C
CISA
Guest
High Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
accusoft -- imagegear | An out-of-bounds write vulnerability exists in the tiff_planar_adobe functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. | 2023-09-25 | 9.8 | CVE-2023-32284 MISC |
accusoft -- imagegear | A heap-based buffer overflow vulnerability exists in the create_png_object functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. | 2023-09-25 | 9.8 | CVE-2023-32614 MISC |
accusoft -- imagegear | A heap-based buffer overflow vulnerability exists in the pictwread functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | 2023-09-25 | 9.8 | CVE-2023-35002 MISC |
accusoft -- imagegear | A use-after-free vulnerability exists in the tif_parse_sub_IFD functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can deliver file to trigger this vulnerability. | 2023-09-25 | 9.8 | CVE-2023-39453 MISC |
accusoft -- imagegear | An out-of-bounds write vulnerability exists in the allocate_buffer_for_jpeg_decoding functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. | 2023-09-25 | 9.8 | CVE-2023-40163 MISC |
accusoft -- imagegear | A heap-based buffer overflow vulnerability exists in the CreateDIBfromPict functionality of Accusoft ImageGear 20.1. A specially crafted file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | 2023-09-25 | 8.8 | CVE-2023-23567 MISC |
accusoft -- imagegear | A stack-based buffer overflow vulnerability exists in the tif_processing_dng_channel_count functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. | 2023-09-25 | 8.8 | CVE-2023-28393 MISC |
accusoft -- imagegear | An out-of-bounds write vulnerability exists in the dcm_pixel_data_decode functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | 2023-09-25 | 8.8 | CVE-2023-32653 MISC |
acronis -- cyber_protect | Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. | 2023-09-27 | 9.1 | CVE-2023-44152 MISC |
acronis -- cyber_protect | Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | 2023-09-27 | 9.1 | CVE-2023-44154 MISC |
acronis -- cyber_protect | Sensitive information disclosure and manipulation due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | 2023-09-27 | 9.1 | CVE-2023-44206 MISC |
acronis -- cyber_protect | Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979. | 2023-09-27 | 7.8 | CVE-2023-44157 MISC |
acronis -- cyber_protect | Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. | 2023-09-27 | 7.5 | CVE-2023-44153 MISC |
acronis -- cyber_protect | Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | 2023-09-27 | 7.5 | CVE-2023-44155 MISC |
acronis -- cyber_protect | Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | 2023-09-27 | 7.5 | CVE-2023-44156 MISC |
acronis -- cyber_protect | Sensitive information disclosure due to insufficient token field masking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | 2023-09-27 | 7.5 | CVE-2023-44158 MISC |
acronis -- cyber_protect | Sensitive information disclosure due to cleartext storage of sensitive information. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | 2023-09-27 | 7.5 | CVE-2023-44159 MISC |
apple -- iphone_os/ipad_os | The issue was addressed with improved memory handling. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-40431 MISC |
apple -- iphone_os/ipad_os | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to gain root privileges. | 2023-09-27 | 7.8 | CVE-2023-40443 MISC |
apple -- macos | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions. | 2023-09-27 | 10 | CVE-2023-38586 MISC |
apple -- macos | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions. | 2023-09-27 | 10 | CVE-2023-40455 MISC |
apple -- macos | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. An attacker may be able to cause unexpected system termination or read kernel memory. | 2023-09-27 | 9.1 | CVE-2023-40436 MISC |
apple -- macos | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-32377 MISC |
apple -- macos | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-38615 MISC |
apple -- macos | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14. A remote attacker may be able to cause a denial-of-service. | 2023-09-27 | 7.5 | CVE-2023-40407 MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. A remote user may cause an unexpected app termination or arbitrary code execution. | 2023-09-27 | 9.8 | CVE-2023-40400 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. | 2023-09-27 | 8.8 | CVE-2023-35074 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. | 2023-09-27 | 8.8 | CVE-2023-39434 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. | 2023-09-27 | 8.8 | CVE-2023-41074 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. A remote attacker may be able to break out of Web Content sandbox. | 2023-09-27 | 8.6 | CVE-2023-40448 MISC MISC MISC MISC MISC |
apple -- multiple_products | This issue was addressed with improved checks. This issue is fixed in Xcode 15, tvOS 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to gain elevated privileges. | 2023-09-27 | 7.8 | CVE-2023-32396 MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-40409 MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-40412 MISC MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to gain elevated privileges. | 2023-09-27 | 7.8 | CVE-2023-40419 MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-40432 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-41063 MISC MISC MISC MISC MISC |
apple -- multiple_products | An access issue was addressed with improved access restrictions. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7. A user may be able to elevate privileges. | 2023-09-27 | 7.8 | CVE-2023-41068 MISC MISC MISC MISC |
apple -- multiple_products | A use-after-free issue was addressed with improved memory management. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Ventura 13.6. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-41071 MISC MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-41174 MISC MISC MISC |
apple -- multiple_products | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-41984 MISC MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | 2023-09-27 | 7.8 | CVE-2023-41995 MISC MISC |
apple -- multiple_products | The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to overwrite arbitrary files. | 2023-09-27 | 7.1 | CVE-2023-40452 MISC MISC MISC MISC MISC MISC |
apple -- multiple_products | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to delete files for which it does not have permission. | 2023-09-27 | 7.1 | CVE-2023-40454 MISC MISC MISC MISC MISC MISC MISC |
apple -- safari | This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code. | 2023-09-27 | 8.8 | CVE-2023-40451 MISC MISC |
automataci -- automataci | AutomataCI is a template git repository equipped with a native built-in semi-autonomous CI tool. An issue in versions 1.4.1 and below can let a release job reset the git root repository to the first commit. Version 1.5.0 has a patch for this issue. As a workaround, make sure the PROJECT_PATH_RELEASE (e.g., releases/ ) directory is manually and actually git cloned properly, making it a different git repostiory from the root git repository. | 2023-09-22 | 9.1 | CVE-2023-42798 MISC MISC |
blog -- blog | SQL Injection vulnerability in Tianchoy Blog v.1.8.8 allows a remote attacker to obtain sensitive information via the id parameter in the login.php | 2023-09-27 | 7.5 | CVE-2023-43381 MISC MISC |
cadence -- cadence | Cadence through 0.9.2 2023-08-21 uses an Insecure /tmp/cadence-wineasio.reg Temporary File. The filename is used even if it has been created by a local adversary before Cadence started. The adversary can leverage this to create or overwrite files via a symlink attack. In some kernel configurations, code injection into the Wine registry is possible. | 2023-09-22 | 7.5 | CVE-2023-43783 MISC MISC |
cassia_networks -- access_controller | An issue was discovered in Cassia Access Controller 2.1.1.2303271039. Establishing a web SSH session to gateways is vulnerable to Cross Site Request Forgery (CSRF) attacks. | 2023-09-27 | 8.8 | CVE-2023-35793 MISC MISC |
cesanta_software_ltd. -- mjs | Cesanta mjs v2.20.0 was discovered to contain a function pointer hijacking vulnerability via the function mjs_get_ptr(). This vulnerability allows attackers to execute arbitrary code via a crafted input. | 2023-09-23 | 9.8 | CVE-2023-43338 MISC |
cilium -- cilium | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to update pod labels can cause Cilium to apply incorrect network policies. This issue arises due to the fact that on pod update, Cilium incorrectly uses user-provided pod labels to select the policies which apply to the workload in question. This can affect Cilium network policies that use the namespace, service account or cluster constructs to restrict traffic, Cilium clusterwide network policies that use Cilium namespace labels to select the Pod and Kubernetes network policies. Non-existent construct names can be provided, which bypass all network policies applicable to the construct. For example, providing a pod with a non-existent namespace as the value of the io.kubernetes.pod.namespace label results in none of the namespaced CiliumNetworkPolicies applying to the pod in question. This attack requires the attacker to have Kubernetes API Server access, as described in the Cilium Threat Model. This issue has been resolved in: Cilium versions 1.14.2, 1.13.7, and 1.12.14. Users are advised to upgrade. As a workaround an admission webhook can be used to prevent pod label updates to the k8s:io.kubernetes.pod.namespace and io.cilium.k8s.policy.* keys. | 2023-09-27 | 9 | CVE-2023-39347 MISC MISC |
cilium -- cilium | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to create or modify CiliumNetworkPolicy objects in a particular namespace is able to affect traffic on an entire Cilium cluster, potentially bypassing policy enforcement in other namespaces. By using a crafted endpointSelector that uses the DoesNotExist operator on the reserved:init label, the attacker can create policies that bypass namespace restrictions and affect the entire Cilium cluster. This includes potentially allowing or denying all traffic. This attack requires API server access, as described in the Kubernetes API Server Attacker section of the Cilium Threat Model. This issue has been resolved in Cilium versions 1.14.2, 1.13.7, and 1.12.14. As a workaround an admission webhook can be used to prevent the use of endpointSelectors that use the DoesNotExist operator on the reserved:init label in CiliumNetworkPolicies. | 2023-09-27 | 8.1 | CVE-2023-41333 MISC MISC MISC |
cisco -- ios_xe | A vulnerability in Cisco IOS XE Software for Cisco Catalyst 3650 and Catalyst 3850 Series Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper resource management when processing traffic that is received on the management interface. An attacker could exploit this vulnerability by sending a high rate of traffic to the management interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. | 2023-09-27 | 8.6 | CVE-2023-20033 MISC |
cisco -- sd-wan_manager | A vulnerability in the session management system of the Cisco Catalyst SD-WAN Manager multi-tenant feature could allow an authenticated, remote attacker to access another tenant that is being managed by the same Cisco Catalyst SD-WAN Manager instance. This vulnerability requires the multi-tenant feature to be enabled. This vulnerability is due to insufficient user session management within the Cisco Catalyst SD-WAN Manager system. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain unauthorized access to information about another tenant, make configuration changes, or possibly take a tenant offline causing a denial-of-service condition. | 2023-09-27 | 8.8 | CVE-2023-20254 MISC |
collne_inc. -- welcart_e-commerce | SQL injection vulnerability in Order Data Edit page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with editor (without setting authority) or higher privilege to perform unintended database operations. | 2023-09-27 | 8.8 | CVE-2023-43610 MISC MISC |
collne_inc. -- welcart_e-commerce | Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with editor or higher privilege to upload an arbitrary file to an unauthorized directory. | 2023-09-27 | 7.2 | CVE-2023-40219 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 function. | 2023-09-28 | 9.8 | CVE-2023-43869 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanNonLogin function. | 2023-09-28 | 7.5 | CVE-2023-43860 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanPPPoE function. | 2023-09-28 | 7.5 | CVE-2023-43861 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formLanguageChange function. | 2023-09-28 | 7.5 | CVE-2023-43862 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanDhcpplus function. | 2023-09-28 | 7.5 | CVE-2023-43863 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard55 function. | 2023-09-28 | 7.5 | CVE-2023-43864 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanPPTP function. | 2023-09-28 | 7.5 | CVE-2023-43865 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard7 function. | 2023-09-28 | 7.5 | CVE-2023-43866 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWanL2TP function. | 2023-09-28 | 7.5 | CVE-2023-43867 MISC MISC |
d-link -- dir-619l_firmware | D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function. | 2023-09-28 | 7.5 | CVE-2023-43868 MISC MISC |
d-link -- dir-806_firmware | D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of REMOTE_PORT parameters. | 2023-09-22 | 9.8 | CVE-2023-43129 MISC MISC |
d-link -- dir-806_firmware | D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection. | 2023-09-22 | 9.8 | CVE-2023-43130 MISC MISC |
dedebiz -- dedebiz | DedeBIZ v6.2.11 was discovered to contain multiple remote code execution (RCE) vulnerabilities at /admin/file_manage_control.php via the $activepath and $filename parameters. | 2023-09-27 | 9.8 | CVE-2023-43234 MISC MISC MISC MISC |
dedecms -- dedecms | An arbitrary file upload vulnerability in dede/baidunews.php in DedeCMS 5.7.111 and earlier allows attackers to execute arbitrary code via uploading a crafted PHP file. | 2023-09-28 | 8.8 | CVE-2023-43226 MISC |
dell -- networker | Dell NetWorker, Version 19.7 has an improper authorization vulnerability in the NetWorker client. An unauthenticated attacker within the same network could potentially exploit this by manipulating a command leading to gain of complete access to the server file further resulting in information leaks, denial of service, and arbitrary code execution. Dell recommends customers to upgrade at the earliest opportunity. | 2023-09-27 | 8.8 | CVE-2023-28055 MISC |
docker -- docker_desktop | Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog. This issue affects Docker Desktop: before 4.12.0. | 2023-09-25 | 9.8 | CVE-2023-0625 MISC |
docker -- docker_desktop | Docker Desktop before 4.12.0 is vulnerable to RCE via query parameters in message-box route. This issue affects Docker Desktop: before 4.12.0. | 2023-09-25 | 9.8 | CVE-2023-0626 MISC |
docker -- docker_desktop | Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.23.0. Affected Docker Desktop versions: from 4.13.0 before 4.23.0. | 2023-09-25 | 8.8 | CVE-2023-5165 MISC |
docker -- docker_desktop | Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE). This issue affects Docker Desktop: 4.11.X. | 2023-09-25 | 7.8 | CVE-2023-0627 MISC |
docker -- docker_desktop | In Docker Desktop on Windows before 4.12.0 an argument injection to installer may result in local privilege escalation (LPE). This issue affects Docker Desktop: before 4.12.0. | 2023-09-25 | 7.8 | CVE-2023-0633 MISC |
dreamer_cms -- dreamer_cms | Directory Traversal vulnerability in itechyou dreamer CMS v.4.1.3 allows a remote attacker to execute arbitrary code via the themePath in the uploaded template function. | 2023-09-25 | 8.8 | CVE-2023-43382 MISC MISC MISC |
dreamer_cms -- dreamer_cms | Dreamer CMS v4.1.3 was discovered to contain an arbitrary file read vulnerability via the component /admin/TemplateController.java. | 2023-09-27 | 7.5 | CVE-2023-43856 MISC MISC MISC MISC |
dst-admin -- dst-admin | dst-admin v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the userId parameter at /home/playerOperate. | 2023-09-22 | 9.8 | CVE-2023-43270 MISC |
easyphp -- webserver | An OS command injection vulnerability has been found on EasyPHP Webserver affecting version 14.1. This vulnerability could allow an attacker to get full access to the system by sending a specially crafted exploit to the /index.php?zone=settings parameter. | 2023-09-27 | 9.8 | CVE-2023-3767 MISC |
emlog_pro -- emlog_pro | Deserialization of Untrusted Data in emlog pro v.2.1.15 and earlier allows a remote attacker to execute arbitrary code via the cache.php component. | 2023-09-27 | 9.8 | CVE-2023-43291 MISC |
f-secure -- client_security | Certain WithSecure products allow Denial of Service via a fuzzed PE32 file. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0, Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | 2023-09-22 | 7.5 | CVE-2023-43760 MISC MISC |
f-secure -- linux_protection | Certain WithSecure products allow Local privilege escalation via the lhz archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0, Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | 2023-09-22 | 7.8 | CVE-2023-43766 MISC MISC |
f-secure -- linux_protection | Certain WithSecure products allow Denial of Service (infinite loop). This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0, Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | 2023-09-22 | 7.5 | CVE-2023-43761 MISC MISC |
f-secure -- linux_protection | Certain WithSecure products allow Denial of Service in the aeelf component. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0, Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | 2023-09-22 | 7.5 | CVE-2023-43765 MISC MISC |
f-secure -- linux_protection | Certain WithSecure products allow Denial of Service via the aepack archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0, Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1. | 2023-09-22 | 7.5 | CVE-2023-43767 MISC MISC |
f5 -- big-ip_access_policy_manager | BIG-IP APM clients may send IP traffic outside of the VPN tunnel. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | 2023-09-27 | 7.1 | CVE-2023-43124 MISC |
fortect -- fortect | Fortect - CWE-428: Unquoted Search Path or Element, may be used by local user to elevate privileges. | 2023-09-27 | 7.8 | CVE-2023-42486 MISC |
fuxa -- fuxa | FUXA api/signin. | 2023-09-22 | 9.8 | CVE-2023-31719 MISC MISC MISC |
fuxa -- fuxa | FUXA [TD] 2023-09-22 |
[TD]
[TR]
[TD]
[TD]
[/TR]
[TD]
[TD]
fuxa -- fuxa
[/TD][TD]
A SQL Injection attack in FUXA td> [TD]
[TD]
[TD]CVE-2023-31717
MISC
MISC
MISC[/TD]
[/TD]2023-09-22
[/TD][TD]
7.5
[/TD][TD]CVE-2023-31717
MISC
MISC
MISC[/TD]
[/TR]
[TD]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-31718
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43131
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41419
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41320
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42461
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42462
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41322
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41324
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41326
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4156
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5156
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42821
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5186
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5187
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-32541
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4737
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41297
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41296
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-48606
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39408
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39409
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41300
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41301
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41302
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41303
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41305
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-48605
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41294
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39407
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41293
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41298
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41299
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41307
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41308
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41309
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-40375
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-40989
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42819
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42820
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41027
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41029
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41031
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-4318
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-1260
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5217
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42753
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-3550
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41878
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5168
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5174
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5175
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5173
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5176
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-35071
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43187
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43739
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43468
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43469
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43470
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-2315
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5002
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41449
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41450
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-41452
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42657
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-40044
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-40046
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43013
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43014
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43144
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-5185
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44163
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44164
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44165
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44166
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44167
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44168
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-23364
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-23363
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-23362
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-0456
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-3874
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2022-4039
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-3223
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43644
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43216
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43222
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44169
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44170
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44171
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44172
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43278
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39375
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39378
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39377
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42487
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-30415
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43457
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44047
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44044
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44013
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44014
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44015
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44016
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44017
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44018
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44019
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44020
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44021
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44022
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-44023
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43141
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-38907
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-39640
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4934
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42460
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-42222
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-38346
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43762
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-43764
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4490
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4521
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-3547
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-3664
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4238
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
[TD]
[TD]CVE-2023-4300
MISC[/TD]
[/TR]
[TR]
[TD]
[TD]
[TD]
fuxa -- fuxa
[/TD][TD]
FUXA api/download.
[/TD][TD]
2023-09-22
[/TD][TD]
7.5
[/TD][TD]CVE-2023-31718
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
general_device_manager -- general_device_manager
[/TD][TD]
General Device Manager 2.5.2.2 is vulnerable to Buffer Overflow.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43131
MISC[/TD]
[/TR]
[TR]
[TD]
gevent -- gevent
[/TD][TD]
An issue in Gevent Gevent before version 23.9.1 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-41419
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be used to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-41320
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The ITIL actors input field from the Ticket form can be used to perform a SQL injection. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-42461
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The document upload process can be diverted to delete some files. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
9.1
[/TD][TD]CVE-2023-42462
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work arounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41322
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user that has read access on users' resource can steal accounts of other users. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41324
MISC[/TD]
[/TR]
[TR]
[TD]
glpi -- glpi
[/TD][TD]
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41326
MISC[/TD]
[/TR]
[TR]
[TD]
gnu -- gawk
[/TD][TD]
A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.
[/TD][TD]
2023-09-25
[/TD][TD]
7.1
[/TD][TD]CVE-2023-4156
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
gnu -- glibc
[/TD][TD]
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-5156
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
gomarkdown -- markdown
[/TD][TD]
The package
[/TD]github.com/gomarkdown/markdown
is a Go library for parsing Markdown text and rendering as HTML. Prior to pseudoversion 0.0.0-20230922105210-14b16010c2ee
, which corresponds with commit 14b16010c2ee7ff33a940a541d993bd043a88940
, parsing malformed markdown input with parser that uses parser.Mmark extension could result in out-of-bounds read vulnerability. To exploit the vulnerability, parser needs to have parser.Mmark
extension set. The panic occurs inside the citation.go
file on the line 69 when the parser tries to access the element past its length. This can result in a denial of service. Commit 14b16010c2ee7ff33a940a541d993bd043a88940
/pseudoversion 0.0.0-20230922105210-14b16010c2ee
contains a patch for this issue.[TD]
2023-09-22
[/TD][TD]
7.5
[/TD][TD]CVE-2023-42821
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
google -- chrome
[/TD][TD]
Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-5186
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
google -- chrome
[/TD][TD]
Use after free in Extensions in Google Chrome prior to 117.0.5938.132 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-5187
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
hancom -- hancom_office_2020
[/TD][TD]
A use-after-free vulnerability exists in the footerr functionality of Hancom Office 2020 HWord 11.0.0.7520. A specially crafted .doc file can lead to a use-after-free. An attacker can trick a user into opening a malformed file to trigger this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
7.8
[/TD][TD]CVE-2023-32541
MISC[/TD]
[/TR]
[TR]
[TD]
hedef_tracking -- admin_panel
[/TD][TD]
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hedef Tracking Admin Panel allows SQL Injection.This issue affects Admin Panel: before 1.2.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-4737
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-41297
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality.
[/TD][TD]
2023-09-25
[/TD][TD]
9.1
[/TD][TD]CVE-2023-41296
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2022-48606
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-39408
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-39409
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41300
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41301
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41302
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41303
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- emui
[/TD][TD]
Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41305
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2022-48605
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The DP module has a service hijacking vulnerability. Successful exploitation of this vulnerability may affect some Super Device services.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-41294
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
The Watchkit has a risk of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality and integrity.
