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'}
CVE-2023-45372
An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. During item merging, ItemMergeInteractor does not have an edit filter running (e.g., AbuseFilter).
https://phabricator.wikimedia.org/T345064
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T05:32:40.875300
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45667
stb_image is a single file MIT licensed library for processing images. If `stbi__load_gif_main` in `stbi_load_gif_from_memory` fails it returns a null pointer and may keep the `z` variable uninitialized. In case the caller also sets the flip vertically flag, it continues and calls `stbi__vertical_flip_slices` with the null pointer result value and the uninitialized `z` value. This may result in a program crash.
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
2023-10-10T14:36:40.860Z
2023-10-20T23:26:44.376Z
2023-10-20T23:26:44.376Z
{'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 2.28'}
CVE-2023-45237
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
2023-10-05T20:48:19.879Z
2024-01-16T16:11:11.556Z
2024-01-16T16:11:11.556Z
{'Vendor': 'TianoCore', 'Product': 'edk2', 'Versions': 'edk2-stable202308'}
CVE-2023-45889
A Universal Cross Site Scripting (UXSS) vulnerability in ClassLink OneClick Extension through 10.8 allows remote attackers to inject JavaScript into any webpage. NOTE: this issue exists because of an incomplete fix for CVE-2022-48612.
https://blog.zerdle.net/classlink/
2023-10-15T00:00:00
2024-01-23T00:00:00
2024-01-23T17:40:18.567876
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45866
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.
https://bluetooth.com
2023-10-14T00:00:00
2023-12-08T00:00:00
2024-01-05T13:06:14.377607
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45165
IBM AIX 7.2 and 7.3 could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service. IBM X-Force ID: 267963.
https://www.ibm.com/support/pages/node/7100970
2023-10-05T01:38:44.721Z
2023-12-22T15:51:40.490Z
2023-12-22T15:51:40.490Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3'}
CVE-2023-45759
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Peter Keung Peter’s Custom Anti-Spam plugin <= 3.2.2 versions.
https://patchstack.com/database/vulnerability/peters-custom-anti-spam-image/wordpress-peter-s-custom-anti-spam-plugin-3-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-12T12:45:14.808Z
2023-10-24T11:48:20.947Z
2023-10-24T11:48:20.947Z
{'Vendor': 'Peter Keung', 'Product': 'Peter’s Custom Anti-Spam', 'Versions': 'n/a'}
CVE-2023-45077
A memory leakage vulnerability was reported in the 534D0740 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-10-03T17:36:49.034Z
2023-11-08T22:30:05.886Z
2023-11-08T22:38:59.712Z
{'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'}
CVE-2023-45132
NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.
https://github.com/wargio/naxsi/security/advisories/GHSA-7qjc-q4j9-pc8x
2023-10-04T16:02:46.328Z
2023-10-11T20:21:26.313Z
2023-10-11T20:21:26.313Z
{'Vendor': 'wargio', 'Product': 'naxsi', 'Versions': '>= 1.3, < 1.6'}
CVE-2023-45831
Cross-Site Request Forgery (CSRF) vulnerability in Pixelative, Mohsin Rafique AMP WP – Google AMP For WordPress plugin <= 1.5.15 versions.
https://patchstack.com/database/vulnerability/amp-wp/wordpress-amp-wp-google-amp-for-wordpress-plugin-1-5-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-13T13:20:17.575Z
2023-10-16T10:23:05.292Z
2023-10-16T10:23:05.292Z
{'Vendor': 'Pixelative, Mohsin Rafique', 'Product': 'AMP WP – Google AMP For WordPress', 'Versions': 'n/a'}
CVE-2023-45827
Dot diver is a lightweight, powerful, and dependency-free TypeScript utility library that provides types and functions to work with object paths in dot notation. In versions prior to 1.0.2 there is a Prototype Pollution vulnerability in the `setByPath` function which can leads to remote code execution (RCE). This issue has been addressed in commit `98daf567` which has been included in release 1.0.2. Users are advised to upgrade. There are no known workarounds to this vulnerability.
