High Vulnerabilities
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT]acronis -- agent[/LEFT][/TD]
[TD][LEFT]Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29051.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44209&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44209]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44209')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-2119')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- cyber_protect_home_office[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44208&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-44208]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44208')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-6587')[/TD]
[/TR]
[TR]
[TD][LEFT]afterlogic -- aurora_files[/LEFT][/TD]
[TD][LEFT]A deserialization vulnerability in Afterlogic Aurora Files v9.7.3 allows attackers to execute arbitrary code via supplying a crafted .sabredav file.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43176&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43176]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43176')
[MISC]('https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1')
[MISC]('https://sec.leonardini.dev/blog/cve-2023-43176-rce_aurora_files/')
[MISC]('http://aurora.com')
[MISC]('http://afterlogic.com')[/TD]
[/TR]
[TR]
[TD][LEFT]apple -- ipados/ios[/LEFT][/TD]
[TD][LEFT]The issue was addressed with improved checks. This issue is fixed in iOS 17.0.3 and iPadOS 17.0.3. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.6.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42824&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-42824]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42824')
[MISC]('https://support.apple.com/en-us/HT213961')
[MISC]('https://support.apple.com/kb/HT213961')
[MISC]('http://seclists.org/fulldisclosure/2023/Oct/12')[/TD]
[/TR]
[TR]
[TD][LEFT]aqua_esolutions -- aqua_drive[/LEFT][/TD]
[TD][LEFT]Aqua Drive, in its 2.4 version, is vulnerable to a relative path traversal vulnerability. By exploiting this vulnerability, an authenticated non privileged user could access/modify stored resources of other users. It could also be possible to access and modify the source and configuration files of the cloud disk platform, affecting the integrity and availability of the entire platform.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3701&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-3701]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3701')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-aqua-esolutions')[/TD]
[/TR]
[TR]
[TD][LEFT]asyncua -- asyncua[/LEFT][/TD]
[TD][LEFT]Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication. [B]Note:[/B] This issue is a result of missing checks for services that require an active session.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26150&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-26150]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26150')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/commit/b4106dfd5037423c9d1810b48a97296b59cde513')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/commit/2be7ce80df05de8d6c6ae1ebce6fa2bb7147844a')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96')
[MISC]('https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673435')
[MISC]('https://gist.github.com/artfire52/84f7279a4119d6f90381ac49d7121121')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/issues/1014')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/pull/1015')[/TD]
[/TR]
[TR]
[TD][LEFT]asyncua -- asyncua[/LEFT][/TD]
[TD][LEFT]Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26151&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-26151]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26151')
[MISC]('https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96')
[MISC]('https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/issues/1013')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/pull/1039')
[MISC]('https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262')[/TD]
[/TR]
[TR]
[TD][LEFT]baramundi_software_gmbh -- enterprise_mobility_management_agent[/LEFT][/TD]
[TD][LEFT]Buffer Overflow vulnerability in baramundi software GmbH EMM Agent 23.1.50 and before allows an attacker to cause a denial of service via a crafted request to the password parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37605&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37605]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37605')
[MISC]('https://medium.com/@david_42/complex-password-vs-buffer-overflow-and-the-winner-is-decbc56db5e3')[/TD]
[/TR]
[TR]
[TD][LEFT]bydemes -- airspace_cctv_web_service[/LEFT][/TD]
[TD][LEFT]The web service of ByDemes Group Airspace CCTV Web Service in its 2.616.BY00.11 version, contains a privilege escalation vulnerability, detected in the Camera Control Panel, whose exploitation could allow a low-privileged attacker to gain administrator access.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-0506&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-0506]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-0506')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products')
[MISC]('https://github.com/zerolynx/wstg/blob/master/document/4-Web_Application_Security_Testing/05-Authorization_Testing/02-Testing_for_Bypassing_Authorization_Schema.md')[/TD]
[/TR]
[TR]
[TD][LEFT]cambium_networks -- enterprise_wi-fi[/LEFT][/TD]
[TD][LEFT]Cambium Enterprise Wi-Fi System Software before 6.4.2 does not sanitize the ping host argument in device-agent.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-35908&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2022-35908]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-35908')
[CONFIRM]('https://community.cambiumnetworks.com/t/enterprise-wi-fi-system-software-release-6-4-2/87229')
[MISC]('https://www.cambiumnetworks.com/support/security/')[/TD]
[/TR]
[TR]
[TD][LEFT]candlepin -- candlepin[/LEFT][/TD]
[TD][LEFT]An improper access control flaw was found in Candlepin. An attacker can create data scoped under another customer/tenant, which can result in loss of confidentiality and availability for the affected customer/tenant.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-1832&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-1832]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-1832')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2184364')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-1832')[/TD]
[/TR]
[TR]
[TD][LEFT]caphyon -- advanced_installer[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in Caphyon Advanced Installer 19.7. This affects an unknown part of the component WinSxS DLL Handler. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 19.7.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-240903.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4956&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2022-4956]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4956')
[MISC]('https://vuldb.com/?id.240903')
[MISC]('https://www.advancedinstaller.com/release-19.7.1.html#bugfixes')
[MISC]('https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/')
[MISC]('https://vuldb.com/?ctiid.240903')[/TD]
[/TR]
[TR]
[TD][LEFT]cashit -- cashit![/LEFT][/TD]
[TD][LEFT]cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by an origin bypass via the host header in an HTTP request. This vulnerability can be triggered by an HTTP endpoint exposed to the network.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3654&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-3654]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3654')
[MISC]('https://www.cashit.at/')[/TD]
[/TR]
[TR]
[TD][LEFT]cashit -- cashit![/LEFT][/TD]
[TD][LEFT]cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by an unauthenticated remote code execution vulnerability. This vulnerability can be triggered by an HTTP endpoint exposed to the network.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3656&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-3656]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3656')
[MISC]('https://www.cashit.at/')[/TD]
[/TR]
[TR]
[TD][LEFT]cashit -- cashit![/LEFT][/TD]
[TD][LEFT]cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by a dangerous methods, that allows to leak the database (system settings, user accounts,...). This vulnerability can be triggered by an HTTP endpoint exposed to the network.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3655&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3655]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3655')
[MISC]('https://www.cashit.at/')[/TD]
[/TR]
[TR]
[TD][LEFT]cato_networks -- cato_client[/LEFT][/TD]
[TD][LEFT]An issue in CatoNetworks CatoClient before v.5.4.0 allows attackers to escalate privileges and winning the race condition (TOCTOU) via the PrivilegedHelperTool component.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43976&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43976]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43976')
[MISC]('https://www.ns-echo.com/posts/cve_2023_43976.html')
[MISC]('https://www.catonetworks.com')[/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- emergency_responder[/LEFT][/TD]
[TD][LEFT]A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are typically reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-20101&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-20101]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20101')
[MISC]('https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cer-priv-esc-B9t3hqk9')[/TD]
[/TR]
[TR]
[TD][LEFT]composer -- composer[/LEFT][/TD]
[TD][LEFT]Composer is a dependency manager for PHP. Users publishing a composer.phar to a public web-accessible server where the composer.phar can be executed as a php file may be subject to a remote code execution vulnerability if PHP also has [ICODE]register_argc_argv[/ICODE] enabled in php.ini. Versions 2.6.4, 2.2.22 and 1.10.27 patch this vulnerability. Users are advised to upgrade. Users unable to upgrade should make sure [ICODE]register_argc_argv[/ICODE] is disabled in php.ini, and avoid publishing composer.phar to the web as this is not best practice.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43655&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43655]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43655')
[MISC]('https://github.com/composer/composer/commit/955a48e6319c8962e5cd421b07c00ab3c728968c')
[MISC]('https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf')
[MISC]('https://github.com/composer/composer/commit/95e091c921037b7b6564942845e7b738f6b95c9c')
[MISC]('https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the CurrentPassword parameter in the CheckPasswdSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44828&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44828]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44828')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/CheckPasswdSettings_CurrentPassword')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44829&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44829]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44829')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetDeviceSettings_AdminPassword')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the EndTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44830&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44830]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44830')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetParentsControlInfo_EndTime')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Type parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44831&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44831]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44831')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_Type')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the MacAddress parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44832&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44832]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44832')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWanSettings_MacAddress')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the GuardInt parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44833&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44833]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44833')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_GuardInt')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the StartTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44834&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44834]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44834')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetParentsControlInfo_%20StartTime')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Mac parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44835&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44835]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44835')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetParentsControlInfo_Mac')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the SSID parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44836&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44836]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44836')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_SSID')
[MISC]('https://www.dlink.com/en/security-bulletin/')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Password parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44837&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44837]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44837')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWanSettings_Password')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44838&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44838]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44838')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSettings_TXPower')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-823g_firmware[/LEFT][/TD]
[TD][LEFT]D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44839&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44839]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44839')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/bugfinder0/public_bug/tree/main/dlink/dir823g/SetWLanRadioSecurity_Encryption')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-846_firmware[/LEFT][/TD]
[TD][LEFT]An issue in D-Link Wireless MU-MIMO Gigabit AC1200 Router DIR-846 firmware version 100A53DBR-Retail allows a remote attacker to execute arbitrary code.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43284&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43284]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43284')
[MISC]('https://youtu.be/Y8osw_xU6-0')
[MISC]('https://github.com/MateusTesser/CVE-2023-43284')[/TD]
[/TR]
[TR]
[TD][LEFT]dedecms -- dedecms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in DedeCMS 5.7.111. This vulnerability affects the function AddMyAddon of the file album_add.php. The manipulation of the argument albumUploadFiles leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240940.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5301&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5301]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5301')
[MISC]('https://vuldb.com/?id.240940')
[MISC]('https://vuldb.com/?ctiid.240940')
[MISC]('https://github.com/Lamber-maybe/cve/blob/main/DedeCMS%20V5.7.111%20Remote%20Code%20Execution%20Vulnerability.md')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- common_event_enabler[/LEFT][/TD]
[TD][LEFT]Dell Common Event Enabler 8.9.8.2 for Windows and prior, contain an improper access control vulnerability. A local low-privileged malicious user may potentially exploit this vulnerability to gain elevated privileges.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32477&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32477]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32477')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218120/dsa-2023-310-security-update-for-dell-emc-common-event-enabler')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software version 1.3 and lower contain an improper input validation vulnerability. A remote unauthenticated attacker may exploit this vulnerability and escalate privileges up to the highest administration level. This is a critical severity vulnerability affecting user authentication. Dell recommends customers to upgrade at the earliest opportunity.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32485&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32485]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32485')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000216587/dsa-2023-283-security-update-for-dell-smartfabric-storage-software-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contains an OS Command Injection Vulnerability in the restricted shell in SSH. An authenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary commands.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43068&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43068]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43068')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contains an OS Command Injection Vulnerability in the CLI use of the 'more' command. A local or remote authenticated attacker could potentially exploit this vulnerability, leading to the ability to gain root-level access.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4401&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4401]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4401')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contain(s) an OS Command Injection Vulnerability in the CLI. An authenticated local attacker could potentially exploit this vulnerability, leading to possible injection of parameters to curl or docker.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43069&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43069]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43069')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contains an improper access control vulnerability in the CLI. A local possibly unauthenticated attacker could potentially exploit this vulnerability, leading to ability to execute arbritrary shell commands.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43072&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43072]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43072')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]deyue_remote_vehicle_management_system -- deyue_remote_vehicle_management_system[/LEFT][/TD]
[TD][LEFT]Deyue Remote Vehicle Management System v1.1 was discovered to contain a deserialization vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43268&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43268]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43268')
[MISC]('https://github.com/Fliggyaaa/DeYue-remote-vehicle-management-system')
[MISC]('https://hzya.anlu169.com/ms/login')
[MISC]('https://gist.github.com/Fliggyaaa/5517fdd59853cd81724b19d2f29c6760')[/TD]
[/TR]
[TR]
[TD][LEFT]dts -- monitoring[/LEFT][/TD]
[TD][LEFT]An issue was discovered in DTS Monitoring 3.57.0. The parameter port within the SSL Certificate check function is vulnerable to OS command injection (blind).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33268&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33268]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33268')
[MISC]('https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33268.md')[/TD]
[/TR]
[TR]
[TD][LEFT]dts -- monitoring[/LEFT][/TD]
[TD][LEFT]An issue was discovered in DTS Monitoring 3.57.0. The parameter options within the WGET check function is vulnerable to OS command injection (blind).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33269&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33269]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33269')
[MISC]('https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33269.md')[/TD]
[/TR]
[TR]
[TD][LEFT]dts -- monitoring[/LEFT][/TD]
[TD][LEFT]An issue was discovered in DTS Monitoring 3.57.0. The parameter url within the Curl check function is vulnerable to OS command injection (blind).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33270&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33270]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33270')
[MISC]('https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33270.md')[/TD]
[/TR]
[TR]
[TD][LEFT]dts -- monitoring[/LEFT][/TD]
[TD][LEFT]An issue was discovered in DTS Monitoring 3.57.0. The parameter common_name within the SSL Certificate check function is vulnerable to OS command injection (blind).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33271&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33271]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33271')
[MISC]('https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33271.md')[/TD]
[/TR]
[TR]
[TD][LEFT]dts -- monitoring[/LEFT][/TD]
[TD][LEFT]An issue was discovered in DTS Monitoring 3.57.0. The parameter ip within the Ping check function is vulnerable to OS command injection (blind).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33272&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33272]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33272')
[MISC]('https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33272.md')[/TD]
[/TR]
[TR]
[TD][LEFT]dts -- monitoring[/LEFT][/TD]
[TD][LEFT]An issue was discovered in DTS Monitoring 3.57.0. The parameter url within the WGET check function is vulnerable to OS command injection (blind).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33273&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33273]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33273')
[MISC]('https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33273.md')[/TD]
[/TR]
[TR]
[TD][LEFT]eclipse -- mosquitto[/LEFT][/TD]
[TD][LEFT]In Mosquitto before 2.0.16, a memory leak occurs when clients send v5 CONNECT packets with a will message that contains invalid property types.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3592&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3592]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3592')
[MISC]('https://mosquitto.org/blog/2023/08/version-2-0-16-released/')[/TD]
[/TR]
[TR]
[TD][LEFT]ecshop -- ecshop[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/order.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240925 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5294&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5294]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5294')
[MISC]('https://vuldb.com/?id.240925')
[MISC]('https://vuldb.com/?ctiid.240925')
[MISC]('https://github.com/xhcccan/code/issues/2')[/TD]
[/TR]
[TR]
[TD][LEFT]efs_software -- easy_address_book_web_server[/LEFT][/TD]
[TD][LEFT]Buffer overflow vulnerability in Easy Address Book Web Server 1.6 version. The exploitation of this vulnerability could allow an attacker to send a very long username string to /searchbook.ghp, asking for the name via a POST request, resulting in arbitrary code execution on the remote machine.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4491&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4491]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4491')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]efs_software -- easy_chat_server[/LEFT][/TD]
[TD][LEFT]Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4494&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4494]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4494')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]emlog -- emlog[/LEFT][/TD]
[TD][LEFT]An arbitrary file upload vulnerability in the component /content/templates/ of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44973&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44973]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44973')
[MISC]('https://github.com/yangliukk/emlog/blob/main/Template-getshell.md')[/TD]
[/TR]
[TR]
[TD][LEFT]emlog -- emlog[/LEFT][/TD]
[TD][LEFT]An arbitrary file upload vulnerability in the component /admin/plugin.php of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44974&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44974]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44974')
[MISC]('https://github.com/yangliukk/emlog/blob/main/Plugin-getshell.md')[/TD]
[/TR]
[TR]
[TD][LEFT]field_logic -- datacube4_firmware[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5329&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5329]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5329')
[MISC]('https://vuldb.com/?id.241030')
[MISC]('https://vuldb.com/?ctiid.241030')
[MISC]('https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/Field%20Logic/Field%20Logic%20DataCube4%20Web%20API%20Improper%20Authentication.md')[/TD]
[/TR]
[TR]
[TD][LEFT]free5gc -- free5gc[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4659&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4659]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4659')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-request-forgery-free5gc')[/TD]
[/TR]
[TR]
[TD][LEFT]furuno_systems -- acera_1210_firmware[/LEFT][/TD]
[TD][LEFT]Cross-site request forgery (CSRF) vulnerability exists in FURUNO SYSTEMS wireless LAN access point devices. If a user views a malicious page while logged in, unintended operations may be performed. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41086&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-41086]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41086')
[MISC]('https://www.furunosystems.co.jp/news/info/vulner20231002.html')
[MISC]('https://jvn.jp/en/vu/JVNVU94497038/')[/TD]
[/TR]
[TR]
[TD][LEFT]furuno_systems -- acera_1310_firmware[/LEFT][/TD]
[TD][LEFT]OS command injection vulnerability in FURUNO SYSTEMS wireless LAN access point devices allow an authenticated user to execute an arbitrary OS command that is not intended to be executed from the web interface by sending a specially crafted request. Affected products and versions are as follows: ACERA 1320 firmware ver.01.26 and earlier, ACERA 1310 firmware ver.01.26 and earlier, ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39222&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39222]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39222')
[MISC]('https://www.furunosystems.co.jp/news/info/vulner20231002.html')
[MISC]('https://jvn.jp/en/vu/JVNVU94497038/')[/TD]
[/TR]
[TR]
[TD][LEFT]furuno_systems -- acera_1310_firmware[/LEFT][/TD]
[TD][LEFT]Authentication bypass vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent unauthenticated attacker who can access the affected product to download configuration files and/or log files, and upload configuration files and/or firmware. They are affected when running in ST(Standalone) mode.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42771&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-42771]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42771')
[MISC]('https://www.furunosystems.co.jp/news/info/vulner20231002.html')
[MISC]('https://jvn.jp/en/vu/JVNVU94497038/')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5207&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5207]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5207')
[MISC]('https://hackerone.com/reports/2174141')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/425604')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/425857')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to read the source code of a project through a fork created before changing visibility to only project members.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3413&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3413]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3413')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/416284')
[MISC]('https://hackerone.com/reports/2027967')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]Denial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3917&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3917]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3917')
[MISC]('https://hackerone.com/reports/2055158')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/417896')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5106&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-5106]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5106')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/commit/67039cfcae80b8fc0496f79be88714873cd169b3')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3922&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L')[/CENTER][/TD]
[TD][CVE-2023-3922]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3922')
[MISC]('https://hackerone.com/reports/1887323')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/394770')[/TD]
[/TR]
[TR]
[TD][LEFT]gnu -- glibc[/LEFT][/TD]
[TD][LEFT]A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4911&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4911]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4911')
[MISC]('https://www.qualys.com/cve-2023-4911/')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2238352')
[MISC]('https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-4911')
[MISC]('http://www.openwall.com/lists/oss-security/2023/10/03/3')
[MISC]('http://www.openwall.com/lists/oss-security/2023/10/03/2')
[MISC]('https://www.debian.org/security/2023/dsa-5514')
[MISC]('https://security.gentoo.org/glsa/202310-03')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/')
[MISC]('http://www.openwall.com/lists/oss-security/2023/10/05/1')
[MISC]('https://access.redhat.com/errata/RHSA-2023:5454')
[MISC]('https://access.redhat.com/errata/RHSA-2023:5453')
[MISC]('https://access.redhat.com/errata/RHSA-2023:5455')
[MISC]('https://access.redhat.com/errata/RHSA-2023:5476')
[MISC]('http://seclists.org/fulldisclosure/2023/Oct/11')
[MISC]('http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- chrome[/LEFT][/TD]