[/TD][TD]
2023-09-25
[/TD][TD]
9.1
[/TD][TD]CVE-2023-39407
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41293
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41298
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41299
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41307
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41308
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
huawei -- harmonyos
[/TD][TD]
Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-41309
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
ibm -- i
[/TD][TD]
Integrated application server for IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 263580.
[/TD][TD]
2023-09-28
[/TD][TD]
7.8
[/TD][TD]CVE-2023-40375
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
jeecg -- jeecg_boot
[/TD][TD]
SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the report/jeecgboot/jmreport/queryFieldBySql component.
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2023-40989
MISC[/TD]
[/TR]
[TR]
[TD]
jumpserver -- jumpserver
[/TD][TD]
JumpServer is an open-source bastion host. Logged-in users can access and modify the contents of any file on the system. A user can use the 'Job-Template' menu and create a playbook named 'test'. Get the playbook id from the detail page, like 'e0adabef-c38f-492d-bd92-832bacc3df5f'. An attacker can exploit the directory traversal flaw using the provided URL to access and retrieve the contents of the file.
[/TD]https://jumpserver-ip/api/v1/ops/playbook/e0adabef-c38f-492d-bd92-832bacc3df5f/file/?key=../../../../../../../etc/passwd
a similar method to modify the file content is also present. This issue has been addressed in version 3.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.[TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-42819
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
jumpserver -- jumpserver
[/TD][TD]
JumpServer is an open-source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affected. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
[/TD][TD]
2023-09-27
[/TD][TD]
8.2
[/TD][TD]CVE-2023-42820
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
juplink -- rx4-1500_firmware
[/TD][TD]
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
[/TD][TD]
2023-09-22
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41027
MISC[/TD]
[/TR]
[TR]
[TD]
juplink -- rx4-1500_firmware
[/TD][TD]
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint.
[/TD][TD]
2023-09-22
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41029
MISC[/TD]
[/TR]
[TR]
[TD]
juplink -- rx4-1500_firmware
[/TD][TD]
Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint.
[/TD][TD]
2023-09-22
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41031
MISC[/TD]
[/TR]
[TR]
[TD]
kubernetes -- cri-o
[/TD][TD]
A vulnerability was found in cri-o. This issue allows the addition of arbitrary lines into /etc/passwd by use of a specially crafted environment variable.
[/TD][TD]
2023-09-25
[/TD][TD]
7.8
[/TD][TD]CVE-2022-4318
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
kubernetes -- kube-apiserver
[/TD][TD]
An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
[/TD][TD]
2023-09-24
[/TD][TD]
9.1
[/TD][TD]CVE-2023-1260
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
libvpx -- libvpx
[/TD][TD]
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-5217
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
linux -- kernel
[/TD][TD]
An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the
[/TD]h->nets
array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.[TD]
2023-09-25
[/TD][TD]
7.8
[/TD][TD]CVE-2023-42753
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mediawiki -- mediawiki
[/TD][TD]
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
[/TD][TD]
2023-09-25
[/TD][TD]
9
[/TD][TD]CVE-2023-3550
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
metersphere -- metersphere
[/TD][TD]
MeterSphere is a one-stop open-source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-41878
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mozilla -- firefox
[/TD][TD]
A compromised content process could have provided malicious data to
[/TD]FilterNodeD2D1
resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.[TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-5168
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mozilla -- firefox
[/TD][TD]
If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. This bug only affects Firefox on Windows when run in non-standard configurations (such as using
[/TD]runas
). Other operating systems are unaffected. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.[TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-5174
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mozilla -- firefox
[/TD][TD]
During process shutdown, it was possible that an
[/TD]ImageBitmap
was created that would later be used after being freed from a different codepath, leading to a potentially exploitable crash. This vulnerability affects Firefox < 118.[TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-5175
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mozilla -- firefox
[/TD][TD]
In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (
[/TD]network.http.altsvc.oe
) is enabled. This vulnerability affects Firefox < 118.[TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-5173
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mozilla -- multiple_products
[/TD][TD]
Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-5176
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
mrv_tech -- logging_administration_panel
[/TD][TD]
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MRV Tech Logging Administration Panel allows SQL Injection.This issue affects Logging Administration Panel: before 20230915.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-35071
MISC[/TD]
[/TR]
[TR]
[TD]
nodebb_inc. -- nodebb
[/TD][TD]
A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43187
MISC[/TD]
[/TR]
[TR]
[TD]
online_book_store_project -- online_book_store_project
[/TD][TD]
The 'bookisbn' parameter of the cart.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43739
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online_job_portal -- online_job_portal
[/TD][TD]
SQL injection vulnerability in janobe Online Job Portal v.2020 allows a remote attacker to execute arbitrary code via the login.php component.
[/TD][TD]
2023-09-23
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43468
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online_job_portal -- online_job_portal
[/TD][TD]
SQL injection vulnerability in janobe Online Job Portal v.2020 allows a remote attacker to execute arbitrary code via the ForPass.php component.
[/TD][TD]
2023-09-23
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43469
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
online_voting_system -- online_voting_system
[/TD][TD]
SQL injection vulnerability in janobe Online Voting System v.1.0 allows a remote attacker to execute arbitrary code via the checklogin.php component.
[/TD][TD]
2023-09-23
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43470
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
opencart -- opencart
[/TD][TD]
Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2 allows an authenticated user with access/modify privilege on the Log component to empty out arbitrary files on the server
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-2315
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
pgadmin -- pgadmin
[/TD][TD]
A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
[/TD][TD]
2023-09-22
[/TD][TD]
8.8
[/TD][TD]CVE-2023-5002
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
phpkobo -- ajaxnewsticker
[/TD][TD]
An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-41449
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
phpkobo -- ajaxnewsticker
[/TD][TD]
An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter.
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41450
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
phpkobo -- ajaxnewsticker
[/TD][TD]
Cross Site Request Forgery vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the txt parameter in the index.php component.
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-41452
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
progress -- ws_ftp_server
[/TD][TD]
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traversal vulnerability was discovered. An attacker could leverage this vulnerability to perform file operations (delete, rename, rmdir, mkdir) on files and folders outside of their authorized WS_FTP folder path. Attackers could also escape the context of the WS_FTP Server file structure and perform the same level of operations (delete, rename, rmdir, mkdir) on file and folder locations on the underlying operating system.
[/TD][TD]
2023-09-27
[/TD][TD]
9.6
[/TD][TD]CVE-2023-42657
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
progress -- ws_ftp_server
[/TD][TD]
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-40044
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
progress -- ws_ftp_server
[/TD][TD]
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a SQL injection vulnerability exists in the WS_FTP Server manager interface. An attacker may be able to infer information about the structure and contents of the database and execute SQL statements that alter or delete database elements.
[/TD][TD]
2023-09-27
[/TD][TD]
7.2
[/TD][TD]CVE-2023-40046
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- asset_management_system
[/TD][TD]
Asset Management System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'email' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43013
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- asset_management_system
[/TD][TD]
Asset Management System v1.0 is vulnerable to an Authenticated SQL Injection vulnerability on the 'first_name' and 'last_name' parameters of user.php page, allowing an authenticated attacker to dump all the contents of the database contents.
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-43014
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- asset_management_system_project_in_php
[/TD][TD]
Projectworldsl Assets-management-system-in-php 1.0 is vulnerable to SQL Injection via the "id" parameter in delete.php.
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43144
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- gym_management_system_project
[/TD][TD]
Gym Management System Project v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'file' parameter of profile/i.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-5185
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- online_movie_ticket_booking_system
[/TD][TD]
The 'search' parameter of the process_search.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44163
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- online_movie_ticket_booking_system
[/TD][TD]
The 'Email' parameter of the process_login.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44164
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- online_movie_ticket_booking_system
[/TD][TD]
The 'Password' parameter of the process_login.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44165
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- online_movie_ticket_booking_system
[/TD][TD]
The 'age' parameter of the process_registration.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44166
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- online_movie_ticket_booking_system
[/TD][TD]
The 'name' parameter of the process_registration.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44167
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
projectworlds -- online_movie_ticket_booking_system
[/TD][TD]
The 'phone' parameter of the process_registration.php resource does not validate the characters received and they are sent unfiltered to the database.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44168
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
qnap -- multimedia_console
[/TD][TD]
A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors. We have already fixed the vulnerability in the following versions: Multimedia Console 2.1.1 (2023/03/29) and later Multimedia Console 1.4.7 (2023/03/20) and later
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2023-23364
MISC[/TD]
[/TR]
[TR]
[TD]
qnap -- qts
[/TD][TD]
A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating system. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 4.3.6.2441 build 20230621 and later QTS 4.3.3.2420 build 20230621 and later QTS 4.2.6 build 20230621 and later QTS 4.3.4.2451 build 20230621 and later
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2023-23363
MISC[/TD]
[/TR]
[TR]
[TD]
qnap -- qutscloud
[/TD][TD]
An OS command injection vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability allows remote authenticated users to execute commands via susceptible QNAP devices. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2376 build 20230421 and later QTS 4.5.4.2374 build 20230416 and later QuTS hero h5.0.1.2376 build 20230421 and later QuTS hero h4.5.4.2374 build 20230417 and later QuTScloud c5.0.1.2374 and later
[/TD][TD]
2023-09-22
[/TD][TD]
8.8
[/TD][TD]CVE-2023-23362
MISC[/TD]
[/TR]
[TR]
[TD]
redhat -- apicast
[/TD][TD]
A flaw was found in APICast, when 3Scale's OIDC module does not properly evaluate the response to a mismatched token from a separate realm. This could allow a separate realm to be accessible to an attacker, permitting access to unauthorized information.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-0456
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
redhat -- satellite
[/TD][TD]
A command injection flaw was found in foreman. This flaw allows an authenticated user with admin privileges on the foreman instance to transpile commands through CoreOS and Fedora CoreOS configurations in templates, possibly resulting in arbitrary command execution on the underlying operating system.
[/TD][TD]
2023-09-22
[/TD][TD]
9.1
[/TD][TD]CVE-2022-3874
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
redhat -- single_sign-on
[/TD][TD]
A flaw was found in Red Hat Single Sign-On for OpenShift container images, which are configured with an unsecured management interface enabled. This flaw allows an attacker to use this interface to deploy malicious code and access and modify potentially sensitive information in the app server configuration.
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2022-4039
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
redhat -- undertow
[/TD][TD]
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-3223
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sagernet -- sing-box
[/TD][TD]
Sing-box is an open-source proxy system. Affected versions are subject to an authentication bypass when specially crafted requests are sent to sing-box. This affects all SOCKS5 inbounds with user authentication and an attacker may be able to bypass authentication. Users are advised to update to sing-box 1.4.4 or to 1.5.0-rc.4. Users unable to update should not expose the SOCKS5 inbound to insecure environments.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43644
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ip.php.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43216
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
SeaCMS v12.8 has an arbitrary code writing vulnerability in the /jxz7g2/admin_ping.php file.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43222
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_notify.php.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44169
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ping.php.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44170
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_smtp.php.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44171
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_weixin.php.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44172
MISC[/TD]
[/TR]
[TR]
[TD]
seacms -- seacms
[/TD][TD]
A Cross-Site Request Forgery (CSRF) in admin_manager.php of Seacms up to v12.8 allows attackers to arbitrarily add an admin account.
[/TD][TD]
2023-09-25
[/TD][TD]
8.8
[/TD][TD]CVE-2023-43278
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
siberiancms -- siberiancms
[/TD][TD]
SiberianCMS - CWE-274: Improper Handling of Insufficient Privileges
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-39375
MISC[/TD]
[/TR]
[TR]
[TD]
siberiancms -- siberiancms
[/TD][TD]
SiberianCMS - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') by an unauthenticated user
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-39378
MISC[/TD]
[/TR]
[TR]
[TD]
siberiancms -- siberiancms
[/TD][TD]
SiberianCMS - CWE-434: Unrestricted Upload of File with Dangerous Type - A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method
[/TD][TD]
2023-09-27
[/TD][TD]
7.2
[/TD][TD]CVE-2023-39377
MISC[/TD]
[/TR]
[TR]
[TD]
soundminer -- soundminer
[/TD][TD]
Soundminer - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
[/TD][TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-42487
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- packers_and_movers_management_system
[/TD][TD]
Sourcecodester Packers and Movers Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /inquiries/view_inquiry.php.
[/TD][TD]
2023-09-28
[/TD][TD]
9.8
[/TD][TD]CVE-2023-30415
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- service_provider_management_system
[/TD][TD]
An issue in Service Provider Management System v.1.0 allows a remote attacker to gain privileges via the ID parameter in the /php-spms/admin/?page=user/ endpoint.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43457
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
sourcecodester -- toll_tax_management_system
[/TD][TD]
Sourcecodester Toll Tax Management System v1 is vulnerable to SQL Injection.
[/TD][TD]
2023-09-27
[/TD][TD]
7.2
[/TD][TD]CVE-2023-44047
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
super_store_finder -- super_store_finder
[/TD][TD]
Super Store Finder v3.6 and below was discovered to contain a SQL injection vulnerability via the Search parameter at /admin/stores.php.
[/TD][TD]
2023-09-27
[/TD][TD]
7.2
[/TD][TD]CVE-2023-44044
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the list parameter in the fromSetIpMacBind function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44013
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain multiple stack overflows in the formSetMacFilterCfg function via the macFilterType and deviceList parameters.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44014
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the schedEndTime parameter in the setSchedWifi function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44015
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the deviceId parameter in the addWifiMacFilter function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44016
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44017
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the domain parameter in the add_white_node function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44018
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the mac parameter in the GetParentControlInfo function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44019
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the security parameter in the formWifiBasicSet function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44020
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the formSetClientState function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44021
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44022
MISC[/TD]
[/TR]
[TR]
[TD]
tenda -- ac10u_firmware
[/TD][TD]
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
[/TD][TD]
2023-09-27
[/TD][TD]
9.8
[/TD][TD]CVE-2023-44023
MISC[/TD]
[/TR]
[TR]
[TD]
totolink -- a3700r_firmware
[/TD][TD]
TOTOLINK A3700R V9.1.2u.6134_B20201202 and N600R V5.3c.5137 are vulnerable to Incorrect Access Control.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43141
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
tp-link -- tapo_l530e_firmware
[/TD][TD]
An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function.
[/TD][TD]
2023-09-25
[/TD][TD]
7.5
[/TD][TD]CVE-2023-38907
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
uplight -- cookie_law
[/TD][TD]
UpLight cookiebanner before 1.5.1 was discovered to contain a SQL injection vulnerability via the component Hook::getHookModuleExecList().
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-39640
MISC[/TD]
[/TR]
[TR]
[TD]
usta -- aybs
[/TD][TD]
Authorization Bypass Through User-Controlled Key vulnerability in Usta AYBS allows Authentication Abuse, Authentication Bypass.This issue affects AYBS: before 1.0.3.
[/TD][TD]
2023-09-27
[/TD][TD]
8.8
[/TD][TD]CVE-2023-4934
MISC[/TD]
[/TR]
[TR]
[TD]
vyperlang -- vyper
[/TD][TD]
Vyper is a Pythonic Smart Contract Language for the EVM. The
[/TD]_abi_decode()
function does not validate input when it is nested in an expression. Uses of _abi_decode()
can be constructed which allow for bounds checking to be bypassed resulting in incorrect results. This issue has not yet been fixed, but a fix is expected in release 0.3.10
. Users are advised to reference pull request #3626.[TD]
2023-09-27
[/TD][TD]
7.5
[/TD][TD]CVE-2023-42460
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
webcatalog -- webcatalog
[/TD][TD]
WebCatalog before 49.0 is vulnerable to Incorrect Access Control. WebCatalog calls the Electron shell.openExternal function without verifying that the URL is for an http or https resource, in some circumstances.
[/TD][TD]
2023-09-28
[/TD][TD]
8.8
[/TD][TD]CVE-2023-42222
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wind_river -- vxworks
[/TD][TD]
An issue was discovered in Wind River VxWorks 6.9 and 7. The function
[/TD]tarExtract
implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior.[TD]
2023-09-22
[/TD][TD]
8.8
[/TD][TD]CVE-2023-38346
MISC
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
withsecure -- f-secure_policy_manager
[/TD][TD]
Certain WithSecure products allow Unauthenticated Remote Code Execution via the web server (backend), issue 1 of 2. This affects WithSecure Policy Manager 15 and Policy Manager Proxy 15.
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43762
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
withsecure -- f-secure_policy_manager
[/TD][TD]
Certain WithSecure products allow Unauthenticated Remote Code Execution via the web server (backend), issue 2 of 2. This affects WithSecure Policy Manager 15 on Windows and Linux.
[/TD][TD]
2023-09-22
[/TD][TD]
9.8
[/TD][TD]CVE-2023-43764
MISC
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The WP Job Portal WordPress plugin through 2.0.3 does not sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-4490
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Import XML and RSS Feeds WordPress plugin before 2.1.5 contains a web shell, allowing unauthenticated attackers to perform RCE. The plugin/vendor was not compromised and the files are the result of running a PoC for a previously reported issue (https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42) and not deleting the created files when releasing the new version.
[/TD][TD]
2023-09-25
[/TD][TD]
9.8
[/TD][TD]CVE-2023-4521
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The All in One B2B for WooCommerce WordPress plugin through 1.0.3 does not properly check nonce values in several actions, allowing an attacker to perform CSRF attacks.
[/TD][TD]
2023-09-25
[/TD][TD]
8.8
[/TD][TD]CVE-2023-3547
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The FileOrganizer WordPress plugin through 1.0.2 does not restrict functionality on multisite instances, allowing site admins to gain full control over the server.
[/TD][TD]
2023-09-25
[/TD][TD]
7.2
[/TD][TD]CVE-2023-3664
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Prevent files / folders access WordPress plugin before 2.5.2 does not validate files to be uploaded, which could allow attackers to upload arbitrary files such as PHP on the server.
[/TD][TD]
2023-09-25
[/TD][TD]
7.2
[/TD][TD]CVE-2023-4238
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The Import XML and RSS Feeds WordPress plugin before 2.1.4 does not filter file extensions for uploaded files, allowing an attacker to upload a malicious PHP file, leading to Remote Code Execution.
