CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-45684 | Northern.tech CFEngine Enterprise before 3.21.3 allows SQL Injection. The fixed versions are 3.18.6 and 3.21.3. The earliest affected version is 3.6.0. The issue is in the Mission Portal login page in the CFEngine hub. | https://cfengine.com/blog/2023/cve-2023-45684/ | 2023-10-10T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T14:45:21.677019 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45391 | A stored cross-site scripting (XSS) vulnerability in the Create A New Employee function of Granding UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter. | https://the-it-wonders.blogspot.com/2023/10/granding-utime-master-stored-xss.html | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T13:24:12.470910 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45542 | Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function. | https://github.com/ahrixia/CVE-2023-45542 | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T20:57:52.778218 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45112 | null | null | 2023-10-04T14:28:12.263Z | 2023-11-02T01:44:00.473Z | 2024-01-02T19:26:25.801Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45811 | Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `[email protected]`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags
| https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx | 2023-10-13T12:00:50.437Z | 2023-10-17T22:37:20.249Z | 2023-10-17T22:37:20.249Z | {'Vendor': 'relative', 'Product': 'synchrony', 'Versions': '>= 2.0.1, < 2.4.4'} |
CVE-2023-45057 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hitsteps Web Analytics plugin <= 5.86 versions. | https://patchstack.com/database/vulnerability/hitsteps-visitor-manager/wordpress-hitsteps-web-analytics-plugin-5-85-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:31:00.205Z | 2023-10-18T08:18:39.406Z | 2023-10-18T08:18:39.406Z | {'Vendor': 'Hitsteps', 'Product': 'Hitsteps Web Analytics', 'Versions': 'n/a'} |
CVE-2023-45240 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. | https://security-advisory.acronis.com/advisories/SEC-5904 | 2023-10-05T21:47:00.378Z | 2023-10-05T21:57:11.962Z | 2023-10-05T21:57:11.962Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-45755 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in BuddyBoss BuddyPress Global Search plugin <= 1.2.1 versions. | https://patchstack.com/database/vulnerability/buddypress-global-search/wordpress-buddypress-global-search-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-12T08:27:55.558Z | 2023-10-24T11:34:08.866Z | 2023-10-24T11:34:08.866Z | {'Vendor': 'BuddyBoss', 'Product': 'BuddyPress Global Search', 'Versions': 'n/a'} |
CVE-2023-45885 | Cross Site Scripting (XSS) vulnerability in NASA Open MCT (aka openmct) through 3.1.0 allows attackers to run arbitrary code via the new component feature in the flexibleLayout plugin. | https://www.linkedin.com/pulse/xss-nasas-open-mct-v302-visionspace-technologies-ubg4f | 2023-10-15T00:00:00 | 2023-11-09T00:00:00 | 2023-11-09T16:51:10.211274 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45539 | HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server. | https://lists.w3.org/Archives/Public/ietf-http-wg/2023JulSep/0070.html | 2023-10-09T00:00:00 | 2023-11-28T00:00:00 | 2023-12-14T17:06:29.095966 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45169 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the pmsvcs kernel extension to cause a denial of service. IBM X-Force ID: 267967. | https://www.ibm.com/support/pages/node/7105282 | 2023-10-05T01:38:44.722Z | 2024-01-11T02:03:17.669Z | 2024-01-11T02:03:17.669Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45647 | Cross-Site Request Forgery (CSRF) vulnerability in MailMunch Constant Contact Forms by MailMunch plugin <= 2.0.10 versions. | https://patchstack.com/database/vulnerability/constant-contact-forms-by-mailmunch/wordpress-constant-contact-forms-by-mailmunch-plugin-2-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T09:58:47.170Z | 2023-10-16T09:58:02.307Z | 2023-10-16T09:58:02.307Z | {'Vendor': 'MailMunch', 'Product': 'Constant Contact Forms by MailMunch', 'Versions': 'n/a'} |
CVE-2023-45702 | An HCL UrbanCode Deploy Agent installed as a Windows service in a non-standard location could be subject to a denial of service attack by local accounts..