[TD][LEFT]Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5346&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5346]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5346')
[MISC]('https://crbug.com/1485829')
[MISC]('https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/BMFDRMWMT6ZBLGLLWSWHHRAUBOSUXQDR/')[/TD]
[/TR]
[TR]
[TD][LEFT]gpac -- gpac[/LEFT][/TD]
[TD][LEFT]Out-of-bounds Read in GitHub repository gpac/gpac prior to v2.2.2-DEV.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5377&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-5377]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5377')
[MISC]('https://github.com/gpac/gpac/commit/8e9d6b38c036a97020c462ad48e1132e0ddc57ce')
[MISC]('https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf')[/TD]
[/TR]
[TR]
[TD][LEFT]hashicorp -- vault[/LEFT][/TD]
[TD][LEFT]The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5077&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-5077]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5077')
[MISC]('https://discuss.hashicorp.com/t/hcsec-2023-30-vault-s-google-cloud-secrets-engine-removed-existing-iam-conditions-when-creating-updating-rolesets/58654')[/TD]
[/TR]
[TR]
[TD][LEFT]helpdezk -- helpdezk[/LEFT][/TD]
[TD][LEFT]Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.6]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3037&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L')[/CENTER][/TD]
[TD][CVE-2023-3037]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3037')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community')[/TD]
[/TR]
[TR]
[TD][LEFT]helpdezk -- helpdezk[/LEFT][/TD]
[TD][LEFT]SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3038&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3038]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3038')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community')[/TD]
[/TR]
[TR]
[TD][LEFT]hitachi -- ops_center_common_services[/LEFT][/TD]
[TD][LEFT]Allocation of Resources Without Limits or Throttling vulnerability in Hitachi Ops Center Common Services on Linux allows DoS.This issue affects Hitachi Ops Center Common Services: before 10.9.3-00.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3967&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3967]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3967')
[MISC]('https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-142/index.html')[/TD]
[/TR]
[TR]
[TD][LEFT]hospital_management_system -- hospital_management_system[/LEFT][/TD]
[TD][LEFT]Hospital Management System thru commit 4770d was discovered to contain a SQL injection vulnerability via the app_contact parameter in appsearch.php.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43909&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-43909]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43909')
[MISC]('https://www.notion.so/SQL-Injection-vulnerability-in-app_contact-parameter-on-appsearch-php-directory-2e3daa8975164ee18217c52c43ae1a22')[/TD]
[/TR]
[TR]
[TD][LEFT]ibermatica -- ibermatica_rps[/LEFT][/TD]
[TD][LEFT]Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3349&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3349]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3349')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019')[/TD]
[/TR]
[TR]
[TD][LEFT]ibermatica -- ibermatica_rps[/LEFT][/TD]
[TD][LEFT]A Cryptographic Issue vulnerability has been found on IBERMATICA RPS, affecting version 2019. By firstly downloading the log file, an attacker could retrieve the SQL query sent to the application in plaint text. This log file contains the password hashes coded with AES-CBC-128 bits algorithm, which can be decrypted with a .NET function, obtaining the username's password in plain text.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3350&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3350]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3350')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- disconnected_log_collector[/LEFT][/TD]
[TD][LEFT]IBM Disconnected Log Collector 1.0 through 1.8.2 is vulnerable to potential security misconfigurations that could disclose unintended information. IBM X-Force ID: 224648.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-22447&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2022-22447]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-22447')
[MISC]('https://https://www.ibm.com/support/pages/node/7042313')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/224648')
[MISC]('https://www.ibm.com/support/pages/node/7042313')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- observability_with_instana[/LEFT][/TD]
[TD][LEFT]IBM Observability with Instana 1.0.243 through 1.0.254 could allow an attacker on the network to execute arbitrary code on the host after a successful DNS poisoning attack. IBM X-Force ID: 259789.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37404&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37404]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37404')
[MISC]('https://www.ibm.com/support/pages/node/7041863')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/259789')[/TD]
[/TR]
[TR]
[TD][LEFT]icpdas -- et-7060_firmware[/LEFT][/TD]
[TD][LEFT]This vulnerability allows an authenticated attacker to upload malicious files by bypassing the restrictions of the upload functionality, compromising the entire device.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4817&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4817]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4817')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/unrestricted-file-upload-vulnerability-icp-das-et-7060')[/TD]
[/TR]
[TR]
[TD][LEFT]ingeteam -- ingepac_da3451_firmware[/LEFT][/TD]
[TD][LEFT]Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3768&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3768]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3768')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products')[/TD]
[/TR]
[TR]
[TD][LEFT]ingeteam -- ingepac_fc5066_firmware[/LEFT][/TD]
[TD][LEFT]Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3769&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3769]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3769')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products')[/TD]
[/TR]
[TR]
[TD][LEFT]jorani -- jorani[/LEFT][/TD]
[TD][LEFT]An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the "id" parameter, managing to extract arbritary information from the database.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-2681&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-2681]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2681')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/jorani-sql-injection')[/TD]
[/TR]
[TR]
[TD][LEFT]libvpx -- libvpx[/LEFT][/TD]
[TD][LEFT]VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44488&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-44488]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44488')
[MISC]('https://github.com/webmproject/libvpx/compare/v1.13.0...v1.13.1')
[MISC]('https://github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937')
[MISC]('https://github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f')
[MISC]('https://github.com/webmproject/libvpx/releases/tag/v1.13.1')
[MLIST]('http://www.openwall.com/lists/oss-security/2023/09/30/4')
[MLIST]('https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2241806')
[GENTOO]('https://security.gentoo.org/glsa/202310-04')
[DEBIAN]('https://www.debian.org/security/2023/dsa-5518')[/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44466&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44466]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44466')
[MISC]('https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97')
[MISC]('https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph')
[MISC]('https://www.spinics.net/lists/ceph-devel/msg57909.html')
[MISC]('https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97')[/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39191&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39191]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39191')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2226783')
[MISC]('https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-39191')[/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation. In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free. We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5345&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5345]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5345')
[MISC]('https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705')
[MISC]('https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/')[/TD]
[/TR]
[TR]
[TD][LEFT]mediatek,_inc. -- lr11[/LEFT][/TD]
[TD][LEFT]In CDMA PPP protocol, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privilege needed. User interaction is not needed for exploitation. Patch ID: MOLY01068234; Issue ID: ALPS08010003.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-20819&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-20819]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20819')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32820&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-32820]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32820')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]microweber -- microweber[/LEFT][/TD]
[TD][LEFT]Use of Hard-coded Credentials in GitHub repository microweber/microweber prior to 2.0.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5318&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5318]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5318')
[MISC]('https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d')
[MISC]('https://github.com/microweber/microweber/commit/c48b34dfd6cae7a55b452280d692dc62512574b0')[/TD]
[/TR]
[TR]
[TD][LEFT]mojoportal -- mojoportal[/LEFT][/TD]
[TD][LEFT]File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the File Manager function.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44008&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44008]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44008')
[MISC]('https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008')[/TD]
[/TR]
[TR]
[TD][LEFT]mojoportal -- mojoportal[/LEFT][/TD]
[TD][LEFT]File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the Skin Management function.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44009&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44009]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44009')
[MISC]('https://www.mojoportal.com/')
[MISC]('https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44009')[/TD]
[/TR]
[TR]
[TD][LEFT]mojoportal -- mojoportal[/LEFT][/TD]
[TD][LEFT]An issue in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via a crafted script to the layout.master skin file at the Skin management component.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44011&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44011]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44011')
[MISC]('https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44011')[/TD]
[/TR]
[TR]
[TD][LEFT]moxa -- nport_5150ai-m12-ct-t_firmware[/LEFT][/TD]
[TD][LEFT]All firmware versions of the NPort 5000 Series are affected by an improper validation of integrity check vulnerability. This vulnerability results from insufficient checks on firmware updates or upgrades, potentially allowing malicious users to manipulate the firmware and gain control of devices.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4929&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4929]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4929')
[MISC]('https://www.moxa.com/en/support/product-support/security-advisory/mpsa-233328-nport-5000-series-firmware-improper-validation-of-integrity-check-vulnerability')[/TD]
[/TR]
[TR]
[TD][LEFT]netis_systems -- n3m_firmware[/LEFT][/TD]
[TD][LEFT]Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability in the Changing Username and Password function. This vulnerability is exploited via a crafted payload.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43891&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43891]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43891')
[MISC]('https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20in%20changing%20password%20feature.md')[/TD]
[/TR]
[TR]
[TD][LEFT]netis_systems -- n3m_firmware[/LEFT][/TD]
[TD][LEFT]Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the Hostname parameter within the WAN settings. This vulnerability is exploited via a crafted payload.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43892&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43892]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43892')
[MISC]('https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20hostname%20parameter%20in%20wan%20settings.md')[/TD]
[/TR]
[TR]
[TD][LEFT]netis_systems -- n3m_firmware[/LEFT][/TD]
[TD][LEFT]Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the wakeup_mac parameter in the Wake-On-LAN (WoL) function. This vulnerability is exploited via a crafted payload.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43893&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43893]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43893')
[MISC]('https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md')[/TD]
[/TR]
[TR]
[TD][LEFT]netis_systems -- n3m_firmware[/LEFT][/TD]
[TD][LEFT]Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability in the diagnostic tools page. This vulnerability is exploited via a crafted HTTP request.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43890&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43890]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43890')
[MISC]('https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20bypass%20filter.md')[/TD]
[/TR]
[TR]
[TD][LEFT]nodebb_inc. -- nodebb[/LEFT][/TD]
[TD][LEFT]Denial-of-service in NodeBB td> [TD][CENTER]2023-09-29[/CENTER][/LEFT][/TD][LEFT]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30591&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-30591]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30591')
[MISC]('https://github.com/NodeBB/NodeBB/commit/4d2d76897a02e7068ab74c81d17a2febfae8bfb9')
[MISC]('https://github.com/NodeBB/NodeBB/commit/830f142b7aea2e597294a84d52c05aab3a3539ca')
[MISC]('https://github.com/NodeBB/NodeBB/commit/37b48b82a4bc7680c6e4c42647209010cb239c2c')
[MISC]('https://starlabs.sg/advisories/23/23-30591/')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]nokia -- wavelite_metro_200_and_fan_firmware[/LEFT][/TD]
[TD][LEFT]If Security Hardening guide rules are not followed, then Nokia WaveLite products allow a local user to create new users with administrative privileges by manipulating a web request. This affects (for example) WaveLite Metro 200 and Fan, WaveLite Metro 200 OPS and Fans, WaveLite Metro 200 and F2B fans, WaveLite Metro 200 OPS and F2B fans, WaveLite Metro 200 NE and F2B fans, and WaveLite Metro 200 NE OPS and F2B fans.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-22618&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-22618]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-22618')
[MISC]('https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-22618/')
[MISC]('https://nokia.com')[/TD]
[/TR]
[TR]
[TD][LEFT]open5gs -- open5gs[/LEFT][/TD]
[TD][LEFT]DOS vulnerability that could allow an attacker to register a new VNF (Virtual Network Function) value. This action could trigger the args_assets() function defined in the arg-log.php file, which would then execute the args-abort.c file, causing the service to crash.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4882&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-4882]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4882')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs')[/TD]
[/TR]
[TR]
[TD][LEFT]open5gs -- open5gs[/LEFT][/TD]
[TD][LEFT]Invalid pointer release vulnerability. Exploitation of this vulnerability could allow an attacker to interrupt the correct operation of the service by sending a specially crafted json string to the VNF (Virtual Network Function) and triggering the ogs_sbi_message_free function, which could cause a service outage.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4883&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-4883]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4883')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs')[/TD]
[/TR]
[TR]
[TD][LEFT]open5gs -- open5gs[/LEFT][/TD]
[TD][LEFT]An attacker could send an HTTP request to an Open5GS endpoint and retrieve the information stored on the device due to the lack of Authentication.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4884&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4884]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4884')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs')[/TD]
[/TR]
[TR]
[TD][LEFT]optipng -- optipng[/LEFT][/TD]
[TD][LEFT]OptiPNG v0.7.7 was discovered to contain a global buffer overflow via the 'buffer' variable at gifread.c.[/LEFT][/TD]
[TD][CENTER]2023-10-01[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43907&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43907]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43907')
[MISC]('http://optipng.sourceforge.net/')
[MISC]('https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md')
[MISC]('https://sourceforge.net/projects/optipng/files/OptiPNG/optipng-0.7.7/optipng-0.7.7.tar.gz/download?use_mirror=udomain&download=')[/TD]
[/TR]
[TR]
[TD][LEFT]oracle -- apache_avro[/LEFT][/TD]
[TD][LEFT]When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39410&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-39410]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39410')
[MISC]('https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds')
[MISC]('https://www.openwall.com/lists/oss-security/2023/09/29/6')[/TD]
[/TR]
[TR]
[TD][LEFT]pandora_fms -- pandora_fms[/LEFT][/TD]
[TD][LEFT]A Cross-site Request Forgery (CSRF) vulnerability in Pandora FMS allows an attacker to force authenticated users to send a request to a web application they are currently authenticated against. This issue affects Pandora FMS version 767 and earlier versions on all platforms.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24518&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L')[/CENTER][/TD]
[TD][CVE-2023-24518]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24518')
[MISC]('https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/')[/TD]
[/TR]
[TR]
[TD][LEFT]personal_management_system -- personal_management_system[/LEFT][/TD]
[TD][LEFT]An arbitrary file upload vulnerability in Personal Management System v1.4.64 allows attackers to execute arbitrary code via uploading a crafted SVG file into a user profile's avatar.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43838&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43838]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43838')
[MISC]('http://www.w3.org/2000/svg')
[MISC]('https://github.com/Volmarg/personal-management-system/blob/39d3c0df641a5435f2028b37a27d26ba61a3b97b/src/assets/scripts/core/ui/DataProcessor/SpecialAction.ts#L35')
[MISC]('https://github.com/Volmarg')
[MISC]('https://github.com/rootd4ddy/CVE-2023-43838')
[MISC]('https://github.com/Volmarg/personal-management-system')
[MISC]('https://github.com/rootd4ddy/')[/TD]
[/TR]
[TR]
[TD][LEFT]phpipam -- phpipam[/LEFT][/TD]
[TD][LEFT]Phpipam before v1.5.2 was discovered to contain a LDAP injection vulnerability via the dname parameter at /users/ad-search-result.php. This vulnerability allows attackers to enumerate arbitrary fields in the LDAP server and access sensitive data via a crafted POST request.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41580&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-41580]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41580')
[MISC]('https://github.com/ehtec/phpipam-exploit')
[MISC]('https://github.com/phpipam/phpipam/commit/c451085476074943eb4056941005c0b61db566c5')[/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5227&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5227]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5227')
[MISC]('https://github.com/thorsten/phpmyfaq/commit/abf52487422ce47195c8a80bd904a7af39f60297')
[MISC]('https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8')[/TD]
[/TR]
[TR]
[TD][LEFT]pjsip -- pjsip[/LEFT][/TD]
[TD][LEFT]PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability ([ICODE]PJMEDIA_HAS_SRTP[/ICODE] is set) and use underlying media transport other than UDP. This vulnerability's impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-38703&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-38703]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38703')
[MISC]('https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d')
[MISC]('https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]SQL injection vulnerability in KnowBand Module One Page Checkout, Social Login & Mailchimp (supercheckout) v.8.0.3 and before allows a remote attacker to execute arbitrary code via a crafted request to the updateCheckoutBehaviour function in the supercheckout.php component.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44024&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44024]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44024')
[MISC]('https://security.friendsofpresta.org/modules/2023/10/05/supercheckout.html')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]Improper neutralization of SQL parameter in Theme Volty CMS Payment Icon module for PrestaShop. In the module "Theme Volty CMS Payment Icon" (tvcmspaymenticon) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39645&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39645]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39645')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/26/tvcmspaymenticon.html')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]Improper neutralization of SQL parameter in Theme Volty CMS Category Chain Slider module for PrestaShop. In the module "Theme Volty CMS Category Chain Slide"(tvcmscategorychainslider) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39646&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39646]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39646')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategorychainslider.html')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]Improper neutralization of SQL parameter in Theme Volty CMS Category Product module for PrestaShop. In the module "Theme Volty CMS Category Product" (tvcmscategoryproduct) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39647&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39647]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39647')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategoryproduct.html')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]Improper neutralization of SQL parameter in Theme Volty CMS Testimonial module for PrestaShop. In the module "Theme Volty CMS Testimonial" (tvcmstestimonial) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39648&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39648]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39648')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/26/tvcmstestimonial.html')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]Improper neutralization of SQL parameter in Theme Volty CMS Category Slider module for PrestaShop. In the module "Theme Volty CMS Category Slider" (tvcmscategoryslider) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39649&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39649]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39649')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategoryslider.html')[/TD]
[/TR]
[TR]
[TD][LEFT]prestashop -- prestashop[/LEFT][/TD]
[TD][LEFT]Improper neutralization of SQL parameter in Theme Volty CMS BrandList module for PrestaShop In the module "Theme Volty CMS BrandList" (tvcmsbrandlist) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39651&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39651]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39651')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/26/tvcmsbrandlist.html')[/TD]
[/TR]
[TR]
[TD][LEFT]presto_changeo -- attribute_grid[/LEFT][/TD]
[TD][LEFT]Presto Changeo attributegrid up to 2.0.3 was discovered to contain a SQL injection vulnerability via the component disable_json.php.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43983&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43983]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43983')
[MISC]('https://security.friendsofpresta.org/modules/2023/10/03/attributegrid.html')[/TD]
[/TR]
[TR]
[TD][LEFT]presto_changeo -- test_site_creator[/LEFT][/TD]
[TD][LEFT]Presto Changeo testsitecreator up to 1.1.1 was discovered to contain a deserialization vulnerability via the component delete_excluded_folder.php.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43981&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43981]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43981')
[MISC]('https://security.friendsofpresta.org/modules/2023/10/03/testsitecreator.html')[/TD]
[/TR]
[TR]
[TD][LEFT]presto_changeo -- testsitecreator[/LEFT][/TD]
[TD][LEFT]Presto Changeo testsitecreator up to v1.1.1 was discovered to contain a SQL injection vulnerability via the component disable_json.php.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43980&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43980]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43980')
[MISC]('https://security.friendsofpresta.org/modules/2023/09/28/testsitecreator-89.html')
[MISC]('https://www.presto-changeo.com/prestashop/home/158-test-site-creator.html')[/TD]
[/TR]
[TR]
[TD][LEFT]pretix -- pretix[/LEFT][/TD]
[TD][LEFT]pretix before 2023.7.2 allows Pillow to parse EPS files.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44464&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44464]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44464')
[MISC]('https://github.com/pretix/pretix/tags')
[MISC]('https://github.com/pretix/pretix/compare/v2023.7.1...v2023.7.2')
[MISC]('https://pretix.eu/about/en/ticketing')
[MISC]('https://github.com/pretix/pretix/commit/8583bfb7d97263e9e923ad5d7f123ca1cadc8f2e')
[CONFIRM]('https://pretix.eu/about/de/blog/20230912-release-2023-7-2/')[/TD]
[/TR]
[TR]
[TD][LEFT]prointegra -- uptime_dc[/LEFT][/TD]
[TD][LEFT]Improper authorisation of regular users in ProIntegra Uptime DC software (versions below 2.0.0.33940) allows them to change passwords of all other users including administrators leading to a privilege escalation.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4997&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4997]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4997')
[MISC]('https://cert.pl/posts/2023/10/CVE-2023-4997/')
[MISC]('https://cert.pl/en/posts/2023/10/CVE-2023-4997/')[/TD]
[/TR]
[TR]
[TD][LEFT]puppet -- puppet_server[/LEFT][/TD]
[TD][LEFT]For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5255&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-5255]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5255')
[MISC]('https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates')[/TD]
[/TR]
[TR]
[TD][LEFT]pure_storage -- flasharray_purity[/LEFT][/TD]
[TD][LEFT]A flaw exists in VASA which allows users with access to a vSphere/ESXi VMware admin on a FlashArray to gain root access through privilege escalation.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-36628&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-36628]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36628')
[MISC]('https://support.purestorage.com/Pure_Storage_Technical_Services/Field_Bulletins/Security_Bulletins/Security_Bulletin_for_Privilege_Escalation_in_VASA_CVE-2023-36628')[/TD]
[/TR]
[TR]
[TD][LEFT]qsige -- qsige[/LEFT][/TD]
[TD][LEFT]The file upload functionality is not implemented correctly and allows uploading of any type of file. As a prerequisite, it is necessary for the attacker to log into the application with a valid username.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4097&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4097]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4097')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]qsige -- qsige[/LEFT][/TD]
[TD][LEFT]It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4098&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4098]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4098')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]qsige -- qsige[/LEFT][/TD]
[TD][LEFT]Allows an attacker to perform XSS attacks stored on certain resources. Exploiting this vulnerability can lead to a DoS condition, among other actions.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4100&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H')[/CENTER][/TD]
[TD][CVE-2023-4100]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4100')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Memory Corruption in Data Modem while making a MO call or MT VOLTE call.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-22385&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-22385]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-22385')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Transient DOS in Modem while triggering a camping on an 5G cell.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24843&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-24843]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24843')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Transient DOS in Modem while allocating DSM items.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24847&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-24847]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24847')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24848&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-24848]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24848')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Information Disclosure in data Modem while parsing an FMTP line in an SDP message.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24849&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-24849]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24849')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Cryptographic issue in Data Modem due to improper authentication during TLS handshake.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28540&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-28540]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28540')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- 315_5g_iot_modem_firmware[/LEFT][/TD]