[/TD][TD]
2023-09-25
[/TD][TD]
7.2
[/TD][TD]CVE-2023-4300
MISC[/TD]
[/TR]
[TR]
[TD]
wordpress -- wordpress
[/TD][TD]
The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the
PHP:
shortcode setting to be enabled on the vulnerable site.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5201&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H']9.9[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5201']CVE-2023-5201[/URL]
[URL='https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.1/inc/shortcodes.php?rev=2972840#L24']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.0/inc/shortcodes.php#L28']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]xen -- xen[/LEFT][/TD]
[TD][LEFT]The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately, the logic introduced there didn't account for the extreme case of the entire packet being split into as many pieces as permitted by the protocol, yet still being smaller than the area that's specially dealt with to keep all (possible) headers together. Such an unusual packet would therefore trigger a buffer overrun in the driver.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-34319&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']7.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-34319']CVE-2023-34319[/URL]
[URL='https://xenbits.xenproject.org/xsa/advisory-438.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]xerial -- snappy-java[/LEFT][/TD]
[TD][LEFT]snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. All versions of snappy-java including the latest released version 1.1.10.3 are vulnerable to this issue. A fix has been introduced in commit [ICODE]9f8c3cf74[/ICODE] which will be included in the 1.1.10.4 release. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43642&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43642']CVE-2023-43642[/URL]
[URL='https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv']MISC[/URL]
[URL='https://github.com/xerial/snappy-java/commit/9f8c3cf74223ed0a8a834134be9c917b9f10ceb5']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]xunruicms -- xunruicms[/LEFT][/TD]
[TD][LEFT]xunruicms td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2021-38243&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']9.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-38243']CVE-2021-38243[/URL]
[URL='https://github.com/P0wfuu/xunruicms-RCE']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]yt-dlp -- yt-dlp[/LEFT][/TD]
[TD][LEFT]yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the [ICODE]--exec[/ICODE] flag. This flag allows output template expansion in its argument, so that metadata values may be used in the shell commands. The metadata fields can be combined with the [ICODE]%q[/ICODE] conversion, which is intended to quote/escape these values so they can be safely passed to the shell. However, the escaping used for [ICODE]cmd[/ICODE] (the shell used by Python's [ICODE]subprocess[/ICODE] on Windows) does not properly escape special characters, which can allow for remote code execution if [ICODE]--exec[/ICODE] is used directly with maliciously crafted remote data. This vulnerability only impacts [ICODE]yt-dlp[/ICODE] on Windows, and the vulnerability is present regardless of whether [ICODE]yt-dlp[/ICODE] is run from [ICODE]cmd[/ICODE] or from [ICODE]PowerShell[/ICODE]. Support for output template expansion in [ICODE]--exec[/ICODE], along with this vulnerable behavior, was added to [ICODE]yt-dlp[/ICODE] in version 2021.04.11. yt-dlp version 2023.09.24 fixes this issue by properly escaping each special character. [ICODE]\n[/ICODE] will be replaced by [ICODE]\r[/ICODE] as no way of escaping it has been found. It is recommended to upgrade yt-dlp to version 2023.09.24 as soon as possible. Also, always be careful when using --exec, because while this specific vulnerability has been patched, using unvalidated input in shell commands is inherently dangerous. For Windows users who are not able to upgrade: 1. Avoid using any output template expansion in --exec other than {} (filepath). 2. If expansion in --exec is needed, verify the fields you are using do not contain ", | or &. 3. Instead of using --exec, write the info json and load the fields from it instead.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40581&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H']7.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40581']CVE-2023-40581[/URL]
[URL='https://github.com/yt-dlp/yt-dlp/releases/tag/2021.04.11']MISC[/URL]
[URL='https://github.com/yt-dlp/yt-dlp/releases/tag/2023.09.24']MISC[/URL]
[URL='https://github.com/yt-dlp/yt-dlp/commit/de015e930747165dbb8fcd360f8775fd973b7d6e']MISC[/URL]
[URL='https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-42h4-v29r-42qg']MISC[/URL]
[URL='https://github.com/yt-dlp/yt-dlp-nightly-builds/releases/tag/2023.09.24.003044']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zephyr -- zephyr[/LEFT][/TD]
[TD][LEFT]Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4260&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H']10[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4260']CVE-2023-4260[/URL]
[URL='https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zephyr -- zephyr[/LEFT][/TD]
[TD][LEFT]Possible buffer overflow in Zephyr mgmt subsystem when asserts are disabled.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4262&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H']10[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4262']CVE-2023-4262[/URL]
[URL='https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-56p9-5p3v-hhrc']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zephyr -- zephyr[/LEFT][/TD]
[TD][LEFT]Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.[/LEFT][/TD]
[TD][CENTER]2023-09-26[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4259&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']8.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4259']CVE-2023-4259[/URL]
[URL='https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zephyr -- zephyr[/LEFT][/TD]
[TD][LEFT]Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4264&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H']9.6[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4264']CVE-2023-4264[/URL]
[URL='https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zod -- zod[/LEFT][/TD]
[TD][LEFT]Zod in version 3.22.2 allows an attacker to perform a denial of service while validating emails[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4316&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']7.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4316']CVE-2023-4316[/URL]
[URL='https://www.npmjs.com/package/zod']MISC[/URL]
[URL='https://fluidattacks.com/advisories/swift']MISC[/URL][/TD]
[/TR][/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT][TD][LEFT][TD][LEFT]
[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[TD][LEFT][TD][LEFT][TD][LEFT]
[HEADING=1]Medium Vulnerabilities[/HEADING]
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT]acronis -- cyber_protect[/LEFT][/TD]
[TD][LEFT]Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44160&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44160']CVE-2023-44160[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-4083']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- cyber_protect[/LEFT][/TD]
[TD][LEFT]Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44161&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44161']CVE-2023-44161[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-4084']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- cyber_protect[/LEFT][/TD]
[TD][LEFT]Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44207&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44207']CVE-2023-44207[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-5914']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- cyber_protect[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44205&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44205']CVE-2023-44205[/URL]
[URL='https://security-advisory.acronis.com/advisories/SEC-4321']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]aes-gcm -- aes-gcm[/LEFT][/TD]
[TD][LEFT]aes-gcm is a pure Rust implementation of the AES-GCM. Starting in version 0.10.0 and prior to version 0.10.3, in the AES GCM implementation of decrypt_in_place_detached, the decrypted ciphertext (i.e., the correct plaintext) is exposed even if tag verification fails. If a program using the [ICODE]aes-gcm[/ICODE] crate's [ICODE]decrypt_in_place*[/ICODE] APIs accesses the buffer after decryption failure, it will contain a decryption of an unauthenticated input. Depending on the specific nature of the program this may enable Chosen Ciphertext Attacks (CCAs) which can cause a catastrophic breakage of the cipher including full plaintext recovery. Version 0.10.3 contains a fix for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42811&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42811']CVE-2023-42811[/URL]
[URL='https://docs.rs/aes-gcm/latest/src/aes_gcm/lib.rs.html#309']MISC[/URL]
[URL='https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- iphone_os/ipad_os[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved handling of caches. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to access sensitive user data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40428&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40428']CVE-2023-40428[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may disclose sensitive information.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39233&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39233']CVE-2023-39233[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sonoma 14. An app may be able to access sensitive user data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-23495&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23495']CVE-2023-23495[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to observe unprotected user data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32421&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32421']CVE-2023-32421[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to access sensitive user data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40402&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40402']CVE-2023-40402[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, macOS Ventura 13.6, macOS Sonoma 14. An app may be able to read arbitrary files.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40406&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40406']CVE-2023-40406[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to cause a denial-of-service.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40422&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40422']CVE-2023-40422[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40426&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40426']CVE-2023-40426[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may bypass Gatekeeper checks.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40450&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40450']CVE-2023-40450[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14. A shortcut may output sensitive user data without consent.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40541&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40541']CVE-2023-40541[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to unexpectedly leak a user's credentials from secure text fields.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41066&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41066']CVE-2023-41066[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may bypass Gatekeeper checks.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41067&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41067']CVE-2023-41067[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]An authorization issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41078&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41078']CVE-2023-41078[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14. An app may be able to bypass Privacy preferences.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41079&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41079']CVE-2023-41079[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6. Apps that fail verification checks may still launch.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41996&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41996']CVE-2023-41996[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A race condition was addressed with improved locking. This issue is fixed in macOS Sonoma 14. An app may be able to modify protected parts of the file system.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41979&vector=CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N']4.7[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41979']CVE-2023-41979[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. Safari may save photos to an unprotected location.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40388&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40388']CVE-2023-40388[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may disclose sensitive information.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40403&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40403']CVE-2023-40403[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40420&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40420']CVE-2023-40420[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A resource exhaustion issue was addressed with improved input validation. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to a denial-of-service.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40441&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40441']CVE-2023-40441[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved handling of caches. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access user-sensitive data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32361&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32361']CVE-2023-32361[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may fail to enforce App Transport Security.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-38596&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38596']CVE-2023-38596[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, macOS Sonoma 14, Xcode 15. An app may be able to disclose kernel memory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40391&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40391']CVE-2023-40391[/URL]
[URL='https://support.apple.com/en-us/HT213939']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to disclose kernel memory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40399&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40399']CVE-2023-40399[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to disclose kernel memory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40410&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40410']CVE-2023-40410[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access user-sensitive data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40424&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40424']CVE-2023-40424[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A permissions issue was addressed with improved validation. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to access sensitive user data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40429&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40429']CVE-2023-40429[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access sensitive data logged when a user shares a link.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41070&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41070']CVE-2023-41070[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]An authorization issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access protected user data.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41073&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41073']CVE-2023-41073[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.7, iOS 17 and iPadOS 17, macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. An app may be able to disclose kernel memory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41232&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41232']CVE-2023-41232[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read arbitrary files.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41968&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41968']CVE-2023-41968[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to bypass Privacy preferences.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41980&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41980']CVE-2023-41980[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to modify protected parts of the file system.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41986&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41986']CVE-2023-41986[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A window management issue was addressed with improved state management. This issue is fixed in Safari 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. Visiting a website that frames malicious content may lead to UI spoofing.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40417&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40417']CVE-2023-40417[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213941']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41981&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N']4.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41981']CVE-2023-41981[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An attacker in physical proximity can cause a limited out of bounds write.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-35984&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-35984']CVE-2023-35984[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- watchos[/LEFT][/TD]
[TD][LEFT]An authentication issue was addressed with improved state management. This issue is fixed in watchOS 10. An Apple Watch Ultra may not lock when using the Depth app.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40418&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40418']CVE-2023-40418[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- xcode[/LEFT][/TD]
[TD][LEFT]This issue was addressed by enabling hardened runtime. This issue is fixed in Xcode 15. An app may be able to access App Store credentials.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40435&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40435']CVE-2023-40435[/URL]
[URL='https://support.apple.com/en-us/HT213939']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]black_cat_cms -- black_cat_cms[/LEFT][/TD]
[TD][LEFT]A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website footer parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44043&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44043']CVE-2023-44043[/URL]
[URL='https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]black_cat_cms -- black_cat_cms[/LEFT][/TD]
[TD][LEFT]A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website header parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44042&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44042']CVE-2023-44042[/URL]
[URL='https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cadence -- cadence[/LEFT][/TD]
[TD][LEFT]Cadence through 0.9.2 2023-08-21 uses an Insecure /tmp/.cadence-aloop-daemon.x Temporary File. The file is used even if it has been created by a local adversary before Cadence started. The adversary can then delete the file, disrupting Cadence.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43782&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43782']CVE-2023-43782[/URL]
[URL='https://bugzilla.suse.com/show_bug.cgi?id=1213983']MISC[/URL]
[URL='https://github.com/falkTX/Cadence']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cmsmadesimple -- cmsmadesimple[/LEFT][/TD]
[TD][LEFT]Cross-Site Scripting (XSS) vulnerability in cmsmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted payload injected into the Database Name, DataBase User or Database Port components.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43339&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43339']CVE-2023-43339[/URL]
[URL='https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md']MISC[/URL]
[URL='http://www.cmsmadesimple.org/']MISC[/URL]
[URL='https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cmsmadesimple -- cmsmadesimple[/LEFT][/TD]
[TD][LEFT]A File upload vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS).[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43872&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43872']CVE-2023-43872[/URL]
[URL='https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]collne_inc. -- welcart[/LEFT][/TD]
[TD][LEFT]Path traversal vulnerability in Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with author or higher privilege to obtain partial information of the files on the web server.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40532&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40532']CVE-2023-40532[/URL]
[URL='https://jvn.jp/en/jp/JVN97197972/']MISC[/URL]
[URL='https://www.welcart.com/archives/20106.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]collne_inc. -- welcart_e-commerce[/LEFT][/TD]
[TD][LEFT]Cross-site scripting vulnerability in Item List page registration process of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41233&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41233']CVE-2023-41233[/URL]
[URL='https://jvn.jp/en/jp/JVN97197972/']MISC[/URL]
[URL='https://www.welcart.com/archives/20106.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]collne_inc. -- welcart_e-commerce[/LEFT][/TD]
[TD][LEFT]Cross-site scripting vulnerability in Credit Card Payment Setup page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script in the page.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41962&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41962']CVE-2023-41962[/URL]
[URL='https://jvn.jp/en/jp/JVN97197972/']MISC[/URL]
[URL='https://www.welcart.com/archives/20106.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]collne_inc. -- welcart_e-commerce[/LEFT][/TD]
[TD][LEFT]Cross-site scripting vulnerability in Item List page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43484&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43484']CVE-2023-43484[/URL]
[URL='https://jvn.jp/en/jp/JVN97197972/']MISC[/URL]
[URL='https://www.welcart.com/archives/20106.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]collne_inc. -- welcart_e-commerce[/LEFT][/TD]
[TD][LEFT]Cross-site scripting vulnerability in Order Data Edit page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43614&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43614']CVE-2023-43614[/URL]
[URL='https://jvn.jp/en/jp/JVN97197972/']MISC[/URL]
[URL='https://www.welcart.com/archives/20106.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]collne_inc. -- welcart_e-commerce[/LEFT][/TD]
[TD][LEFT]SQL injection vulnerability in Item List page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with author or higher privilege to obtain sensitive information.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43493&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N']4.9[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43493']CVE-2023-43493[/URL]
[URL='https://jvn.jp/en/jp/JVN97197972/']MISC[/URL]
[URL='https://www.welcart.com/archives/20106.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dedebiz -- dedebiz[/LEFT][/TD]
[TD][LEFT]A stored cross-site scripting (XSS) vulnerability in the Website column management function of DedeBIZ v6.2.11 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43232&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43232']CVE-2023-43232[/URL]
[URL='https://www.dedebiz.com/download']MISC[/URL]
[URL='http://dedebiz.com']MISC[/URL]
[URL='https://github.com/yux1azhengye/mycve/blob/main/dedebiz_6.2.11_xss.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]docker -- docker_desktop[/LEFT][/TD]
[TD][LEFT]Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL. This issue affects Docker Desktop: before 4.23.0.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5166&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5166']CVE-2023-5166[/URL]
[URL='https://docs.docker.com/desktop/release-notes/#4230']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dreamer_cms -- dreamer_cms[/LEFT][/TD]
[TD][LEFT]Dreamer CMS v4.1.3 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /admin/u/toIndex.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43857&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43857']CVE-2023-43857[/URL]
[URL='https://gitee.com/iteachyou/dreamer_cms/issues/I834WV']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]e017_cms -- e017_cms[/LEFT][/TD]
[TD][LEFT]A Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Name filed in the Manage Menu.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43873&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43873']CVE-2023-43873[/URL]
[URL='https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]e017_cms -- e017_cms[/LEFT][/TD]
[TD][LEFT]Multiple Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Copyright and Author fields in the Meta & Custom Tags Menu.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43874&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43874']CVE-2023-43874[/URL]
[URL='https://github.com/sromanhu/e107-CMS-Stored-XSS---MetaCustomTags/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]f5 -- big-ip_edge_client[/LEFT][/TD]
[TD][LEFT]BIG-IP APM clients may send IP traffic outside of the VPN tunnel. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43125&vector=CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N']6.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43125']CVE-2023-43125[/URL]
[URL='https://my.f5.com/manage/s/article/K000136909']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]froala -- froala_editor[/LEFT][/TD]
[TD][LEFT]Cross-site scripting (XSS) vulnerability in Froala Froala Editor v.4.1.1 allows remote attackers to execute arbitrary code via the 'Insert link' parameter in the 'Insert Image' component.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42426&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42426']CVE-2023-42426[/URL]
[URL='http://froala.com']MISC[/URL]
[URL='https://www.youtube.com/watch?v=Me33Dx1_XqQ']MISC[/URL]
[URL='https://github.com/b0marek/CVE-2023-42426']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]froala -- froala_editor[/LEFT][/TD]
[TD][LEFT]A Cross-site scripting (XSS) vulnerability in Froala Editor v.4.1.1 allows attackers to execute arbitrary code via the Markdown component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43263&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43263']CVE-2023-43263[/URL]
[URL='https://www.youtube.com/watch?v=-dXipo_q7tM']MISC[/URL]
[URL='https://github.com/b0marek/CVE-2023-43263']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]galaxy -- galaxy[/LEFT][/TD]
[TD][LEFT]Galaxy is an open-source platform for FAIR data analysis. Prior to version 22.05, Galaxy is vulnerable to server-side request forgery, which allows a malicious to issue arbitrary HTTP/HTTPS requests from the application server to internal hosts and read their responses. Version 22.05 contains a patch for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42812&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42812']CVE-2023-42812[/URL]
[URL='https://github.com/galaxyproject/galaxy/blob/06d56c859713b74f1c2e35da1c2fcbbf0a965645/lib/galaxy/files/uris.py']MISC[/URL]
[URL='https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]github -- enterprise_server[/LEFT][/TD]
[TD][LEFT]An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To do so, an attacker would need write access to the repository. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.6.17, 3.7.15, 3.8.8, 3.9.3, and 3.10.1. This vulnerability was reported via the GitHub Bug Bounty program.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-23766&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23766']CVE-2023-23766[/URL]
[URL='https://docs.github.com/[email protected]/admin/release-notes#3.9.3']MISC[/URL]
[URL='https://docs.github.com/[email protected]/admin/release-notes#3.6.17']MISC[/URL]
[URL='https://docs.github.com/[email protected]/admin/release-notes#3.7.15']MISC[/URL]
[URL='https://docs.github.com/[email protected]/admin/release-notes#3.10.1']MISC[/URL]
[URL='https://docs.github.com/[email protected]/admin/release-notes#3.8.8']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gladys_assistant -- gladys_assistant[/LEFT][/TD]
[TD][LEFT]A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43256&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43256']CVE-2023-43256[/URL]
[URL='https://github.com/GladysAssistant/Gladys/commit/f27d0ea4689c3deca5739b5f9ed45a2ddbf00b7b']MISC[/URL]
[URL='https://blog.moku.fr/cves/CVE-unassigned/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]glpi -- glpi[/LEFT][/TD]
[TD][LEFT]GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41321&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41321']CVE-2023-41321[/URL]
[URL='https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]glpi -- glpi[/LEFT][/TD]
[TD][LEFT]GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. The lack of path filtering on the GLPI URL may allow an attacker to transmit a malicious URL of login page that can be used to attempt a phishing attack on user credentials. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41888&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41888']CVE-2023-41888[/URL]
[URL='https://github.com/glpi-project/glpi/security/advisories/GHSA-2hcg-75jj-hghp']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]glpi -- glpi[/LEFT][/TD]
[TD][LEFT]GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can enumerate users' logins. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41323&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41323']CVE-2023-41323[/URL]
[URL='https://github.com/glpi-project/glpi/security/advisories/GHSA-5cf4-6q6r-49x9']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gnome -- gnome-shell[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in GNOME Shell. GNOME Shell's lock screen allows an unauthenticated local user to view windows of the locked desktop session by using keyboard shortcuts to unlock the restricted functionality of the screenshot tool.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43090&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43090']CVE-2023-43090[/URL]