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108646 | 2023-10-10T21:26:06.755Z | 2023-12-28T07:29:22.062Z | 2023-12-28T07:29:22.062Z | {'Vendor': 'HCL Software', 'Product': 'HCL Launch', 'Versions': '7.2 - 7.2.3.7, 7.3 - 7.3.2.2'} |
CVE-2023-45352 | Atos Unify OpenScape Common Management Portal V10 before V10 R4.17.0 and V10 R5.1.0 allows an authenticated attacker to execute arbitrary code on the operating system via a Common Management Portal web interface Path traversal vulnerability allowing write access outside the intended folders. This is also known as OCMP-6592. | https://networks.unify.com/security/advisories/OBSO-2306-02.pdf | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T03:33:50.080810 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45201 | Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
| https://fluidattacks.com/advisories/uchida | 2023-10-05T13:51:36.875Z | 2023-11-01T21:53:07.852Z | 2023-11-01T21:53:07.852Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'} |
CVE-2023-45651 | Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi WP Attachments plugin <= 5.0.6 versions. | https://patchstack.com/database/vulnerability/wp-attachments/wordpress-wp-attachments-plugin-5-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T12:38:22.832Z | 2023-10-16T08:41:39.143Z | 2023-10-16T08:41:39.143Z | {'Vendor': 'Marco Milesi', 'Product': 'WP Attachments', 'Versions': 'n/a'} |
CVE-2023-45344 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_balance' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.767Z | 2023-11-02T13:57:07.765Z | 2023-11-02T13:57:07.765Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45578 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the pap_en/chap_en parameter of the pppoe_base.asp function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug4.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-18T19:22:48.996130 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45128 | Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to inject arbitrary values and forge malicious requests on behalf of a user. This vulnerability can allow an attacker to inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This issue has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes as defense in depth measures. There are no known workarounds for this vulnerability. | https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368 | 2023-10-04T16:02:46.327Z | 2023-10-16T20:45:07.068Z | 2023-10-16T20:46:19.342Z | {'Vendor': 'gofiber', 'Product': 'fiber', 'Versions': '< 2.50.0'} |
CVE-2023-45606 | Cross-Site Request Forgery (CSRF) vulnerability in Lasso Simple URLs plugin <= 120 versions. | https://patchstack.com/database/vulnerability/simple-urls/wordpress-simple-urls-plugin-120-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-09T10:11:54.307Z | 2023-10-16T08:29:08.932Z | 2023-10-16T08:29:08.932Z | {'Vendor': 'Lasso', 'Product': 'Simple URLs', 'Versions': 'n/a'} |
CVE-2023-45893 | An indirect Object Reference (IDOR) in the Order and Invoice pages in Floorsight Customer Portal Q3 2023 allows an unauthenticated remote attacker to view sensitive customer information. | https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45893.md | 2023-10-16T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T20:39:03.844535 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45485 | null | null | 2023-10-09T00:00:00 | null | 2024-01-19T19:48:15.003043 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45558 | An issue in Golden v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | https://github.com/syz913/CVE-reports/blob/main/CVE-2023-45558.md | 2023-10-09T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T02:32:26.618365 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45108 | Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin <= 2.1.1 versions. | https://patchstack.com/database/vulnerability/mailrelay/wordpress-mailrelay-plugin-2-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-04T14:11:49.848Z | 2023-10-13T12:03:15.049Z | 2023-10-13T12:03:15.049Z | {'Vendor': 'Mailrelay', 'Product': 'Mailrelay', 'Versions': 'n/a'} |
CVE-2023-45364 | An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information. | https://phabricator.wikimedia.org/T264765 | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-11T01:06:18.082273 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45671 | Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, there is a reflected cross-site scripting vulnerability in any API endpoints reliant on the `/<camera_name>` base path as values provided for the path are not sanitized. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. As the reflected values included in the URL are not sanitized or escaped, this permits execution arbitrary Javascript payloads. Version 0.13.0 Beta 3 contains a patch for this issue. | https://github.com/blakeblackshear/frigate/security/advisories/GHSA-jjxc-m35j-p56f | 2023-10-10T14:36:40.861Z | 2023-10-30T22:41:17.276Z | 2023-12-13T19:41:08.602Z | {'Vendor': 'blakeblackshear', 'Product': 'frigate', 'Versions': '< 0.13.0-beta3'} |