[TD][LEFT]Transient DOS in WLAN Firmware while parsing rsn ies.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33027&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-33027]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33027')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- apq8017_firmware[/LEFT][/TD]
[TD][LEFT]Memory Corruption in HLOS while importing a cryptographic key into KeyMaster Trusted Application.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24850&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-24850]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24850')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- apq8064au_firmware[/LEFT][/TD]
[TD][LEFT]Weak configuration in Automotive while VM is processing a listener request from TEE.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.2]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-22382&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-22382]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-22382')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- aqt1000_firmware[/LEFT][/TD]
[TD][LEFT]Improper Access to the VM resource manager can lead to Memory Corruption.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-21673&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-21673]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-21673')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption in Modem while processing security related configuration before AS Security Exchange.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24855&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-24855]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24855')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption in WLAN Firmware while doing a memory copy of pmk cache.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33028&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33028]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33028')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory Corruption in Core while invoking a call to Access Control core library with hardware protected address range.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24844&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-24844]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24844')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory Corruption in HLOS while registering for key provisioning notify.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-24853&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-24853]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-24853')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption in WLAN Host when the firmware invokes multiple WMI Service Available command.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28539&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-28539]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28539')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption in DSP Service during a remote call from HLOS to DSP.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33029&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33029]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33029')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption while invoking callback function of AFE from ADSP.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33035&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33035]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33035')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- ar8035_firmware[/LEFT][/TD]
[TD][LEFT]Transient DOS in WLAN Firmware while parsing a NAN management frame.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33026&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-33026]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33026')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- csra6620_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption while parsing the ADSP response command.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33034&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33034]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33034')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- qam8295p_firmware[/LEFT][/TD]
[TD][LEFT]Memory corruption in Automotive Display while destroying the image handle created using connected display driver.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33039&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-33039]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33039')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- qca6574au_firmware[/LEFT][/TD]
[TD][LEFT]Memory Corruption in VR Service while sending data using Fast Message Queue (FMQ).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-22384&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-22384]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-22384')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]rdiffweb -- rdiffweb[/LEFT][/TD]
[TD][LEFT]Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5289&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5289]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5289')
[MISC]('https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce')
[MISC]('https://github.com/ikus060/rdiffweb/commit/06f89b43469aae70e8833e55192721523f86c5a2')[/TD]
[/TR]
[TR]
[TD][LEFT]red_hat -- openshift[/LEFT][/TD]
[TD][LEFT]A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3361&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3361]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3361')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2216588')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-3361')
[MISC]('https://github.com/opendatahub-io/odh-dashboard/issues/1415')[/TD]
[/TR]
[TR]
[TD][LEFT]riello-ups -- netman_204_firmware[/LEFT][/TD]
[TD][LEFT]All versions of NetMan 204 allow an attacker that knows the MAC and serial number of the device to reset the administrator password via the legitimate recovery function.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47891&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2022-47891]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47891')
[MISC]('https://www.incibe.es/incibe-cert/alerta-temprana/avisos-sci/multiples-vulnerabilidades-netman-204-riello-ups')[/TD]
[/TR]
[TR]
[TD][LEFT]riello-ups -- netman_204_firmware[/LEFT][/TD]
[TD][LEFT]All versions of NetMan 204 could allow an unauthenticated remote attacker to read a file (config.cgi) containing sensitive information, like credentials.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47892&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2022-47892]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47892')
[MISC]('https://www.incibe.es/incibe-cert/alerta-temprana/avisos-sci/multiples-vulnerabilidades-netman-204-riello-ups')[/TD]
[/TR]
[TR]
[TD][LEFT]riello_ups -- netman_204_firmware[/LEFT][/TD]
[TD][LEFT]There is a remote code execution vulnerability that affects all versions of NetMan 204. A remote attacker could upload a firmware file containing a webshell, that could allow him to execute arbitrary code as root.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-47893&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2022-47893]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47893')
[MISC]('https://www.incibe.es/incibe-cert/alerta-temprana/avisos-sci/multiples-vulnerabilidades-netman-204-riello-ups')[/TD]
[/TR]
[TR]
[TD][LEFT]rockoa -- rockoa[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5296&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-5296]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5296')
[MISC]('https://github.com/magicwave18/vuldb/issues/1')
[MISC]('https://vuldb.com/?id.240926')
[MISC]('https://vuldb.com/?ctiid.240926')[/TD]
[/TR]
[TR]
[TD][LEFT]rockoa -- rockoa[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5297&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5297]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5297')
[MISC]('https://github.com/magicwave18/vuldb/issues/2')
[MISC]('https://vuldb.com/?ctiid.240927')
[MISC]('https://vuldb.com/?id.240927')[/TD]
[/TR]
[TR]
[TD][LEFT]sage -- sage_200_spain[/LEFT][/TD]
[TD][LEFT]Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-2809&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-2809]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2809')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200')[/TD]
[/TR]
[TR]
[TD][LEFT]salesagility -- suitecrm[/LEFT][/TD]
[TD][LEFT]SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5350&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-5350]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5350')
[MISC]('https://github.com/salesagility/suitecrm/commit/c43eaa311fb010b7928983e6afc6f9075c3996aa')
[MISC]('https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- android[/LEFT][/TD]
[TD][LEFT]Stack-based Buffer Overflow in vulnerability HDCP trustlet prior to SMR Oct-2023 Release 1 allows attacker to perform code execution.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30733&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-30733]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30733')
[MISC]('https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- android[/LEFT][/TD]
[TD][LEFT]Improper input validation vulnerability in Evaluator prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30692&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-30692]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30692')
[MISC]('https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- android[/LEFT][/TD]
[TD][LEFT]Improper access control vulnerability in SecSettings prior to SMR Oct-2023 Release 1 allows attackers to enable Wi-Fi and connect arbitrary Wi-Fi without User Interaction.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30727&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-30727]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30727')
[MISC]('https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- galaxy_book_firmware[/LEFT][/TD]
[TD][LEFT]An improper input validation in UEFI Firmware prior to Firmware update Oct-2023 Release in Galaxy Book, Galaxy Book Pro, Galaxy Book Pro 360 and Galaxy Book Odyssey allows local attacker to execute SMM memory corruption.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30738&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-30738]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30738')
[MISC]('https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]sato -- cl4nx-j_plus_firmware[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027.[/LEFT][/TD]
[TD][CENTER]2023-10-01[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5326&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5326]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5326')
[MISC]('https://vuldb.com/?ctiid.241027')
[MISC]('https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus/README.md')
[MISC]('https://vuldb.com/?id.241027')[/TD]
[/TR]
[TR]
[TD][LEFT]sato -- cl4nx-j_plus_firmware[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5328&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5328]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5328')
[MISC]('https://vuldb.com/?ctiid.241029')
[MISC]('https://vuldb.com/?id.241029')
[MISC]('https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20cookie/README.md')[/TD]
[/TR]
[TR]
[TD][LEFT]setelsa_security -- conacwin[/LEFT][/TD]
[TD][LEFT]Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the "Download file" parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3512&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3512]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3512')
[MISC]('https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin')
[MISC]('https://github.com/advisories/GHSA-v6jm-v768-76h2')[/TD]
[/TR]
[TR]
[TD][LEFT]sick -- sim1012-0p0g200_firmware[/LEFT][/TD]
[TD][LEFT]A remote unauthorized attacker may connect to the SIM1012, interact with the device and change configuration settings. The adversary may also reset the SIM and in the worst case upload a new firmware version to the device.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5288&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5288]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5288')
[MISC]('https://sick.com/psirt')
[MISC]('https://sick.com/.well-known/csaf/white/2023/sca-2023-0008.pdf')
[MISC]('https://sick.com/.well-known/csaf/white/2023/sca-2023-0008.json')[/TD]
[/TR]
[TR]
[TD][LEFT]slims -- slims[/LEFT][/TD]
[TD][LEFT]Server-Side Request Forgery vulnerability in SLims version 9.6.0. This vulnerability could allow an authenticated attacker to send requests to internal services or upload the contents of relevant files via the "scrape_image.php" file in the imageURL parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3744&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-3744]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3744')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-slims')[/TD]
[/TR]
[TR]
[TD][LEFT]soflyy -- oxygen_builder[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Soflyy Oxygen Builder plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-46841&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2022-46841]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-46841')
[MISC]('https://patchstack.com/database/vulnerability/oxygen/wordpress-oxygen-builder-plugin-4-6-2-cross-site-request-forgery-csrf?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]sonicwall -- net_extender[/LEFT][/TD]
[TD][LEFT]A local privilege escalation vulnerability in SonicWall Net Extender MSI client for Windows 10.2.336 and earlier versions allows a local low-privileged user to gain system privileges through running repair functionality.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44217&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44217]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44217')
[MISC]('https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0013')
[MISC]('https://github.com/advisories/GHSA-jw5c-8746-98g5')[/TD]
[/TR]
[TR]
[TD][LEFT]sonicwall -- net_extender[/LEFT][/TD]
[TD][LEFT]A flaw within the SonicWall NetExtender Pre-Logon feature enables an unauthorized user to gain access to the host Windows operating system with 'SYSTEM' level privileges, leading to a local privilege escalation (LPE) vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44218&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-44218]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44218')
[MISC]('https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0014')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-240882 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5269&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5269]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5269')
[MISC]('https://vuldb.com/?ctiid.240882')
[MISC]('https://vuldb.com/?id.240882')
[MISC]('https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%201.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5270&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5270]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5270')
[MISC]('https://vuldb.com/?ctiid.240883')
[MISC]('https://vuldb.com/?id.240883')
[MISC]('https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%202.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5271&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5271]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5271')
[MISC]('https://vuldb.com/?ctiid.240884')
[MISC]('https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%203.pdf')
[MISC]('https://vuldb.com/?id.240884')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file edit_parcel.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-240885 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5272&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5272]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5272')
[MISC]('https://vuldb.com/?id.240885')
[MISC]('https://vuldb.com/?ctiid.240885')
[MISC]('https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%204.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in SourceCodester Engineers Online Portal 1.0. This vulnerability affects unknown code of the file downloadable_student.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-240904.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5276&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5276]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5276')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20downloadable_student.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?id.240904')
[MISC]('https://vuldb.com/?ctiid.240904')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in SourceCodester Engineers Online Portal 1.0. This issue affects some unknown processing of the file student_avatar.php. The manipulation of the argument change leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240905 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5277&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5277]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5277')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf')
[MISC]('https://vuldb.com/?ctiid.240905')
[MISC]('https://vuldb.com/?id.240905')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240906 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5278&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5278]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5278')
[MISC]('https://vuldb.com/?ctiid.240906')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20login.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?id.240906')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file my_classmates.php. The manipulation of the argument teacher_class_student_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240907.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5279&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5279]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5279')
[MISC]('https://vuldb.com/?ctiid.240907')
[MISC]('https://vuldb.com/?id.240907')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20my_classmates.php%20%20has%20Sqlinjection.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file my_students.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240908.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5280&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5280]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5280')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20my_students.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?ctiid.240908')
[MISC]('https://vuldb.com/?id.240908')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been classified as critical. This affects an unknown part of the file remove_inbox_message.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240909 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5281&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5281]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5281')
[MISC]('https://vuldb.com/?ctiid.240909')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20remove_inbox_message.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?id.240909')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file seed_message_student.php. The manipulation of the argument teacher_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240910 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5282&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5282]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5282')
[MISC]('https://vuldb.com/?id.240910')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20seed_message_student.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?ctiid.240910')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file teacher_signup.php. The manipulation of the argument firstname/lastname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240911.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5283&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5283]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5283')
[MISC]('https://vuldb.com/?id.240911')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20teacher_signup.php%20%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?ctiid.240911')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- engineers_online_portal[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file upload_save_student.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240912.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5284&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5284]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5284')
[MISC]('https://vuldb.com/?id.240912')
[MISC]('https://vuldb.com/?ctiid.240912')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Engineers%20Online%20Portal%20System%20upload_save_student.php%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- online_computer_and_laptop_store[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected is the function register of the file Master.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-241254 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5373&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5373]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5373')
[MISC]('https://vuldb.com/?ctiid.241254')
[MISC]('https://github.com/Szlllc/Cve/blob/main/Computer%20and%20Laptop%20Store%20System%20Master.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?id.241254')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- online_computer_and_laptop_store[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241255.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5374&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5374]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5374')
[MISC]('https://vuldb.com/?ctiid.241255')
[MISC]('https://github.com/llixixi/Engineers-Online-Portal-System/blob/main/Computer%20and%20Laptop%20Store%20System%20products.php%20has%20Sqlinjection.pdf')
[MISC]('https://vuldb.com/?id.241255')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- simple_membership_system[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in SourceCodester Simple Membership System 1.0. This issue affects some unknown processing of the file group_validator.php. The manipulation of the argument club_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240869 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5260&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5260]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5260')
[MISC]('https://vuldb.com/?id.240869')
[MISC]('https://vuldb.com/?ctiid.240869')
[MISC]('https://github.com/E1even-321/Membership-System/blob/main/Simple-Membership-System%20group_validator.php%20has%20Sqlinjection.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]static-server -- static-server[/LEFT][/TD]
[TD][LEFT]All versions of the package static-server are vulnerable to Directory Traversal due to improper input sanitization passed via the validPath function of server.js.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26152&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-26152]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26152')
[MISC]('https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d')
[MISC]('https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341')
[MISC]('https://github.com/nbluis/static-server/blob/master/server.js%23L218-L223')[/TD]
[/TR]
[TR]
[TD][LEFT]super_store_finder -- super_store_finder[/LEFT][/TD]
[TD][LEFT]Super Store Finder 3.7 and below is vulnerable to authenticated Arbitrary PHP Code Injection that could lead to Remote Code Execution when settings overwrite config.inc.php content.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43835&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43835]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43835')
[MISC]('https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html')[/TD]
[/TR]
[TR]
[TD][LEFT]tcman -- gim[/LEFT][/TD]
[TD][LEFT]TCMAN GIM v8.0.1 is vulnerable to a SQL injection via the 'SqlWhere' parameter inside the function 'BuscarESM'. The exploitation of this vulnerability might allow a remote attacker to directly interact with the database.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-36276&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2022-36276]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-36276')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim')[/TD]
[/TR]
[TR]
[TD][LEFT]tenda -- ac6_firmware[/LEFT][/TD]
[TD][LEFT]Tenda AC6 v15.03.05.19 is vulnerable to Buffer Overflow as the Index parameter does not verify the length.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40830&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40830]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40830')
[MISC]('https://reference1.example.com/goform/WifiWpsOOB')[/TD]
[/TR]
[TR]
[TD][LEFT]tibco_software_inc. -- nimbus[/LEFT][/TD]
[TD][LEFT]The Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: versions 10.6.0 and below.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26218&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-26218]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26218')
[MISC]('https://www.tibco.com/services/support/advisories')[/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- tongda_oa[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in Tongda OA 2017. Affected is an unknown function of the file general/hr/manage/staff_title_evaluation/delete.php. The manipulation of the argument EVALUATION_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240870 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5261&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5261]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5261')
[MISC]('https://github.com/csbsong/bug_report/blob/main/sql2.md')
[MISC]('https://vuldb.com/?ctiid.240870')
[MISC]('https://vuldb.com/?id.240870')[/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- tongda_oa[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, has been found in Tongda OA 2017. Affected by this issue is some unknown functionality of the file general/hr/manage/staff_transfer/delete.php. The manipulation of the argument TRANSFER_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240878 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5265&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5265]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5265')
[MISC]('https://vuldb.com/?id.240878')
[MISC]('https://vuldb.com/?ctiid.240878')
[MISC]('https://github.com/YaGaoT/cve/blob/main/sql.md')[/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- tongda_oa[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/recruit/hr_pool/delete.php. The manipulation of the argument EXPERT_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-240880.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5267&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5267]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5267')
[MISC]('https://vuldb.com/?ctiid.240880')
[MISC]('https://vuldb.com/?id.240880')
[MISC]('https://github.com/kpz-wm/cve/blob/main/sql.md')[/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- tongda_oa[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in Tongda OA 2017. Affected by this vulnerability is an unknown functionality of the file general/hr/recruit/recruitment/delete.php. The manipulation of the argument RECRUITMENT_ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-240913 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5285&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5285]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5285')
[MISC]('https://vuldb.com/?id.240913')
[MISC]('https://github.com/OliverWu23/cve/blob/main/sql.md')
[MISC]('https://vuldb.com/?ctiid.240913')[/TD]
[/TR]
[TR]
[TD][LEFT]tongda -- tongda_oa[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240938 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5298&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5298]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5298')
[MISC]('https://github.com/szh0105/cve/blob/main/sql.md')
[MISC]('https://vuldb.com/?ctiid.240938')
[MISC]('https://vuldb.com/?id.240938')[/TD]
[/TR]
[TR]
[TD][LEFT]ttsplanning -- ttsplanning[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5300&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5300]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5300')
[MISC]('https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/TTSPlanning/TTSPlanning.md')
[MISC]('https://vuldb.com/?ctiid.240939')
[MISC]('https://vuldb.com/?id.240939')[/TD]
[/TR]
[TR]
[TD][LEFT]turna -- advertising_administration_panel
[/LEFT][/TD]
[TD][LEFT]Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Turna Advertising Administration Panel allows SQL Injection.This issue affects Advertising Administration Panel: before 1.1.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4530&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-4530]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4530')
[MISC]('https://www.usom.gov.tr/bildirim/tr-23-0571')[/TD]
[/TR]
[TR]
[TD][LEFT]unify -- session_border_controller[/LEFT][/TD]
[TD][LEFT]Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of administrative scripts by unauthenticated users.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-36619&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-36619]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36619')