[URL='https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/2944']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-43090']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2239087']MISC[/URL]
[URL='https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/6990']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]h3c -- multiple_products[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/LEFT][/TD]
[TD][CENTER]2023-09-24[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5142&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5142']CVE-2023-5142[/URL]
[URL='https://github.com/yinsel/CVE-H3C-Report']MISC[/URL]
[URL='https://github.com/CJCniubi666/H3C-ER/blob/main/README.md']MISC[/URL]
[URL='https://vuldb.com/?id.240238']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240238']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]hitachi_vantara -- pentaho_business_analytics[/LEFT][/TD]
[TD][LEFT]Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.5.0.0 and 9.3.0.4, including 8.3.x.x, saves passwords of the Hadoop Copy Files step in plaintext.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-2358&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N']4.9[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2358']CVE-2023-2358[/URL]
[URL='https://support.pentaho.com/hc/en-us/articles/19668208622221']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]huawei -- emui[/LEFT][/TD]
[TD][LEFT]Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4565&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4565']CVE-2023-4565[/URL]
[URL='https://consumer.huawei.com/en/support/bulletin/2023/9/']MISC[/URL]
[URL='https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]huawei -- harmonyos[/LEFT][/TD]
[TD][LEFT]Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41295&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41295']CVE-2023-41295[/URL]
[URL='https://consumer.huawei.com/en/support/bulletin/2023/9/']MISC[/URL]
[URL='https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]huawei -- harmonyos[/LEFT][/TD]
[TD][LEFT]Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41311&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41311']CVE-2023-41311[/URL]
[URL='https://consumer.huawei.com/en/support/bulletin/2023/9/']MISC[/URL]
[URL='https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]huawei -- harmonyos[/LEFT][/TD]
[TD][LEFT]Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41312&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41312']CVE-2023-41312[/URL]
[URL='https://consumer.huawei.com/en/support/bulletin/2023/9/']MISC[/URL]
[URL='https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]icewarp -- webclient[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting (XSS) vulnerability in the Sign-In page of IceWarp WebClient 10.3.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43319&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43319']CVE-2023-43319[/URL]
[URL='https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-43319-c2ad758ac2bc']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]intelliants -- subrion[/LEFT][/TD]
[TD][LEFT]A Cross-site scripting (XSS) vulnerability in /panel/languages/ of Subrion v4.2.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Title' parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43828&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43828']CVE-2023-43828[/URL]
[URL='https://github.com/al3zx/xss_languages_subrion_4.2.1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]intelliants -- subrion[/LEFT][/TD]
[TD][LEFT]A Cross-site scripting (XSS) vulnerability in /panel/configuration/financial/ of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into several fields: 'Minimum deposit', 'Maximum deposit' and/or 'Maximum balance'.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43830&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43830']CVE-2023-43830[/URL]
[URL='https://github.com/al3zx/xss_financial_subrion_4.2.1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]intelliants -- subrion[/LEFT][/TD]
[TD][LEFT]A Cross-site scripting (XSS) vulnerability in Reference ID from the panel Transactions, of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Reference ID' parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43884&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43884']CVE-2023-43884[/URL]
[URL='https://github.com/dpuenteramirez/XSS-ReferenceID-Subrion_4.2.1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]juniper_networks -- junos[/LEFT][/TD]
[TD][LEFT]A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * 22.4 versions prior to 22,4R2-S2, 22.4R3; * 23.2 versions prior to 23.2R2.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-36851&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36851']CVE-2023-36851[/URL]
[URL='https://supportportal.juniper.net/JSA72300']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]keycloak -- keycloak[/LEFT][/TD]
[TD][LEFT]A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4137&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4137']CVE-2022-4137[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:1043']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:1044']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2022-4137']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2148496']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:1045']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:1049']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]kiali -- kiali[/LEFT][/TD]
[TD][LEFT]A content spoofing vulnerability was found in Kiali. It was discovered that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an attacker to perform arbitrary text injection when an error response is retrieved from the URL being accessed.[/LEFT][/TD]
[TD][CENTER]2023-09-23[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-3962&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3962']CVE-2022-3962[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2148661']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:0542']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2022-3962']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5158&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5158']CVE-2023-5158[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-5158']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2240561']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]matrix -- synapse[/LEFT][/TD]
[TD][LEFT]Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room. This issue has been patched in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42453&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42453']CVE-2023-42453[/URL]
[URL='https://github.com/matrix-org/synapse/security/advisories/GHSA-7565-cq32-vx2x']MISC[/URL]
[URL='https://github.com/matrix-org/synapse/pull/16327']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]microweber -- microweber[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 2.0.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5244&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5244']CVE-2023-5244[/URL]
[URL='https://huntr.dev/bounties/a3bd58ba-ca59-4cba-85d1-799f73a76470']MISC[/URL]
[URL='https://github.com/microweber/microweber/commit/1cb846f8f54ff6f5c668f3ae64dd81740a7e8968']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]moosocial -- moosocial[/LEFT][/TD]
[TD][LEFT]mooSocial 3.1.8 is vulnerable to external service interaction on post function. When executed, the server sends a HTTP and DNS request to external server. The Parameters effected are multiple - messageText, data[wall_photo], data[userShareVideo] and data[userShareLink].[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43323&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43323']CVE-2023-43323[/URL]
[URL='https://github.com/ahrixia/CVE-2023-43323']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]moosocial -- moosocial[/LEFT][/TD]
[TD][LEFT]A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.[/LEFT][/TD]
[TD][CENTER]2023-09-26[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43325&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43325']CVE-2023-43325[/URL]
[URL='https://moosocial.com/']MISC[/URL]
[URL='https://travel.moosocial.com/']MISC[/URL]
[URL='https://github.com/ahrixia/CVE-2023-43325']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]moosocial -- moosocial[/LEFT][/TD]
[TD][LEFT]A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43326&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43326']CVE-2023-43326[/URL]
[URL='https://moosocial.com/']MISC[/URL]
[URL='https://github.com/ahrixia/CVE-2023-43326']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]multibit_hd -- multibit_hd[/LEFT][/TD]
[TD][LEFT]MultiBit HD before 0.1.2 allows attackers to conduct bit-flipping attacks that insert unspendable Bitcoin addresses into the list that MultiBit uses to send fees to the developers. (Attackers cannot realistically steal these fees for themselves.) This occurs because there is no message authentication code (MAC).[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-6964&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6964']CVE-2015-6964[/URL]
[URL='https://web.archive.org/web/20160506095434/https://multibit.org/blog/2015/07/25/bit-flipping-attack.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]not_quite_ptp -- not_quite_ptp[/LEFT][/TD]
[TD][LEFT]In nqptp-message-handlers.c in nqptp before 1.2.3, crafted packets received on the control port could crash the program.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43771&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43771']CVE-2023-43771[/URL]
[URL='https://github.com/mikebrady/nqptp/commit/b24789982d5cc067ecf6e8f3352b701d177530ec']MISC[/URL]
[URL='https://github.com/mikebrady/nqptp/releases/tag/1.2.4']MISC[/URL]
[URL='https://github.com/mikebrady/nqptp/releases/tag/1.2.3']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]october_cms -- october_cms[/LEFT][/TD]
[TD][LEFT]A Cross-Site Scripting (XSS) vulnerability in installation of October v.3.4.16 allows an attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost field.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43876&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43876']CVE-2023-43876[/URL]
[URL='https://github.com/sromanhu/October-CMS-Reflected-XSS---Installation/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]one_identity_password_manager -- one_identity_password_manager[/LEFT][/TD]
[TD][LEFT]One Identity Password Manager version 5.9.7.1. An unauthenticated attacker with physical access to a workstation may upgrade privileges to SYSTEM through an unspecified method. CWE-250: Execution with Unnecessary Privileges.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4003&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H']6.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4003']CVE-2023-4003[/URL]
[URL='https://www.gov.il/en/Departments/faq/cve_advisories']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]openstack -- openstack[/LEFT][/TD]
[TD][LEFT]A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.[/LEFT][/TD]
[TD][CENTER]2023-09-24[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-1633&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']5.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-1633']CVE-2023-1633[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2181761']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-1633']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]openstack -- openstack[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.[/LEFT][/TD]
[TD][CENTER]2023-09-24[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-1636&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N']5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-1636']CVE-2023-1636[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-1636']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2181765']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]openstack -- openstack[/LEFT][/TD]
[TD][LEFT]An information leak was discovered in OpenStack heat. This issue could allow a remote, authenticated attacker to use the 'stack show' command to reveal parameters which are supposed to remain hidden. This has a low impact to the confidentiality, integrity, and availability of the system.[/LEFT][/TD]
[TD][CENTER]2023-09-24[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-1625&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N']5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-1625']CVE-2023-1625[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2181621']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-1625']MISC[/URL]
[URL='https://github.com/openstack/heat/commit/a49526c278e52823080c7f3fcb72785b93fd4dcb']MISC[/URL]
[URL='https://launchpad.net/bugs/1999665']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]palantir -- apollo_autopilot[/LEFT][/TD]
[TD][LEFT]In Apollo change requests, comments added by users could contain a javascript URI link that when rendered will result in an XSS that require user interaction.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30959&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30959']CVE-2023-30959[/URL]
[URL='https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajaxnewsticker[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the index.php component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41445&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41445']CVE-2023-41445[/URL]
[URL='http://phpkobo.com']MISC[/URL]
[URL='http://ajaxnewsticker.com']MISC[/URL]
[URL='https://gist.github.com/RNPG/84cac1b949bab0e4c587a668385b052d']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajaxnewsticker[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted script to the title parameter in the index.php component.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41446&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41446']CVE-2023-41446[/URL]
[URL='http://phpkobo.com']MISC[/URL]
[URL='https://gist.github.com/RNPG/4bb91170f8ee50b395427f26bc96a1f2']MISC[/URL]
[URL='http://ajaxnewsticker.com']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajaxnewsticker[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the subcmd parameter in the index.php component.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41447&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41447']CVE-2023-41447[/URL]
[URL='https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3']MISC[/URL]
[URL='http://phpkobo.com']MISC[/URL]
[URL='http://ajaxnewsticker.com']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajaxnewsticker[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the ID parameter in the index.php component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41448&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41448']CVE-2023-41448[/URL]
[URL='https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0']MISC[/URL]
[URL='http://phpkobo.com']MISC[/URL]
[URL='http://ajaxnewsticker.com']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajaxnewsticker[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the txt parameter in the index.php component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41451&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41451']CVE-2023-41451[/URL]
[URL='http://phpkobo.com']MISC[/URL]
[URL='https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde']MISC[/URL]
[URL='http://ajaxnewsticker.com']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajaxnewsticker[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the cmd parameter in the index.php component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41453&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41453']CVE-2023-41453[/URL]
[URL='http://phpkobo.com']MISC[/URL]
[URL='http://ajaxnewsticker.com']MISC[/URL]
[URL='https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]pimcore -- pimcore[/LEFT][/TD]
[TD][LEFT]Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5192&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5192']CVE-2023-5192[/URL]
[URL='https://github.com/pimcore/demo/commit/a2a7ff3b565882aefb759804aac4a51afb458f1f']MISC[/URL]
[URL='https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]pimcore -- pimcore[/LEFT][/TD]
[TD][LEFT]Pimcore admin-ui-classic-bundle provides a Backend UI for Pimcore. The translation value with text including "%s" (from "%suggest%) is parsed by sprintf() even though it's supposed to be output literally to the user. The translations may be accessible by a user with comparatively lower overall access (as the translation permission cannot be scoped to certain "modules") and a skilled attacker might be able to exploit the parsing of the translation string in the dialog box. This issue has been patched in commit [ICODE]abd77392[/ICODE] which is included in release 1.1.2. Users are advised to update to version 1.1.2 or apply the patch manually.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42817&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42817']CVE-2023-42817[/URL]
[URL='https://github.com/pimcore/admin-ui-classic-bundle/commit/abd7739298f974319e3cac3fd4fcd7f995b63e4c']MISC[/URL]
[URL='https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-m988-7375-7g2c']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]progress -- ws_ftp_server[/LEFT][/TD]
[TD][LEFT]In WS_FTP Server version prior to 8.8.2, the WS_FTP Server Manager interface was missing cross-site request forgery (CSRF) protection on a POST transaction corresponding to a WS_FTP Server administrative function.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40048&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40048']CVE-2023-40048[/URL]
[URL='https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023']MISC[/URL]
[URL='https://www.progress.com/ws_ftp']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]progress -- ws_ftp_server[/LEFT][/TD]
[TD][LEFT]In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a reflected cross-site scripting (XSS) vulnerability exists in WS_FTP Server's Ad Hoc Transfer module. An attacker could leverage this vulnerability to target WS_FTP Server users with a specialized payload which results in the execution of malicious JavaScript within the context of the victim's browser.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40045&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40045']CVE-2023-40045[/URL]
[URL='https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023']MISC[/URL]
[URL='https://www.progress.com/ws_ftp']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]progress -- ws_ftp_server[/LEFT][/TD]
[TD][LEFT]In WS_FTP Server version prior to 8.8.2, an unauthenticated user could enumerate files under the 'WebServiceHost' directory listing.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40049&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40049']CVE-2023-40049[/URL]
[URL='https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023']MISC[/URL]
[URL='https://www.progress.com/ws_ftp']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]progress -- ws_ftp_server[/LEFT][/TD]
[TD][LEFT]In WS_FTP Server version prior to 8.8.2, a stored cross-site scripting (XSS) vulnerability exists in WS_FTP Server's Management module. An attacker with administrative privileges could import a SSL certificate with malicious attributes containing cross-site scripting payloads. Once the cross-site scripting payload is successfully stored, an attacker could leverage this vulnerability to target WS_FTP Server admins with a specialized payload which results in the execution of malicious JavaScript within the context of the victim's browser.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40047&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40047']CVE-2023-40047[/URL]
[URL='https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023']MISC[/URL]
[URL='https://www.progress.com/ws_ftp']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]projectworlds -- online_movie_ticket_booking_system[/LEFT][/TD]
[TD][LEFT]Online Movie Ticket Booking System v1.0 is vulnerable to an authenticated Reflected Cross-Site Scripting vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44173&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44173']CVE-2023-44173[/URL]
[URL='https://projectworlds.in/']MISC[/URL]
[URL='https://fluidattacks.com/advisories/harrison']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]projectworlds -- online_movie_ticket_booking_system[/LEFT][/TD]
[TD][LEFT]Online Movie Ticket Booking System v1.0 is vulnerable to an authenticated Stored Cross-Site Scripting vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44174&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44174']CVE-2023-44174[/URL]
[URL='https://projectworlds.in/']MISC[/URL]
[URL='https://fluidattacks.com/advisories/mccartney']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]real_time_automation -- 460_series_firmware[/LEFT][/TD]
[TD][LEFT]Real Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway's HTTP interface would redirect to the main page, which is index.htm.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4523&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4523']CVE-2023-4523[/URL]
[URL='https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]resort_reservation_system -- resort_reservation_system[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting (XSS) vulnerability in Resort Reservation System v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the room, name, and description parameters in the manage_room function.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43458&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43458']CVE-2023-43458[/URL]
[URL='https://www.sourcecodester.com/php/16447/resort-reservation-system-php-and-sqlite3-source-code-free-download.html']MISC[/URL]
[URL='https://samh4cks.github.io/posts/cve-2023-43458/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]rite_cms -- rite_cms[/LEFT][/TD]
[TD][LEFT]Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a crafted payload into the Main Menu Items in the Administration Menu.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43878&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43878']CVE-2023-43878[/URL]
[URL='https://github.com/sromanhu/RiteCMS-Stored-XSS---MainMenu/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]rite_cms -- rite_cms[/LEFT][/TD]
[TD][LEFT]Rite CMS 3.0 has a Cross-Site scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload into the Global Content Blocks in the Administration Menu.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43879&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43879']CVE-2023-43879[/URL]
[URL='https://github.com/sromanhu/RiteCMS-Stored-XSS---GlobalContent/tree/main']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]roundcube -- webmail[/LEFT][/TD]
[TD][LEFT]Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43770&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43770']CVE-2023-43770[/URL]
[URL='https://roundcube.net/news/2023/09/15/security-update-1.6.3-released']MISC[/URL]
[URL='https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b']MISC[/URL]
[URL='https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html']MLIST[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]siberiancms -- siberiancms[/LEFT][/TD]
[TD][LEFT]SiberianCMS - CWE-284 Improper Access Control Authorized user may disable a security feature over the network[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39376&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39376']CVE-2023-39376[/URL]
[URL='https://www.gov.il/en/Departments/faq/cve_advisories']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]small_crm -- small_crm[/LEFT][/TD]
[TD][LEFT]A cross-site scripting (XSS) vulnerability in the Add User function of Small CRM v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43331&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43331']CVE-2023-43331[/URL]
[URL='https://github.com/Kartikhunter/CVE/blob/main/CVE-2023-43331']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- expense_tracker_app[/LEFT][/TD]
[TD][LEFT]Sourcecodester Expense Tracker App v1 is vulnerable to Cross Site Scripting (XSS) via add category.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44048&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44048']CVE-2023-44048[/URL]
[URL='https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main']MISC[/URL]
[URL='https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44048.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- service_provider_management_system[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in Service Provider Management System v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the firstname, middlename and lastname parameters in the /php-spms/admin/?page=user endpoint.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43456&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43456']CVE-2023-43456[/URL]
[URL='https://samh4cks.github.io/posts/cve-2023-43456/']MISC[/URL]
[URL='https://www.sourcecodester.com/users/tips23']MISC[/URL]
[URL='https://www.sourcecodester.com/php/16501/service-provider-management-system-using-php-and-mysql-source-code-free-download.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]symantec -- protection_engine[/LEFT][/TD]
[TD][LEFT]Symantec Protection Engine, prior to 9.1.0, may be susceptible to a Hash Leak vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-23958&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23958']CVE-2023-23958[/URL]
[URL='https://support.broadcom.com/external/content/SecurityAdvisories/0/22599']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]taxonworks -- taxonworks[/LEFT][/TD]
[TD][LEFT]TaxonWorks is a web-based workbench designed for taxonomists and biodiversity scientists. Prior to version 0.34.0, a SQL injection vulnerability was found in TaxonWorks that allows authenticated attackers to extract arbitrary data from the TaxonWorks database (including the users table). This issue may lead to information disclosure. Version 0.34.0 contains a fix for the issue.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43640&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43640']CVE-2023-43640[/URL]
[URL='https://github.com/SpeciesFileGroup/taxonworks/security/advisories/GHSA-m9p2-jxr6-4p6c']MISC[/URL]
[URL='https://github.com/SpeciesFileGroup/taxonworks/commit/a98f2dc610a541678e1e51af47659cd8b30179ae']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]teedy -- teedy[/LEFT][/TD]
[TD][LEFT]Teedy v1.11 has a vulnerability in its text editor that allows events to be executed in HTML tags that an attacker could manipulate. Thanks to this, it is possible to execute malicious JavaScript in the webapp.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4892&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N']4.6[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4892']CVE-2023-4892[/URL]
[URL='https://teedy.io']MISC[/URL]
[URL='https://fluidattacks.com/advisories/freebird']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]vmqphp -- vmqphp[/LEFT][/TD]
[TD][LEFT]szvone vmqphp td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43132&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43132']CVE-2023-43132[/URL]
[URL='https://gist.github.com/8FishMan/d42032b1cdcf401a9c27532aa72ccb37']MISC[/URL]
[URL='https://github.com/szvone/vmqphp']MISC[/URL]
[URL='https://gist.github.com/8FishMan/a37417d1fd97046fb00eb11a257008a7']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]vmware -- aria_operations_cloud_foundation[/LEFT][/TD]
[TD][LEFT]VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-34043&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H']6.7[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-34043']CVE-2023-34043[/URL]
[URL='https://www.vmware.com/security/advisories/VMSA-2023-0020.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wbce_cms -- wbce_cms[/LEFT][/TD]
[TD][LEFT]A File upload vulnerability in WBCE v.1.6.1 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS).[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43871&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43871']CVE-2023-43871[/URL]
[URL='https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]withsecure -- f-secure_policy_manager[/LEFT][/TD]
[TD][LEFT]Certain WithSecure products allow XSS via an unvalidated parameter in the endpoint. This affects WithSecure Policy Manager 15 on Windows and Linux.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43763&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43763']CVE-2023-43763[/URL]
[URL='https://www.withsecure.com/en/support/security-advisories/cve-2023-nnn']MISC[/URL]
[URL='https://www.withsecure.com/en/support/security-advisories']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Webvitaly Sitekit plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27628&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27628']CVE-2023-27628[/URL]
[URL='https://patchstack.com/database/vulnerability/sitekit/wordpress-sitekit-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Passback in versions up to, and including, 4.1.10. This is due to insufficient validation when changing the LDAP server. This makes it possible for authenticated attackers, with administrative access and above, to change the LDAP server and retrieve the credentials for the original LDAP server.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4506&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4506']CVE-2023-4506[/URL]
[URL='https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/0585969d-dd08-4058-9d72-138a55a2cdf1?source=cve']MISC[/URL]
[URL='https://wordpress.org/plugins/ldap-login-for-intranet-sites/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Stored Cross-Site Scripting (XSS) vulnerability in David F. Carr RSVPMaker plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27616&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27616']CVE-2023-27616[/URL]
[URL='https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-10-6-4-cross-site-scripting-xss-vulnerability-2?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Estatik Estatik Mortgage Calculator plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28490&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28490']CVE-2023-28490[/URL]
[URL='https://patchstack.com/database/vulnerability/estatik-mortgage-calculator/wordpress-wordpress-mortgage-calculator-estatik-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cornel Raiu WP Search Analytics plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30471&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30471']CVE-2023-30471[/URL]
[URL='https://patchstack.com/database/vulnerability/search-analytics/wordpress-wp-search-analytics-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MyThemeShop URL Shortener by MyThemeShop plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30472&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30472']CVE-2023-30472[/URL]