CVE-2023-45763 | Cross-Site Request Forgery (CSRF) vulnerability in Taggbox plugin <= 2.9 versions. | https://patchstack.com/database/vulnerability/taggbox-widget/wordpress-taggbox-ugc-galleries-social-media-widgets-user-reviews-analytics-plugin-2-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-12T12:45:14.808Z | 2023-10-16T10:15:29.093Z | 2023-10-16T10:15:29.093Z | {'Vendor': 'Taggbox', 'Product': 'Taggbox', 'Versions': 'n/a'} |
CVE-2023-45333 | null | null | 2023-10-06T21:35:59.765Z | 2023-11-02T13:23:50.739Z | 2024-01-02T16:32:46.267Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45626 | An authenticated vulnerability has been identified allowing an attacker to effectively establish highly privileged persistent arbitrary code execution across boot cycles.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt | 2023-10-09T16:22:24.804Z | 2023-11-14T22:58:35.705Z | 2023-11-14T22:58:35.705Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'} |
CVE-2023-45276 | Cross-Site Request Forgery (CSRF) vulnerability in automatededitor.Com Automated Editor plugin <= 1.3 versions. | https://patchstack.com/database/vulnerability/automated-editor/wordpress-automated-editor-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-06T13:05:32.935Z | 2023-10-13T15:10:15.357Z | 2023-10-13T15:10:15.357Z | {'Vendor': 'automatededitor.com', 'Product': 'Automated Editor', 'Versions': 'n/a'} |
CVE-2023-45149 | Nextcloud talk is a chat module for the Nextcloud server platform. In affected versions brute force protection of public talk conversation passwords can be bypassed, as there was an endpoint validating the conversation password without registering bruteforce attempts. It is recommended that the Nextcloud Talk app is upgraded to 15.0.8, 16.0.6 or 17.1.1. There are no known workarounds for this vulnerability. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7rf8-pqmj-rpqv | 2023-10-04T16:02:46.331Z | 2023-10-16T19:03:20.324Z | 2023-10-16T19:03:20.324Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 15.0.0, < 15.0.8, >= 16.0.0, < 16.0.6, >= 17.0.0, < 17.1.1'} |
CVE-2023-45325 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'address' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.764Z | 2023-11-02T13:12:58.449Z | 2023-11-02T13:12:58.449Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45775 | In CreateAudioBroadcast of broadcaster.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8e3b3fc918b3ea77754c6d82ab0f09cce81e145b | 2023-10-12T15:46:50.768Z | 2023-12-04T22:40:55.237Z | 2023-12-22T00:16:54.514Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-45630 | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in wpdevart Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 versions. | https://patchstack.com/database/vulnerability/gallery-album/wordpress-gallery-image-and-video-gallery-with-thumbnails-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-10T07:47:54.381Z | 2023-10-18T13:31:49.297Z | 2023-10-18T13:31:49.297Z | {'Vendor': 'wpdevart', 'Product': 'Gallery – Image and Video Gallery with Thumbnails', 'Versions': 'n/a'} |
CVE-2023-45958 | Thirty Bees Core v1.4.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the backup_pagination parameter at /controller/AdminController.php. This vulnerability allows attackers to execute arbitrary JavaScript in the web browser of a user via a crafted payload. | https://zigrin.com/advisories/thirty-bees-reflected-cross-site-scripting-xss/ | 2023-10-16T00:00:00 | 2023-10-18T00:00:00 | 2023-10-18T21:55:53.704389 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45722 | HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory. The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-10-10T21:26:10.163Z | 2024-01-03T02:59:05.745Z | 2024-01-03T02:59:05.745Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-45688 | Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command | https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/ | 2023-10-10T19:07:28.771Z | 2023-10-16T16:14:41.841Z | 2023-10-16T16:15:00.585Z | {'Vendor': 'South River Technologies', 'Product': 'Titan MFT', 'Versions': '0'} |
CVE-2023-45372 | An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. During item merging, ItemMergeInteractor does not have an edit filter running (e.g., AbuseFilter). | https://phabricator.wikimedia.org/T345064 | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T05:32:40.875300 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45667 | stb_image is a single file MIT licensed library for processing images.
If `stbi__load_gif_main` in `stbi_load_gif_from_memory` fails it returns a null pointer and may keep the `z` variable uninitialized. In case the caller also sets the flip vertically flag, it continues and calls `stbi__vertical_flip_slices` with the null pointer result value and the uninitialized `z` value. This may result in a program crash. | https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ | 2023-10-10T14:36:40.860Z | 2023-10-20T23:26:44.376Z | 2023-10-20T23:26:44.376Z | {'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 2.28'} |
CVE-2023-45237 |
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality.