[CONFIRM]('https://networks.unify.com/security/advisories/OBSO-2307-01.pdf')
[MISC]('https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html')
[MISC]('https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/')[/TD]
[/TR]
[TR]
[TD][LEFT]unify -- session_border_controller[/LEFT][/TD]
[TD][LEFT]Atos Unify OpenScape Session Border Controller through V10 R3.01.03 allows execution of OS commands as root user by low-privileged authenticated users.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-36618&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-36618]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36618')
[CONFIRM]('https://networks.unify.com/security/advisories/OBSO-2307-01.pdf')
[MISC]('https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html')
[MISC]('https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/')[/TD]
[/TR]
[TR]
[TD][LEFT]vim -- vim[/LEFT][/TD]
[TD][LEFT]Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5344&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-5344]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5344')
[MISC]('https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf')
[MISC]('https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Most Popular Posts Widget Plugin up to 0.8 on WordPress. It has been classified as critical. Affected is the function add_views/show_views of the file functions.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. Upgrading to version 0.9 is able to address this issue. The patch is identified as a99667d11ac8d320006909387b100e9a8b5c12e1. It is recommended to upgrade the affected component. VDB-241026 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][9.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2015-10124&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2015-10124]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-10124')
[MISC]('https://vuldb.com/?ctiid.241026')
[MISC]('https://github.com/wp-plugins/most-popular-posts-widget-lite/commit/a99667d11ac8d320006909387b100e9a8b5c12e1')
[MISC]('https://vuldb.com/?id.241026')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole WP-CopyProtect [Protect your blog posts] plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-25025&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-25025]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25025')
[MISC]('https://patchstack.com/database/vulnerability/wp-copyprotect/wordpress-wp-copyprotect-protect-your-blog-posts-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Gopi Ramasamy WP tell a friend popup form plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-25463&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-25463]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25463')
[MISC]('https://patchstack.com/database/vulnerability/wp-tell-a-friend-popup-form/wordpress-wp-tell-a-friend-popup-form-plugin-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Jeff Sherk Update Theme and Plugins from Zip File plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-25489&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-25489]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25489')
[MISC]('https://patchstack.com/database/vulnerability/update-theme-and-plugins-from-zip-file/wordpress-update-theme-and-plugins-from-zip-file-plugin-2-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Saphali Saphali Woocommerce Lite plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-25788&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-25788]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25788')
[MISC]('https://patchstack.com/database/vulnerability/saphali-woocommerce-lite/wordpress-saphali-woocommerce-lite-plugin-1-8-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-25980&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-25980]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25980')
[MISC]('https://patchstack.com/database/vulnerability/rvg-optimize-database/wordpress-optimize-database-after-deleting-revisions-plugin-5-0-110-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Make Paths Relative plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27433&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-27433]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27433')
[MISC]('https://patchstack.com/database/vulnerability/make-paths-relative/wordpress-make-paths-relative-plugin-1-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui HTTP Auth plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27435&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-27435]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27435')
[MISC]('https://patchstack.com/database/vulnerability/http-auth/wordpress-http-auth-plugin-0-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Trustindex.Io WP Testimonials plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-2830&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-2830]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2830')
[MISC]('https://patchstack.com/database/vulnerability/testimonial-widgets/wordpress-wp-testimonials-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Gangesh Matta Simple Org Chart plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28791&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-28791]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28791')
[MISC]('https://patchstack.com/database/vulnerability/simple-org-chart/wordpress-simple-org-chart-plugin-2-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Fugu Maintenance Switch plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-29235&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-29235]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-29235')
[MISC]('https://patchstack.com/database/vulnerability/maintenance-switch/wordpress-maintenance-switch-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in POEditor plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32091&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32091]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32091')
[MISC]('https://patchstack.com/database/vulnerability/poeditor/wordpress-poeditor-plugin-0-9-4-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in OptiMonk OptiMonk: Popups, Personalization & A/B Testing plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37891&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37891]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37891')
[MISC]('https://patchstack.com/database/vulnerability/exit-intent-popups-by-optimonk/wordpress-exit-popups-onsite-retargeting-by-optimonk-plugin-2-0-4-cross-site-request-forgery-csrf?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Mike Perelink Pro plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37990&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37990]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37990')
[MISC]('https://patchstack.com/database/vulnerability/perelink/wordpress-perelink-pro-plugin-2-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Monchito.Net WP Emoji One plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37991&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37991]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37991')
[MISC]('https://patchstack.com/database/vulnerability/wp-emoji-one/wordpress-wp-emoji-one-plugin-0-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37992&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37992]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37992')
[MISC]('https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole WP-CopyProtect [Protect your blog posts] plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37995&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37995]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37995')
[MISC]('https://patchstack.com/database/vulnerability/wp-copyprotect/wordpress-wp-copyprotect-protect-your-blog-posts-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in GTmetrix GTmetrix for WordPress plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37996&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37996]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37996')
[MISC]('https://patchstack.com/database/vulnerability/gtmetrix-for-wordpress/wordpress-gtmetrix-for-wordpress-plugin-0-4-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-37998&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-37998]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-37998')
[MISC]('https://patchstack.com/database/vulnerability/disabler/wordpress-disabler-plugin-3-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Cyle Conoly WP-FlyBox plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-38381&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-38381]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38381')
[MISC]('https://patchstack.com/database/vulnerability/wp-flybox/wordpress-wp-flybox-plugin-6-46-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Anshul Labs Mobile Address Bar Changer plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-38390&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-38390]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38390')
[MISC]('https://patchstack.com/database/vulnerability/mobile-address-bar-changer/wordpress-mobile-address-bar-changer-plugin-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Alain Gonzalez plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-38396&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-38396]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38396')
[MISC]('https://patchstack.com/database/vulnerability/google-map-shortcode/wordpress-google-map-shortcode-plugin-3-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Taboola plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-38398&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-38398]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38398')
[MISC]('https://patchstack.com/database/vulnerability/taboola/wordpress-taboola-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Fetch Designs Sign-up Sheets plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39165&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39165]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39165')
[MISC]('https://patchstack.com/database/vulnerability/sign-up-sheets/wordpress-sign-up-sheets-plugin-2-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Photo Gallery Team Photo Gallery by Ays - Responsive Image Gallery plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39917&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39917]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39917')
[MISC]('https://patchstack.com/database/vulnerability/gallery-photo-gallery/wordpress-photo-gallery-by-ays-responsive-image-gallery-plugin-5-2-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme The Post Grid plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39923&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39923]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39923')
[MISC]('https://patchstack.com/database/vulnerability/the-post-grid/wordpress-the-post-grid-plugin-7-2-7-cross-site-request-forgery-csrf-leading-to-css-change-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in 99robots Header Footer Code Manager plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39989&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-39989]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39989')
[MISC]('https://patchstack.com/database/vulnerability/header-footer-code-manager/wordpress-header-footer-code-manager-plugin-1-1-34-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in CRUDLab WP Like Button plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40199&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40199]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40199')
[MISC]('https://patchstack.com/database/vulnerability/wp-like-button/wordpress-wp-like-button-plugin-1-6-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in FuturioWP Futurio Extra plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40201&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40201]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40201')
[MISC]('https://patchstack.com/database/vulnerability/futurio-extra/wordpress-futurio-extra-plugin-1-8-2-cross-site-request-forgery-csrf?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Hannes Etzelstorfer // codemiq WP HTML Mail plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40202&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40202]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40202')
[MISC]('https://patchstack.com/database/vulnerability/wp-html-mail/wordpress-email-template-designer-wp-html-mail-plugin-3-4-0-cross-site-request-forgery-csrf?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Sean Barton (Tortoise IT) SB Child List plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40210&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40210]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40210')
[MISC]('https://patchstack.com/database/vulnerability/sb-child-list/wordpress-sb-child-list-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in eMarket Design YouTube Video Gallery by YouTube Showcase plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40558&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40558]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40558')
[MISC]('https://patchstack.com/database/vulnerability/youtube-showcase/wordpress-video-gallery-management-plugin-3-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Dynamic Pricing and Discount Rules for WooCommerce plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40559&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40559]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40559')
[MISC]('https://patchstack.com/database/vulnerability/woo-conditional-discount-rules-for-checkout/wordpress-dynamic-pricing-and-discount-rules-for-woocommerce-plugin-2-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Enhanced Ecommerce Google Analytics for WooCommerce plugin td> [TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40561&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40561]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40561')
[MISC]('https://patchstack.com/database/vulnerability/woo-ecommerce-tracking-for-google-and-facebook/wordpress-enhanced-ecommerce-google-analytics-for-woocommerce-plugin-3-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in CLUEVO CLUEVO LMS, E-Learning Platform plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40607&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-40607]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40607')
[MISC]('https://patchstack.com/database/vulnerability/cluevo-lms/wordpress-cluevo-lms-plugin-1-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Buildfail Localize Remote Images plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41244&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-41244]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41244')
[MISC]('https://patchstack.com/database/vulnerability/localize-remote-images/wordpress-localize-remote-images-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in edward_plainview MyCryptoCheckout plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41693&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-41693]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41693')
[MISC]('https://patchstack.com/database/vulnerability/mycryptocheckout/wordpress-mycryptocheckout-plugin-2-125-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]xiph -- vorbis-tools[/LEFT][/TD]
[TD][LEFT]Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][7.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43361&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-43361]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43361')
[MISC]('https://github.com/xiph/vorbis-tools')
[MISC]('https://github.com/xiph/vorbis-tools/issues/41')
[MISC]('https://github.com/xiph/vorbis')
[MISC]('https://xiph.org/vorbis/')[/TD]
[/TR]
[TR]
[TD][LEFT]zzzcms -- zzzcms[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in ZZZCMS 2.1.7 and classified as critical. Affected by this issue is the function restore of the file /admin/save.php of the component Database Backup File Handler. The manipulation leads to permission issues. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240872.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][8.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5263&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-5263]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5263')
[MISC]('https://vuldb.com/?ctiid.240872')
[MISC]('https://github.com/yhy217/zzzcms-vul/issues/1')
[MISC]('https://vuldb.com/?id.240872')[/TD]
[/TR][/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
[Back to top]('https://www.cisa.gov/uscert/ncas/#top')
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[TD][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
Medium Vulnerabilities
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT]acilia -- widestand[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) reflected vulnerability on WideStand until 5.3.5 version, which generates one of the meta tags directly using the content of the queried URL, which would allow an attacker to inject HTML/Javascript code into the response.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4090&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4090]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4090')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-widestand-cms-acilia')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- agent[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29258.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44210&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-44210]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44210')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-2159')
[MISC]('https://security-advisory.acronis.com/SEC-5528')[/TD]
[/TR]
[TR]
[TD][LEFT]animal-art-lab -- animal-art-lab[/LEFT][/TD]
[TD][LEFT]An issue in animal-art-lab v13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43297&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43297]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43297')
[MISC]('https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43297.md')[/TD]
[/TR]
[TR]
[TD][LEFT]arm -- 5th_gen_gpu_architecture_kernel_driver[/LEFT][/TD]
[TD][LEFT]A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory.[/LEFT][/TD]
[TD][CENTER]2023-10-01[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4211&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4211]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4211')
[MISC]('https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]arm -- mali_gpu_kernel_driver[/LEFT][/TD]
[TD][LEFT]A local non-privileged user can make improper GPU processing operations to exploit a software race condition. If the system's memory is carefully prepared by the user, then this in turn could give them access to already freed memory.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-33200&vector=CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-33200]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-33200')
[MISC]('https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]arm -- valhall_gpu_kernel_driver[/LEFT][/TD]
[TD][LEFT]A local non-privileged user can make improper GPU processing operations to access a limited amount outside of buffer bounds or to exploit a software race condition. If the system's memory is carefully prepared by the user, then this in turn could give them access to already freed memory[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-34970&vector=CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-34970]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-34970')
[MISC]('https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]broadpeak -- centralized_accounts_management_auth_agent[/LEFT][/TD]
[TD][LEFT]A cross-site scripting (XSS) vulnerability in the bpk-common/auth/login/index.html login portal in Broadpeak Centralized Accounts Management Auth Agent 01.01.00.19219575_ee9195b0, 01.01.01.30097902_fd999e76, and 00.12.01.9565588_1254b459 allows remote attackers to inject arbitrary web script or HTML via the disconnectMessage parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40519&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-40519]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40519')
[MISC]('https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa')[/TD]
[/TR]
[TR]
[TD][LEFT]buddyboss -- buddyboss[/LEFT][/TD]
[TD][LEFT]Authorization bypass vulnerability in BuddyBoss 2.2.9 version, the exploitation of which could allow an authenticated user to access and rename other users' albums. This vulnerability can be exploited by changing the album identification (id).[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32669&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-32669]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32669')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-budyboss')[/TD]
[/TR]
[TR]
[TD][LEFT]buddyboss -- buddyboss[/LEFT][/TD]
[TD][LEFT]Cross-Site Scripting vulnerability in BuddyBoss 2.2.9 version , which could allow a local attacker with basic privileges to execute a malicious payload through the "[name]=image.jpg" parameter, allowing to assign a persistent javascript payload that would be triggered when the associated image is loaded.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32670&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-32670]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32670')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-budyboss')[/TD]
[/TR]
[TR]
[TD][LEFT]capensis -- canopsis[/LEFT][/TD]
[TD][LEFT]This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3196&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-3196]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3196')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis')[/TD]
[/TR]
[TR]
[TD][LEFT]capensis -- canopsis[/LEFT][/TD]
[TD][LEFT]This vulnerability could allow an attacker to store a malicious JavaScript payload in the broadcast message parameter within the admin panel.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4564&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4564]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4564')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis')[/TD]
[/TR]
[TR]
[TD][LEFT]concrete_cms -- concrete_cms[/LEFT][/TD]
[TD][LEFT]Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow a local attacker to execute arbitrary code via a crafted script to the Forms of the Data objects.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44761&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44761]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44761')
[MISC]('https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms')[/TD]
[/TR]
[TR]
[TD][LEFT]concrete_cms -- concrete_cms[/LEFT][/TD]
[TD][LEFT]A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44762&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44762]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44762')
[MISC]('https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags')[/TD]
[/TR]
[TR]
[TD][LEFT]concrete_cms -- concrete_cms[/LEFT][/TD]
[TD][LEFT]A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the SITE parameter from installation or in the Settings.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44764&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44764]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44764')
[MISC]('https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation')[/TD]
[/TR]
[TR]
[TD][LEFT]concrete_cms -- concrete_cms[/LEFT][/TD]
[TD][LEFT]A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to Plural Handle of the Data Objects from System & Settings.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44765&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44765]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44765')
[MISC]('https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations')[/TD]
[/TR]
[TR]
[TD][LEFT]concrete_cms -- concrete_cms[/LEFT][/TD]
[TD][LEFT]A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the SEO - Extra from Page Settings.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44766&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44766]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44766')
[MISC]('https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contains a Path Traversal Vulnerability in the HTTP interface. A remote authenticated attacker could potentially exploit this vulnerability, leading to modify or write arbitrary files to arbitrary locations in the license container.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43070&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-43070]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43070')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contains an Improper Input Validation vulnerability in RADIUS configuration. An authenticated remote attacker could potentially exploit this vulnerability, leading to gaining unauthorized access to data.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43073&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-43073]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43073')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dell -- smartfabric_storage_software[/LEFT][/TD]
[TD][LEFT]Dell SmartFabric Storage Software v1.4 (and earlier) contains possible vulnerabilities for HTML injection or CVS formula injection which might escalate to cross-site scripting attacks in HTML pages in the GUI. A remote authenticated attacker could potentially exploit these issues, leading to various injection type attacks.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43071&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43071]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43071')
[MISC]('https://www.dell.com/support/kbdoc/en-us/000218107/dsa-2023-347-dell-smartfabric-storage-software-security-update-for-multiple-vulnerabilities')[/TD]
[/TR]
[TR]
[TD][LEFT]dolibarr -- dolibarr[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Generic in GitHub repository dolibarr/dolibarr prior to 18.0.[/LEFT][/TD]
[TD][CENTER]2023-10-01[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5323&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5323]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5323')
[MISC]('https://github.com/dolibarr/dolibarr/commit/695ca086847b3b6a185afa93e897972c93c43d15')
[MISC]('https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8')[/TD]
[/TR]
[TR]
[TD][LEFT]easy_address_book_web_server -- easy_address_book_web_server[/LEFT][/TD]
[TD][LEFT]Vulnerability in Easy Address Book Web Server 1.6 version, affecting the parameters (firstname, homephone, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate and workzip) of the /addrbook.ghp file, allowing an attacker to inject a JavaScript payload specially designed to run when the application is loaded.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4492&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4492]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4492')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]easy_address_book_web_server -- easy_address_book_web_server[/LEFT][/TD]
[TD][LEFT]Stored Cross-Site Scripting in Easy Address Book Web Server 1.6 version, through the users_admin.ghp file that affects multiple parameters such as (firstname, homephone, lastname, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate, workzip). This vulnerability allows a remote attacker to store a malicious JavaScript payload in the application to be executed when the page is loaded, resulting in an integrity impact.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4493&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4493]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4493')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]easy_chat_server -- easy_chat_server[/LEFT][/TD]
[TD][LEFT]Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Resume parameter. The XSS is loaded from /register.ghp.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4495&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4495]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4495')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]easy_chat_server -- easy_chat_server[/LEFT][/TD]
[TD][LEFT]Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4496&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4496]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4496')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]easy_chat_server -- easy_chat_server[/LEFT][/TD]
[TD][LEFT]Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Icon parameter. The XSS is loaded from /users.ghp.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4497&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-4497]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4497')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-efs-software-products')[/TD]
[/TR]
[TR]
[TD][LEFT]eclipse -- mosquitto[/LEFT][/TD]
[TD][LEFT]In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-0809&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD]
[TD][CVE-2023-0809]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-0809')
[MISC]('https://mosquitto.org/blog/2023/08/version-2-0-16-released/')[/TD]
[/TR]
[TR]
[TD][LEFT]ecshop -- ecshop[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240924.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5293&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5293]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5293')
[MISC]('https://vuldb.com/?id.240924')
[MISC]('https://vuldb.com/?ctiid.240924')
[MISC]('https://github.com/xhcccan/code/issues/1')[/TD]
[/TR]
[TR]
[TD][LEFT]eeroos -- eeroos[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in eeroOS up to 6.16.4-11 and classified as critical. This vulnerability affects unknown code of the component Ethernet Interface. The manipulation leads to denial of service. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241024.[/LEFT][/TD]