[URL='https://patchstack.com/database/vulnerability/mts-url-shortener/wordpress-url-shortener-by-mythemeshop-plugin-1-0-17-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Themefic Ultimate Addons for Contact Form 7 plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30493&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30493']CVE-2023-30493[/URL]
[URL='https://patchstack.com/database/vulnerability/ultimate-addons-for-contact-form-7/wordpress-ultimate-addons-for-contact-form-7-plugin-3-1-32-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Milan Petrovic GD Security Headers plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40330&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40330']CVE-2023-40330[/URL]
[URL='https://patchstack.com/database/vulnerability/gd-security-headers/wordpress-gd-security-headers-plugin-1-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Qode Interactive Bridge Core plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40333&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40333']CVE-2023-40333[/URL]
[URL='https://patchstack.com/database/vulnerability/bridge-core/wordpress-bridge-core-plugin-3-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rextheme WP VR plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40663&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40663']CVE-2023-40663[/URL]
[URL='https://patchstack.com/database/vulnerability/wpvr/wordpress-wp-vr-plugin-8-3-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao Donations Made Easy - Smart Donations plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40664&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40664']CVE-2023-40664[/URL]
[URL='https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lasso Simple URLs plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40667&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40667']CVE-2023-40667[/URL]
[URL='https://patchstack.com/database/vulnerability/simple-urls/wordpress-simple-urls-plugin-117-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest Themes Everest News Pro theme td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41235&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41235']CVE-2023-41235[/URL]
[URL='https://patchstack.com/database/vulnerability/everest-news-pro/wordpress-everest-news-pro-theme-1-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Happy addons Happy Elementor Addons Pro plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41236&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41236']CVE-2023-41236[/URL]
[URL='https://patchstack.com/database/vulnerability/happy-elementor-addons-pro/wordpress-happy-elementor-addons-pro-plugin-2-8-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest Themes Arya Multipurpose Pro theme td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41237&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41237']CVE-2023-41237[/URL]
[URL='https://patchstack.com/database/vulnerability/arya-multipurpose-pro/wordpress-arya-multipurpose-pro-theme-1-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in UltimatelySocial Social Media Share Buttons & Social Sharing Icons plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41238&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41238']CVE-2023-41238[/URL]
[URL='https://patchstack.com/database/vulnerability/ultimate-social-media-icons/wordpress-social-media-share-icons-plugin-2-8-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Ditty WordPress plugin before 3.1.25 does not sanitize and escape some parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4148&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4148']CVE-2023-4148[/URL]
[URL='https://wpscan.com/vulnerability/aa39de78-55b3-4237-84db-6fdf6820c58d']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Beplus Sermon'e - Sermons Online plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41653&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41653']CVE-2023-41653[/URL]
[URL='https://patchstack.com/database/vulnerability/sermone-online-sermons-management/wordpress-sermon-e-sermons-online-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pensopay WooCommerce PensoPay plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41691&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41691']CVE-2023-41691[/URL]
[URL='https://patchstack.com/database/vulnerability/woo-pensopay/wordpress-woocommerce-pensopay-plugin-6-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Cross-Site Scripting (XSS) vulnerability in TravelMap plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41860&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41860']CVE-2023-41860[/URL]
[URL='https://patchstack.com/database/vulnerability/travelmap-blog/wordpress-travel-map-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Restrict plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41861&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41861']CVE-2023-41861[/URL]
[URL='https://patchstack.com/database/vulnerability/restricted-content/wordpress-restrict-membership-site-content-and-user-access-restrictions-for-wordpress-plugin-2-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Pepro Dev. Group PeproDev CF7 Database plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41863&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41863']CVE-2023-41863[/URL]
[URL='https://patchstack.com/database/vulnerability/pepro-cf7-database/wordpress-peprodev-cf7-database-plugin-1-7-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in AcyMailing Newsletter Team AcyMailing plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41867&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41867']CVE-2023-41867[/URL]
[URL='https://patchstack.com/database/vulnerability/acymailing/wordpress-acymailing-plugin-8-6-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ram Ratan Maurya, Codestag StagTools plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41868&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41868']CVE-2023-41868[/URL]
[URL='https://patchstack.com/database/vulnerability/stagtools/wordpress-stagtools-plugin-2-3-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Poll Maker Team Poll Maker plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41871&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41871']CVE-2023-41871[/URL]
[URL='https://patchstack.com/database/vulnerability/poll-maker/wordpress-poll-maker-best-wordpress-poll-plugin-plugin-4-7-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Xtemos WoodMart plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41872&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41872']CVE-2023-41872[/URL]
[URL='https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Order Delivery Date for WooCommerce plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41874&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41874']CVE-2023-41874[/URL]
[URL='https://patchstack.com/database/vulnerability/order-delivery-date-for-woocommerce/wordpress-order-delivery-date-for-woocommerce-plugin-3-20-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Locatoraid Store Locator WordPress plugin before 3.9.24 does not sanitize and escape the lpr-search parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4476&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4476']CVE-2023-4476[/URL]
[URL='https://wpscan.com/vulnerability/3ca22b22-fe89-42be-94ec-b164838bcf50']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The DoLogin Security WordPress plugin before 3.7 does not properly sanitize IP addresses coming from the X-Forwarded-For header, which can be used by attackers to conduct Stored XSS attacks via WordPress' login form.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4549&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N']6.1[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4549']CVE-2023-4549[/URL]
[URL='https://wpscan.com/vulnerability/8aebead0-0eab-4d4e-8ceb-8fea0760374f']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor) Cross-Site Scripting (XSS) vulnerability in 93digital Typing Effect plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40605&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40605']CVE-2023-40605[/URL]
[URL='https://patchstack.com/database/vulnerability/animated-typing-effect/wordpress-typing-effect-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in twinpictures, baden03 Collapse-O-Matic plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40669&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40669']CVE-2023-40669[/URL]
[URL='https://patchstack.com/database/vulnerability/jquery-collapse-o-matic/wordpress-collapse-o-matic-plugin-1-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Media Library Assistant plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'mla_gallery' shortcode in versions up to, and including, 3.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4716&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4716']CVE-2023-4716[/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-support.php?rev=2955933#L1531']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f6ae5d-7854-44c7-9fb8-efaa6e850d59?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-support.php?rev=2955933#L1511']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-support.php?rev=2955933#L1515']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/includes/class-mla-shortcode-support.php?rev=2955933#L1507']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2963256/media-library-assistant']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The WP-Matomo Integration (WP-Piwik) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp-piwik' shortcode in versions up to, and including, 1.0.28 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-22[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4774&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4774']CVE-2023-4774[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2969705/wp-piwik#file164']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/wp-piwik/tags/1.0.28/classes/WP_Piwik/Widget/OptOut.php#L28']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/faa4f041-4740-4ebb-afb3-10019ce571be?source=cve']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Contact Form by FormGet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formget' shortcode in versions up to, and including, 5.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-23[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5125&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5125']CVE-2023-5125[/URL]
[URL='https://plugins.trac.wordpress.org/browser/formget-contact-form/trunk/index.php?rev=2145639#L504']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/fdd73289-f292-4903-951e-6a89049d39a7?source=cve']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Modal Window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5161&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5161']CVE-2023-5161[/URL]
[URL='https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/shortcode.php#L53']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file196']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/class-public.php#L73']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file195']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Options for Twenty Seventeen plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'social-links' shortcode in versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5162&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5162']CVE-2023-5162[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/df35d8c6-55ec-4cf5-8055-93ec5193c0a4?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/options-for-twenty-seventeen/tags/2.5.0/options-for-twenty-seventeen.php#L3110']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2971104/options-for-twenty-seventeen']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]This Activity Log WordPress plugin before 2.8.8 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4281&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4281']CVE-2023-4281[/URL]
[URL='https://wpscan.com/vulnerability/f5ea6c8a-6b07-4263-a1be-dd033f078d49']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The DoLogin Security WordPress plugin before 3.7 uses headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4631&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N']5.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4631']CVE-2023-4631[/URL]
[URL='https://wpscan.com/vulnerability/28613fc7-1400-4553-bcc3-24df1cee418e']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Staff / Employee Business Directory for Active Directory plugin for WordPress is vulnerable to LDAP Passback in versions up to, and including, 1.2.3. This is due to insufficient validation when changing the LDAP server. This makes it possible for authenticated attackers, with administrative access and above, to change the LDAP server and retrieve the credentials for the original LDAP server.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4505&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N']4.9[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4505']CVE-2023-4505[/URL]
[URL='https://wordpress.org/plugins/ldap-ad-staff-employee-directory-search/']MISC[/URL]
[URL='https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/1ea40b96-4693-4f98-8e6e-2ed8186cedd8?source=cve']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ankit Agarwal, Priyanshu Mittal Easy Coming Soon plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-25483&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25483']CVE-2023-25483[/URL]
[URL='https://patchstack.com/database/vulnerability/easy-coming-soon/wordpress-easy-coming-soon-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in David F. Carr RSVPMaker plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27617&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27617']CVE-2023-27617[/URL]
[URL='https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-10-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Abel Ruiz GuruWalk Affiliates plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27622&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27622']CVE-2023-27622[/URL]
[URL='https://patchstack.com/database/vulnerability/guruwalk-affiliates/wordpress-guruwalk-affiliates-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Brett Shumaker Simple Staff List plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28790&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28790']CVE-2023-28790[/URL]
[URL='https://patchstack.com/database/vulnerability/simple-staff-list/wordpress-simple-staff-list-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Popup Builder WordPress plugin through 4.1.15 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3226&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3226']CVE-2023-3226[/URL]
[URL='https://wpscan.com/vulnerability/941a9aa7-f4b2-474a-84d9-9a74c99079e2']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jes Madsen Cookies by JM plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40604&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40604']CVE-2023-40604[/URL]
[URL='https://patchstack.com/database/vulnerability/cookies-by-jm/wordpress-cookies-by-jm-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pdfcrowd Save as Image plugin by Pdfcrowd plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40665&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40665']CVE-2023-40665[/URL]
[URL='https://patchstack.com/database/vulnerability/save-as-image-by-pdfcrowd/wordpress-save-as-image-plugin-by-pdfcrowd-plugin-2-16-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40668&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40668']CVE-2023-40668[/URL]
[URL='https://patchstack.com/database/vulnerability/save-as-pdf-by-pdfcrowd/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-2-16-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PluginOps Landing Page Builder plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40675&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40675']CVE-2023-40675[/URL]
[URL='https://patchstack.com/database/vulnerability/page-builder-add/wordpress-landing-page-builder-plugin-1-5-1-1-cross-site-scripting-xss?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jason Crouse, VeronaLabs Slimstat Analytics plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40676&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40676']CVE-2023-40676[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-slimstat/wordpress-slimstat-analytics-plugin-5-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Vertical marquee plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40677&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40677']CVE-2023-40677[/URL]
[URL='https://patchstack.com/database/vulnerability/vertical-marquee-plugin/wordpress-vertical-marquee-plugin-plugin-7-1-cross-site-scripting-xss?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SureCart WordPress Ecommerce For Creating Fast Online Stores plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41241&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41241']CVE-2023-41241[/URL]
[URL='https://patchstack.com/database/vulnerability/surecart/wordpress-surecart-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hassan Ali Snap Pixel plugin td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41242&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41242']CVE-2023-41242[/URL]
[URL='https://patchstack.com/database/vulnerability/snap-pixel/wordpress-snap-pixel-plugin-1-5-7-cross-site-scripting-xss?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Christoph Rado Cookie Notice & Consent plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41948&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41948']CVE-2023-41948[/URL]
[URL='https://patchstack.com/database/vulnerability/cookie-notice-consent/wordpress-cookie-notice-consent-plugin-1-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Avirtum iFolders plugin td> [TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41949&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41949']CVE-2023-41949[/URL]
[URL='https://patchstack.com/database/vulnerability/ifolders/wordpress-ifolders-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The WP Event Manager - Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 3.1.37.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4423&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4423']CVE-2023-4423[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/dd9d22b0-a84a-4bf2-b8b4-89bae2970f29?source=cve']MISC[/URL]
[URL='https://github.com/Jacky-Y/vuls/blob/main/vul5.md']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2969034%40wp-event-manager%2Ftrunk&old=2953169%40wp-event-manager%2Ftrunk&sfp_email=&sfph_mail=']MISC[/URL]
[URL='https://github.com/wpeventmanager/wp-event-manager/issues/1483']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Translate WordPress with GTranslate WordPress plugin before 3.0.4 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). This vulnerability affects multiple parameters.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4502&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N']4.8[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4502']CVE-2023-4502[/URL]
[URL='https://wpscan.com/vulnerability/e4804850-2ac2-4cec-bc27-07ed191d96da']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta.[/LEFT][/TD]
[TD][CENTER]2023-09-23[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5134&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']4.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5134']CVE-2023-5134[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/562fe11f-36a0-4f23-9eed-50ada7ab2961?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/easy-registration-forms/tags/2.1.1/includes/class-user.php#L835']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Simple Cloudflare Turnstile plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'gravity-simple-turnstile' shortcode in versions up to, and including, 1.23.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5135&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5135']CVE-2023-5135[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/91f6c9d3-641d-42f7-bf11-e3c3a44eeb76?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/simple-cloudflare-turnstile/tags/1.23.0/simple-cloudflare-turnstile.php#L72']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/simple-cloudflare-turnstile/tags/1.23.0/inc/integrations/forms/gravity-forms.php#L23']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/changeset/2970368/simple-cloudflare-turnstile#file1']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/simple-cloudflare-turnstile/tags/1.23.0/inc/integrations/forms/gravity-forms.php#L14']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The TM WooCommerce Compare & Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'tm_woo_wishlist_table' shortcode in versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5230&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5230']CVE-2023-5230[/URL]
[URL='https://plugins.trac.wordpress.org/browser/tm-woocommerce-compare-wishlist/tags/1.1.7/includes/wishlist/wishlist.php#L339']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/771ecb8c-feb1-40ea-b47b-a2ae033b3c87?source=cve']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Font Awesome More Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'icon' shortcode in versions up to, and including, 3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5232&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5232']CVE-2023-5232[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/15947764-a070-4715-bd44-cb79b62ed59d?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/font-awesome-more-icons/tags/3.5/plugin.php#L82']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Font Awesome Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'fawesome' shortcode in versions up to, and including, 5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5233&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5233']CVE-2023-5233[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/a2791f48-895f-4099-87ec-41aaac2494a2?source=cve']MISC[/URL]
[URL='https://plugins.trac.wordpress.org/browser/font-awesome-integration/tags/5.0/font-awesome-integration.php#L48']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'vivafbcomment' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5295&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N']6.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5295']CVE-2023-5295[/URL]
[URL='https://plugins.trac.wordpress.org/browser/facebook-comment-by-vivacity/tags/1.4/user-file.php#L172']MISC[/URL]
[URL='https://www.wordfence.com/threat-intel/vulnerabilities/id/602b3b9c-76a7-4b0b-8aad-e554c2fd6910?source=cve']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zephyr -- zephyr[/LEFT][/TD]
[TD][LEFT]In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4258&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N']6.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4258']CVE-2023-4258[/URL]
[URL='https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m34c-cp63-rwh7']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zoho_corp -- manageengine_admanager_plus[/LEFT][/TD]
[TD][LEFT]Zoho ManageEngine ADManager Plus before 7203 allows 2FA bypass (for AuthToken generation) in REST APIs.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41904&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N']5.4[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41904']CVE-2023-41904[/URL]
[URL='https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-41904.html']MISC[/URL][/TD]
[/TR][/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
[HEADING=1]Low Vulnerabilities[/HEADING]
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to access calendar data saved to a temporary directory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-29497&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-29497']CVE-2023-29497[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A lock screen issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. A user may be able to view restricted content from the lock screen.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37448&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37448']CVE-2023-37448[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to access Notes attachments.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40386&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40386']CVE-2023-40386[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-35990&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-35990']CVE-2023-35990[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40384&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40384']CVE-2023-40384[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved handling of caches. This issue is fixed in tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access contacts.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40395&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40395']CVE-2023-40395[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213927']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved handling of caches. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40427&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40427']CVE-2023-40427[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213931']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213932']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A configuration issue was addressed with additional restrictions. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access a user's Photos Library.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40434&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40434']CVE-2023-40434[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to access edited photos saved to a temporary directory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40456&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40456']CVE-2023-40456[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to access edited photos saved to a temporary directory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40520&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40520']CVE-2023-40520[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]apple -- multiple_products[/LEFT][/TD]
[TD][LEFT]A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to read sensitive location information.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41065&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41065']CVE-2023-41065[/URL]
[URL='https://support.apple.com/en-us/HT213937']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213938']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213936']MISC[/URL]
[URL='https://support.apple.com/en-us/HT213940']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cilium -- cilium[/LEFT][/TD]
[TD][LEFT]Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In Cilium clusters where Cilium's Layer 7 proxy has been disabled, creating workloads with [ICODE]policy.cilium.io/proxy-visibility[/ICODE] annotations (in Cilium >= v1.13) or [ICODE]io.cilium.proxy-visibility[/ICODE] annotations (in Cilium td> [TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41332&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L']3.5[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41332']CVE-2023-41332[/URL]
[URL='https://github.com/cilium/cilium/pull/27597']MISC[/URL]
[URL='https://github.com/cilium/cilium/security/advisories/GHSA-24m5-r6hv-ccgp']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]huawei -- emui[/LEFT][/TD]
[TD][LEFT]Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41306&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L']3.7[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41306']CVE-2023-41306[/URL]
[URL='https://consumer.huawei.com/en/support/bulletin/2023/9/']MISC[/URL]
[URL='https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]huawei -- emui[/LEFT][/TD]
[TD][LEFT]Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41310&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L']3.3[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41310']CVE-2023-41310[/URL]
[URL='https://consumer.huawei.com/en/support/bulletin/2023/9/']MISC[/URL]
[URL='https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]matrix -- synapse[/LEFT][/TD]
[TD][LEFT]Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. When users update their passwords, the new credentials may be briefly held in the server database. While this doesn't grant the server any added capabilities-it already learns the users' passwords as part of the authentication process-it does disrupt the expectation that passwords won't be stored in the database. As a result, these passwords could inadvertently be captured in database backups for a longer duration. These temporarily stored passwords are automatically erased after a 48-hour window. This issue has been addressed in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER][URL='https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41335&vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N']3.7[/URL][/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41335']CVE-2023-41335[/URL]
[URL='https://github.com/matrix-org/synapse/pull/16272']MISC[/URL]
[URL='https://github.com/matrix-org/synapse/security/advisories/GHSA-4f74-84v3-j9q5']MISC[/URL][/TD]
[/TR][/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT]
[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]
[/LEFT][/TD]
[TD][LEFT]
[HEADING=1]Severity Not Yet Assigned[/HEADING]
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT]apple -- macos[/LEFT][/TD]
[TD][LEFT]An attacker with standard privileges on macOS when requesting administrator privileges from the application can submit input which causes a buffer overflow resulting in a crash of the application. This could make the application unavailable and allow reading or modification of data.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40307']CVE-2023-40307[/URL]
[URL='https://github.com/SAP/macOS-enterprise-privileges/security/advisories/GHSA-rgq4-wxpj-5jv9']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]argo_cd -- argo_cd[/LEFT][/TD]