https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47
2023-10-13T12:00:50.439Z
2023-11-06T17:25:43.774Z
2023-11-06T17:25:43.774Z
{'Vendor': 'clickbar', 'Product': 'dot-diver', 'Versions': '< 1.0.2'}
CVE-2023-45124
null
null
2023-10-04T14:28:12.265Z
2023-12-21T18:53:13.624Z
2024-01-02T14:09:39.712Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45574
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the file.data function.
https://www.dlink.com/en/security-bulletin/
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-18T19:18:11.333633
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45348
Apache Airflow, versions 2.7.0 and 2.7.1, is affected by a vulnerability that allows an authenticated user to retrieve sensitive configuration information when the "expose_config" option is set to "non-sensitive-only". The `expose_config` option is False by default. It is recommended to upgrade to a version that is not affected.
https://github.com/apache/airflow/pull/34712
2023-10-08T19:34:31.046Z
2023-10-14T09:46:44.563Z
2023-10-14T09:46:44.563Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '2.7.0'}
CVE-2023-45466
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the pin_host parameter in the WPS Settings.
https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md
2023-10-09T00:00:00
2023-10-13T00:00:00
2023-10-13T12:45:42.915763
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45173
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the NFS kernel extension to cause a denial of service. IBM X-Force ID: 267971.
https://www.ibm.com/support/pages/node/7105282
2023-10-05T01:38:44.722Z
2024-01-11T01:59:38.562Z
2024-01-11T01:59:38.562Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45894
The Remote Application Server in Parallels RAS before 19.2.23975 does not segment virtualized applications from the server, which allows a remote attacker to achieve remote code execution via standard kiosk breakout techniques.
https://github.com/Oracle-Security/CVEs/blob/main/Parallels%20Remote%20Server/readme.md
2023-10-16T00:00:00
2023-12-14T00:00:00
2023-12-14T19:26:00.826860
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45482
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info.
https://github.com/l3m0n…st_Info_code.png
2023-10-09T00:00:00
2023-11-29T00:00:00
2023-11-29T05:16:00.759908
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45178
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 CLI is vulnerable to a denial of service when a specially crafted request is used. IBM X-Force ID: 268073.
https://www.ibm.com/support/pages/node/7087207
2023-10-05T01:38:58.206Z
2023-12-03T17:29:29.053Z
2023-12-03T17:29:29.053Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'}
CVE-2023-45601
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.262), Parasolid V35.1 (All versions < V35.1.250), Parasolid V36.0 (All versions < V36.0.169), Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain a stack overflow vulnerability while parsing specially crafted IGS files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21290)
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-10-09T09:36:15.785Z
2023-10-10T10:21:47.253Z
2023-10-10T10:21:47.253Z
{'Vendor': 'Siemens', 'Product': 'Parasolid V35.0', 'Versions': 'All versions < V35.0.262'}
CVE-2023-45251
null
null
2023-10-05T00:00:00
null
2023-12-26T17:29:44.426812
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45085
An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.  In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.
https://advisories.softiron.cloud
2023-10-03T19:37:55.180Z
2023-12-05T16:15:45.986Z
2023-12-05T18:16:33.397Z
{'Vendor': 'SoftIron', 'Product': 'HyperCloud', 'Versions': '2.0.0'}
CVE-2023-45656
Cross-Site Request Forgery (CSRF) vulnerability in Kevin Weber Lazy Load for Videos plugin <= 2.18.2 versions.
https://patchstack.com/database/vulnerability/lazy-load-for-videos/wordpress-lazy-load-for-videos-plugin-2-18-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T12:38:22.832Z
2023-10-16T08:54:09.308Z
2023-10-16T08:54:09.308Z
{'Vendor': 'Kevin Weber', 'Product': 'Lazy Load for Videos', 'Versions': 'n/a'}
CVE-2023-45343
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'ticket_id' parameter of the routers/ticket-message.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.767Z
2023-11-02T13:59:16.838Z
2023-11-02T13:59:16.838Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45139
fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.