[TD][CENTER]2023-10-01[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5324&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-5324]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5324')
[MISC]('https://vuldb.com/?ctiid.241024')
[MISC]('https://vuldb.com/?id.241024')
[MISC]('https://github.com/nomis/eero-zero-length-ipv6-options-header-dos')[/TD]
[/TR]
[TR]
[TD][LEFT]emlog -- emlog[/LEFT][/TD]
[TD][LEFT]A cross-site scripting (XSS) vulnerability in the publish article function of emlog pro v2.1.14 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title field.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43267&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43267]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43267')
[MISC]('https://gist.github.com/Fliggyaaa/b61c24e828cbcfac42406be408665280')
[MISC]('https://github.com/Fliggyaaa/xss/')[/TD]
[/TR]
[TR]
[TD][LEFT]foreman -- foreman[/LEFT][/TD]
[TD][LEFT]A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4886&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4886]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4886')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-4886')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2230135')[/TD]
[/TR]
[TR]
[TD][LEFT]foru_cms -- foru_cms[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in ForU CMS. This vulnerability affects unknown code of the file /admin/cms_admin.php. The manipulation of the argument del leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-240868.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5259&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-5259]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5259')
[MISC]('https://vuldb.com/?id.240868')
[MISC]('https://github.com/RCEraser/cve/blob/main/ForU-CMS.md')
[MISC]('https://vuldb.com/?ctiid.240868')[/TD]
[/TR]
[TR]
[TD][LEFT]freebsd -- freebsd[/LEFT][/TD]
[TD][LEFT]On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file).[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5368&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5368]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5368')
[MISC]('https://security.FreeBSD.org/advisories/FreeBSD-SA-23:12.msdosfs.asc')[/TD]
[/TR]
[TR]
[TD][LEFT]furuno_systems -- acera_1210_firmware[/LEFT][/TD]
[TD][LEFT]Cross-site scripting vulnerability in FURUNO SYSTEMS wireless LAN access point devices allows an authenticated user to inject an arbitrary script via a crafted configuration. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39429&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-39429]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39429')
[MISC]('https://www.furunosystems.co.jp/news/info/vulner20231002.html')
[MISC]('https://jvn.jp/en/vu/JVNVU94497038/')[/TD]
[/TR]
[TR]
[TD][LEFT]furuno_systems -- acera_1310_firmware[/LEFT][/TD]
[TD][LEFT]Path traversal vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent authenticated attacker to alter critical information such as system files by sending a specially crafted request. They are affected when running in ST(Standalone) mode.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43627&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-43627]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43627')
[MISC]('https://www.furunosystems.co.jp/news/info/vulner20231002.html')
[MISC]('https://jvn.jp/en/vu/JVNVU94497038/')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An information disclosure issue in GitLab CE/EE affecting all versions starting from 13.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-0989&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-0989]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-0989')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/417275')
[MISC]('https://hackerone.com/reports/1875515')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3914&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3914]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3914')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/418115')
[MISC]('https://hackerone.com/reports/2040822')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An improper authorization issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.2.8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4 before 16.4.1. It allows a project reporter to leak the owner's Sentry instance projects.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-2233&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-2233]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2233')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/408359')
[MISC]('https://hackerone.com/reports/1947211')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3115&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3115]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3115')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/414367')
[MISC]('https://hackerone.com/reports/2004158')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3920&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-3920]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3920')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/417481')
[MISC]('https://hackerone.com/reports/2058121')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge request's source branch.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3979&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-3979]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3979')
[MISC]('https://hackerone.com/reports/2082560')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/419972')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI/CD jobs of private projects which they are not a member of.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4532&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4532]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4532')
[MISC]('https://hackerone.com/reports/2084199')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/423357')[/TD]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5198&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5198]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5198')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/416957')
[MISC]('https://hackerone.com/reports/2041789')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In video, there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08013430; Issue ID: ALPS08013433.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32821&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32821]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32821')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In ftm, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07994229; Issue ID: ALPS07994229.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32822&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32822]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32822')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In rpmb, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07912966; Issue ID: ALPS07912966.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32823&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32823]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32823')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In rpmb, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07912966; Issue ID: ALPS07912961.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32824&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32824]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32824')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993544.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32826&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32826]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32826')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In camera middleware, there is a possible out of bounds write due to a missing input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993539; Issue ID: ALPS07993539.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32827&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32827]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32827')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03802522; Issue ID: DTV03802522.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32830&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32830]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32830')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android[/LEFT][/TD]
[TD][LEFT]In display, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07993705; Issue ID: ALPS08014138.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32819&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-32819]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32819')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]hashicorp -- vault[/LEFT][/TD]
[TD][LEFT]A Vault Enterprise Sentinel Role Governing Policy created by an operator to restrict access to resources in one namespace can be applied to requests outside in another non-descendant namespace, potentially resulting in denial of service. Fixed in Vault Enterprise 1.15.0, 1.14.4, 1.13.8.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3775&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3775]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3775')
[MISC]('https://discuss.hashicorp.com/t/hcsec-2023-29-vault-enterprise-s-sentinel-rgp-policies-allowed-for-cross-namespace-denial-of-service/58653')[/TD]
[/TR]
[TR]
[TD][LEFT]hitachi -- ops_center_administrator[/LEFT][/TD]
[TD][LEFT]Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator on Linux allows local users to gain sensive information.This issue affects Hitachi Ops Center Administrator: before 10.9.3-00.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3335&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3335]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3335')
[MISC]('https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-140/index.html')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- content_navigator[/LEFT][/TD]
[TD][LEFT]IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOne Virtual is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 264019.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40684&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-40684]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40684')
[MISC]('https://https://www.ibm.com/support/pages/node/7046226')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/264019')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- filenet_content_manager[/LEFT][/TD]
[TD][LEFT]IBM FileNet Content Manager 5.5.8, 5.5.10, and 5.5.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 259384.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-35905&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-35905]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-35905')
[MISC]('https://www.ibm.com/support/pages/node/7014389')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/259384')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- security_guardium[/LEFT][/TD]
[TD][LEFT]IBM Security Guardium 11.5 could disclose sensitive information due to a missing or insecure SameSite attribute for a sensitive cookie. IBM X-Force ID: 240897.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-43906&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2022-43906]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-43906')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/240897')
[MISC]('https://https://www.ibm.com/support/pages/node/7038019')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- urbancode_deploy[/LEFT][/TD]
[TD][LEFT]IBM UrbanCode Deploy (UCD) 7.1 - 7.1.2.12, 7.2 through 7.2.3.5, and 7.3 through 7.3.2.0 under certain configurations could allow an authenticated user to make changes to environment variables due to improper authentication controls. IBM X-Force ID: 263581.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40376&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-40376]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40376')
[MISC]('https://www.ibm.com/support/pages/node/7037230')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/263581')[/TD]
[/TR]
[TR]
[TD][LEFT]ingeteam -- ingepac_da3451_firmware[/LEFT][/TD]
[TD][LEFT] Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3770&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3770]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3770')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products')[/TD]
[/TR]
[TR]
[TD][LEFT]inure -- inure[/LEFT][/TD]
[TD][LEFT]Missing Authorization in GitHub repository hamza417/inure prior to build94.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5321&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5321]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5321')
[MISC]('https://github.com/hamza417/inure/commit/57fda918bfd2fb863f579841a46363fe8e10c29b')
[MISC]('https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a')[/TD]
[/TR]
[TR]
[TD][LEFT]jfrog -- artifactory[/LEFT][/TD]
[TD][LEFT]JFrog Artifactory prior to version 7.66.0 is vulnerable to specific endpoint abuse with a specially crafted payload, which can lead to unauthenticated users being able to send emails with manipulated email body.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42508&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-42508]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42508')
[MISC]('https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories')[/TD]
[/TR]
[TR]
[TD][LEFT]jizhicms -- jizhicms[/LEFT][/TD]
[TD][LEFT]There is a SQL injection vulnerability in the Jizhicms 2.4.9 backend, which users can use to obtain database information[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43836&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-43836]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43836')
[MISC]('https://gist.github.com/Fliggyaaa/417f8335ce0f0546e95dda91d4b54604')
[MISC]('https://github.com/Fliggyaaa/jizhicmssql/')[/TD]
[/TR]
[TR]
[TD][LEFT]lemonldap -- lemonldap[/LEFT][/TD]
[TD][LEFT]A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44469&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44469]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44469')
[MISC]('https://security.lauritz-holtmann.de/post/sso-security-ssrf/')
[MISC]('https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998')
[MISC]('https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/releases/v2.17.1')
[MLIST]('https://lists.debian.org/debian-lts-announce/2023/10/msg00014.html')[/TD]
[/TR]
[TR]
[TD][LEFT]libhv -- libhv[/LEFT][/TD]
[TD][LEFT]All versions of the package ithewei/libhv are vulnerable to Cross-site Scripting (XSS) such that when a file with a name containing a malicious payload is served by the application, the filename is displayed without proper sanitization when it is rendered.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26146&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-26146]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26146')
[MISC]('https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766')
[MISC]('https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20')[/TD]
[/TR]
[TR]
[TD][LEFT]libhv -- libhv[/LEFT][/TD]
[TD][LEFT]All versions of the package ithewei/libhv are vulnerable to HTTP Response Splitting when untrusted user input is used to build headers values. An attacker can add the \r\n (carriage return line feeds) characters to end the HTTP response headers and inject malicious content, like for example additional headers or new response body, leading to a potential XSS vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26147&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-26147]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26147')
[MISC]('https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768')
[MISC]('https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b')[/TD]
[/TR]
[TR]
[TD][LEFT]libhv -- libhv[/LEFT][/TD]
[TD][LEFT]All versions of the package ithewei/libhv are vulnerable to CRLF Injection when untrusted user input is used to set request headers. An attacker can add the \r\n (carriage return line feeds) characters and inject additional headers in the request sent.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-26148&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-26148]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26148')
[MISC]('https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769')
[MISC]('https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e')[/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel[/LEFT][/TD]
[TD][LEFT]A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4732&vector=CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-4732]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4732')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-4732')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2236982')[/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to enforce character limits in all possible notification props allowing an attacker to send a really long value for a notification_prop resulting in the server consuming an abnormal quantity of computing resources and possibly becoming temporarily unavailable for its users.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5196&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-5196]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5196')
[MISC]('https://mattermost.com/security-updates')[/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly validate the permissions when soft deleting a team allowing a team member to soft delete other teams that they are not part of[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5195&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L')[/CENTER][/TD]
[TD][CVE-2023-5195]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5195')
[MISC]('https://mattermost.com/security-updates')[/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to check the Show Full Name option at the /api/v4/teams/TEAM_ID/top/team_members endpoint allowing a member to get the full name of another user even if the Show Full Name option was disabled[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5160&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5160]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5160')
[MISC]('https://mattermost.com/security-updates')[/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly validate permissions when demoting and deactivating a user allowing for a system/user manager to demote / deactivate another manager[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5194&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5194]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5194')
[MISC]('https://mattermost.com/security-updates')[/TD]
[/TR]
[TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Banner Management For WooCommerce plugin td> [TD][CENTER]2023-10-03[/CENTER][/LEFT][/TD][LEFT]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39158&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-39158]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39158')
[MISC]('https://patchstack.com/database/vulnerability/banner-management-for-woocommerce/wordpress-banner-management-for-woocommerce-plugin-2-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Fraud Prevention For Woocommerce plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39159&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-39159]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39159')
[MISC]('https://patchstack.com/database/vulnerability/woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers/wordpress-fraud-prevention-for-woocommerce-plugin-2-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Pipes plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40009&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-40009]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40009')
[MISC]('https://patchstack.com/database/vulnerability/wp-pipes/wordpress-wp-pipes-plugin-1-4-0-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Antsanchez Easy Cookie Law plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40198&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-40198]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40198')
[MISC]('https://patchstack.com/database/vulnerability/easy-cookie-law/wordpress-easy-cookie-law-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Product Attachment for WooCommerce plugin td> [TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-40212&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-40212]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40212')
[MISC]('https://patchstack.com/database/vulnerability/woo-product-attachment/wordpress-product-attachment-for-woocommerce-plugin-2-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]In vpu, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767817; Issue ID: ALPS07767817.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32828&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32828]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32828')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]mediatek,_inc. -- multiple_products[/LEFT][/TD]
[TD][LEFT]In apusys, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07713478; Issue ID: ALPS07713478.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32829&vector=CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H')[/CENTER][/TD]
[TD][CVE-2023-32829]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32829')
[MISC]('https://corp.mediatek.com/product-security-bulletin/October-2023')[/TD]
[/TR]
[TR]
[TD][LEFT]mhlw -- fd_application[/LEFT][/TD]
[TD][LEFT]FD Application Apr. 2022 Edition (Version 9.01) and earlier improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-42132&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-42132]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42132')
[MISC]('https://web.fd-shinsei.mhlw.go.jp/download/software/index.html')
[MISC]('https://jvn.jp/en/jp/JVN39596244/')[/TD]
[/TR]
[TR]
[TD][LEFT]mojoportal -- mojoportal[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44012&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44012]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44012')
[MISC]('https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012')[/TD]
[/TR]
[TR]
[TD][LEFT]mosparo -- mosparo[/LEFT][/TD]
[TD][LEFT]Open Redirect in GitHub repository mosparo/mosparo prior to 1.0.2.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5375&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5375]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5375')
[MISC]('https://github.com/mosparo/mosparo/commit/9d5da367b78b8c883bfef5f332ffea26292f99e8')
[MISC]('https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9')[/TD]
[/TR]
[TR]
[TD][LEFT]nothings_stb -- nothings_stb[/LEFT][/TD]
[TD][LEFT]Nothings stb 2.28 was discovered to contain a Null Pointer Dereference via the function stbi__convert_format. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted pic file.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43898&vector=CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-43898]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43898')
[MISC]('https://github.com/peccc/null-stb')[/TD]
[/TR]
[TR]
[TD][LEFT]nxlog -- nxlog_manager[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in NXLog Manager 5.6.5633 version. This vulnerability allows an attacker to manipulate and delete user accounts within the platform by sending a specifically crafted query to the server. The vulnerability is based on the lack of proper validation of the origin of incoming requests.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32791&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-32791]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32791')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-nxlog-manager')[/TD]
[/TR]
[TR]
[TD][LEFT]nxlog -- nxlog_manager[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in NXLog Manager 5.6.5633 version. This vulnerability allows an attacker to eliminate roles within the platform by sending a specifically crafted query to the server. The vulnerability is based on the absence of proper validation of the origin of incoming requests.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32792&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-32792]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32792')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-nxlog-manager')[/TD]
[/TR]
[TR]
[TD][LEFT]nxlog -- nxlog_manager[/LEFT][/TD]
[TD][LEFT]Cross-Site Scripting (XSS) vulnerability in NXLog Manager 5.6.5633 version. This vulnerability allows an attacker to inject a malicious JavaScript payload into the 'Full Name' field during a user edit, due to improper sanitization of the input parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32790&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-32790]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32790')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-nxlog-manager')[/TD]
[/TR]
[TR]
[TD][LEFT]online_banquet_booking_system -- online_banquet_booking_system[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as problematic, was found in Online Banquet Booking System 1.0. Affected is an unknown function of the file /view-booking-detail.php of the component Account Detail Handler. The manipulation of the argument username leads to cross site scripting. It is possible to launch the attack remotely. VDB-240942 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5303&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5303]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5303')
[MISC]('https://vuldb.com/?id.240942')
[MISC]('https://vuldb.com/?ctiid.240942')[/TD]
[/TR]
[TR]
[TD][LEFT]online_banquet_booking_system -- online_banquet_booking_system[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in Online Banquet Booking System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /book-services.php of the component Service Booking. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-240943.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5304&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5304]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5304')
[MISC]('https://vuldb.com/?id.240943')
[MISC]('https://vuldb.com/?ctiid.240943')[/TD]
[/TR]
[TR]
[TD][LEFT]online_banquet_booking_system -- online_banquet_booking_system[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in Online Banquet Booking System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /mail.php of the component Contact Us Page. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-240944.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5305&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5305]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5305')
[MISC]('https://vuldb.com/?id.240944')
[MISC]('https://vuldb.com/?ctiid.240944')[/TD]
[/TR]
[TR]
[TD][LEFT]open5gs -- open5gs[/LEFT][/TD]