| https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h | 2023-10-05T20:48:19.879Z | 2024-01-16T16:11:11.556Z | 2024-01-16T16:11:11.556Z | {'Vendor': 'TianoCore', 'Product': 'edk2', 'Versions': 'edk2-stable202308'} |
CVE-2023-45889 | A Universal Cross Site Scripting (UXSS) vulnerability in ClassLink OneClick Extension through 10.8 allows remote attackers to inject JavaScript into any webpage. NOTE: this issue exists because of an incomplete fix for CVE-2022-48612. | https://blog.zerdle.net/classlink/ | 2023-10-15T00:00:00 | 2024-01-23T00:00:00 | 2024-01-23T17:40:18.567876 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45866 | Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue. | https://bluetooth.com | 2023-10-14T00:00:00 | 2023-12-08T00:00:00 | 2024-01-05T13:06:14.377607 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45165 | IBM AIX 7.2 and 7.3 could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service. IBM X-Force ID: 267963. | https://www.ibm.com/support/pages/node/7100970 | 2023-10-05T01:38:44.721Z | 2023-12-22T15:51:40.490Z | 2023-12-22T15:51:40.490Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3'} |
CVE-2023-45759 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Peter Keung Peter’s Custom Anti-Spam plugin <= 3.2.2 versions. | https://patchstack.com/database/vulnerability/peters-custom-anti-spam-image/wordpress-peter-s-custom-anti-spam-plugin-3-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-12T12:45:14.808Z | 2023-10-24T11:48:20.947Z | 2023-10-24T11:48:20.947Z | {'Vendor': 'Peter Keung', 'Product': 'Peter’s Custom Anti-Spam', 'Versions': 'n/a'} |
CVE-2023-45077 | A memory leakage vulnerability was reported in the 534D0740 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables. | https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-10-03T17:36:49.034Z | 2023-11-08T22:30:05.886Z | 2023-11-08T22:38:59.712Z | {'Vendor': 'Lenovo', 'Product': 'BIOS', 'Versions': 'various'} |
CVE-2023-45132 | NAXSI is an open-source maintenance web application firewall (WAF) for NGINX. An issue present starting in version 1.3 and prior to version 1.6 allows someone to bypass the WAF when a malicious `X-Forwarded-For` IP matches `IgnoreIP` `IgnoreCIDR` rules. This old code was arranged to allow older NGINX versions to also support `IgnoreIP` `IgnoreCIDR` when multiple reverse proxies were present. The issue is patched in version 1.6. As a workaround, do not set any `IgnoreIP` `IgnoreCIDR` for older versions.
| https://github.com/wargio/naxsi/security/advisories/GHSA-7qjc-q4j9-pc8x | 2023-10-04T16:02:46.328Z | 2023-10-11T20:21:26.313Z | 2023-10-11T20:21:26.313Z | {'Vendor': 'wargio', 'Product': 'naxsi', 'Versions': '>= 1.3, < 1.6'} |
CVE-2023-45831 | Cross-Site Request Forgery (CSRF) vulnerability in Pixelative, Mohsin Rafique AMP WP – Google AMP For WordPress plugin <= 1.5.15 versions. | https://patchstack.com/database/vulnerability/amp-wp/wordpress-amp-wp-google-amp-for-wordpress-plugin-1-5-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-13T13:20:17.575Z | 2023-10-16T10:23:05.292Z | 2023-10-16T10:23:05.292Z | {'Vendor': 'Pixelative, Mohsin Rafique', 'Product': 'AMP WP – Google AMP For WordPress', 'Versions': 'n/a'} |
CVE-2023-45827 | Dot diver is a lightweight, powerful, and dependency-free TypeScript utility library that provides types and functions to work with object paths in dot notation. In versions prior to 1.0.2 there is a Prototype Pollution vulnerability in the `setByPath` function which can leads to remote code execution (RCE). This issue has been addressed in commit `98daf567` which has been included in release 1.0.2. Users are advised to upgrade. There are no known workarounds to this vulnerability.
| https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47 | 2023-10-13T12:00:50.439Z | 2023-11-06T17:25:43.774Z | 2023-11-06T17:25:43.774Z | {'Vendor': 'clickbar', 'Product': 'dot-diver', 'Versions': '< 1.0.2'} |
CVE-2023-45124 | null | null | 2023-10-04T14:28:12.265Z | 2023-12-21T18:53:13.624Z | 2024-01-02T14:09:39.712Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45574 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the fn parameter of the file.data function. | https://www.dlink.com/en/security-bulletin/ | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-18T19:18:11.333633 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45348 |
Apache Airflow, versions 2.7.0 and 2.7.1, is affected by a vulnerability that allows an authenticated user to retrieve sensitive configuration information when the "expose_config" option is set to "non-sensitive-only". The `expose_config` option is False by default.