https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5
2023-10-04T16:02:46.329Z
2024-01-10T16:03:08.770Z
2024-01-10T16:03:08.770Z
{'Vendor': 'fonttools', 'Product': 'fonttools', 'Versions': '>= 4.28.2, < 4.43.0'}
CVE-2023-45990
Insecure Permissions vulnerability in WenwenaiCMS v.1.0 allows a remote attacker to escalate privileges.
https://github.com/PwnCYN/Wenwenai/issues/2
2023-10-16T00:00:00
2023-10-24T00:00:00
2023-10-24T01:43:32.089505
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45640
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in TechnoWich WP ULike – Most Advanced WordPress Marketing Toolkit plugin <= 4.6.8 versions.
https://patchstack.com/database/vulnerability/wp-ulike/wordpress-wp-ulike-plugin-4-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-10T09:58:47.168Z
2023-10-24T11:06:16.619Z
2023-10-24T11:06:16.619Z
{'Vendor': 'TechnoWich', 'Product': 'WP ULike – Most Advanced WordPress Marketing Toolkit', 'Versions': 'n/a'}
CVE-2023-45210
Pleasanter 1.3.47.0 and earlier contains an improper access control vulnerability, which may allow a remote authenticated attacker to view the temporary files uploaded by other users who are not permitted to access.
https://pleasanter.org/archives/vulnerability-update-202311
2023-10-31T01:54:11.551Z
2023-12-06T08:40:41.155Z
2023-12-06T08:40:41.155Z
{'Vendor': 'Implem Inc.', 'Product': 'Pleasanter', 'Versions': '1.3.47.0 and earlier'}
CVE-2023-45355
Atos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 and 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access via the webservice. This is also known as OSFOURK-24120.
https://networks.unify.com/security/advisories/OBSO-2308-02.pdf
2023-10-09T00:00:00
2023-10-09T00:00:00
2023-10-09T03:31:46.903484
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45247
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36497.
https://security-advisory.acronis.com/advisories/SEC-6600
2023-10-05T21:47:00.379Z
2023-10-09T11:09:00.897Z
2023-10-09T11:09:00.897Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-45617
There are arbitrary file deletion vulnerabilities in the CLI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
2023-10-09T16:22:24.802Z
2023-11-14T22:49:52.560Z
2023-11-14T22:49:52.560Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'}
CVE-2023-45752
Cross-Site Request Forgery (CSRF) vulnerability in 10 Quality Post Gallery plugin <= 2.3.12 versions.
https://patchstack.com/database/vulnerability/simple-post-gallery/wordpress-post-gallery-plugin-2-3-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-12T08:27:55.558Z
2023-10-16T10:06:58.208Z
2023-10-16T10:06:58.208Z
{'Vendor': '10 Quality', 'Product': 'Post Gallery', 'Versions': 'n/a'}
CVE-2023-45816
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, there is an edge case where a bookmark reminder is sent and an unread notification is generated, but the underlying bookmarkable (e.g. post, topic, chat message) security has changed, making it so the user can no longer access the underlying resource. As of version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, bookmark reminders are now no longer sent if the user does not have access to the underlying bookmarkable, and also the unread bookmark notifications are always filtered by access. There are no known workarounds.
https://github.com/discourse/discourse/security/advisories/GHSA-v9r6-92wp-f6cf
2023-10-13T12:00:50.437Z
2023-11-10T14:49:27.544Z
2023-11-10T15:10:46.018Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.3, >= 3.2.0.beta0, < 3.2.0.beta3'}
CVE-2023-45115
Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'ch' parameter of the /update.php?q=addqns resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/argerich/
2023-10-04T14:28:12.264Z
2023-12-21T15:36:52.752Z
2024-01-02T13:58:08.800Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'}
CVE-2023-45050
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic Jetpack – WP Security, Backup, Speed, & Growth allows Stored XSS.This issue affects Jetpack – WP Security, Backup, Speed, & Growth: from n/a through 12.8-a.1.