[TD][LEFT]Argo CD is a declarative continuous deployment framework for Kubernetes. In Argo CD versions prior to 2.3 (starting at least in v0.1.0, but likely in any version using Helm before 2.3), using a specifically crafted Helm file could reference external Helm charts handled by the same repo-server to leak values, or files from the referenced Helm Chart. This was possible because Helm paths were predictable. The vulnerability worked by adding a Helm chart that referenced Helm resources from predictable paths. Because the paths of Helm charts were predictable and available on an instance of repo-server, it was possible to reference and then render the values and resources from other existing Helm charts regardless of permissions. While generally, secrets are not stored in these files, it was nevertheless possible to reference any values from these charts. This issue was fixed in Argo CD 2.3 and subsequent versions by randomizing Helm paths. User's still using Argo CD 2.3 or below are advised to update to a supported version. If this is not possible, disabling Helm chart rendering, or using an additional repo-server for each Helm chart would prevent possible exploitation.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40026']CVE-2023-40026[/URL]
[URL='https://argo-cd.readthedocs.io/en/stable/operator-manual/installation/#supported-versions']MISC[/URL]
[URL='https://github.com/argoproj/argo-cd/security/advisories/GHSA-6jqw-jwf5-rp8h']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]binalyze -- binalyze[/LEFT][/TD]
[TD][LEFT]An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the fun_1400084d0 function in IREC.sys driver.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41444']CVE-2023-41444[/URL]
[URL='https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945']MISC[/URL]
[URL='https://github.com/magicsword-io/LOLDrivers/blob/main/yaml/d74fdf19-b4b0-4ec2-9c29-4213b064138b.yml']MISC[/URL]
[URL='https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cambium_networks -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cambium Enterprise Wi-Fi System Software before 6.4.2 does not sanitize the ping host argument in device-agent.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-35908']CVE-2022-35908[/URL]
[URL='https://community.cambiumnetworks.com/t/enterprise-wi-fi-system-software-release-6-4-2/87229']CONFIRM[/URL]
[URL='https://www.cambiumnetworks.com/support/security/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]caphyon -- advanced_installer[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in Caphyon Advanced Installer 19.7. This affects an unknown part of the component WinSxS DLL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 19.7.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-240903.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4956']CVE-2022-4956[/URL]
[URL='https://vuldb.com/?id.240903']MISC[/URL]
[URL='https://www.advancedinstaller.com/release-19.7.1.html#bugfixes']MISC[/URL]
[URL='https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240903']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_aironet_access_point_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20176']CVE-2023-20176[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_aironet_access_point_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device. This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20268']CVE-2023-20268[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-capwap-DDMCZS4m']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_catalyst_sd-wan_manager[/LEFT][/TD]
[TD][LEFT]A vulnerability in the SSH service of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to cause a process crash, resulting in a DoS condition for SSH access only. This vulnerability does not prevent the system from continuing to function, and web UI access is not affected. This vulnerability is due to insufficient resource management when an affected system is in an error condition. An attacker could exploit this vulnerability by sending malicious traffic to the affected system. A successful exploit could allow the attacker to cause the SSH process to crash and restart, resulting in a DoS condition for the SSH service.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20262']CVE-2023-20262[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_digital_network_architecture_center[/LEFT][/TD]
[TD][LEFT]A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in a repository that belongs to an internal service on an affected device. This vulnerability is due to insufficient access control enforcement on API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20223']CVE-2023-20223[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ins-acc-con-nHAVDRBZ']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_ios_xe_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in the Multicast Leaf Recycle Elimination (mLRE) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect handling of certain IPv6 multicast packets when they are fanned out more than seven times on an affected device. An attacker could exploit this vulnerability by sending a specific IPv6 multicast or IPv6 multicast VPN (MVPNv6) packet through the affected device. A successful exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20187']CVE-2023-20187[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlre-H93FswRz']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_ios_xe_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20202']CVE-2023-20202[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_ios_xe_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20226']CVE-2023-20226[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_ios_xe_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. Note: Only traffic directed to the affected system can be used to exploit this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20227']CVE-2023-20227[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_ios_xe_software[/LEFT][/TD]
[TD][LEFT]A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20231']CVE-2023-20231[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdij-FzZAeXAy']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_sd-wan_vmanage[/LEFT][/TD]
[TD][LEFT]Vulnerability in the Elasticsearch database used in the of Cisco SD-WAN vManage software could allow an unauthenticated, remote attacker to access the Elasticsearch configuration database of an affected device with the privileges of the elasticsearch user. This vulnerability is due to the presence of a static username and password configured on the vManage. An attacker could exploit this vulnerability by sending a crafted HTTP request to a reachable vManage on port 9200. A successful exploit could allow the attacker to view the Elasticsearch database content. There are workarounds that address this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20034']CVE-2023-20034[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_sd-wan_vmanage[/LEFT][/TD]
[TD][LEFT]A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to inject HTML content. This vulnerability is due to improper validation of user-supplied data in element fields. An attacker could exploit this vulnerability by submitting malicious content within requests and persuading a user to view a page that contains injected content. A successful exploit could allow the attacker to modify pages within the web-based management interface, possibly leading to further browser-based attacks against users of the application.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20179']CVE-2023-20179[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-html-3ZKh8d6x']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_sd-wan_vmanage[/LEFT][/TD]
[TD][LEFT]A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an unauthenticated, remote attacker to gain unauthorized access to the application as an arbitrary user. This vulnerability is due to improper authentication checks for SAML APIs. An attacker could exploit this vulnerability by sending requests directly to the SAML API. A successful exploit could allow the attacker to generate an authorization token sufficient to gain access to the application.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20252']CVE-2023-20252[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_sd-wan_vmanage[/LEFT][/TD]
[TD][LEFT]A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage could allow an authenticated, local attacker to bypass authorization and allow the attacker to roll back the configuration on vManage controllers and edge router device. This vulnerability is due to improper access control in the cli-management interface of an affected system. An attacker with low-privilege (read only) access to the cli could exploit this vulnerability by sending a request to roll back the configuration on for other controller and devices managed by an affected system. A successful exploit could allow the attacker to to roll back the configuration on for other controller and devices managed by an affected system.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20253']CVE-2023-20253[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vman-sc-LRLfu2z']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- cisco_wireless_lan_controller[/LEFT][/TD]
[TD][LEFT]A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause memory leaks that could eventually lead to a device reboot. This vulnerability is due to memory leaks caused by multiple clients connecting under specific conditions. An attacker could exploit this vulnerability by causing multiple wireless clients to attempt to connect to an access point (AP) on an affected device. A successful exploit could allow the attacker to cause the affected device to reboot after a significant amount of time, resulting in a denial of service (DoS) condition.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20251']CVE-2023-20251[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-dos-YSmbUqX3']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- ios[/LEFT][/TD]
[TD][LEFT]A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20109']CVE-2023-20109[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- ios[/LEFT][/TD]
[TD][LEFT]A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP). This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20186']CVE-2023-20186[/URL]
[URL='https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaascp-Tyj4fEJm']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]codehaus-plexus -- codehaus-plexus[/LEFT][/TD]
[TD][LEFT]A flaw was found in codeplex-codehaus. A directory traversal attack (also known as path traversal) aims to access files and directories stored outside the intended folder. By manipulating files with "dot-dot-slash (../)" sequences and their variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system, including application source code, configuration, and other critical system files.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4244']CVE-2022-4244[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2022-4244']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:3906']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2149841']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]codehaus-plexus -- codehaus-plexus[/LEFT][/TD]
[TD][LEFT]A flaw was found in codehaus-plexus. The org.codehaus.plexus.util.xml.XmlWriterUtil#writeComment fails to sanitize comments for a --> sequence. This issue means that text contained in the command string could be interpreted as XML and allow for XML injection.[/LEFT][/TD]
[TD][CENTER]2023-09-25[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4245']CVE-2022-4245[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2022-4245']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:3906']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2149843']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]composer -- composer[/LEFT][/TD]
[TD][LEFT]Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has [ICODE]register_argc_argv[/ICODE] enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure [ICODE]register_argc_argv[/ICODE] is disabled in php.ini and avoid publishing composer.phar to the web as this is not best practice.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43655']CVE-2023-43655[/URL]
[URL='https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c']MISC[/URL]
[URL='https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf']MISC[/URL]
[URL='https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c']MISC[/URL]
[URL='https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]consensys -- gnark-crypto[/LEFT][/TD]
[TD][LEFT]Consensys gnark-crypto through 0.11.2 allows Signature Malleability. This occurs because deserialisation of EdDSA and ECDSA signatures does not ensure that the data is in a certain interval.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44273']CVE-2023-44273[/URL]
[URL='https://github.com/Consensys/gnark-crypto/pull/449']MISC[/URL]
[URL='https://github.com/Consensys/gnark-crypto/releases']MISC[/URL]
[URL='https://verichains.io']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dedebiz -- dedebiz[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240879.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5266']CVE-2023-5266[/URL]
[URL='https://github.com/yhy217/dedebiz--vul/blob/main/time_injection.zip']MISC[/URL]
[URL='https://vuldb.com/?id.240879']MISC[/URL]
[URL='https://github.com/yhy217/dedebiz--vul/issues/1']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240879']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dedebiz -- dedebiz[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in DedeBIZ 6.2 and classified as critical. This issue affects some unknown processing of the file /src/admin/makehtml_taglist_action.php. The manipulation of the argument mktime leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240881 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5268']CVE-2023-5268[/URL]
[URL='https://vuldb.com/?ctiid.240881']MISC[/URL]
[URL='https://github.com/yhy217/dedebiz--vul/issues/2']MISC[/URL]
[URL='https://vuldb.com/?id.240881']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dedecms -- dedecms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in DedeCMS 5.7.111. This vulnerability affects the function AddMyAddon of the file album_add.php. The manipulation of the argument albumUploadFiles leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240940.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5301']CVE-2023-5301[/URL]
[URL='https://vuldb.com/?id.240940']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240940']MISC[/URL]
[URL='https://github.com/Lamber-maybe/cve/blob/main/DedeCMS%20V5.7.111%20Remote%20Code%20Execution%20Vulnerability.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dell -- common_event_enabler[/LEFT][/TD]
[TD][LEFT]Dell Common Event Enabler 8.9.8.2 for Windows and prior, contain an improper access control vulnerability. A local low-privileged malicious user may potentially exploit this vulnerability to gain elevated privileges.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32477']CVE-2023-32477[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000218120/dsa-2023-310-security-update-for-dell-emc-common-event-enabler']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dell -- data_protection_central[/LEFT][/TD]
[TD][LEFT]Dell Data Protection Central, version 19.9, contains an Inadequate Encryption Strength Vulnerability. An unauthenticated network attacker could potentially exploit this vulnerability, allowing an attacker to recover plaintext from a block of ciphertext.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4129']CVE-2023-4129[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000218045/dsa-2023-346-security-update-for-dell-data-protection-central']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]dell -- dell_emc_appsync[/LEFT][/TD]
[TD][LEFT]Dell AppSync, versions 4.4.0.0 to 4.6.0.0 including Service Pack releases, contains an improper access control vulnerability in Embedded Service Enabler component. A local malicious user could potentially exploit this vulnerability during installation leading to a privilege escalation.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32458']CVE-2023-32458[/URL]
[URL='https://www.dell.com/support/kbdoc/en-us/000218038/dsa-2023-331-dell-emc-appsync-security-update-for-dell-embedded-service-enabler-vulnerability']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]discourse -- discourse[/LEFT][/TD]
[TD][LEFT]discourse-encrypt is a plugin that provides a secure communication channel through Discourse. Improper escaping of encrypted topic titles could lead to a cross site scripting (XSS) issue when a site has content security policy (CSP) headers disabled. Having CSP disabled is a non-default configuration, and having it disabled with discourse-encrypt installed will result in a warning in the Discourse admin dashboard. This has been fixed in commit [ICODE]9c75810af9[/ICODE] which is included in the latest version of the discourse-encrypt plugin. Users are advised to upgrade. Users unable to upgrade should ensure that CSP headers are enabled and properly configured.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43657']CVE-2023-43657[/URL]
[URL='https://github.com/discourse/discourse-encrypt/security/advisories/GHSA-5fh6-wp7p-xx7v']MISC[/URL]
[URL='https://github.com/discourse/discourse-encrypt/commit/9c75810af9a474d7edaec67dea66f852c0ba1f4e']MISC[/URL]
[URL='https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]drupal -- core[/LEFT][/TD]
[TD][LEFT]In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5256']CVE-2023-5256[/URL]
[URL='https://www.drupal.org/sa-core-2023-006']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]eaton -- smp_sg-4260[/LEFT][/TD]
[TD][LEFT]Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is not vulnerable anymore.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43775']CVE-2023-43775[/URL]
[URL='https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]economizzer -- economizzer[/LEFT][/TD]
[TD][LEFT]A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38870']CVE-2023-38870[/URL]
[URL='https://github.com/gugoan/economizzer']MISC[/URL]
[URL='https://www.economizzer.org']MISC[/URL]
[URL='https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38870']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]economizzer -- economizzer[/LEFT][/TD]
[TD][LEFT]The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or email address is valid, and when it's not. This may allow an attacker to determine whether a user or email address is valid, or brute force valid usernames and email addresses.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38871']CVE-2023-38871[/URL]
[URL='https://github.com/gugoan/economizzer']MISC[/URL]
[URL='https://www.economizzer.org']MISC[/URL]
[URL='https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38871']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]economizzer -- economizzer[/LEFT][/TD]
[TD][LEFT]An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38872']CVE-2023-38872[/URL]
[URL='https://github.com/gugoan/economizzer']MISC[/URL]
[URL='https://www.economizzer.org']MISC[/URL]
[URL='https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38872']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]economizzer -- economizzer[/LEFT][/TD]
[TD][LEFT]The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer is vulnerable to Clickjacking. Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top-level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38873']CVE-2023-38873[/URL]
[URL='https://github.com/gugoan/economizzer']MISC[/URL]
[URL='https://www.economizzer.org']MISC[/URL]
[URL='https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38873']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]economizzer -- economizzer[/LEFT][/TD]
[TD][LEFT]A remote code execution (RCE) vulnerability via an insecure file upload exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). A malicious attacker can upload a PHP web shell as an attachment when adding a new cash book entry. Afterwards, the attacker may visit the web shell and execute arbitrary commands.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38874']CVE-2023-38874[/URL]
[URL='https://github.com/gugoan/economizzer']MISC[/URL]
[URL='https://www.economizzer.org']MISC[/URL]
[URL='https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38874']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]economizzer -- economizzer[/LEFT][/TD]
[TD][LEFT]A host header injection vulnerability exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This allows an attacker to reset other users' passwords.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38877']CVE-2023-38877[/URL]
[URL='https://github.com/gugoan/economizzer/']MISC[/URL]
[URL='https://www.economizzer.org']MISC[/URL]
[URL='https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38877']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]ecshop -- ecshop[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240924.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5293']CVE-2023-5293[/URL]
[URL='https://vuldb.com/?id.240924']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240924']MISC[/URL]
[URL='https://github.com/xhcccan/code/issues/1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]ecshop -- ecshop[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/order.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240925 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5294']CVE-2023-5294[/URL]
[URL='https://vuldb.com/?id.240925']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240925']MISC[/URL]
[URL='https://github.com/xhcccan/code/issues/2']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]ekakin -- shihonkanri_plus[/LEFT][/TD]
[TD][LEFT]Relative path traversal vulnerability in Shihonkanri Plus Ver9.0.3 and earlier allows a local attacker to execute an arbitrary code by having a legitimate user import a specially crafted backup file of the product.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43825']CVE-2023-43825[/URL]
[URL='https://jvn.jp/en/jp/JVN17434995/']MISC[/URL]
[URL='http://ekakin.la.coocan.jp/index.htm']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]foru_cms -- foru_cms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in ForU CMS. This affects an unknown part of the file /install/index.php. The manipulation of the argument db_name leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-240363. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5221']CVE-2023-5221[/URL]
[URL='https://vuldb.com/?id.240363']MISC[/URL]
[URL='https://github.com/Fovker8/cve/blob/main/rce.md']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240363']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]foru_cms -- foru_cms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in ForU CMS. This vulnerability affects unknown code of the file /admin/cms_admin.php. The manipulation of the argument del leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continuous delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-240868.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5259']CVE-2023-5259[/URL]
[URL='https://vuldb.com/?id.240868']MISC[/URL]
[URL='https://github.com/RCEraser/cve/blob/main/ForU-CMS.md']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240868']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]generex -- ups_cs141[/LEFT][/TD]
[TD][LEFT]There is an unrestricted upload of file vulnerability in Generex CS141 below 2.06 version. An attacker could upload and/or delete any type of file, without any format restriction and without any authentication, in the "upload" directory.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47186']CVE-2022-47186[/URL]
[URL='https://www.incibe-cert.es/en/early-warning/ics-advisories/update-03032023-multiple-vulnerabilities-generex-ups-cs141']MISC[/URL]
[URL='https://www.generex.de/support/changelogs/cs141/page:2']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]generex -- ups_cs141[/LEFT][/TD]
[TD][LEFT]There is a file upload XSS vulnerability in Generex CS141 below 2.06 version. The web application allows file uploading, making it possible to upload a file with HTML content. When HTML files are allowed, XSS payload can be injected into the uploaded file.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47187']CVE-2022-47187[/URL]
[URL='https://www.incibe-cert.es/en/early-warning/ics-advisories/update-03032023-multiple-vulnerabilities-generex-ups-cs141']MISC[/URL]
[URL='https://www.generex.de/support/changelogs/cs141/2-12']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]get-func-name -- get-func-name[/LEFT][/TD]
[TD][LEFT]get-func-name is a module to retrieve a function's name securely and consistently both in NodeJS and the browser. Versions prior to 2.0.1 are subject to a regular expression denial-of-service (redos) vulnerability which may lead to a denial of service when parsing malicious input. This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: '\t'.repeat(54773) + '\t/function/i'. This issue has been addressed in commit [ICODE]f934b228b[/ICODE] which has been included in releases from 2.0.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43646']CVE-2023-43646[/URL]
[URL='https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69']MISC[/URL]
[URL='https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An information disclosure issue in GitLab CE/EE affecting all versions starting from 13.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-0989']CVE-2023-0989[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/417275']MISC[/URL]
[URL='https://hackerone.com/reports/1875515']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An improper authorization issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.2.8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4 before 16.4.1. It allows a project reporter to leak the owner's Sentry instance projects.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2233']CVE-2023-2233[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/408359']MISC[/URL]
[URL='https://hackerone.com/reports/1947211']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3115']CVE-2023-3115[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/414367']MISC[/URL]
[URL='https://hackerone.com/reports/2004158']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to read the source code of a project through a fork created before changing visibility to only project members.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3413']CVE-2023-3413[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/416284']MISC[/URL]
[URL='https://hackerone.com/reports/2027967']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An input validation issue in the asset proxy in GitLab EE, affecting all versions from 12.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1, allowed an authenticated attacker to craft image urls which bypass the asset proxy.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3906']CVE-2023-3906[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/419213']MISC[/URL]
[URL='https://hackerone.com/reports/2071411']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3914']CVE-2023-3914[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/418115']MISC[/URL]
[URL='https://hackerone.com/reports/2040822']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]Denial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3917']CVE-2023-3917[/URL]
[URL='https://hackerone.com/reports/2055158']MISC[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/417896']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3920']CVE-2023-3920[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/417481']MISC[/URL]
[URL='https://hackerone.com/reports/2058121']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3922']CVE-2023-3922[/URL]
[URL='https://hackerone.com/reports/1887323']MISC[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/394770']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge request's source branch.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3979']CVE-2023-3979[/URL]
[URL='https://hackerone.com/reports/2082560']MISC[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/419972']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI/CD jobs of private projects which they are not a member of.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4532']CVE-2023-4532[/URL]
[URL='https://hackerone.com/reports/2084199']MISC[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/423357']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5198']CVE-2023-5198[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/416957']MISC[/URL]
[URL='https://hackerone.com/reports/2041789']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5207']CVE-2023-5207[/URL]
[URL='https://hackerone.com/reports/2174141']MISC[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/425604']MISC[/URL]
[URL='https://gitlab.com/gitlab-org/gitlab/-/issues/425857']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]hashicorp -- vault[/LEFT][/TD]
[TD][LEFT]The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5077']CVE-2023-5077[/URL]
[URL='https://discuss.hashicorp.com/t/hcsec-2023-30-vault-s-google-cloud-secrets-engine-removed-existing-iam-conditions-when-creating-updating-rolesets/58654']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]hashicorp -- vault_enterprise[/LEFT][/TD]
[TD][LEFT]A Vault Enterprise Sentinel Role Governing Policy created by an operator to restrict access to resources in one namespace can be applied to requests outside in another non-descendant namespace, potentially resulting in denial of service. Fixed in Vault Enterprise 1.15.0, 1.14.4, 1.13.8.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3775']CVE-2023-3775[/URL]
[URL='https://discuss.hashicorp.com/t/hcsec-2023-29-vault-enterprise-s-sentinel-rgp-policies-allowed-for-cross-namespace-denial-of-service/58653']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]himitzh -- hoj[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in HimitZH HOJ up to 4.6-9a65e3f. This issue affects some unknown processing of the component Topic Handler. The manipulation leads to sandbox issue. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240365 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5223']CVE-2023-5223[/URL]
[URL='https://vuldb.com/?id.240365']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240365']MISC[/URL]
[URL='https://github.com/payI0ad/cves/issues/1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]hospital-management-system -- hospital-management-system[/LEFT][/TD]
[TD][LEFT]Hospital Management System thru commit 4770d was discovered to contain a SQL injection vulnerability via the app_contact parameter in appsearch.php.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43909']CVE-2023-43909[/URL]
[URL='https://www.notion.so/SQL-Injection-vulnerability-in-app_contact-parameter-on-appsearch-php-directory-2e3daa8975164ee18217c52c43ae1a22']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]hospital-management-system -- hospital-management-system[/LEFT][/TD]
[TD][LEFT]Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5004']CVE-2023-5004[/URL]
[URL='https://fluidattacks.com/advisories/alcocer']MISC[/URL]