It is recommended to upgrade to a version that is not affected. | https://github.com/apache/airflow/pull/34712 | 2023-10-08T19:34:31.046Z | 2023-10-14T09:46:44.563Z | 2023-10-14T09:46:44.563Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '2.7.0'} |
CVE-2023-45466 | Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the pin_host parameter in the WPS Settings. | https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md | 2023-10-09T00:00:00 | 2023-10-13T00:00:00 | 2023-10-13T12:45:42.915763 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45173 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the NFS kernel extension to cause a denial of service. IBM X-Force ID: 267971. | https://www.ibm.com/support/pages/node/7105282 | 2023-10-05T01:38:44.722Z | 2024-01-11T01:59:38.562Z | 2024-01-11T01:59:38.562Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45894 | The Remote Application Server in Parallels RAS before 19.2.23975 does not segment virtualized applications from the server, which allows a remote attacker to achieve remote code execution via standard kiosk breakout techniques. | https://github.com/Oracle-Security/CVEs/blob/main/Parallels%20Remote%20Server/readme.md | 2023-10-16T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T19:26:00.826860 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45482 | Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info. | 2023-10-09T00:00:00 | 2023-11-29T00:00:00 | 2023-11-29T05:16:00.759908 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
|
CVE-2023-45178 | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 CLI is vulnerable to a denial of service when a specially crafted request is used. IBM X-Force ID: 268073. | https://www.ibm.com/support/pages/node/7087207 | 2023-10-05T01:38:58.206Z | 2023-12-03T17:29:29.053Z | 2023-12-03T17:29:29.053Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'} |
CVE-2023-45601 | A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.262), Parasolid V35.1 (All versions < V35.1.250), Parasolid V36.0 (All versions < V36.0.169), Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain a stack overflow vulnerability while parsing specially crafted IGS files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21290) | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-10-09T09:36:15.785Z | 2023-10-10T10:21:47.253Z | 2023-10-10T10:21:47.253Z | {'Vendor': 'Siemens', 'Product': 'Parasolid V35.0', 'Versions': 'All versions < V35.0.262'} |
CVE-2023-45251 | null | null | 2023-10-05T00:00:00 | null | 2023-12-26T17:29:44.426812 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45085 | An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process. In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window.
This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.
| https://advisories.softiron.cloud | 2023-10-03T19:37:55.180Z | 2023-12-05T16:15:45.986Z | 2023-12-05T18:16:33.397Z | {'Vendor': 'SoftIron', 'Product': 'HyperCloud', 'Versions': '2.0.0'} |
CVE-2023-45656 | Cross-Site Request Forgery (CSRF) vulnerability in Kevin Weber Lazy Load for Videos plugin <= 2.18.2 versions. | https://patchstack.com/database/vulnerability/lazy-load-for-videos/wordpress-lazy-load-for-videos-plugin-2-18-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T12:38:22.832Z | 2023-10-16T08:54:09.308Z | 2023-10-16T08:54:09.308Z | {'Vendor': 'Kevin Weber', 'Product': 'Lazy Load for Videos', 'Versions': 'n/a'} |
CVE-2023-45343 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'ticket_id' parameter of the routers/ticket-message.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.767Z | 2023-11-02T13:59:16.838Z | 2023-11-02T13:59:16.838Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45139 | fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0. | https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5 | 2023-10-04T16:02:46.329Z | 2024-01-10T16:03:08.770Z | 2024-01-10T16:03:08.770Z | {'Vendor': 'fonttools', 'Product': 'fonttools', 'Versions': '>= 4.28.2, < 4.43.0'} |
CVE-2023-45990 | Insecure Permissions vulnerability in WenwenaiCMS v.1.0 allows a remote attacker to escalate privileges. | https://github.com/PwnCYN/Wenwenai/issues/2 | 2023-10-16T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T01:43:32.089505 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45640 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in TechnoWich WP ULike – Most Advanced WordPress Marketing Toolkit plugin <= 4.6.8 versions. | https://patchstack.com/database/vulnerability/wp-ulike/wordpress-wp-ulike-plugin-4-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-10T09:58:47.168Z | 2023-10-24T11:06:16.619Z | 2023-10-24T11:06:16.619Z | {'Vendor': 'TechnoWich', 'Product': 'WP ULike – Most Advanced WordPress Marketing Toolkit', 'Versions': 'n/a'} |
CVE-2023-45210 | Pleasanter 1.3.47.0 and earlier contains an improper access control vulnerability, which may allow a remote authenticated attacker to view the temporary files uploaded by other users who are not permitted to access. | https://pleasanter.org/archives/vulnerability-update-202311 | 2023-10-31T01:54:11.551Z | 2023-12-06T08:40:41.155Z | 2023-12-06T08:40:41.155Z | {'Vendor': 'Implem Inc.', 'Product': 'Pleasanter', 'Versions': '1.3.47.0 and earlier'} |
CVE-2023-45355 | Atos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 and 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access via the webservice. This is also known as OSFOURK-24120. | https://networks.unify.com/security/advisories/OBSO-2308-02.pdf | 2023-10-09T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T03:31:46.903484 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45247 | Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36497. | https://security-advisory.acronis.com/advisories/SEC-6600 | 2023-10-05T21:47:00.379Z | 2023-10-09T11:09:00.897Z | 2023-10-09T11:09:00.897Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-45617 | There are arbitrary file deletion vulnerabilities in the CLI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt | 2023-10-09T16:22:24.802Z | 2023-11-14T22:49:52.560Z | 2023-11-14T22:49:52.560Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'} |
CVE-2023-45752 | Cross-Site Request Forgery (CSRF) vulnerability in 10 Quality Post Gallery plugin <= 2.3.12 versions. | https://patchstack.com/database/vulnerability/simple-post-gallery/wordpress-post-gallery-plugin-2-3-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-12T08:27:55.558Z | 2023-10-16T10:06:58.208Z | 2023-10-16T10:06:58.208Z | {'Vendor': '10 Quality', 'Product': 'Post Gallery', 'Versions': 'n/a'} |
CVE-2023-45816 | Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, there is an edge case where a bookmark reminder is sent and an unread notification is generated, but the underlying bookmarkable (e.g. post, topic, chat message) security has changed, making it so the user can no longer access the underlying resource. As of version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, bookmark reminders are now no longer sent if the user does not have access to the underlying bookmarkable, and also the unread bookmark notifications are always filtered by access. There are no known workarounds. | https://github.com/discourse/discourse/security/advisories/GHSA-v9r6-92wp-f6cf | 2023-10-13T12:00:50.437Z | 2023-11-10T14:49:27.544Z | 2023-11-10T15:10:46.018Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.3, >= 3.2.0.beta0, < 3.2.0.beta3'} |
CVE-2023-45115 | Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'ch' parameter of the /update.php?q=addqns resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/argerich/ | 2023-10-04T14:28:12.264Z | 2023-12-21T15:36:52.752Z | 2024-01-02T13:58:08.800Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'} |
CVE-2023-45050 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic Jetpack – WP Security, Backup, Speed, & Growth allows Stored XSS.This issue affects Jetpack – WP Security, Backup, Speed, & Growth: from n/a through 12.8-a.1.