https://patchstack.com/database/vulnerability/jetpack/wordpress-jetpack-plugin-12-8-a-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:30:39.403Z
2023-11-30T12:07:42.417Z
2023-11-30T12:07:42.417Z
{'Vendor': 'Automattic', 'Product': 'Jetpack – WP Security, Backup, Speed, & Growth', 'Versions': 'n/a'}
CVE-2023-45683
github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim’s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata.
https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5
2023-10-10T14:36:40.862Z
2023-10-16T18:13:10.451Z
2023-10-16T18:13:10.451Z
{'Vendor': 'crewjam', 'Product': 'saml', 'Versions': '< 0.4.14'}
CVE-2023-45379
In the module "Rotator Img" (posrotatorimg) in versions at least up to 1.1 from PosThemes for PrestaShop, a guest can perform SQL injection.
http://posrotatorimg.com
2023-10-09T00:00:00
2023-10-19T00:00:00
2023-10-19T12:02:38.528154
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45396
An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12.
https://github.com/strik3r0x1/Vulns/blob/main/%28IDOR%29%20leads%20to%20events%20profiles%20access%20-%20Elenos.md
2023-10-09T00:00:00
2023-10-11T00:00:00
2023-10-11T13:54:29.313865
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45142
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.
https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr
2023-10-04T16:02:46.330Z
2023-10-12T16:33:21.435Z
2023-10-12T16:33:21.435Z
{'Vendor': 'open-telemetry', 'Product': 'opentelemetry-go-contrib', 'Versions': '< 0.44.0'}
CVE-2023-45841
Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `versal-firmware` package.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
2023-10-13T15:53:40.298Z
2023-12-05T11:30:10.990Z
2023-12-05T18:00:07.696Z
{'Vendor': 'Buildroot', 'Product': 'Buildroot', 'Versions': '2023.08.1, dev commit 622698d7847'}
CVE-2023-45904
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /variable/update.
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20variable%20management%20modification%20function.md
2023-10-16T00:00:00
2023-10-17T00:00:00
2023-10-17T13:12:01.886921
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45007
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fotomoto plugin <= 1.2.8 versions.
https://patchstack.com/database/vulnerability/fotomoto/wordpress-fotomoto-plugin-1-2-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-02T10:33:37.984Z
2023-10-17T11:29:41.559Z
2023-10-17T11:29:41.559Z
{'Vendor': 'Fotomoto', 'Product': 'Fotomoto', 'Versions': 'n/a'}
CVE-2023-45284
On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and "LPT" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local.
https://go.dev/issue/63713
2023-10-06T17:06:26.220Z
2023-11-09T16:30:15.250Z
2023-11-09T16:30:15.250Z
{'Vendor': 'Go standard library', 'Product': 'path/filepath', 'Versions': '0, 1.21.0-0'}
CVE-2023-45857
An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information.
https://github.com/axios/axios/issues/6006
2023-10-14T00:00:00
2023-11-08T00:00:00
2023-11-08T21:01:38.491118
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45011
Cross-Site Request Forgery (CSRF) vulnerability in Igor Buyanov WP Power Stats plugin <= 2.2.3 versions.
https://patchstack.com/database/vulnerability/wp-power-stats/wordpress-wp-power-stats-plugin-2-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T10:33:37.985Z
2023-10-12T12:12:48.865Z
2023-10-12T12:12:48.865Z
{'Vendor': 'Igor Buyanov', 'Product': 'WP Power Stats', 'Versions': 'n/a'}
CVE-2023-45912
WIPOTEC GmbH ComScale v4.3.29.21344 and v4.4.12.723 fails to validate user sessions, allowing unauthenticated attackers to read files from the underlying operating system and obtain directory listings.
https://github.com/PostalBlab/Vulnerabilities/blob/main/ComScale/file_access.txt
2023-10-16T00:00:00
2023-10-18T00:00:00
2023-10-18T17:38:05.294584
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45338
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.766Z
2023-11-02T14:01:11.776Z
2023-11-02T14:01:11.776Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45292
When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.