[TD][LEFT]Man in the Middle vulnerability, which could allow an attacker to intercept VNF (Virtual Network Function) communications resulting in the exposure of sensitive information.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4885&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4885]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4885')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-open5gs')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "tracking_number" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43702&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43702]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43702')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "product_info[][name]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43703&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43703]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43703')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "title" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43704&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43704]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43704')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "translation_value[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43705&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43705]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43705')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "email_templates_key" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43706&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43706]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43706')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "CatalogsPageDescriptionForm[1][name] " parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43707&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43707]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43707')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1](MODULE_PAYMENT_SAGE_PAY_SERVER_TEXT_TITLE)" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43708&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43708]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43708')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1](MODULE)" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43709&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43709]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43709')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "configuration_title[1][MODULE_SHIPPING_PERCENT_TEXT_TITLE]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43710&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43710]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43710')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "admin_firstname" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43711&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43711]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43711')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "access_levels_name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43712&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43712]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43712')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability, which allows attackers to inject JS via the "title" parameter, in the "/admin/admin-menu/add-submit" endpoint, which can lead to unauthorized execution of scripts in a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43713&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43713]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43713')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "SKIP_CART_PAGE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43714&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43714]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43714')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "ENTRY_FIRST_NAME_MIN_LENGTH_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43715&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43715]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43715')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MAX_DISPLAY_NEW_PRODUCTS_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43716&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43716]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43716')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MSEARCH_HIGHLIGHT_ENABLE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43717&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43717]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43717')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "MSEARCH_ENABLE_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43718&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43718]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43718')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "SHIPPING_GENDER_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43719&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43719]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43719')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "BILLING_GENDER_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43720&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43720]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43720')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "PACKING_SLIPS_SUMMARY_TITLE[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43721&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43721]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43721')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_status_groups_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43722&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43722]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43722')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_status_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43723&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43723]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43723')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "derb6zmklgtjuhh2cn5chn2qjbm2stgmfa4.oastify.comscription[1][name]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43724&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43724]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43724')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_products_status_name_long[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43725&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43725]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43725')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "orders_products_status_manual_name_long[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43726&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43726]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43726')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "stock_indication_text[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43727&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43727]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43727')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "stock_delivery_terms_text[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43728&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43728]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43728')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "xsell_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43729&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43729]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43729')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "countries_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43730&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43730]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43730')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "zone_name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43731&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43731]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43731')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "tax_class_title" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43732&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43732]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43732')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "company_address" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43733&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43733]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43733')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "name" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43734&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43734]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43734')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "formats_titles[7]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43735&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43735]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43735')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "featured_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5111&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5111]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5111')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]os_commerce -- os_commerce[/LEFT][/TD]
[TD][LEFT]Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "specials_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5112&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5112]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5112')
[MISC]('https://fluidattacks.com/advisories/bts/')
[MISC]('https://www.oscommerce.com/')[/TD]
[/TR]
[TR]
[TD][LEFT]ovn -- open_virtual_network[/LEFT][/TD]
[TD][LEFT]A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3153&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD]
[TD][CVE-2023-3153]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3153')
[MISC]('https://mail.openvswitch.org/pipermail/ovs-announce/2023-August/000327.html')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-3153')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2213279')
[MISC]('https://mail.openvswitch.org/pipermail/ovs-dev/2023-August/407553.html')
[MISC]('https://github.com/ovn-org/ovn/commit/9a3f7ed905e525ebdcb14541e775211cbb0203bd')
[MISC]('https://github.com/ovn-org/ovn/issues/198')[/TD]
[/TR]
[TR]
[TD][LEFT]pandorafms -- pandora_fms[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) vulnerability in Syslog Section of Pandora FMS allows attacker to cause that users cookie value will be transferred to the attacker's user's server. This issue affects Pandora FMS v767 version and prior versions on all platforms.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-0828&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-0828]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-0828')
[MISC]('https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/')[/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5316&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5316]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5316')
[MISC]('https://github.com/thorsten/phpmyfaq/commit/332d2e4a83251d406ca58dd11c27c598673aa5fa')
[MISC]('https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43')[/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5320&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5320]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5320')
[MISC]('https://github.com/thorsten/phpmyfaq/commit/e92369543959772adcdab4f36c837faa27490346')
[MISC]('https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67')[/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5317&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5317]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5317')
[MISC]('https://github.com/thorsten/phpmyfaq/commit/ec551bdf1566ede1e55f289888c446f877ad9a83')
[MISC]('https://huntr.dev/bounties/5e146e7c-60c7-498b-9ffe-fd4cb4ca8c54')[/TD]
[/TR]
[TR]
[TD][LEFT]phpmyfaq -- phpmyfaq[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5319&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5319]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5319')
[MISC]('https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d')
[MISC]('https://github.com/thorsten/phpmyfaq/commit/95ed9b20557ed930d4eed1f3a6db713416f31131')[/TD]
[/TR]
[TR]
[TD][LEFT]pleasant_solutions -- pleasant_password_server[/LEFT][/TD]
[TD][LEFT]A cross-site scripting (XSS) vulnerability in the component /framework/cron/action/humanize of Pleasant Solutions Pleasant Password Server v7.11.41.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cronString parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-27121&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-27121]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27121')
[MISC]('https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/')
[MISC]('https://www.nuget.org/packages/CronExpressionDescriptor/2.9.0')
[MISC]('https://pleasantpasswords.com/download')[/TD]
[/TR]
[TR]
[TD][LEFT]pretix -- pretix[/LEFT][/TD]
[TD][LEFT]An issue was discovered in pretix before 2023.7.1. Incorrect parsing of configuration files causes the application to trust unchecked X-Forwarded-For headers even though it has not been configured to do so. This can lead to IP address spoofing by users of the application.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44463&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44463]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44463')
[MISC]('https://github.com/pretix/pretix/tags')
[MISC]('https://github.com/pretix/pretix/compare/v2023.7.0...v2023.7.1')
[MISC]('https://pretix.eu/about/en/ticketing')
[MISC]('https://github.com/pretix/pretix/commit/ccdce2ccb8207b82501af3c03f50abc0f819b469')
[CONFIRM]('https://pretix.eu/about/en/blog/20230911-release-2023-7-1/')[/TD]
[/TR]
[TR]
[TD][LEFT]pure_storage -- flasharray_purity[/LEFT][/TD]
[TD][LEFT]A flaw exists in FlashArray Purity wherein under limited circumstances, an array administrator can alter the retention lock of a pgroup and disable pgroup SafeMode protection.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][4.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-32572&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-32572]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32572')
[MISC]('https://https://support.purestorage.com/Pure_Storage_Technical_Services/Field_Bulletins/Security_Bulletins/Security_Bulletin_-_FlashArray_pgroup_Retention_Lock_SafeMode_Protection_CVE-2023-32572')[/TD]
[/TR]
[TR]
[TD][LEFT]pure_storage -- purity[/LEFT][/TD]
[TD][LEFT]A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade's object store protocol can impact the availability of the system's data access and replication protocols.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-31042&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD]
[TD][CVE-2023-31042]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-31042')
[MISC]('https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042')[/TD]
[/TR]
[TR]
[TD][LEFT]qsige -- qsige[/LEFT][/TD]
[TD][LEFT]The QSige Monitor application does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4099&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-4099]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4099')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]qualcomm -- apq8064au_firmware[/LEFT][/TD]
[TD][LEFT]Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28571&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-28571]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28571')
[MISC]('https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin')[/TD]
[/TR]
[TR]
[TD][LEFT]quick_cms -- quick_cms[/LEFT][/TD]
[TD][LEFT]Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Files - Description parameter in the Pages Menu component.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43343&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43343]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43343')
[MISC]('https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files')
[MISC]('https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files')[/TD]
[/TR]
[TR]
[TD][LEFT]red_hat -- multiple_products[/LEFT][/TD]
[TD][LEFT]A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.9]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-4132&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2022-4132]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4132')
[MISC]('https://access.redhat.com/security/cve/CVE-2022-4132')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2147372')[/TD]
[/TR]
[TR]
[TD][LEFT]ritecms -- ritecms[/LEFT][/TD]
[TD][LEFT]Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a payload crafted in the Home Page fields in the Administration menu.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43877&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43877]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43877')
[MISC]('https://github.com/sromanhu/RiteCMS-Stored-XSS---Home')[/TD]
[/TR]
[TR]
[TD][LEFT]salesagility -- suitecrm[/LEFT][/TD]
[TD][LEFT]Improper Access Control in GitHub repository salesagility/suitecrm prior to 7.14.1.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5353&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5353]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5353')
[MISC]('https://github.com/salesagility/suitecrm/commit/c43eaa311fb010b7928983e6afc6f9075c3996aa')
[MISC]('https://huntr.dev/bounties/3b3bb4f1-1aea-4134-99eb-157f245fa752')[/TD]
[/TR]
[TR]
[TD][LEFT]salesagility -- suitecrm[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm prior to 7.14.1.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5351&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5351]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5351')
[MISC]('https://github.com/salesagility/suitecrm/commit/c43eaa311fb010b7928983e6afc6f9075c3996aa')
[MISC]('https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- android[/LEFT][/TD]
[TD][LEFT]Logic error in package installation via debugger command prior to SMR Oct-2023 Release 1 allows physical attacker to install an application that has different build type.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][4.6]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30731&vector=CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N')[/CENTER][/TD]
[TD][CVE-2023-30731]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30731')
[MISC]('https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- health[/LEFT][/TD]
[TD][LEFT]Improper access control vulnerability in Samsung Health prior to version 6.24.3.007 allows attackers to access sensitive information via implicit intent.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30734&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-30734]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30734')
[MISC]('https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- health[/LEFT][/TD]
[TD][LEFT]Improper access control vulnerability in Samsung Health prior to version 6.24.3.007 allows attackers to access sensitive information via implicit intent.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30737&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-30737]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30737')
[MISC]('https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- samsung_assistant[/LEFT][/TD]
[TD][LEFT]Improper authorization in PushMsgReceiver of Samsung Assistant prior to version 8.7.00.1 allows attacker to execute javascript interface. To trigger this vulnerability, user interaction is required.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30736&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-30736]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30736')
[MISC]('https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]sato -- cl4nx-j_plus_firmware[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028.[/LEFT][/TD]
[TD][CENTER]2023-10-01[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5327&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5327]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5327')
[MISC]('https://vuldb.com/?id.241028')
[MISC]('https://vuldb.com/?ctiid.241028')
[MISC]('https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20dir/README.md')[/TD]
[/TR]
[TR]
[TD][LEFT]setelsa_security -- conacwin[/LEFT][/TD]
[TD][LEFT]Blind SQL injection vulnerability in the Conacwin 3.7.1.2 web interface, the exploitation of which could allow a local attacker to obtain sensitive data stored in the database by sending a specially crafted SQL query to the xml parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4037&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4037]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4037')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-setelsa-security-conacwin')[/TD]
[/TR]
[TR]
[TD][LEFT]silabs -- gecko_software_development_kit[/LEFT][/TD]
[TD][LEFT]Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3024&vector=CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H')[/CENTER][/TD]
[TD][CVE-2023-3024]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3024')
[MISC]('https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ViQvHQAV/?operationContext=S1')
[MISC]('https://github.com/SiliconLabs/gecko_sdk')[/TD]
[/TR]
[TR]
[TD][LEFT]small_crm -- small_crm[/LEFT][/TD]
[TD][LEFT]Cross Site Scripting vulnerability in Small CRM in PHP v.3.0 allows a remote attacker to execute arbitrary code via a crafted payload to the Address parameter.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44075&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44075]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44075')
[MISC]('https://github.com/TheKongV/CVE/blob/main/CVE-2023-44075')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of the file manage_parcel_status.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240886 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5273&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5273]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5273')
[MISC]('https://vuldb.com/?ctiid.240886')
[MISC]('https://vuldb.com/?id.240886')
[MISC]('https://github.com/E1CHO/cve_hub/blob/main/Best%20courier%20management%20system/Best%20courier%20management%20system%20project%20in%20php%20-%20vuln%206.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- best_courier_management_system[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5302&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5302]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5302')
[MISC]('https://vuldb.com/?ctiid.240941')
[MISC]('https://vuldb.com/?id.240941')
[MISC]('https://github.com/rohit0x5/poc/blob/main/cve_2')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- expense_tracker[/LEFT][/TD]
[TD][LEFT]A vulnerability, which was classified as problematic, has been found in SourceCodester Expense Tracker App v1. Affected by this issue is some unknown functionality of the file add_category.php of the component Category Handler. The manipulation of the argument category_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240914 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5286&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5286]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5286')
[MISC]('https://vuldb.com/?id.240914')
[MISC]('https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App')
[MISC]('https://vuldb.com/?ctiid.240914')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- task_management_system[/LEFT][/TD]
[TD][LEFT]A Stored Cross Site Scripting (XSS) vulnerability was found in SourceCodester Task Management System 1.0. It allows attackers to execute arbitrary code via parameter field in index.php?page=project_list.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43944&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43944]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43944')
[MISC]('https://purring-climb-52a.notion.site/Reflected-Cross-site-scripting-b6fd50b94b464313847bb52d4049154f?pvs=4')[/TD]
[/TR]
[TR]
[TD][LEFT]sscms -- sscms[/LEFT][/TD]
[TD][LEFT]SSCMS 7.2.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Material Management component.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43952&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43952]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43952')
[MISC]('https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-43952')[/TD]
[/TR]
[TR]
[TD][LEFT]sscms -- sscms[/LEFT][/TD]
[TD][LEFT]SSCMS 7.2.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Column Management component.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43951&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43951]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43951')
[MISC]('https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-43951')[/TD]
[/TR]
[TR]
[TD][LEFT]sscms -- sscms[/LEFT][/TD]
[TD][LEFT]SSCMS 7.2.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the Content Management component.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-43953&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-43953]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43953')
[MISC]('https://github.com/M19O/Security-Advisories/tree/main/CVE-2023-43953')[/TD]
[/TR]
[TR]
[TD][LEFT]tcman -- gim[/LEFT][/TD]
[TD][LEFT]The 'sReferencia', 'sDescripcion', 'txtCodigo' and 'txtDescripcion' parameters, in the frmGestionStock.aspx and frmEditServicio.aspx files in TCMAN GIM v8.0.1, could allow an attacker to perform persistent XSS attacks.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2022-36277&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2022-36277]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-36277')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-tcman-gim')[/TD]
[/TR]
[TR]
[TD][LEFT]upv -- peix[/LEFT][/TD]
[TD][LEFT]Authorization bypass vulnerability in UPV PEIX, affecting the component "pdf_curri_new.php". Through a POST request, an authenticated user could change the ID parameter to retrieve all the stored information of other registered users.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][6.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-2544&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-2544]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2544')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/authorization-bypass-upv-peix')[/TD]
[/TR]
[TR]
[TD][LEFT]userfeedback -- userfeedback[/LEFT][/TD]
[TD][LEFT]Unauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-39308&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-39308]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39308')
[MISC]('https://patchstack.com/database/vulnerability/userfeedback-lite/wordpress-userfeedback-lite-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve')
[MISC]('https://revan-ar.medium.com/cve-2023-39308-wordpress-plugin-user-feedback-1-0-7-unauthenticated-stored-xss-db992a01686a')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]whitehsbg -- jndiexploit[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5257&vector=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5257]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5257')
[MISC]('https://vuldb.com/?id.240866')
[MISC]('https://github.com/WhiteHSBG/JNDIExploit/issues/10')
[MISC]('https://vuldb.com/?ctiid.240866')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Photo Gallery Slideshow & Masonry Tiled Gallery plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41658&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41658]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41658')
[MISC]('https://patchstack.com/database/vulnerability/wp-responsive-photo-gallery/wordpress-photo-gallery-slideshow-masonry-tiled-gallery-plugin-1-0-13-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ulf Benjaminsson WP-dTree plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41662&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41662]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41662')
[MISC]('https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Giovambattista Fazioli WP Bannerize Pro plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41663&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41663]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41663')
[MISC]('https://patchstack.com/database/vulnerability/wp-bannerize-pro/wordpress-wp-bannerize-pro-plugin-1-6-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Hennessey Digital Attorney theme td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41692&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41692]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41692')
[MISC]('https://patchstack.com/database/vulnerability/attorney/wordpress-attorney-theme-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ClickToTweet.Com Click To Tweet plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41856&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41856]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41856')
[MISC]('https://patchstack.com/database/vulnerability/click-to-tweet/wordpress-click-to-tweet-plugin-2-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dreamfox Payment gateway per Product for WooCommerce plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44144&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44144]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44144')
[MISC]('https://patchstack.com/database/vulnerability/woocommerce-product-payments/wordpress-payment-gateway-per-product-for-woocommerce-plugin-3-2-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44244&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44244]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44244')
[MISC]('https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Leap Contractor Contact Form Website to Workflow Tool plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44245&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44245]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44245')
[MISC]('https://patchstack.com/database/vulnerability/contractor-contact-form-website-to-workflow-tool/wordpress-contractor-contact-form-website-to-workflow-tool-plugin-4-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MD Jakir Hosen Tiger Forms - Drag and Drop Form Builder plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][6.1]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44474&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44474]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44474')
[MISC]('https://patchstack.com/database/vulnerability/tiger-form/wordpress-tiger-forms-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Stockdio Stock Quotes List plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41666&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41666]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41666')
[MISC]('https://patchstack.com/database/vulnerability/stock-quotes-list/wordpress-stock-quotes-list-plugin-2-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Irina Sokolovskaya Goods Catalog plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41687&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41687]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41687')
[MISC]('https://patchstack.com/database/vulnerability/goods-catalog/wordpress-goods-catalog-plugin-2-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Rescue Themes Rescue Shortcodes plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41728&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41728]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41728')
[MISC]('https://patchstack.com/database/vulnerability/rescue-shortcodes/wordpress-rescue-shortcodes-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Gold Plugins Locations plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41797&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41797]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41797')
[MISC]('https://patchstack.com/database/vulnerability/locations/wordpress-locations-plugin-4-0-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WEN Solutions Notice Bar plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41847&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41847]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41847')
[MISC]('https://patchstack.com/database/vulnerability/notice-bar/wordpress-notice-bar-plugin-3-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in jesweb.Dev Anchor Episodes Index (Spotify for Podcasters) plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44145&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44145]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44145')
[MISC]('https://patchstack.com/database/vulnerability/anchor-episodes-index/wordpress-anchor-episodes-index-spotify-for-podcasters-plugin-2-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 2J Slideshow Team Slideshow, Image Slider by 2J plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44242&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44242]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44242')