| https://patchstack.com/database/vulnerability/jetpack/wordpress-jetpack-plugin-12-8-a-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:30:39.403Z | 2023-11-30T12:07:42.417Z | 2023-11-30T12:07:42.417Z | {'Vendor': 'Automattic', 'Product': 'Jetpack – WP Security, Backup, Speed, & Growth', 'Versions': 'n/a'} |
CVE-2023-45683 | github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim’s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata. | https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5 | 2023-10-10T14:36:40.862Z | 2023-10-16T18:13:10.451Z | 2023-10-16T18:13:10.451Z | {'Vendor': 'crewjam', 'Product': 'saml', 'Versions': '< 0.4.14'} |
CVE-2023-45379 | In the module "Rotator Img" (posrotatorimg) in versions at least up to 1.1 from PosThemes for PrestaShop, a guest can perform SQL injection. | http://posrotatorimg.com | 2023-10-09T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T12:02:38.528154 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45396 | An Insecure Direct Object Reference (IDOR) vulnerability leads to events profiles access in Elenos ETG150 FM transmitter running on version 3.12. | https://github.com/strik3r0x1/Vulns/blob/main/%28IDOR%29%20leads%20to%20events%20profiles%20access%20-%20Elenos.md | 2023-10-09T00:00:00 | 2023-10-11T00:00:00 | 2023-10-11T13:54:29.313865 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45142 | OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it. | https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr | 2023-10-04T16:02:46.330Z | 2023-10-12T16:33:21.435Z | 2023-10-12T16:33:21.435Z | {'Vendor': 'open-telemetry', 'Product': 'opentelemetry-go-contrib', 'Versions': '< 0.44.0'} |
CVE-2023-45841 | Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `versal-firmware` package. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 | 2023-10-13T15:53:40.298Z | 2023-12-05T11:30:10.990Z | 2023-12-05T18:00:07.696Z | {'Vendor': 'Buildroot', 'Product': 'Buildroot', 'Versions': '2023.08.1, dev commit 622698d7847'} |
CVE-2023-45904 | Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /variable/update. | https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20vulnerability%20in%20the%20variable%20management%20modification%20function.md | 2023-10-16T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T13:12:01.886921 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45007 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fotomoto plugin <= 1.2.8 versions. | https://patchstack.com/database/vulnerability/fotomoto/wordpress-fotomoto-plugin-1-2-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-02T10:33:37.984Z | 2023-10-17T11:29:41.559Z | 2023-10-17T11:29:41.559Z | {'Vendor': 'Fotomoto', 'Product': 'Fotomoto', 'Versions': 'n/a'} |
CVE-2023-45284 | On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and "LPT" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local. | https://go.dev/issue/63713 | 2023-10-06T17:06:26.220Z | 2023-11-09T16:30:15.250Z | 2023-11-09T16:30:15.250Z | {'Vendor': 'Go standard library', 'Product': 'path/filepath', 'Versions': '0, 1.21.0-0'} |
CVE-2023-45857 | An issue discovered in Axios 1.5.1 inadvertently reveals the confidential XSRF-TOKEN stored in cookies by including it in the HTTP header X-XSRF-TOKEN for every request made to any host allowing attackers to view sensitive information. | https://github.com/axios/axios/issues/6006 | 2023-10-14T00:00:00 | 2023-11-08T00:00:00 | 2023-11-08T21:01:38.491118 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45011 | Cross-Site Request Forgery (CSRF) vulnerability in Igor Buyanov WP Power Stats plugin <= 2.2.3 versions. | https://patchstack.com/database/vulnerability/wp-power-stats/wordpress-wp-power-stats-plugin-2-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T10:33:37.985Z | 2023-10-12T12:12:48.865Z | 2023-10-12T12:12:48.865Z | {'Vendor': 'Igor Buyanov', 'Product': 'WP Power Stats', 'Versions': 'n/a'} |