https://github.com/mojocn/base64Captcha/issues/120
2023-10-06T17:06:26.221Z
2023-12-11T21:51:16.055Z
2023-12-11T21:51:16.055Z
{'Vendor': 'github.com/mojocn/base64Captcha', 'Product': 'github.com/mojocn/base64Captcha', 'Versions': '0'}
CVE-2023-45768
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephanie Leary Next Page plugin <= 1.5.2 versions.
https://patchstack.com/database/vulnerability/next-page/wordpress-next-page-plugin-1-5-2-cross-site-scripting-xss?_s_id=cve
2023-10-12T14:57:39.224Z
2023-10-24T12:04:53.347Z
2023-10-24T12:04:53.347Z
{'Vendor': 'Stephanie Leary', 'Product': 'Next Page', 'Versions': 'n/a'}
CVE-2023-45103
Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Permalinks Customizer plugin <= 2.8.2 versions.
https://patchstack.com/database/vulnerability/permalinks-customizer/wordpress-permalinks-customizer-plugin-2-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-04T14:11:49.848Z
2023-10-12T14:33:33.651Z
2023-10-12T14:33:33.651Z
{'Vendor': 'YAS Global Team', 'Product': 'Permalinks Customizer', 'Versions': 'n/a'}
CVE-2023-45800
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hanbiro Hanbiro groupware allows Information Elicitation.This issue affects Hanbiro groupware: from V3.8.79 before V3.8.81.1.
https://hanbiro.com/
2023-10-13T08:01:54.364Z
2023-12-13T01:46:40.239Z
2023-12-13T01:46:54.587Z
{'Vendor': 'Hanbiro', 'Product': 'Hanbiro groupware', 'Versions': 'V3.8.79'}
CVE-2023-45046
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pressference Pressference Exporter allows SQL Injection.This issue affects Pressference Exporter: from n/a through 1.0.3.
https://patchstack.com/database/vulnerability/pressference-exporter/wordpress-pressference-exporter-plugin-1-0-3-sql-injection-vulnerability?_s_id=cve
2023-10-03T13:30:39.402Z
2023-11-06T08:24:42.869Z
2023-11-06T08:24:42.869Z
{'Vendor': 'Pressference', 'Product': 'Pressference Exporter', 'Versions': 'n/a'}
CVE-2023-45380
In the module "Order Duplicator " Clone and Delete Existing Order" (orderduplicate) in version <= 1.1.7 from Silbersaiten for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can download personal information from ps_customer/ps_address tables such as name / surname / phone number / full postal address.
https://security.friendsofpresta.org/modules/2023/11/07/orderduplicate.html
2023-10-09T00:00:00
2023-11-07T00:00:00
2023-11-07T22:20:18.364288
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45748
Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailChimp Forms by MailMunch plugin <= 3.1.4 versions.
https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-12T08:27:55.558Z
2023-10-16T10:01:15.956Z
2023-10-16T10:01:15.956Z
{'Vendor': 'MailMunch', 'Product': 'MailChimp Forms by MailMunch', 'Versions': 'n/a'}
CVE-2023-45898
The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.
https://lore.kernel.org/lkml/aa03f191-445c-0d2e-d6d7-0a3208d7df7a%40huawei.com/T/
2023-10-16T00:00:00
2023-10-16T00:00:00
2023-10-16T02:10:09.538461
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45174
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a privileged local user to exploit a vulnerability in the qdaemon command to escalate privileges or cause a denial of service. IBM X-Force ID: 267972.
https://www.ibm.com/support/pages/node/7095022
2023-10-05T01:38:58.205Z
2023-12-13T23:04:25.351Z
2023-12-13T23:04:25.351Z
{'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'}
CVE-2023-45066
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Smackcoders Export All Posts, Products, Orders, Refunds & Users.This issue affects Export All Posts, Products, Orders, Refunds & Users: from n/a through 2.4.1.