[MISC]('https://patchstack.com/database/vulnerability/2j-slideshow/wordpress-slideshow-image-slider-by-2j-plugin-1-3-54-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed - Custom Feed plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44264&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44264]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44264')
[MISC]('https://patchstack.com/database/vulnerability/wp-facebook-feed/wordpress-the-awesome-feed-custom-feed-plugin-2-2-5-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Boxy Studio Cooked plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44477&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44477]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44477')
[MISC]('https://patchstack.com/database/vulnerability/cooked/wordpress-cooked-plugin-1-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'AWL-BlogFilter' shortcode in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5291&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5291]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5291')
[MISC]('https://plugins.trac.wordpress.org/changeset/2974261/blog-filter#file54')
[MISC]('https://plugins.trac.wordpress.org/browser/blog-filter/tags/1.5.3/blog-filter-output.php#L128')
[MISC]('https://www.wordfence.com/threat-intel/vulnerabilities/id/b95c1bf7-bb05-44d3-a185-7e38e62b7201?source=cve')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The WP Responsive header image slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sp_responsiveslider' shortcode in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5334&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5334]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5334')
[MISC]('https://www.wordfence.com/threat-intel/vulnerabilities/id/6953dea2-ca2d-4283-97c2-45c3420d9390?source=cve')
[MISC]('https://plugins.trac.wordpress.org/browser/responsive-header-image-slider/trunk/responsive_headerimageslider.php#L343')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The Instagram for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5357&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5357]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5357')
[MISC]('https://www.wordfence.com/threat-intel/vulnerabilities/id/3991d8d0-57a8-42e7-a53c-97508f7e137f?source=cve')
[MISC]('https://plugins.trac.wordpress.org/browser/instagram-for-wordpress/tags/2.1.6/templates/instagramPost.php#L12')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]The WP Mail SMTP Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the is_print_page function in versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to disclose potentially sensitive email information.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3213&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3213]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3213')
[MISC]('https://www.wordfence.com/threat-intel/vulnerabilities/id/a813251b-a4c1-4b23-ad03-dcc1f4f19eb9?source=cve')
[MISC]('https://wpmailsmtp.com/docs/how-to-view-recent-changes-to-the-wp-mail-smtp-plugin-changelog/')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Andreas Heigl authLdap plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41655&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41655]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41655')
[MISC]('https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Groundhogg Inc. HollerBox plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41657&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41657]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41657')
[MISC]('https://patchstack.com/database/vulnerability/holler-box/wordpress-hollerbox-plugin-2-3-2-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin td> [TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41661&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41661]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41661')
[MISC]('https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41729&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41729]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41729')
[MISC]('https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WordPress publish post email notification plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41731&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41731]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41731')
[MISC]('https://patchstack.com/database/vulnerability/publish-post-email-notification/wordpress-wordpress-publish-post-email-notification-plugin-1-0-2-2-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in YYDevelopment Back To The Top Button plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41733&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41733]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41733')
[MISC]('https://patchstack.com/database/vulnerability/back-to-the-top-button/wordpress-back-to-the-top-button-plugin-2-1-5-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nigauri Insert Estimated Reading Time plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41734&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41734]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41734')
[MISC]('https://patchstack.com/database/vulnerability/insert-estimated-reading-time/wordpress-insert-estimated-reading-time-plugin-1-2-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Email posts to subscribers plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41736&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41736]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41736')
[MISC]('https://patchstack.com/database/vulnerability/email-posts-to-subscribers/wordpress-email-posts-to-subscribers-plugin-6-2-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPGens Swifty Bar, sticky bar by WPGens plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41737&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41737]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41737')
[MISC]('https://patchstack.com/database/vulnerability/swifty-bar/wordpress-swifty-bar-sticky-bar-by-wpgens-plugin-1-2-10-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in UniConsent UniConsent CMP for GDPR CPRA GPP TCF plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41800&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41800]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41800')
[MISC]('https://patchstack.com/database/vulnerability/uniconsent-cmp/wordpress-uniconsent-cookie-consent-cmp-for-gdpr-ccpa-plugin-1-4-2-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Regpacks Regpack plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41855&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41855]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41855')
[MISC]('https://patchstack.com/database/vulnerability/regpack/wordpress-regpack-plugin-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-41859&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-41859]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41859')
[MISC]('https://patchstack.com/database/vulnerability/order-delivery-date/wordpress-order-delivery-date-for-wp-e-commerce-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Onclick show popup plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44228&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44228]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44228')
[MISC]('https://patchstack.com/database/vulnerability/onclick-show-popup/wordpress-onclick-show-popup-plugin-8-1-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44230&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44230]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44230')
[MISC]('https://patchstack.com/database/vulnerability/popup-contact-form/wordpress-popup-contact-form-plugin-7-1-cross-site-scripting-xss-2?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jobin Jose WWM Social Share On Image Hover plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44239&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44239]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44239')
[MISC]('https://patchstack.com/database/vulnerability/wwm-social-share-on-image-hover/wordpress-wwm-social-share-on-image-hover-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Renzo Johnson Blocks plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44262&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44262]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44262')
[MISC]('https://patchstack.com/database/vulnerability/blocks/wordpress-blocks-plugin-1-6-41-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Riyaz Social Metrics plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44263&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44263]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44263')
[MISC]('https://patchstack.com/database/vulnerability/social-metrics/wordpress-social-metrics-plugin-2-2-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44265&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44265]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44265')
[MISC]('https://patchstack.com/database/vulnerability/popup-contact-form/wordpress-popup-contact-form-plugin-7-1-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jewel Theme WP Adminify plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44266&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44266]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44266')
[MISC]('https://patchstack.com/database/vulnerability/adminify/wordpress-wp-adminify-custom-login-admin-dashboard-admin-columns-plugin-3-1-6-cross-site-scripting-xss?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jim Krill WP Jump Menu plugin td> [TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][4.8]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44479&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44479]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44479')
[MISC]('https://patchstack.com/database/vulnerability/wp-jump-menu/wordpress-wp-jump-menu-plugin-3-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress
[/LEFT][/TD]
[TD][LEFT]The Profile Extra Fields by BestWebSoft plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the prflxtrflds_export_file function in versions up to, and including, 1.2.7. This makes it possible for unauthenticated attackers to expose potentially sensitive user data, including data entered into custom fields.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-4469&vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-4469]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4469')
[MISC]('https://www.wordfence.com/threat-intel/vulnerabilities/id/916c73e8-a150-4b35-8773-ea0ec29f7fd1?source=cve')
[MISC]('https://plugins.trac.wordpress.org/changeset/2975179/profile-extra-fields')[/TD]
[/TR]
[TR]
[TD][LEFT]zenario_cms -- zenario_cms[/LEFT][/TD]
[TD][LEFT]A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows an attacker to execute arbitrary code via a crafted script to the Organizer - Spare alias.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44770&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44770]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44770')
[MISC]('https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md')[/TD]
[/TR]
[TR]
[TD][LEFT]zenario_cms -- zenario_cms[/LEFT][/TD]
[TD][LEFT]A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER][5.4]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-44771&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-44771]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44771')
[MISC]('https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout')[/TD]
[/TR][/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
[Back to top]('https://www.cisa.gov/uscert/ncas/#top')
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
Low Vulnerabilities
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT]gitlab -- gitlab[/LEFT][/TD]
[TD][LEFT]An input validation issue in the asset proxy in GitLab EE, affecting all versions from 12.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1, allowed an authenticated attacker to craft image urls which bypass the asset proxy.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][3.5]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-3906&vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-3906]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3906')
[MISC]('https://gitlab.com/gitlab-org/gitlab/-/issues/419213')
[MISC]('https://hackerone.com/reports/2071411')[/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][2.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5159&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5159]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5159')
[MISC]('https://mattermost.com/security-updates')[/TD]
[/TR]
[TR]
[TD][LEFT]mattermost -- mattermost[/LEFT][/TD]
[TD][LEFT]Mattermost fails to properly check permissions when retrieving a post allowing for a System Role with the permission to manage channels to read the posts of a DM conversation.[/LEFT][/TD]
[TD][CENTER]2023-09-29[/CENTER][/TD]
[TD][CENTER][2.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5193&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-5193]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5193')
[MISC]('https://mattermost.com/security-updates')[/TD]
[/TR]
[TR]
[TD][LEFT]phpkobo -- ajax_poll_script[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic was found in phpkobo Ajax Poll Script 3.18. Affected by this vulnerability is an unknown functionality of the file ajax-poll.php of the component Poll Handler. The manipulation leads to improper enforcement of a single, unique action. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240949 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-09-30[/CENTER][/TD]
[TD][CENTER][3.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-5313&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N')[/CENTER][/TD]
[TD][CVE-2023-5313]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5313')
[MISC]('https://vuldb.com/?ctiid.240949')
[MISC]('https://vuldb.com/?id.240949')
[MISC]('https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md')[/TD]
[/TR]
[TR]
[TD][LEFT]pure_storage -- flasharray_purity[/LEFT][/TD]
[TD][LEFT]A flaw exists in FlashArray Purity whereby an array administrator by configuring an external key manager can affect the availability of data on the system including snapshots protected by SafeMode.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER][2.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28373&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD]
[TD][CVE-2023-28373]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28373')
[MISC]('https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashArray_SafeMode_Immutable_Vulnerability_CVE-2023-28373')[/TD]
[/TR]
[TR]
[TD][LEFT]pure_storage -- flashblad_purity[/LEFT][/TD]
[TD][LEFT]A flaw exists in FlashBlade Purity (OE) Version 4.1.0 whereby a user with privileges to extend an object's retention period can affect the availability of the object lock.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][2.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-28372&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD]
[TD][CVE-2023-28372]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-28372')
[MISC]('https://support.purestorage.com/Pure_Storage_Technical_Services/Field_Bulletins/Security_Bulletins/Security_Bulletin_for_FlashBlade_Object_Store_Privileged_Access_Vulnerability_CVE-2023-28372')[/TD]
[/TR]
[TR]
[TD][LEFT]pure_storage -- flashblade_purity[/LEFT][/TD]
[TD][LEFT]A flaw exists in FlashBlade Purity whereby a user with access to an administrative account on a FlashBlade that is configured with timezone-dependent snapshot schedules can configure a timezone to prevent the schedule from functioning properly.[/LEFT][/TD]
[TD][CENTER]2023-10-02[/CENTER][/TD]
[TD][CENTER][2.7]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-36627&vector=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L')[/CENTER][/TD]
[TD][CVE-2023-36627]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36627')
[MISC]('https://support.purestorage.com/Pure_Storage_Technical_Services/Field_Bulletins/Security_Bulletins/Security_Bulletin_for_FlashBlade_Snapshot_Scheduler_CVE-2023-36627')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- android[/LEFT][/TD]
[TD][LEFT]Improper access control in system property prior to SMR Oct-2023 Release 1 allows local attacker to get CPU serial number.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30732&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-30732]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30732')
[MISC]('https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung -- sassistant[/LEFT][/TD]
[TD][LEFT]Improper Preservation of Permissions vulnerability in SAssistant prior to version 8.7 allows local attackers to access backup data in SAssistant.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER][3.3]('https://nvd.nist.gov/cvss.cfm?version=2&name=CVE-2023-30735&vector=CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N')[/CENTER][/TD]
[TD][CVE-2023-30735]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30735')
[MISC]('https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10')[/TD]
[/TR]
[/TABLE][/CENTER]
Back to top
Severity Not Yet Assigned
[CENTER][TABLE]
[TR]
[TH]Primary
Vendor -- Product[/TH]
[TH]Description[/TH]
[TH]Published[/TH]
[TH]CVSS Score[/TH]
[TH]Source & Patch Info[/TH]
[/TR]
[TR]
[TD][LEFT] simple_and_nice_shopping_cart_scrip --
simple_and_nice_shopping_cart_script
[/LEFT][/TD]
[TD][LEFT]File Upload vulnerability in Simple and Nice Shopping Cart Script v.1.0 allows a remote attacker to execute arbitrary code via the upload function in the edit profile component.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44061]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44061')
[MISC]('https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md')[/TD]
[/TR]
[TR]
[TD][LEFT]1e -- 1e_client
[/LEFT][/TD]
[TD][LEFT]1E Client installer can perform arbitrary file deletion on protected files. A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forces the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45159]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45159')
[MISC]('https://www.1e.com/trust-security-compliance/cve-info/')[/TD]
[/TR]
[TR]
[TD][LEFT]1e -- 1e_client
[/LEFT][/TD]
[TD][LEFT]In the affected version of the 1E Client, an ordinary user could subvert downloaded instruction resource files, e.g., to substitute a harmful script. by replacing a resource script file created by an instruction at run time with a malicious script. This has been fixed in patch Q23094 as the 1E Client's temporary directory is now locked down[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45160]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45160')
[MISC]('https://www.1e.com/trust-security-compliance/cve-info/')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31637.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44211]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44211')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-4061')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31477.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44212]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44212')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5528')
[MISC]('https://security-advisory.acronis.com/SEC-2159')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44214]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44214')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5902')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45240]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45240')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5904')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45241]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45241')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5999')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45242]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45242')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-6018')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45243]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45243')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-6019')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35895.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45244]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45244')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5907')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45245]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45245')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-6017')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36343.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45246]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45246')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5903')[/TD]
[/TR]
[TR]
[TD][LEFT]acronis -- acronis_agent_for_windows
[/LEFT][/TD]
[TD][LEFT]Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 35739.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44213]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44213')
[MISC]('https://security-advisory.acronis.com/advisories/SEC-5286')[/TD]
[/TR]
[TR]
[TD][LEFT]altair-graphql -- altair
[/LEFT][/TD]
[TD][LEFT]Altair is a GraphQL Client. Prior to version 5.2.5, the Altair GraphQL Client Desktop Application does not sanitize external URLs before passing them to the underlying system. Moreover, Altair GraphQL Client also does not isolate the context of the renderer process. This affects versions of the software running on MacOS, Windows, and Linux. Version 5.2.5 fixes this issue.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43799]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43799')
[MISC]('https://github.com/altair-graphql/altair/security/advisories/GHSA-9m5v-vrf6-fmvm')
[MISC]('https://github.com/altair-graphql/altair/releases/tag/v5.2.5')[/TD]
[/TR]
[TR]
[TD][LEFT]ansible -- ansible
[/LEFT][/TD]
[TD][LEFT]A logic flaw exists in Ansible. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4380]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4380')
[MISC]('https://access.redhat.com/errata/RHSA-2023:4693')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2232324')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-4380')[/TD]
[/TR]
[TR]
[TD][LEFT]ansible_automation_platform -- ansible_automation_platform
[/LEFT][/TD]
[TD][LEFT]A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4237]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4237')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-4237')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2229979')[/TD]
[/TR]
[TR]
[TD][LEFT]atlassian -- confluence_data_center
[/LEFT][/TD]
[TD][LEFT]Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. For more details, please review the linked advisory on this CVE.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-22515]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-22515')
[MISC]('https://jira.atlassian.com/browse/CONFSERVER-92457')
[MISC]('https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515')
[MISC]('https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276')[/TD]
[/TR]
[TR]
[TD][LEFT]buddyboss -- buddyboss
[/LEFT][/TD]
[TD][LEFT]A stored XSS vulnerability has been found on BuddyBoss Platform affecting version 2.2.9. This vulnerability allows an attacker to store a malicious javascript payload via POST request when sending an invitation.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-32671]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32671')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-budyboss')[/TD]
[/TR]
[TR]
[TD][LEFT]canonical_ltd. -- subiquity
[/LEFT][/TD]
[TD][LEFT]Sensitive data could be exposed in logs of subiquity version 23.09.1 and earlier. An attacker in the adm group could use this information to find hashed passwords and possibly escalate their privilege.[/LEFT][/TD]
[TD][CENTER]2023-10-07[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5182]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5182')
[MISC]('https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5182')
[MISC]('https://github.com/canonical/subiquity/pull/1820/commits/62e126896fb063808767d74d00886001e38eaa1c')[/TD]
[/TR]
[TR]
[TD][LEFT]checkfront_inc. -- checkfront_online_booking_system
[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Checkfront Inc. Checkfront Online Booking System plugin td> [TD][CENTER]2023-10-06[/CENTER][/LEFT][/TD][LEFT]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44146]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44146')
[MISC]('https://patchstack.com/database/vulnerability/checkfront-wp-booking/wordpress-checkfront-online-booking-system-plugin-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]cisco -- ios_xe_software
[/LEFT][/TD]
[TD][LEFT]A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-20235]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20235')
[MISC]('https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn')[/TD]
[/TR]
[TR]
[TD][LEFT]cisco -- unified_communications_products
[/LEFT][/TD]
[TD][LEFT]A vulnerability in an API endpoint of multiple Cisco Unified Communications Products could allow an unauthenticated, remote attacker to cause high CPU utilization, which could impact access to the web-based management interface and cause delays with call processing. This API is not used for device management and is unlikely to be used in normal operations of the device. This vulnerability is due to improper API authentication and incomplete validation of the API request. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to high CPU utilization, which could negatively impact user traffic and management access. When the attack stops, the device will recover without manual intervention.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-20259]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-20259')
[MISC]('https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-apidos-PGsDcdNF')[/TD]
[/TR]
[TR]
[TD][LEFT]citadel -- citadel[/LEFT][/TD]
[TD][LEFT]A cross-site scripting vulnerability exists in Citadel versions prior to 994. When a malicious user sends an instant message with some JavaScript code, the script may be executed on the web browser of the victim user.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44272]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44272')
[MISC]('https://code.citadel.org/citadel/citadel/-/commit/f0dac5ff074ad686fa71ea663c8ead107bd3041e')
[MISC]('https://jvn.jp/en/jp/JVN08237727/')
[MISC]('https://code.citadel.org/citadel/citadel')
[MISC]('https://www.citadel.org/download.html')[/TD]
[/TR]
[TR]
[TD][LEFT]d-link -- dir-820l
[/LEFT][/TD]
[TD][LEFT]D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the cancelPing function.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44807]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44807')
[MISC]('https://www.dlink.com/en/security-bulletin/')
[MISC]('https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug2.md')[/TD]
[/TR]
[TR]
[TD][LEFT]decidim -- decidim
[/LEFT][/TD]
[TD][LEFT]Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. The [ICODE]templates[/ICODE] module doesn't enforce the correct permissions, allowing any logged-in user to access to this functionality in the administration panel. An attacker could use this vulnerability to change, create or delete templates of surveys. This issue has been patched in version 0.26.8 and 0.27.4.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-36465]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36465')
[MISC]('https://github.com/decidim/decidim/releases/tag/v0.26.8')
[MISC]('https://github.com/decidim/decidim/security/advisories/GHSA-639h-86hw-qcjq')
[MISC]('https://github.com/decidim/decidim/releases/tag/v0.27.4')[/TD]
[/TR]
[TR]
[TD][LEFT]digital_china_networks -- dcfw-1800-sdc
[/LEFT][/TD]
[TD][LEFT]File Upload vulnerability in Digital China Networks DCFW-1800-SDC v.3.0 allows an authenticated attacker to execute arbitrary code via the wget function in the /sbin/cloudadmin.sh component.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43321]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43321')
[MISC]('https://github.com/Push3AX/vul/blob/main/DCN/DCFW_1800_SDC_CommandInjection.md')
[MISC]('https://www.dcnetworks.com.cn/goods/61.html')[/TD]
[/TR]
[TR]
[TD][LEFT]discourse -- discourse-jira
[/LEFT][/TD]
[TD][LEFT]Discourse-jira is a Discourse plugin allows Jira projects, issue types, fields and field options will be synced automatically. An administrator user can make an SSRF attack by setting the Jira URL to an arbitrary location and enabling the [ICODE]discourse_jira_verbose_log[/ICODE] site setting. A moderator user could manipulate the request path to the Jira API, allowing them to perform arbitrary GET requests using the Jira API credentials, potentially with elevated permissions, used by the application.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44384]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44384')
[MISC]('https://github.com/discourse/discourse-jira/security/advisories/GHSA-pmv5-h2x6-35fh')
[MISC]('https://github.com/discourse/discourse-jira/pull/50')
[MISC]('https://github.com/discourse/discourse-jira/commit/8a2d3ad228883199fd5f081cc93d173c88e2e48f')[/TD]
[/TR]
[TR]
[TD][LEFT]extreme_networks -- iq_engine
[/LEFT][/TD]
[TD][LEFT]IQ Engine before 10.6r2 on Extreme Network AP devices has a Buffer Overflow.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-35803]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-35803')
[MISC]('https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472')[/TD]
[/TR]
[TR]
[TD][LEFT]facebook -- whatsapp_desktop_for_mac
[/LEFT][/TD]
[TD][LEFT]A race condition in a network transport subsystem led to a heap use-after-free issue in established or unsilenced incoming audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-38537]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38537')
[MISC]('https://www.whatsapp.com/security/advisories/2023/')[/TD]
[/TR]
[TR]
[TD][LEFT]facebook -- whatsapp_desktop_for_mac
[/LEFT][/TD]