CVE-2023-45912 | WIPOTEC GmbH ComScale v4.3.29.21344 and v4.4.12.723 fails to validate user sessions, allowing unauthenticated attackers to read files from the underlying operating system and obtain directory listings. | https://github.com/PostalBlab/Vulnerabilities/blob/main/ComScale/file_access.txt | 2023-10-16T00:00:00 | 2023-10-18T00:00:00 | 2023-10-18T17:38:05.294584 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45338 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.766Z | 2023-11-02T14:01:11.776Z | 2023-11-02T14:01:11.776Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45292 | When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct. | https://github.com/mojocn/base64Captcha/issues/120 | 2023-10-06T17:06:26.221Z | 2023-12-11T21:51:16.055Z | 2023-12-11T21:51:16.055Z | {'Vendor': 'github.com/mojocn/base64Captcha', 'Product': 'github.com/mojocn/base64Captcha', 'Versions': '0'} |
CVE-2023-45768 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephanie Leary Next Page plugin <= 1.5.2 versions. | https://patchstack.com/database/vulnerability/next-page/wordpress-next-page-plugin-1-5-2-cross-site-scripting-xss?_s_id=cve | 2023-10-12T14:57:39.224Z | 2023-10-24T12:04:53.347Z | 2023-10-24T12:04:53.347Z | {'Vendor': 'Stephanie Leary', 'Product': 'Next Page', 'Versions': 'n/a'} |
CVE-2023-45103 | Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Permalinks Customizer plugin <= 2.8.2 versions. | https://patchstack.com/database/vulnerability/permalinks-customizer/wordpress-permalinks-customizer-plugin-2-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-04T14:11:49.848Z | 2023-10-12T14:33:33.651Z | 2023-10-12T14:33:33.651Z | {'Vendor': 'YAS Global Team', 'Product': 'Permalinks Customizer', 'Versions': 'n/a'} |
CVE-2023-45800 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hanbiro Hanbiro groupware allows Information Elicitation.This issue affects Hanbiro groupware: from V3.8.79 before V3.8.81.1.
| https://hanbiro.com/ | 2023-10-13T08:01:54.364Z | 2023-12-13T01:46:40.239Z | 2023-12-13T01:46:54.587Z | {'Vendor': 'Hanbiro', 'Product': 'Hanbiro groupware', 'Versions': 'V3.8.79'} |
CVE-2023-45046 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pressference Pressference Exporter allows SQL Injection.This issue affects Pressference Exporter: from n/a through 1.0.3.
| https://patchstack.com/database/vulnerability/pressference-exporter/wordpress-pressference-exporter-plugin-1-0-3-sql-injection-vulnerability?_s_id=cve | 2023-10-03T13:30:39.402Z | 2023-11-06T08:24:42.869Z | 2023-11-06T08:24:42.869Z | {'Vendor': 'Pressference', 'Product': 'Pressference Exporter', 'Versions': 'n/a'} |
CVE-2023-45380 | In the module "Order Duplicator " Clone and Delete Existing Order" (orderduplicate) in version <= 1.1.7 from Silbersaiten for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can download personal information from ps_customer/ps_address tables such as name / surname / phone number / full postal address. | https://security.friendsofpresta.org/modules/2023/11/07/orderduplicate.html | 2023-10-09T00:00:00 | 2023-11-07T00:00:00 | 2023-11-07T22:20:18.364288 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45748 | Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailChimp Forms by MailMunch plugin <= 3.1.4 versions. | https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-12T08:27:55.558Z | 2023-10-16T10:01:15.956Z | 2023-10-16T10:01:15.956Z | {'Vendor': 'MailMunch', 'Product': 'MailChimp Forms by MailMunch', 'Versions': 'n/a'} |
CVE-2023-45898 | The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent. | https://lore.kernel.org/lkml/aa03f191-445c-0d2e-d6d7-0a3208d7df7a%40huawei.com/T/ | 2023-10-16T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T02:10:09.538461 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45174 | IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a privileged local user to exploit a vulnerability in the qdaemon command to escalate privileges or cause a denial of service. IBM X-Force ID: 267972. | https://www.ibm.com/support/pages/node/7095022 | 2023-10-05T01:38:58.205Z | 2023-12-13T23:04:25.351Z | 2023-12-13T23:04:25.351Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.2, 7.3, VIOS 3.1'} |
CVE-2023-45066 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Smackcoders Export All Posts, Products, Orders, Refunds & Users.This issue affects Export All Posts, Products, Orders, Refunds & Users: from n/a through 2.4.1.