[URL='https://github.com/projectworldsofficial/hospital-management-system-in-php/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]hospital-management-system -- hospital-management-system[/LEFT][/TD]
[TD][LEFT]Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5053']CVE-2023-5053[/URL]
[URL='https://github.com/projectworldsofficial/hospital-management-system-in-php/']MISC[/URL]
[URL='https://fluidattacks.com/advisories/shierro']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]huakecms -- huakecms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in huakecms 3.0. Affected by this vulnerability is an unknown functionality of the file /admin/cms_content.php. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240877 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5264']CVE-2023-5264[/URL]
[URL='https://vuldb.com/?id.240877']MISC[/URL]
[URL='https://github.com/yhy217/huakecms-vul/issues/1']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240877']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- license_metric_tool[/LEFT][/TD]
[TD][LEFT]IBM License Metric Tool 9.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 266893.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43044']CVE-2023-43044[/URL]
[URL='https://https://www.ibm.com/support/pages/node/7040605']MISC[/URL]
[URL='https://exchange.xforce.ibmcloud.com/vulnerabilities/266893']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]illumio -- core_pce[/LEFT][/TD]
[TD][LEFT]Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE's operating system user.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5183']CVE-2023-5183[/URL]
[URL='https://docs.illumio.com/Guides/security-advisories/september-2023/cve-2023-5183.htm']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]imagination_technologies -- powervr_image_compression_(pvric)[/LEFT][/TD]
[TD][LEFT]PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44216']CVE-2023-44216[/URL]
[URL='https://blog.imaginationtech.com/introducing-pvric4-taking-image-compression-to-the-next-level/']MISC[/URL]
[URL='https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf']MISC[/URL]
[URL='https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/']MISC[/URL]
[URL='https://blog.imaginationtech.com/reducing-bandwidth-pvric/']MISC[/URL]
[URL='https://www.hertzbleed.com/gpu.zip/']MISC[/URL]
[URL='https://news.ycombinator.com/item?id=37663159']MISC[/URL]
[URL='https://github.com/UT-Security/gpu-zip']MISC[/URL]
[URL='https://www.w3.org/TR/filter-effects-1/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]inure -- inure[/LEFT][/TD]
[TD][LEFT]Missing Authorization in GitHub repository hamza417/inure prior to build94.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5321']CVE-2023-5321[/URL]
[URL='https://github.com/hamza417/inure/commit/57fda918bfd2fb863f579841a46363fe8e10c29b']MISC[/URL]
[URL='https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]jfinalcms -- jfinalcms[/LEFT][/TD]
[TD][LEFT]JFinalCMS foreground message can be embedded malicious code saved in the database. When users browse the comments, these malicious codes embedded in the HTML will be executed, and the user's browser will be controlled by the attacker, so as to achieve the special purpose of the attacker, such as cookie theft[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43191']CVE-2023-43191[/URL]
[URL='https://github.com/etn0tw/cmscve_test/blob/main/README.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]jfinalcms -- jfinalcms[/LEFT][/TD]
[TD][LEFT]SQL injection can exist in a newly created part of the JFinalcms background, and the parameters submitted by users are not filtered. As a result, special characters in parameters destroy the original logic of SQL statements. Attackers can use this vulnerability to execute any SQL statement.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43192']CVE-2023-43192[/URL]
[URL='https://github.com/etn0tw/cve_sql/blob/main/jfinalcms_sql.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]jumpserver -- jumpserver[/LEFT][/TD]
[TD][LEFT]JumpServer is an open-source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42818']CVE-2023-42818[/URL]
[URL='https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]jumpserver -- jumpserver[/LEFT][/TD]
[TD][LEFT]JumpServer is an open-source bastion host. The verification code for resetting user's password is vulnerable to brute-force attacks due to the absence of rate limiting. JumpServer provides a feature allowing users to reset forgotten passwords. Affected users are sent a 6-digit verification code, ranging from 000000 to 999999, to facilitate the password reset. Although the code is only available in 1 minute, this window potentially allows for up to 1,000,000 validation attempts. This issue has been addressed in versions 2.28.20 and 3.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43650']CVE-2023-43650[/URL]
[URL='https://github.com/jumpserver/jumpserver/security/advisories/GHSA-mwx4-8fwc-2xvw']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]jumpserver -- jumpserver[/LEFT][/TD]
[TD][LEFT]JumpServer is an open-source bastion host. An authenticated user can exploit a vulnerability in MongoDB sessions to execute arbitrary commands, leading to remote code execution. This vulnerability may further be leveraged to gain root privileges on the system. Through the WEB CLI interface provided by the koko component, a user logs into the authorized mongoDB database and exploits the MongoDB session to execute arbitrary commands. This vulnerability has been addressed in versions 2.28.20 and 3.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43651']CVE-2023-43651[/URL]
[URL='https://github.com/jumpserver/jumpserver/security/advisories/GHSA-4r5x-x283-wm96']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]jumpserver -- jumpserver[/LEFT][/TD]
[TD][LEFT]JumpServer is an open-source bastion host. As an unauthenticated user, it is possible to authenticate to the core API with a username and an SSH public key without needing a password or the corresponding SSH private key. An SSH public key should be considered public knowledge and should not be used as an authentication secret alone. JumpServer provides an API for the KoKo component to validate user private key logins. This API does not verify the source of requests and will generate a personal authentication token. Given that public keys can be easily leaked, an attacker can exploit the leaked public key and username to authenticate, subsequently gaining access to the current user's information and authorized actions. This issue has been addressed in versions 2.28.20 and 3.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43652']CVE-2023-43652[/URL]
[URL='https://github.com/jumpserver/jumpserver/security/advisories/GHSA-fr8h-xh5x-r8g9']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lemonldap::ng -- lemonldap::ng[/LEFT][/TD]
[TD][LEFT]A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44469']CVE-2023-44469[/URL]
[URL='https://security.lauritz-holtmann.de/post/sso-security-ssrf/']MISC[/URL]
[URL='https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998']MISC[/URL]
[URL='https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.17.1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is an intent redirection in LG ThinQ Service ("com.lge.lms2") in the "com/lge/lms/things/ui/notification/NotificationManager.java" file. This vulnerability could be exploited by a third-party app installed on an LG device by sending a broadcast with the action "com.lge.lms.things.notification.ACTION". Additionally, this vulnerability is very dangerous because LG ThinQ Service is a system app (having android:sharedUserId="android.uid.system" setting). Intent redirection in this app leads to accessing arbitrary not exported activities of absolutely all apps.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44121']CVE-2023-44121[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is to theft of arbitrary files with system privilege in the LockScreenSettings ("com.lge.lockscreensettings") app in the "com/lge/lockscreensettings/dynamicwallpaper/MyCategoryGuideActivity.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The LockScreenSettings app copies the received file to the "/data/shared/dw/mycategory/wallpaper_01.png" path and then changes the file access mode to world-readable and world-writable.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44122']CVE-2023-44122[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is the use of implicit PendingIntents with the PendingIntent.FLAG_MUTABLE set that leads to theft and/or (over-)write of arbitrary files with system privilege in the Bluetooth ("com.lge.bluetoothsetting") app. The attacker's app, if it had access to app notifications, could intercept them and redirect them to its activity, before making it grant access permissions to content providers with the [ICODE]android:grantUriPermissions="true"[/ICODE] flag.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44123']CVE-2023-44123[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is to theft of arbitrary files with system privilege in the Screen recording ("com.lge.gametools.gamerecorder") app in the "com/lge/gametools/gamerecorder/settings/ProfilePreferenceFragment.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The Screen recording app saves contents of arbitrary URIs to SD card which is a world-readable storage.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44124']CVE-2023-44124[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is the use of implicit PendingIntents without the PendingIntent.FLAG_IMMUTABLE set that leads to theft and/or (over-)write of arbitrary files with system privilege in the Personalized service ("com.lge.abba") app. The attacker's app, if it had access to app notifications, could intercept them and redirect them to its activity, before making it grant access permissions to content providers with the [ICODE]android:grantUriPermissions="true"[/ICODE] flag.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44125']CVE-2023-44125[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is that the Call management ("com.android.server.telecom") app patched by LG sends a lot of LG-owned implicit broadcasts that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as call states, durations, called numbers, contacts info, etc.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44126']CVE-2023-44126[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is that the Call management ("com.android.server.telecom") app patched by LG launches implicit intents that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as contact details and phone numbers.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44127']CVE-2023-44127[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is to delete arbitrary files in LGInstallService ("com.lge.lginstallservies") app. The app contains the exported "com.lge.lginstallservies.InstallService" service that exposes an AIDL interface. All its "installPackage*" methods are finally calling the "installPackageVerify()" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44128']CVE-2023-44128[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]lg_electronics -- lg_v60_thin_q_5g[/LEFT][/TD]
[TD][LEFT]The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the [ICODE]android:grantUriPermissions="true"[/ICODE] flag set.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44129']CVE-2023-44129[/URL]
[URL='https://lgsecurity.lge.com/bulletins/mobile#updateDetails']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]libhv -- libhv[/LEFT][/TD]
[TD][LEFT]All versions of the package ithewei/libhv are vulnerable to Cross-site Scripting (XSS) such that when a file with a name containing a malicious payload is served by the application, the filename is displayed without proper sanitization when it is rendered.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26146']CVE-2023-26146[/URL]
[URL='https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766']MISC[/URL]
[URL='https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]libhv -- libhv[/LEFT][/TD]
[TD][LEFT]All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26147']CVE-2023-26147[/URL]
[URL='https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768']MISC[/URL]
[URL='https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]libhv -- libhv[/LEFT][/TD]
[TD][LEFT]All versions of the package ithewei/libhv are vulnerable to CRLF Injection when untrusted user input is used to set request headers. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26148']CVE-2023-26148[/URL]
[URL='https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769']MISC[/URL]
[URL='https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]libnbd -- libnbd[/LEFT][/TD]
[TD][LEFT]A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5215']CVE-2023-5215[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-5215']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2241041']MISC[/URL]
[URL='https://listman.redhat.com/archives/libguestfs/2023-September/032635.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]libvpx -- libvpx[/LEFT][/TD]
[TD][LEFT]VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44488']CVE-2023-44488[/URL]
[URL='https://github.com/webmproject/libvpx/compare/v1.13.0...v1.13.1']MISC[/URL]
[URL='https://github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937']MISC[/URL]
[URL='https://github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f']MISC[/URL]
[URL='https://github.com/webmproject/libvpx/releases/tag/v1.13.1']MISC[/URL]
[URL='http://www.openwall.com/lists/oss-security/2023/09/30/4']MLIST[/URL]
[URL='https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html']MLIST[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of [ICODE]__ip_set_put[/ICODE] on a wrong [ICODE]set[/ICODE]. This issue may allow a local user to crash the system.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42756']CVE-2023-42756[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-42756']MISC[/URL]
[URL='https://seclists.org/oss-sec/2023/q3/242']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2239848']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44466']CVE-2023-44466[/URL]
[URL='https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97']MISC[/URL]
[URL='https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph']MISC[/URL]
[URL='https://www.spinics.net/lists/ceph-devel/msg57909.html']MISC[/URL]
[URL='https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5197']CVE-2023-5197[/URL]
[URL='https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325']MISC[/URL]
[URL='https://kernel.dance/f15f29fd4779be8a418b66e9d52979bb6d6c2325']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]macs_framework_content_management_system -- macs_framework_content_management_system[/LEFT][/TD]
[TD][LEFT]In Macrob7 Macs Framework Content Management System (CMS) 1.1.4f, loose comparison in "isValidLogin()" function during login attempt results in PHP type confusion vulnerability that leads to authentication bypass and takeover of the administrator account.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43154']CVE-2023-43154[/URL]
[URL='https://github.com/ally-petitt/macs-cms-auth-bypass']MISC[/URL]
[URL='https://cxsecurity.com/issue/WLB-2023090075']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mariadb -- mariadb[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5157']CVE-2023-5157[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2240246']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-5157']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]matrix-org -- matrix-hookshot[/LEFT][/TD]
[TD][LEFT]matrix-hookshot is a Matrix bot for connecting to external services like GitHub, GitLab, JIRA, and more. Instances that have enabled transformation functions (those that have [ICODE]generic.allowJsTransformationFunctions[/ICODE] in their config), may be vulnerable to an attack where it is possible to break out of the [ICODE]vm2[/ICODE] sandbox and as a result Hookshot will be vulnerable to this. This problem is only likely to affect users who have allowed untrusted users to apply their own transformation functions. If you have only enabled a limited set of trusted users, this threat is reduced (though not eliminated). Version 4.5.0 and above of hookshot include a new sandbox library which should better protect users. Users are advised to upgrade. Users unable to upgrade should disable [ICODE]generic.allowJsTransformationFunctions[/ICODE] in the config.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43656']CVE-2023-43656[/URL]
[URL='https://github.com/matrix-org/matrix-hookshot/commit/dc126afa6af86d66aefcd23a825326f405bcc894']MISC[/URL]
[URL='https://github.com/matrix-org/matrix-hookshot/security/advisories/GHSA-fr97-pv6w-4cj6']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5159']CVE-2023-5159[/URL]
[URL='https://mattermost.com/security-updates']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly check permissions when retrieving a post allowing for a System Role with the permission to manage channels to read the posts of a DM conversation.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5193']CVE-2023-5193[/URL]
[URL='https://mattermost.com/security-updates']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly validate permissions when demoting and deactivating a user allowing for a system/user manager to demote / deactivate another manager[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5194']CVE-2023-5194[/URL]
[URL='https://mattermost.com/security-updates']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly validate the permissions when soft deleting a team allowing a team member to soft delete other teams that they are not part of[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5195']CVE-2023-5195[/URL]
[URL='https://mattermost.com/security-updates']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to enforce character limits in all possible notification props allowing an attacker to send a really long value for a notification_prop resulting in the server consuming an abnormal quantity of computing resources and possibly becoming temporarily unavailable for its users.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5196']CVE-2023-5196[/URL]
[URL='https://mattermost.com/security-updates']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]microweber -- microweber[/LEFT][/TD]
[TD][LEFT]Use of Hard-coded Credentials in GitHub repository microweber/microweber prior to 2.0.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5318']CVE-2023-5318[/URL]
[URL='https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d']MISC[/URL]
[URL='https://github.com/microweber/microweber/commit/c48b34dfd6cae7a55b452280d692dc62512574b0']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- firefox[/LEFT][/TD]
[TD][LEFT]In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to affect a sandbox escape if the correct data was leaked. This vulnerability affects Firefox < 118.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5170']CVE-2023-5170[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-41/']MISC[/URL]
[URL='https://bugzilla.mozilla.org/show_bug.cgi?id=1846686']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- firefox[/LEFT][/TD]
[TD][LEFT]A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 118.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5172']CVE-2023-5172[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-41/']MISC[/URL]
[URL='https://bugzilla.mozilla.org/show_bug.cgi?id=1852218']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]A compromised content process could have provided malicious data in a [ICODE]PathRecording[/ICODE] resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5169']CVE-2023-5169[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-41/']MISC[/URL]
[URL='https://bugzilla.mozilla.org/show_bug.cgi?id=1846685']MISC[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-43/']MISC[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-42/']MISC[/URL]
[URL='https://www.debian.org/security/2023/dsa-5506']MISC[/URL]
[URL='https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- multiple_products[/LEFT][/TD]
[TD][LEFT]During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5171']CVE-2023-5171[/URL]
[URL='https://bugzilla.mozilla.org/show_bug.cgi?id=1851599']MISC[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-41/']MISC[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-43/']MISC[/URL]
[URL='https://www.mozilla.org/security/advisories/mfsa2023-42/']MISC[/URL]
[URL='https://www.debian.org/security/2023/dsa-5506']MISC[/URL]
[URL='https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]nodebb_inc. -- nodebb[/LEFT][/TD]
[TD][LEFT]Denial-of-service in NodeBB td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30591']CVE-2023-30591[/URL]
[URL='https://github.com/NodeBB/NodeBB/commit/4d2d76897a02e7068ab74c81d17a2febfae8bfb9']MISC[/URL]
[URL='https://github.com/NodeBB/NodeBB/commit/830f142b7aea2e597294a84d52c05aab3a3539ca']MISC[/URL]
[URL='https://github.com/NodeBB/NodeBB/commit/37b48b82a4bc7680c6e4c42647209010cb239c2c']MISC[/URL]
[URL='https://starlabs.sg/advisories/23/23-30591/']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]okhttp -- okhttp[/LEFT][/TD]
[TD][LEFT]A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-0833']CVE-2023-0833[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:1241']MISC[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-0833']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:3223']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2169845']MISC[/URL]
[URL='https://github.com/square/okhttp/issues/6738']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]online_banquet_booking_system -- online_banquet_booking_system[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as problematic, was found in Online Banquet Booking System 1.0. Affected is an unknown function of the file /view-booking-detail.php of the component Account Detail Handler. The manipulation of the argument username leads to cross site scripting. It is possible to launch the attack remotely. VDB-240942 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5303']CVE-2023-5303[/URL]
[URL='https://vuldb.com/?id.240942']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240942']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]online_banquet_booking_system -- online_banquet_booking_system[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in Online Banquet Booking System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /book-services.php of the component Service Booking. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-240943.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5304']CVE-2023-5304[/URL]
[URL='https://vuldb.com/?id.240943']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240943']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]online_banquet_booking_system -- online_banquet_booking_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Online Banquet Booking System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /mail.php of the component Contact Us Page. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-240944.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5305']CVE-2023-5305[/URL]
[URL='https://vuldb.com/?id.240944']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240944']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]online_book_store_project -- online_book_store_project[/LEFT][/TD]
[TD][LEFT]Online Book Store Project v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'image' parameter of admin_edit.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43740']CVE-2023-43740[/URL]
[URL='https://projectworlds.in/']MISC[/URL]
[URL='https://fluidattacks.com/advisories/shagrath']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]openfga -- openfga[/LEFT][/TD]
[TD][LEFT]OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA is vulnerable to a denial-of-service attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. Users are advised to upgrade to v1.3.2 and update any offending models. There are no known workarounds for this vulnerability. Note that for models which contained cycles or a relation definition that has the relation itself in its evaluation path, checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. Users who do not have cyclic models are unaffected.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43645']CVE-2023-43645[/URL]
[URL='https://github.com/openfga/openfga/security/advisories/GHSA-2hm9-h873-pgqh']MISC[/URL]
[URL='https://github.com/openfga/openfga/commit/725296025fd81227c89525808652c6acd4a605f6']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]openrapid -- rapidcms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240867.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5258']CVE-2023-5258[/URL]
[URL='https://github.com/yhy217/rapidcms-vul/issues/4']MISC[/URL]
[URL='https://vuldb.com/?id.240867']MISC[/URL]
[URL='https://github.com/OpenRapid/rapidcms/issues/9']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240867']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]openrapid -- rapidcms[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240871.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5262']CVE-2023-5262[/URL]
[URL='https://vuldb.com/?ctiid.240871']MISC[/URL]
[URL='https://github.com/OpenRapid/rapidcms/issues/10']MISC[/URL]
[URL='https://vuldb.com/?id.240871']MISC[/URL]
[URL='https://github.com/yhy217/rapidcms-vul/issues/5']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]opnsense -- opnsense[/LEFT][/TD]
[TD][LEFT]OPNsense before 23.7.5 allows XSS via the index.php column_count parameter to the Lobby Dashboard.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44275']CVE-2023-44275[/URL]
[URL='https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense']MISC[/URL]
[URL='https://github.com/opnsense/core/commit/484753b2abe3fd0fcdb73d8bf00c3fc3709eb8b7']MISC[/URL]
[URL='https://github.com/opnsense/core/compare/23.7.4...23.7.5']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]opnsense -- opnsense[/LEFT][/TD]
[TD][LEFT]OPNsense before 23.7.5 allows XSS via the index.php sequence parameter to the Lobby Dashboard.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44276']CVE-2023-44276[/URL]
[URL='https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense']MISC[/URL]
[URL='https://github.com/opnsense/core/commit/484753b2abe3fd0fcdb73d8bf00c3fc3709eb8b7']MISC[/URL]
[URL='https://github.com/opnsense/core/compare/23.7.4...23.7.5']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]oracle -- apache_avro[/LEFT][/TD]
[TD][LEFT]When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39410']CVE-2023-39410[/URL]
[URL='https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds']MISC[/URL]
[URL='http://www.openwall.com/lists/oss-security/2023/09/29/6']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "tracking_number" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43702']CVE-2023-43702[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "product_info[][name]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43703']CVE-2023-43703[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "title" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43704']CVE-2023-43704[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "translation_value[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43705']CVE-2023-43705[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "email_templates_key" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43706']CVE-2023-43706[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "CatalogsPageDescriptionForm[1][name] " parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43707']CVE-2023-43707[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1](MODULE_PAYMENT_SAGE_PAY_SERVER_TEXT_TITLE)" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43708']CVE-2023-43708[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1](MODULE)" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43709']CVE-2023-43709[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1][MODULE_SHIPPING_PERCENT_TEXT_TITLE]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43710']CVE-2023-43710[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "admin_firstname" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43711']CVE-2023-43711[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "access_levels_name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43712']CVE-2023-43712[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability, which allows attackers to inject JS via the "title" parameter, in the "/admin/admin-menu/add-submit" endpoint, which can lead to unauthorized execution of scripts in a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43713']CVE-2023-43713[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "SKIP_CART_PAGE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43714']CVE-2023-43714[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "ENTRY_FIRST_NAME_MIN_LENGTH_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43715']CVE-2023-43715[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MAX_DISPLAY_NEW_PRODUCTS_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43716']CVE-2023-43716[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MSEARCH_HIGHLIGHT_ENABLE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43717']CVE-2023-43717[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MSEARCH_ENABLE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43718']CVE-2023-43718[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "SHIPPING_GENDER_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43719']CVE-2023-43719[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "BILLING_GENDER_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43720']CVE-2023-43720[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "PACKING_SLIPS_SUMMARY_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43721']CVE-2023-43721[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_status_groups_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43722']CVE-2023-43722[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_status_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43723']CVE-2023-43723[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "derb6zmklgtjuhh2cn5chn2qjbm2stgmfa4.oastify.comscription[1][name]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43724']CVE-2023-43724[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_products_status_name_long[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43725']CVE-2023-43725[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_products_status_manual_name_long[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43726']CVE-2023-43726[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "stock_indication_text[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43727']CVE-2023-43727[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "stock_delivery_terms_text[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43728']CVE-2023-43728[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "xsell_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43729']CVE-2023-43729[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "countries_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43730']CVE-2023-43730[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "zone_name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43731']CVE-2023-43731[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "tax_class_title" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43732']CVE-2023-43732[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "company_address" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43733']CVE-2023-43733[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43734']CVE-2023-43734[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "formats_titles[7]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43735']CVE-2023-43735[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "featured_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5111']CVE-2023-5111[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "specials_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5112']CVE-2023-5112[/URL]