https://patchstack.com/database/vulnerability/wp-ultimate-exporter/wordpress-export-all-posts-products-orders-refunds-users-plugin-2-2-sensitive-data-exposure-vulnerability?_s_id=cve
2023-10-03T13:31:21.243Z
2023-11-30T14:43:05.150Z
2023-11-30T14:43:05.150Z
{'Vendor': 'Smackcoders', 'Product': 'Export All Posts, Products, Orders, Refunds & Users', 'Versions': 'n/a'}
CVE-2023-45123
null
null
2023-10-04T14:28:12.265Z
2023-12-21T16:42:55.086Z
2024-01-02T14:09:34.176Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45573
Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the n parameter of the mrclfile_del.asp function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug7.md
2023-10-09T00:00:00
2023-10-16T00:00:00
2023-10-19T21:01:57.752094
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45820
Directus is a real-time API and App dashboard for managing SQL database content. In affected versions any Directus installation that has websockets enabled can be crashed if the websocket server receives an invalid frame. A malicious user could leverage this bug to crash Directus. This issue has been addressed in version 10.6.2. Users are advised to upgrade. Users unable to upgrade should avoid using websockets.
https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m
2023-10-13T12:00:50.438Z
2023-10-19T18:38:18.856Z
2023-10-19T18:38:18.856Z
{'Vendor': 'directus', 'Product': 'directus', 'Versions': '>=10.4, < 10.6.2'}
CVE-2023-45070
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in 10Web Form Builder Team Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin <= 1.15.18 versions.
https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-mobile-friendly-drag-drop-contact-form-builder-plugin-1-15-18-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-03T13:31:21.244Z
2023-10-18T12:34:29.536Z
2023-10-18T12:34:29.536Z
{'Vendor': '10Web Form Builder Team', 'Product': 'Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder', 'Versions': 'n/a'}
CVE-2023-45836
Cross-Site Request Forgery (CSRF) vulnerability in XYDAC Ultimate Taxonomy Manager plugin <= 2.0 versions.
https://patchstack.com/database/vulnerability/ultimate-taxonomy-manager/wordpress-ultimate-taxonomy-manager-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-13T15:14:01.755Z
2023-10-16T10:25:31.935Z
2023-10-16T10:25:31.935Z
{'Vendor': 'XYDAC', 'Product': 'Ultimate Taxonomy Manager', 'Versions': 'n/a'}
CVE-2023-45135
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In `org.xwiki.platform:xwiki-platform-web` versions 7.2-milestone-2 until 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, it is possible to pass a title to the page creation action that isn't displayed at first but then executed in the second step. This can be used by an attacker to trick a victim to execute code, allowing script execution if the victim has script right or remote code execution including full access to the XWiki instance if the victim has programming right. For the attack to work, the attacker needs to convince the victim to visit a link like `<xwiki-host>/xwiki/bin/create/NonExistingSpace/WebHome?title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)` where `<xwiki-host>` is the URL of the Wiki installation and to then click on the "Create" button on that page. The page looks like a regular XWiki page that the victim would also see when clicking the button to create a page that doesn't exist yet, the malicious code is not displayed anywhere on that page. After clicking the "Create" button, the malicious title would be displayed but at this point, the code has already been executed and the attacker could use this code also to hide the attack, e.g., by redirecting the victim again to the same page with an innocent title. It thus seems plausible that this attack could work if the attacker can place a fake "create page" button on a page which is possible with edit right. This has been patched in `org.xwiki.platform:xwiki-platform-web` version 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by displaying the title already in the first step such that the victim can notice the attack before continuing. It is possible to manually patch the modified files from the patch in an existing installation. For the JavaScript change, the minified JavaScript file would need to be obtained from a build of XWiki and replaced accordingly.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghf6-2f42-mjh9
2023-10-04T16:02:46.329Z
2023-10-25T19:29:04.882Z
2023-10-25T19:29:04.882Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.2-milestone-2, < 14.10.12, >= 15.0-rc-1, < 15.5-rc-1'}