| https://patchstack.com/database/vulnerability/wp-ultimate-exporter/wordpress-export-all-posts-products-orders-refunds-users-plugin-2-2-sensitive-data-exposure-vulnerability?_s_id=cve | 2023-10-03T13:31:21.243Z | 2023-11-30T14:43:05.150Z | 2023-11-30T14:43:05.150Z | {'Vendor': 'Smackcoders', 'Product': 'Export All Posts, Products, Orders, Refunds & Users', 'Versions': 'n/a'} |
CVE-2023-45123 | null | null | 2023-10-04T14:28:12.265Z | 2023-12-21T16:42:55.086Z | 2024-01-02T14:09:34.176Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45573 | Buffer Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the n parameter of the mrclfile_del.asp function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7xxxx/bug7.md | 2023-10-09T00:00:00 | 2023-10-16T00:00:00 | 2023-10-19T21:01:57.752094 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45820 | Directus is a real-time API and App dashboard for managing SQL database content. In affected versions any Directus installation that has websockets enabled can be crashed if the websocket server receives an invalid frame. A malicious user could leverage this bug to crash Directus. This issue has been addressed in version 10.6.2. Users are advised to upgrade. Users unable to upgrade should avoid using websockets. | https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m | 2023-10-13T12:00:50.438Z | 2023-10-19T18:38:18.856Z | 2023-10-19T18:38:18.856Z | {'Vendor': 'directus', 'Product': 'directus', 'Versions': '>=10.4, < 10.6.2'} |
CVE-2023-45070 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in 10Web Form Builder Team Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin <= 1.15.18 versions. | https://patchstack.com/database/vulnerability/form-maker/wordpress-form-maker-by-10web-mobile-friendly-drag-drop-contact-form-builder-plugin-1-15-18-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-03T13:31:21.244Z | 2023-10-18T12:34:29.536Z | 2023-10-18T12:34:29.536Z | {'Vendor': '10Web Form Builder Team', 'Product': 'Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder', 'Versions': 'n/a'} |
CVE-2023-45836 | Cross-Site Request Forgery (CSRF) vulnerability in XYDAC Ultimate Taxonomy Manager plugin <= 2.0 versions. | https://patchstack.com/database/vulnerability/ultimate-taxonomy-manager/wordpress-ultimate-taxonomy-manager-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-13T15:14:01.755Z | 2023-10-16T10:25:31.935Z | 2023-10-16T10:25:31.935Z | {'Vendor': 'XYDAC', 'Product': 'Ultimate Taxonomy Manager', 'Versions': 'n/a'} |
CVE-2023-45135 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In `org.xwiki.platform:xwiki-platform-web` versions 7.2-milestone-2 until 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` prior to versions 14.10.12 and 15.5-rc-1, it is possible to pass a title to the page creation action that isn't displayed at first but then executed in the second step. This can be used by an attacker to trick a victim to execute code, allowing script execution if the victim has script right or remote code execution including full access to the XWiki instance if the victim has programming right.
For the attack to work, the attacker needs to convince the victim to visit a link like `<xwiki-host>/xwiki/bin/create/NonExistingSpace/WebHome?title=$services.logging.getLogger(%22foo%22).error(%22Script%20executed!%22)` where `<xwiki-host>` is the URL of the Wiki installation and to then click on the "Create" button on that page. The page looks like a regular XWiki page that the victim would also see when clicking the button to create a page that doesn't exist yet, the malicious code is not displayed anywhere on that page. After clicking the "Create" button, the malicious title would be displayed but at this point, the code has already been executed and the attacker could use this code also to hide the attack, e.g., by redirecting the victim again to the same page with an innocent title. It thus seems plausible that this attack could work if the attacker can place a fake "create page" button on a page which is possible with edit right.
This has been patched in `org.xwiki.platform:xwiki-platform-web` version 14.10.12 and `org.xwiki.platform:xwiki-platform-web-templates` versions 14.10.12 and 15.5-rc-1 by displaying the title already in the first step such that the victim can notice the attack before continuing. It is possible to manually patch the modified files from the patch in an existing installation. For the JavaScript change, the minified JavaScript file would need to be obtained from a build of XWiki and replaced accordingly. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghf6-2f42-mjh9 | 2023-10-04T16:02:46.329Z | 2023-10-25T19:29:04.882Z | 2023-10-25T19:29:04.882Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.2-milestone-2, < 14.10.12, >= 15.0-rc-1, < 15.5-rc-1'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.