[URL='https://fluidattacks.com/advisories/bts/']MISC[/URL]
[URL='https://www.oscommerce.com/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]palantir -- gotham-fe-bundle[/LEFT][/TD]
[TD][LEFT]Palantir Gotham was found to be vulnerable to a bug where under certain circumstances, the frontend could have applied an incorrect classification to a newly created property or link.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30961']CVE-2023-30961[/URL]
[URL='https://palantir.safebase.us/?tcuUid=2755c49f-2c30-459e-8bdf-f95ef3692da4']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]pgyer -- codefever[/LEFT][/TD]
[TD][LEFT]An issue in PGYER codefever v.2023.8.14-2ce4006 allows a remote attacker to execute arbitrary code via a crafted request to the branchList component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44080']CVE-2023-44080[/URL]
[URL='https://gist.github.com/one-pyy/330548f740415dff49f59d56e14b4219']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajax_poll_script[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in phpkobo Ajax Poll Script 3.18. Affected by this vulnerability is an unknown functionality of the file ajax-poll.php of the component Poll Handler. The manipulation leads to improper enforcement of a single, unique action. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240949 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5313']CVE-2023-5313[/URL]
[URL='https://vuldb.com/?ctiid.240949']MISC[/URL]
[URL='https://vuldb.com/?id.240949']MISC[/URL]
[URL='https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5227']CVE-2023-5227[/URL]
[URL='https://github.com/thorsten/phpmyfaq/commit/abf52487422ce47195c8a80bd904a7af39f60297']MISC[/URL]
[URL='https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5316']CVE-2023-5316[/URL]
[URL='https://github.com/thorsten/phpmyfaq/commit/332d2e4a83251d406ca58dd11c27c598673aa5fa']MISC[/URL]
[URL='https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5317']CVE-2023-5317[/URL]
[URL='https://github.com/thorsten/phpmyfaq/commit/ec551bdf1566ede1e55f289888c446f877ad9a83']MISC[/URL]
[URL='https://huntr.dev/bounties/5e146e7c-60c7-498b-9ffe-fd4cb4ca8c54']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5319']CVE-2023-5319[/URL]
[URL='https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d']MISC[/URL]
[URL='https://github.com/thorsten/phpmyfaq/commit/95ed9b20557ed930d4eed1f3a6db713416f31131']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5320']CVE-2023-5320[/URL]
[URL='https://github.com/thorsten/phpmyfaq/commit/e92369543959772adcdab4f36c837faa27490346']MISC[/URL]
[URL='https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]postcss -- postcss[/LEFT][/TD]
[TD][LEFT]An issue was discovered in PostCSS before 8.4.31. It affects linters using PostCSS to parse external Cascading Style Sheets (CSS). There may be \r discrepancies, as demonstrated by @font-face{ font:(\r/*);} in a rule.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44270']CVE-2023-44270[/URL]
[URL='https://github.com/postcss/postcss/blob/main/lib/tokenize.js#L25']MISC[/URL]
[URL='https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5']MISC[/URL]
[URL='https://github.com/postcss/postcss/releases/tag/8.4.31']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]PrestaShop is an open-source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shop's functionality. Commit [ICODE]ce1f6708[/ICODE] addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43663']CVE-2023-43663[/URL]
[URL='https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6jmf-2pfc-q9m7']MISC[/URL]
[URL='https://github.com/PrestaShop/PrestaShop/commit/ce1f67083537194e974caf86c57e547a0aaa46cd']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]PrestaShop is an open-source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method [ICODE]ajaxProcessGetPossibleHookingListForModule[/ICODE] doesn't check access rights. This issue has been addressed in commit [ICODE]15bd281c[/ICODE] which is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43664']CVE-2023-43664[/URL]
[URL='https://github.com/PrestaShop/PrestaShop/commit/15bd281c18f032a5134a8d213b44d24829d45762']MISC[/URL]
[URL='https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gvrg-62jp-rf7j']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]pretix -- pretix[/LEFT][/TD]
[TD][LEFT]pretix before 2023.7.2 allows Pillow to parse EPS files.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44464']CVE-2023-44464[/URL]
[URL='https://github.com/pretix/pretix/tags']MISC[/URL]
[URL='https://github.com/pretix/pretix/compare/v2023.7.1...v2023.7.2']MISC[/URL]
[URL='https://pretix.eu/about/en/ticketing']MISC[/URL]
[URL='https://github.com/pretix/pretix/commit/8583bfb7d97263e9e923ad5d7f123ca1cadc8f2e']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]proxmox_server_solutions_gmbh -- multiple_products[/LEFT][/TD]
[TD][LEFT]An issue in Proxmox Server Solutions GmbH Proxmox VE v.5.4 thru v.8.0, Proxmox Backup Server v.1.1 thru v.3.0, and Proxmox Mail Gateway v.7.1 thru v.8.0 allows a remote authenticated attacker to escalate privileges via bypassing the two-factor authentication component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43320']CVE-2023-43320[/URL]
[URL='https://github.com/proxmox/proxmox-rs/commit/50b793db8d3421bbfe2bce060a486263f18a90cb']MISC[/URL]
[URL='https://bugzilla.proxmox.com/show_bug.cgi?id=4579']MISC[/URL]
[URL='https://bugzilla.proxmox.com/show_bug.cgi?id=4584']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]pydash -- pydash[/LEFT][/TD]
[TD][LEFT]This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects. [B]Note:[/B] The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied: 1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the [B]init[/B].[B]globals[/B] path is not accessible) 2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method) The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26145']CVE-2023-26145[/URL]
[URL='https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021']MISC[/URL]
[URL='https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca']MISC[/URL]
[URL='https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]pytorch -- serve[/LEFT][/TD]
[TD][LEFT]TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43654']CVE-2023-43654[/URL]
[URL='https://github.com/pytorch/serve/releases/tag/v0.8.2']MISC[/URL]
[URL='https://github.com/pytorch/serve/pull/2534']MISC[/URL]
[URL='https://github.com/pytorch/serve/security/advisories/GHSA-8fxr-qfr9-p34w']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]quill-mention -- quill-mention[/LEFT][/TD]
[TD][LEFT]Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function. [B]Note:[/B] If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26149']CVE-2023-26149[/URL]
[URL='https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549']MISC[/URL]
[URL='https://codepen.io/ALiangLiang/pen/mdQMJXK']MISC[/URL]
[URL='https://github.com/quill-mention/quill-mention/blob/0aa9847719257496b14ac5401872c4e2ffcbc3d1/src/quill.mention.js%23L391']MISC[/URL]
[URL='https://github.com/quill-mention/quill-mention/pull/341']MISC[/URL]
[URL='https://github.com/quill-mention/quill-mention/commit/e85262ddced0a7f0b6fc8350d236a68bd1e28385']MISC[/URL]
[URL='https://github.com/quill-mention/quill-mention/issues/255']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]rdiffweb -- rdiffweb[/LEFT][/TD]
[TD][LEFT]Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5289']CVE-2023-5289[/URL]
[URL='https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce']MISC[/URL]
[URL='https://github.com/ikus060/rdiffweb/commit/06f89b43469aae70e8833e55192721523f86c5a2']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]red_hat -- amq_broker[/LEFT][/TD]
[TD][LEFT]A flaw was found in Red Hat AMQ Broker Operator, where it displayed a password defined in ActiveMQArtemisAddress CR, shown in plain text in the Operator Log. This flaw allows an authenticated local attacker to access information outside of their permissions.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4065']CVE-2023-4065[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-4065']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2224630']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:4720']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]red_hat -- amq_broker[/LEFT][/TD]
[TD][LEFT]A flaw was found in Red Hat's AMQ Broker, which stores certain passwords in a secret security-properties-prop-module, defined in ActivemqArtemisSecurity CR; however, they are shown in plaintext in the StatefulSet details yaml of AMQ Broker.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4066']CVE-2023-4066[/URL]
[URL='https://access.redhat.com/security/cve/CVE-2023-4066']MISC[/URL]
[URL='https://bugzilla.redhat.com/show_bug.cgi?id=2224677']MISC[/URL]
[URL='https://access.redhat.com/errata/RHSA-2023:4720']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]samsung-- exynos[/LEFT][/TD]
[TD][LEFT]Samsung Mobile Processor Exynos 2200 allows a GPU Double Free (issue 1 of 2).[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41911']CVE-2023-41911[/URL]
[URL='https://semiconductor.samsung.com/support/quality-support/product-security-updates/']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]scylladb -- scylladb[/LEFT][/TD]
[TD][LEFT]Scylladb is a NoSQL data store using the seastar framework, compatible with Apache Cassandra. Authenticated users who are authorized to create tables in a keyspace can escalate their privileges to access a table in the same keyspace, even if they don't have permissions for that table. This issue has not yet been patched. A workaround to address this issue is to disable CREATE privileges on a keyspace and create new tables on behalf of other users.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33972']CVE-2023-33972[/URL]
[URL='https://github.com/scylladb/scylladb/security/advisories/GHSA-ww5v-p45p-3vhq']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]shokoanime -- shokoserver[/LEFT][/TD]
[TD][LEFT]ShokoServer is a media server which specializes in organizing anime. In affected versions the [ICODE]/api/Image/WithPath[/ICODE] endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter [ICODE]serverImagePath[/ICODE], which is not sanitized in any way before being passed to [ICODE]System.IO.File.OpenRead[/ICODE], which results in an arbitrary file read. This issue may lead to an arbitrary file read which is exacerbated in the windows installer which installs the ShokoServer as administrator. Any unauthenticated attacker may be able to access sensitive information and read files stored on the server. The [ICODE]/api/Image/WithPath[/ICODE] endpoint has been removed in commit [ICODE]6c57ba0f0[/ICODE] which will be included in subsequent releases. Users should limit access to the [ICODE]/api/Image/WithPath[/ICODE] endpoint or manually patch their installations until a patched release is made. This issue was discovered by the GitHub Security lab and is also indexed as GHSL-2023-191.[/LEFT][/TD]
[TD][CENTER]2023-09-28[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43662']CVE-2023-43662[/URL]
[URL='https://github.com/ShokoAnime/ShokoServer/security/advisories/GHSA-mwcv-ghjq-8f2g']MISC[/URL]
[URL='https://github.com/ShokoAnime/ShokoServer/commit/6c57ba0f073d6be5a4f508c46c2ce36727cbce80']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sick_ag -- sim1012[/LEFT][/TD]
[TD][LEFT]A remote unauthorized attacker may connect to the SIM1012, interact with the device and change configuration settings. The adversary may also reset the SIM and in the worst case upload a new firmware version to the device.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5288']CVE-2023-5288[/URL]
[URL='https://sick.com/psirt']MISC[/URL]
[URL='https://sick.com/.well-known/csaf/white/2023/sca-2023-0008.pdf']MISC[/URL]
[URL='https://sick.com/.well-known/csaf/white/2023/sca-2023-0008.json']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]silabs.com -- gsdk[/LEFT][/TD]
[TD][LEFT]Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3024']CVE-2023-3024[/URL]
[URL='https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ViQvHQAV/?operationContext=S1']MISC[/URL]
[URL='https://github.com/SiliconLabs/gecko_sdk']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-240882 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5269']CVE-2023-5269[/URL]
[URL='https://vuldb.com/?ctiid.240882']MISC[/URL]
[URL='https://vuldb.com/?id.240882']MISC[/URL]
[URL='https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%201.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5270']CVE-2023-5270[/URL]
[URL='https://vuldb.com/?ctiid.240883']MISC[/URL]
[URL='https://vuldb.com/?id.240883']MISC[/URL]
[URL='https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%202.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5271']CVE-2023-5271[/URL]
[URL='https://vuldb.com/?ctiid.240884']MISC[/URL]
[URL='https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%203.pdf']MISC[/URL]
[URL='https://vuldb.com/?id.240884']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file edit_parcel.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-240885 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5272']CVE-2023-5272[/URL]
[URL='https://vuldb.com/?id.240885']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240885']MISC[/URL]
[URL='https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%204.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of the file manage_parcel_status.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240886 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5273']CVE-2023-5273[/URL]
[URL='https://vuldb.com/?ctiid.240886']MISC[/URL]
[URL='https://vuldb.com/?id.240886']MISC[/URL]
[URL='https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%206.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5302']CVE-2023-5302[/URL]
[URL='https://vuldb.com/?ctiid.240941']MISC[/URL]
[URL='https://vuldb.com/?id.240941']MISC[/URL]
[URL='https://github.com/rohit0x5/poc/blob/main/cve_2']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in SourceCodester Engineers Online Portal 1.0. This vulnerability affects unknown code of the file downloadable_student.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-240904.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5276']CVE-2023-5276[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20downloadable_student.php%20has%20Sqlinjection.pdf']MISC[/URL]
[URL='https://vuldb.com/?id.240904']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240904']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in SourceCodester Engineers Online Portal 1.0. This issue affects some unknown processing of the file student_avatar.php. The manipulation of the argument change leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240905 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5277']CVE-2023-5277[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240905']MISC[/URL]
[URL='https://vuldb.com/?id.240905']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240906 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5278']CVE-2023-5278[/URL]
[URL='https://vuldb.com/?ctiid.240906']MISC[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20login.php%20has%20Sqlinjection.pdf']MISC[/URL]
[URL='https://vuldb.com/?id.240906']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file my_classmates.php. The manipulation of the argument teacher_class_student_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240907.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5279']CVE-2023-5279[/URL]
[URL='https://vuldb.com/?ctiid.240907']MISC[/URL]
[URL='https://vuldb.com/?id.240907']MISC[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20my_classmates.php%20%20has%20Sqlinjection.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file my_students.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240908.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5280']CVE-2023-5280[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20my_students.php%20has%20Sqlinjection.pdf']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240908']MISC[/URL]
[URL='https://vuldb.com/?id.240908']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been classified as critical. This affects an unknown part of the file remove_inbox_message.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240909 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5281']CVE-2023-5281[/URL]
[URL='https://vuldb.com/?ctiid.240909']MISC[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20remove_inbox_message.php%20has%20Sqlinjection.pdf']MISC[/URL]
[URL='https://vuldb.com/?id.240909']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file seed_message_student.php. The manipulation of the argument teacher_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240910 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5282']CVE-2023-5282[/URL]
[URL='https://vuldb.com/?id.240910']MISC[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20seed_message_student.php%20has%20Sqlinjection.pdf']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240910']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file teacher_signup.php. The manipulation of the argument firstname/lastname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240911.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5283']CVE-2023-5283[/URL]
[URL='https://vuldb.com/?id.240911']MISC[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20teacher_signup.php%20%20has%20Sqlinjection.pdf']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240911']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file upload_save_student.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240912.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5284']CVE-2023-5284[/URL]
[URL='https://vuldb.com/?id.240912']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240912']MISC[/URL]
[URL='https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20upload_save_student.php%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- expense_tracker_app[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as problematic, has been found in SourceCodester Expense Tracker App v1. Affected by this issue is some unknown functionality of the file add_category.php of the component Category Handler. The manipulation of the argument category_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240914 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5286']CVE-2023-5286[/URL]
[URL='https://vuldb.com/?id.240914']MISC[/URL]
[URL='https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240914']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- simple_membership_system[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in SourceCodester Simple Membership System 1.0. This issue affects some unknown processing of the file group_validator.php. The manipulation of the argument club_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240869 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5260']CVE-2023-5260[/URL]
[URL='https://vuldb.com/?id.240869']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240869']MISC[/URL]
[URL='https://github.com/E1even-321/Membership-System/blob/main/Simple-Membership-System%20group_validator.php%20has%20Sqlinjection.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- task_management_system[/LEFT][/TD]
[TD][LEFT]A Stored Cross Site Scripting (XSS) vulnerability was found in SourceCodester Task Management System 1.0. It allows attackers to execute arbitrary code via parameter field in index.php?page=project_list.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43944']CVE-2023-43944[/URL]
[URL='https://purring-climb-52a.notion.site/Reflected-Cross-site-scripting-b6fd50b94b464313847bb52d4049154f?pvs=4']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]tibco_software_inc. -- tibco_nimbus[/LEFT][/TD]
[TD][LEFT]The Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: versions 10.6.0 and below.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26218']CVE-2023-26218[/URL]
[URL='https://www.tibco.com/services/support/advisories']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- oa_2017[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in Tongda OA 2017. Affected is an unknown function of the file general/hr/manage/staff_title_evaluation/delete.php. The manipulation of the argument EVALUATION_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240870 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5261']CVE-2023-5261[/URL]
[URL='https://github.com/csbsong/bug_report/blob/main/sql2.md']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240870']MISC[/URL]
[URL='https://vuldb.com/?id.240870']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- oa_2017[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in Tongda OA 2017. Affected by this issue is some unknown functionality of the file general/hr/manage/staff_transfer/delete.php. The manipulation of the argument TRANSFER_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240878 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5265']CVE-2023-5265[/URL]
[URL='https://vuldb.com/?id.240878']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240878']MISC[/URL]
[URL='https://github.com/YaGaoT/cve/blob/main/sql.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- oa_2017[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/recruit/hr_pool/delete.php. The manipulation of the argument EXPERT_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-240880.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5267']CVE-2023-5267[/URL]
[URL='https://vuldb.com/?ctiid.240880']MISC[/URL]
[URL='https://vuldb.com/?id.240880']MISC[/URL]
[URL='https://github.com/kpz-wm/cve/blob/main/sql.md']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- oa_2017[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in Tongda OA 2017. Affected by this vulnerability is an unknown functionality of the file general/hr/recruit/recruitment/delete.php. The manipulation of the argument RECRUITMENT_ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-240913 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5285']CVE-2023-5285[/URL]
[URL='https://vuldb.com/?id.240913']MISC[/URL]
[URL='https://github.com/OliverWu23/cve/blob/main/sql.md']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240913']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- oa_2017[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240938 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5298']CVE-2023-5298[/URL]
[URL='https://github.com/szh0105/cve/blob/main/sql.md']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240938']MISC[/URL]
[URL='https://vuldb.com/?id.240938']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]ttsplanning -- ttsplanning[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5300']CVE-2023-5300[/URL]
[URL='https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/TTSPlanning/TTSPlanning.md']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240939']MISC[/URL]
[URL='https://vuldb.com/?id.240939']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]viessmann -- vitogate_300[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5222']CVE-2023-5222[/URL]
[URL='https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_HardcodedPassword.md']MISC[/URL]
[URL='https://vuldb.com/?id.240364']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240364']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]warp-tech -- warpgate[/LEFT][/TD]
[TD][LEFT]Warpgate is a smart SSH, HTTPS and MySQL bastion host for Linux that doesn't need special client apps. The SSH key verification for a user can be bypassed by sending an SSH key offer without a signature. This allows bypassing authentication under following conditions: 1. The attacker knows the username and a valid target name 2. The attacked knows the user's public key and 3. Only SSH public key authentication is required for the user account. This issue has been addressed in version 0.8.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43660']CVE-2023-43660[/URL]
[URL='https://github.com/warp-tech/warpgate/commit/a4df7f7a21395cfaee7a9789d1e3846290caeb63']MISC[/URL]
[URL='https://github.com/warp-tech/warpgate/security/advisories/GHSA-3cjp-w4cp-m9c8']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]whitehsbg -- jndiexploit[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5257']CVE-2023-5257[/URL]
[URL='https://vuldb.com/?id.240866']MISC[/URL]
[URL='https://github.com/WhiteHSBG/JNDIExploit/issues/10']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240866']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39308']CVE-2023-39308[/URL]
[URL='https://patchstack.com/database/vulnerability/userfeedback-lite/wordpress-userfeedback-lite-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL]
[URL='https://revan-ar.medium.com/cve-2023-39308-wordpress-plugin-user-feedback-1-0-7-unauthenticated-stored-xss-db992a01686a']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Andreas Heigl authLdap plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41655']CVE-2023-41655[/URL]
[URL='https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Groundhogg Inc. HollerBox plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41657']CVE-2023-41657[/URL]
[URL='https://patchstack.com/database/vulnerability/holler-box/wordpress-hollerbox-plugin-2-3-2-cross-site-scripting-xss?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Photo Gallery Slideshow & Masonry Tiled Gallery plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41658']CVE-2023-41658[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-responsive-photo-gallery/wordpress-photo-gallery-slideshow-masonry-tiled-gallery-plugin-1-0-13-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41661']CVE-2023-41661[/URL]
[URL='https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ulf Benjaminsson WP-dTree plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41662']CVE-2023-41662[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Giovambattista Fazioli WP Bannerize Pro plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41663']CVE-2023-41663[/URL]
[URL='https://patchstack.com/database/vulnerability/wp-bannerize-pro/wordpress-wp-bannerize-pro-plugin-1-6-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Stockdio Stock Quotes List plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41666']CVE-2023-41666[/URL]
[URL='https://patchstack.com/database/vulnerability/stock-quotes-list/wordpress-stock-quotes-list-plugin-2-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Irina Sokolovskaya Goods Catalog plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41687']CVE-2023-41687[/URL]
[URL='https://patchstack.com/database/vulnerability/goods-catalog/wordpress-goods-catalog-plugin-2-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve']MISC[/URL][/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]xinhu -- rockoa[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5296']CVE-2023-5296[/URL]
[URL='https://github.com/magicwave18/vuldb/issues/1']MISC[/URL]
[URL='https://vuldb.com/?id.240926']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240926']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]xinhu -- rockoa[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5297']CVE-2023-5297[/URL]
[URL='https://github.com/magicwave18/vuldb/issues/2']MISC[/URL]
[URL='https://vuldb.com/?ctiid.240927']MISC[/URL]
[URL='https://vuldb.com/?id.240927']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]xrdp -- xrdp[/LEFT][/TD]
[TD][LEFT]xrdp is an open-source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked. Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42822']CVE-2023-42822[/URL]
[URL='https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw']MISC[/URL]
[URL='https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]yzncms -- yzncms[/LEFT][/TD]
[TD][LEFT]A stored cross-site scripting (XSS) vulnerability in the cms/content/edit component of YZNCMS v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title parameter.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43233']CVE-2023-43233[/URL]
[URL='https://github.com/yux1azhengye/mycve/blob/main/YZNCMS%201.3.0%20XSS.pdf']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zephyr -- zephyr[/LEFT][/TD]
[TD][LEFT]Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5184']CVE-2023-5184[/URL]
[URL='https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zyxel -- zyxel[/LEFT][/TD]
[TD][LEFT]Buffer Overflow vulnerability in ZYXEL ZYXEL v.PMG2005-T20B allows a remote attacker to cause a denial of service via a crafted script to the uid parameter in the cgi-bin/login.asp component.[/LEFT][/TD]
[TD][CENTER]2023-09-27[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43314']CVE-2023-43314[/URL]
[URL='https://github.com/Rumble00/Rumble/issues/1']MISC[/URL][/TD]
[/TR]
[TR]
[TD][LEFT]zzzcms -- zzzcms[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in ZZZCMS 2.1.7 and classified as critical. Affected by this issue is the function restore of the file /admin/save.php of the component Database Backup File Handler. The manipulation leads to permission issues. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240872.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][URL='https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5263']CVE-2023-5263[/URL]
[URL='https://vuldb.com/?ctiid.240872']MISC[/URL]
[URL='https://github.com/yhy217/zzzcms-vul/issues/1']MISC[/URL]
[URL='https://vuldb.com/?id.240872']MISC[/URL][/TD]
[/TR][/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
[URL='https://www.cisa.gov/uscert/ncas/#top']Back to top[/URL]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT] [/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[url="https://www.cisa.gov/news-events/bulletins/sb23-275"]Continue reading...[/url]