[TD][LEFT]A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-38538]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38538')
[MISC]('https://www.whatsapp.com/security/advisories/2023/')[/TD]
[/TR]
[TR]
[TD][LEFT]freebsd -- freebsd
[/LEFT][/TD]
[TD][LEFT]Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability. This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5369]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5369')
[MISC]('https://security.FreeBSD.org/advisories/FreeBSD-SA-23:13.capsicum.asc')[/TD]
[/TR]
[TR]
[TD][LEFT]freebsd -- freebsd
[/LEFT][/TD]
[TD][LEFT]On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5370]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5370')
[MISC]('https://security.FreeBSD.org/advisories/FreeBSD-SA-23:14.smccc.asc')[/TD]
[/TR]
[TR]
[TD][LEFT]fsevents -- fsevents
[/LEFT][/TD]
[TD][LEFT]fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45311]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45311')
[MISC]('https://github.com/cloudflare/hugo-cloudflare-docs/blob/e0f7cfa195af8ef1bfa51a487be7d34ba298ed06/package-lock.json#L494')
[MISC]('https://github.com/fsevents/fsevents/compare/v1.2.10...v1.2.11')
[MISC]('https://github.com/atlassian/react-immutable-proptypes/blob/ddb9fa5194b931bf7528eb4f2c0a8c3434f70edd/package-lock.json#L153')
[MISC]('https://github.com/cloudflare/redux-grim/blob/b652f99f95fb16812336073951adc5c5a93e2c23/package-lock.json#L266-L267')
[MISC]('https://github.com/cloudflare/authr/blob/3f6129d97d06e61033a7f237d84e35e678db490f/ts/package-lock.json#L1512')
[MISC]('https://github.com/cloudflare/serverless-cloudflare-workers/blob/e95e1e9c9770ed9a3d9480c1fa73e64391268354/package-lock.json#L737')
[MISC]('https://github.com/atlassian/moo/blob/56ccbdd41b493332bc2cd7a4097a5802594cdb9c/package-lock.json#L1901-L1902')[/TD]
[/TR]
[TR]
[TD][LEFT]garuda_linux -- garuda_linux
[/LEFT][/TD]
[TD][LEFT]Garuda Linux performs an insecure user creation and authentication that allows any user to impersonate the created account. By creating users from the 'Garuda settings manager', an insecure procedure is performed that keeps the created user without an assigned password during some seconds. This could allow a potential attacker to exploit this vulnerability in order to authenticate without knowing the password.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2021-3784]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2021-3784')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/garuda-linux-improper-authorization')[/TD]
[/TR]
[TR]
[TD][LEFT]gdidees_cms -- gdidees_cms
[/LEFT][/TD]
[TD][LEFT]GDidees CMS 3.0 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Title.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44758]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44758')
[MISC]('https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main')[/TD]
[/TR]
[TR]
[TD][LEFT]geokit-rails-- geokit-rails[/LEFT][/TD]
[TD][LEFT]Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value. [B]Note:[/B] An attacker can use this vulnerability to execute commands on the host system.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-26153]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26153')
[MISC]('https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d')
[MISC]('https://github.com/geokit/geokit-rails/blob/master/lib/geokit-rails/ip_geocode_lookup.rb%23L37')
[MISC]('https://github.com/geokit/geokit-rails/commit/a93dfe49fb9aeae7164e2f8c4041450a04b5482f')
[MISC]('https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323')
[MISC]('https://github.com/geokit/geokit-rails/commit/7ffc5813e57f6f417987043e1039925fd0865c43')[/TD]
[/TR]
[TR]
[TD][LEFT]go_toolchain -- cmd/go
[/LEFT][/TD]
[TD][LEFT]Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-39323]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39323')
[MISC]('https://pkg.go.dev/vuln/GO-2023-2095')
[MISC]('https://groups.google.com/g/golang-announce/c/XBa1oHDevAo')
[MISC]('https://go.dev/cl/533215')
[MISC]('https://go.dev/issue/63211')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android
[/LEFT][/TD]
[TD][LEFT]In visitUris of Notification.java, there is a possible bypass of user profile boundaries due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-21244]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-21244')
[MISC]('https://android.googlesource.com/platform/frameworks/base/+/20aedba4998373addc2befcc455a118585559fef')
[MISC]('https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3')
[MISC]('https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad')
[MISC]('https://source.android.com/security/bulletin/2023-10-01')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android
[/LEFT][/TD]
[TD][LEFT]In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-21252]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-21252')
[MISC]('https://android.googlesource.com/platform/packages/modules/Wifi/+/044ab0684153c4effb9f4fda47df43ccdc77bda8')
[MISC]('https://android.googlesource.com/platform/packages/modules/Wifi/+/50b08ee30e04d185e5ae97a5f717d436fd5a90f3')
[MISC]('https://source.android.com/security/bulletin/2023-10-01')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android
[/LEFT][/TD]
[TD][LEFT]In multiple locations, there is a possible way to crash multiple system services due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-21253]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-21253')
[MISC]('https://android.googlesource.com/platform/frameworks/base/+/84df68840b6f2407146e722ebd95a7d8bc6e3529')
[MISC]('https://android.googlesource.com/platform/tools/apksig/+/039f815895f62c9f8af23df66622b66246f3f61e')
[MISC]('https://android.googlesource.com/platform/tools/apksig/+/41d882324288085fd32ae0bb70dc85f5fd0e2be7')
[MISC]('https://source.android.com/security/bulletin/2023-10-01')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android
[/LEFT][/TD]
[TD][LEFT]In killBackgroundProcesses of ActivityManagerService.java, there is a possible way to escape Google Play protection due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-21266]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-21266')
[MISC]('https://android.googlesource.com/platform/frameworks/base/+/5b7edbf2ba076b04000eb5d27101927eeb609c26')
[MISC]('https://source.android.com/security/bulletin/2023-10-01')[/TD]
[/TR]
[TR]
[TD][LEFT]google -- android
[/LEFT][/TD]
[TD][LEFT]In visitUris of Notification.java, there is a possible way to reveal image contents from another user due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-21291]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-21291')
[MISC]('https://android.googlesource.com/platform/frameworks/base/+/cb6282e8970f4c9db5497889699e68fb2038566e')
[MISC]('https://source.android.com/security/bulletin/2023-10-01')[/TD]
[/TR]
[TR]
[TD][LEFT]gradle -- gradle
[/LEFT][/TD]
[TD][LEFT]Gradle is a build tool with a focus on build automation and support for multi-language development. In some cases, when Gradle parses XML files, resolving XML external entities is not disabled. Combined with an Out Of Band XXE attack (OOB-XXE), just parsing XML can lead to exfiltration of local text files to a remote server. Gradle parses XML files for several purposes. Most of the time, Gradle parses XML files it generated or were already present locally. Only Ivy XML descriptors and Maven POM files can be fetched from remote repositories and parsed by Gradle. In Gradle 7.6.3 and 8.4, resolving XML external entities has been disabled for all use cases to protect against this vulnerability. Gradle will now refuse to parse XML files that have XML external entities.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42445]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42445')
[MISC]('https://github.com/gradle/gradle/releases/tag/v7.6.3')
[MISC]('https://github.com/gradle/gradle/security/advisories/GHSA-mrff-q8qj-xvg8')
[MISC]('https://github.com/gradle/gradle/releases/tag/v8.4.0')[/TD]
[/TR]
[TR]
[TD][LEFT]gradle -- gradle
[/LEFT][/TD]
[TD][LEFT]Gradle is a build tool with a focus on build automation and support for multi-language development. When copying or archiving symlinked files, Gradle resolves them but applies the permissions of the symlink itself instead of the permissions of the linked file to the resulting file. This leads to files having too much permissions given that symlinks usually are world readable and writeable. While it is unlikely this results in a direct vulnerability for the impacted build, it may open up attack vectors depending on where build artifacts end up being copied to or un-archived. In versions 7.6.3, 8.4 and above, Gradle will now properly use the permissions of the file pointed at by the symlink to set permissions of the copied or archived file.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44387]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44387')
[MISC]('https://github.com/gradle/gradle/security/advisories/GHSA-43r3-pqhv-f7h9')
[MISC]('https://github.com/gradle/gradle/releases/tag/v7.6.3')
[MISC]('https://github.com/gradle/gradle/releases/tag/v8.4.0')
[MISC]('https://github.com/gradle/gradle/commit/3b406191e24d69e7e42dc3f3b5cc50625aa930b7')[/TD]
[/TR]
[TR]
[TD][LEFT]hex_dragon -- plain_craft_launcher_2
[/LEFT][/TD]
[TD][LEFT]Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version Alpha 1.3.9, allows local attackers to execute arbitrary code and gain sensitive information.[/LEFT][/TD]
[TD][CENTER]2023-10-07[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-36123]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-36123')
[MISC]('https://github.com/9Bakabaka/CVE-2023-36123')
[MISC]('https://gist.github.com/9Bakabaka/d4559b081ce0577dbf415917afc0efb5')[/TD]
[/TR]
[TR]
[TD][LEFT]hitachi -- hitachi_ops_center_common_services
[/LEFT][/TD]
[TD][LEFT]An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-3971]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3971')
[MISC]('https://access.redhat.com/errata/RHSA-2023:4340')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-3971')
[MISC]('https://access.redhat.com/errata/RHSA-2023:4590')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2226965')[/TD]
[/TR]
[TR]
[TD][LEFT]hitachi -- jp1/performance_management-manager
[/LEFT][/TD]
[TD][LEFT]Incorrect Default Permissions vulnerability in Hitachi JP1/Performance Management on Windows allows File Manipulation.This issue affects JP1/Performance Management - Manager: from 09-00 before 12-50-07; JP1/Performance Management - Base: from 09-00 through 10-50-[I]; JP1/Performance Management - Agent Option for Application Server: from 11-00 before 11-50-16; JP1/Performance Management - Agent Option for Enterprise Applications: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for HiRDB: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for IBM Lotus Domino: from 10-00 before 11-50-16; JP1/Performance Management - Agent Option for Microsoft(R) Exchange Server: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for Microsoft(R) Internet Information Server: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for Microsoft(R) SQL Server: from 09-00 before 12-50-07; JP1/Performance Management - Agent Option for Oracle: from 09-00 before 12-10-08; JP1/Performance Management - Agent Option for Platform: from 09-00 before 12-50-07; JP1/Performance Management - Agent Option for Service Response: from 09-00 before 11-50-16; JP1/Performance Management - Agent Option for Transaction System: from 11-00 before 12-00-14; JP1/Performance Management - Remote Monitor for Microsoft(R) SQL Server: from 09-00 before 12-50-07; JP1/Performance Management - Remote Monitor for Oracle: from 09-00 before 12-10-08; JP1/Performance Management - Remote Monitor for Platform: from 09-00 before 12-10-08; JP1/Performance Management - Remote Monitor for Virtual Machine: from 10-00 before 12-50-07; JP1/Performance Management - Agent Option for Domino: from 09-00 through 09-00-[/I]; JP1/Performance Management - Agent Option for IBM WebSphere Application Server: from 09-00 through 10-00-[I]; JP1/Performance Management - Agent Option for IBM WebSphere MQ: from 09-00 through 10-00-[/I]; JP1/Performance Management - Agent Option for JP1/AJS3: from 09-00 through 10-00-[I]; JP1/Performance Management - Agent Option for OpenTP1: from 09-00 through 10-00-[/I]; JP1/Performance Management - Agent Option for Oracle WebLogic Server: from 09-00 through 10-00-[I]; JP1/Performance Management - Agent Option for uCosminexus Application Server: from 09-00 through 10-00-[/I]; JP1/Performance Management - Agent Option for Virtual Machine: from 09-00 through 09-01-*.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-3440]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3440')
[MISC]('https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-145/index.html')[/TD]
[/TR]
[TR]
[TD][LEFT]hotrod-client -- hotrod-client
[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in the Hot Rod client. This security issue occurs as the Hot Rod client does not enable hostname validation when using TLS, possibly resulting in a man-in-the-middle (MITM) attack.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4586]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4586')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-4586')
[MISC]('https://security.snyk.io/vuln/SNYK-JAVA-IONETTY-1042268')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2235564')[/TD]
[/TR]
[TR]
[TD][LEFT]hp_inc. -- multiple_products
[/LEFT][/TD]
[TD][LEFT]Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5113]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5113')
[MISC]('https://support.hp.com/us-en/document/ish_9365285-9365309-16')[/TD]
[/TR]
[TR]
[TD][LEFT]htmlsanitizer -- htmlsanitizer
[/LEFT][/TD]
[TD][LEFT]HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. The vulnerability occurs in configurations where foreign content is allowed, i.e. either [ICODE]svg[/ICODE] or [ICODE]math[/ICODE] are in the list of allowed elements. In the case an application sanitizes user input with a vulnerable configuration, an attacker could bypass the sanitization and inject arbitrary HTML, including JavaScript code. Note that in the default configuration the vulnerability is not present. The vulnerability has been fixed in versions 8.0.723 and 8.1.722-beta (preview version).[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44390]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44390')
[MISC]('https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-43cp-6p3q-2pc4')
[MISC]('https://github.com/mganss/HtmlSanitizer/commit/ab29319866c020f0cc11e6b92228cd8039196c6e')[/TD]
[/TR]
[TR]
[TD][LEFT]hydra -- hydra
[/LEFT][/TD]
[TD][LEFT]Hydra is the layer-two scalability solution for Cardano. Users of the Hydra head protocol send the UTxOs they wish to commit into the Hydra head first to the [ICODE]commit[/ICODE] validator, where they remain until they are either collected into the [ICODE]head[/ICODE] validator or the protocol initialisation is aborted and the value in the committed UTxOs is returned to the users who committed them. Prior to version 0.12.0, the [ICODE]commit[/ICODE] validator contains a flawed check when the [ICODE]ViaAbort[/ICODE] redeemer is used, which allows any user to spend any UTxO which is at the validator arbitrarily, meaning an attacker can steal the funds that users are trying to commit into the head validator. The intended behavior is that the funds must be returned to the user which committed the funds and can only be performed by a participant of the head. The [ICODE]initial[/ICODE] validator also is similarly affected as the same flawed check is performed for the [ICODE]ViaAbort[/ICODE] redeemer. Due to this issue, an attacker can steal any funds that user's try to commit into a Hydra head. Also, an attacker can prevent any Hydra head from being successfully opened. It does not allow an attacker to take funds which have been successfully collected into and currently reside in the [ICODE]head[/ICODE] validator. Version 0.12.0 contains a fix for this issue.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-38701]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-38701')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/Util.hs#L32-L42')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/Commit.hs#L94-L97')
[MISC]('https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18')[/TD]
[/TR]
[TR]
[TD][LEFT]hydra -- hydra
[/LEFT][/TD]
[TD][LEFT]Hydra is the layer-two scalability solution for Cardano. Prior to version 0.13.0, the specification states that the contestation period in the datum of the UTxO at the head validator must stay unchanged as the state progresses from Open to Closed (Close transaction), but no such check appears to be performed in the [ICODE]checkClose[/ICODE] function of the head validator. This would allow a malicious participant to modify the contestation deadline of the head to either allow them to fanout the head without giving another participant the chance to contest or prevent any participant from ever redistributing the funds locked in the head via a fan-out. Version 0.13.0 contains a patch for this issue.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42448]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42448')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/Head.hs#L320-L323')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/Head.hs#L284-L296')
[MISC]('https://github.com/input-output-hk/hydra/security/advisories/GHSA-mgcx-6p7h-5996')
[MISC]('https://github.com/input-output-hk/hydra/commit/2f45529729e28254a62f7a7c8d6649066923ed1f')[/TD]
[/TR]
[TR]
[TD][LEFT]hydra -- hydra
[/LEFT][/TD]
[TD][LEFT]Hydra is the two-layer scalability solution for Cardano. Prior to version 0.13.0, it is possible for a malicious head initializer to extract one or more PTs for the head they are initializing due to incorrect data validation logic in the head token minting policy which then results in a flawed check for burning the head ST in the [ICODE]initial[/ICODE] validator. This is possible because it is not checked in [ICODE]HeadTokens.hs[/ICODE] that the datums of the outputs at the [ICODE]initial[/ICODE] validator are equal to the real head ID, and it is also not checked in the [ICODE]off-chain code[/ICODE]. During the [ICODE]Initial[/ICODE] state of the protocol, if the malicious initializer removes a PT from the Hydra scripts it becomes impossible for any other participant to reclaim any funds they have attempted to commit into the head, as to do so the Abort transaction must burn all the PTs for the head, but they cannot burn the PT which the attacker controls and so cannot satisfy this requirement. That means the initializer can lock the other participants committed funds forever or until they choose to return the PT (ransom). The malicious initializer can also use the PT to spoof that they have committed a particular TxO when progressing the head into the [ICODE]Open[/ICODE] state. For example, they could say they committed a TxO residing at their address containing 100 ADA, but in fact this 100 ADA was not moved into the head, and thus in order for another participant to perform the fanout they will be forced to pay the attacker the 100 ADA out of their own funds, as the fanout transaction must pay all the committed TxOs (even though the attacker did not really commit that TxO). They can do this by placing the PT in a UTxO with a well-formed [ICODE]Commit[/ICODE] datum with whatever contents they like, then use this UTxO in the [ICODE]collectCom[/ICODE] transaction. There may be other possible ways to abuse having control of a PT. Version 0.13.0 fixes this issue.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42449]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42449')
[MISC]('https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03')
[MISC]('https://github.com/input-output-hk/hydra/blob/1e13b60a7b21c5ccd6c36e3cf220547f5d443cef/hydra-node/src/Hydra/Chain/Direct/Tx.hs#L645-L761')
[MISC]('https://github.com/input-output-hk/hydra/blob/1e13b60a7b21c5ccd6c36e3cf220547f5d443cef/hydra-plutus/src/Hydra/Contract/Initial.hs#L84-L91')
[MISC]('https://github.com/input-output-hk/hydra/blob/master/hydra-plutus/src/Hydra/Contract/HeadTokens.hs#L76-L136')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- engineering_lifecycle_management
[/LEFT][/TD]
[TD][LEFT]IBM Jazz Foundation (IBM Engineering Lifecycle Management 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2) could disclose sensitive version information to a user that could be used in further attacks against the system. IBM X-Force ID: 230498.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-34355]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-34355')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/230498')
[MISC]('https://www.ibm.com/support/pages/node/7046995')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- robotic_process_automation[/LEFT][/TD]
[TD][LEFT]IBM Robotic Process Automation 23.0.9 is vulnerable to privilege escalation that affects ownership of projects. IBM X-Force ID: 247527.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43058]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43058')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/267527')
[MISC]('https://www.ibm.com/support/pages/node/7047017')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- security_directory_suite
[/LEFT][/TD]
[TD][LEFT]IBM Security Directory Suite 8.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 228568.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-33160]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-33160')
[MISC]('https://www.ibm.com/support/pages/node/7047071')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/228568')[/TD]
[/TR]
[TR]
[TD][LEFT]ibm -- storage_protect_client
[/LEFT][/TD]
[TD][LEFT]IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments 8.1.0.0 through 8.1.19.0 could allow a local user to execute arbitrary code on the system using a specially crafted file, caused by a DLL hijacking flaw. IBM X-Force ID: 259246.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-35897]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-35897')
[MISC]('https://exchange.xforce.ibmcloud.com/vulnerabilities/259246')
[MISC]('https://www.ibm.com/support/pages/node/7037299')[/TD]
[/TR]
[TR]
[TD][LEFT]idm_sistemas_qsige -- qsige
[/LEFT][/TD]
[TD][LEFT]The QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4101]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4101')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]idm_sistemas_qsige -- qsige
[/LEFT][/TD]
[TD][LEFT]QSige login SSO does not have an access control mechanism to verify whether the user requesting a resource has sufficient permissions to do so. As a prerequisite, it is necessary to log into the application.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4102]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4102')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]idm_sistemas_qsige -- qsige
[/LEFT][/TD]
[TD][LEFT]QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4103]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4103')
[MISC]('https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-idm-sistemas-qsige')[/TD]
[/TR]
[TR]
[TD][LEFT]imagemagick -- imagemagick
[/LEFT][/TD]
[TD][LEFT]A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-3428]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3428')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2218369')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-3428')[/TD]
[/TR]
[TR]
[TD][LEFT]keycloak -- keycloak
[/LEFT][/TD]
[TD][LEFT]A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-2422]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2422')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-2422')
[MISC]('https://access.redhat.com/errata/RHSA-2023:3892')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2191668')
[MISC]('https://access.redhat.com/errata/RHSA-2023:3885')
[MISC]('https://access.redhat.com/errata/RHSA-2023:3884')
[MISC]('https://access.redhat.com/errata/RHSA-2023:3883')
[MISC]('https://access.redhat.com/errata/RHSA-2023:3888')[/TD]
[/TR]
[TR]
[TD][LEFT]kong -- insomnia
[/LEFT][/TD]
[TD][LEFT]Kong Insomnia 2023.4.0 on macOS allows attackers to execute code and access restricted files, or make requests for TCC permissions, by using the DYLD_INSERT_LIBRARIES environment variable.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-40299]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40299')
[MISC]('https://github.com/Kong/insomnia/releases')
[MISC]('https://www.angelystor.com/posts/cve-2023-40299/')
[MISC]('https://github.com/Kong/insomnia/pull/6217/commits')
[MISC]('https://insomnia.rest/changelog')[/TD]
[/TR]
[TR]
[TD][LEFT]libtiff -- libtiff
[/LEFT][/TD]
[TD][LEFT]A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-3576]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3576')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-3576')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2219340')[/TD]
[/TR]
[TR]
[TD][LEFT]libtiff -- libtiff
[/LEFT][/TD]
[TD][LEFT]LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-40745]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40745')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-40745')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2235265')[/TD]
[/TR]
[TR]
[TD][LEFT]libtiff -- libtiff
[/LEFT][/TD]
[TD][LEFT]A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41175]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41175')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-41175')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2235264')[/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel
[/LEFT][/TD]
[TD][LEFT]A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42754]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42754')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-42754')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2239845')
[MISC]('https://seclists.org/oss-sec/2023/q4/14')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/')[/TD]
[/TR]
[TR]
[TD][LEFT]linux -- kernel
[/LEFT][/TD]
[TD][LEFT]A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the [ICODE]rsvp_classify[/ICODE] function. This issue may allow a local user to crash the system and cause a denial of service.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42755]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42755')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-42755')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2239847')
[MISC]('https://seclists.org/oss-sec/2023/q3/229')[/TD]
[/TR]
[TR]
[TD][LEFT]mbed_tls -- mbed_tls
[/LEFT][/TD]
[TD][LEFT]Mbed TLS 2.x before 2.28.5 and 3.x before 3.5.0 has a Buffer Overflow.[/LEFT][/TD]
[TD][CENTER]2023-10-07[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43615]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43615')
[MISC]('https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-1/')[/TD]
[/TR]
[TR]
[TD][LEFT]mbed_tls -- mbed_tls
[/LEFT][/TD]
[TD][LEFT]Mbed TLS 3.2.x through 3.4.x before 3.5 has a Buffer Overflow that can lead to remote Code execution.[/LEFT][/TD]
[TD][CENTER]2023-10-07[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45199]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45199')
[MISC]('https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-2/')[/TD]
[/TR]
[TR]
[TD][LEFT]meks -- multiple_products[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Meks Video Importer, Meks Time Ago, Meks ThemeForest Smart Widget, Meks Smart Author Widget, Meks Audio Player, Meks Easy Maps, Meks Easy Photo Feed Widget, Meks Simple Flickr Widget, Meks Easy Ads Widget, Meks Smart Social Widget plugins leading to dismiss or the popup.[/LEFT][/TD]
[TD][CENTER]2023-10-03[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-25989]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25989')
[MISC]('https://patchstack.com/database/vulnerability/meks-video-importer/wordpress-meks-video-importer-plugin-1-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-easy-maps/wordpress-meks-easy-maps-plugin-2-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-smart-author-widget/wordpress-meks-smart-author-widget-plugin-1-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-smart-social-widget/wordpress-meks-smart-social-widget-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-easy-ads-widget/wordpress-meks-easy-ads-widget-plugin-2-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-themeforest-smart-widget/wordpress-meks-themeforest-smart-widget-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-easy-instagram-widget/wordpress-meks-easy-photo-feed-widget-plugin-1-2-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-time-ago/wordpress-meks-time-ago-plugin-1-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-audio-player/wordpress-meks-audio-player-plugin-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')
[MISC]('https://patchstack.com/database/vulnerability/meks-simple-flickr-widget/wordpress-meks-simple-flickr-widget-plugin-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/TR]
[TR]
[TD][LEFT]meta -- tac_plus
[/LEFT][/TD]
[TD][LEFT]A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45239]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45239')
[MISC]('https://github.com/facebook/tac_plus/pull/41')
[MISC]('https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3')
[MISC]('https://lists.fedoraproject.org/archives/list/
[email protected]/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/')[/TD]
[/TR]
[TR]
[TD][LEFT]milesight -- multiple_products
[/LEFT][/TD]
[TD][LEFT]Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the admin panel.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43260]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43260')
[MISC]('https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13')[/TD]
[/TR]
[TR]
[TD][LEFT]milesight -- multiple_products
[/LEFT][/TD]
[TD][LEFT]An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43261]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43261')
[MISC]('https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf')
[MISC]('http://ur5x.com')
[MISC]('https://support.milesight-iot.com/support/home')
[MISC]('https://github.com/win3zz/CVE-2023-43261')
[MISC]('http://milesight.com')[/TD]
[/TR]
[TR]
[TD][LEFT]misskey -- misskey
[/LEFT][/TD]
[TD][LEFT]Misskey is an open source, decentralized social media platform. Prior to version 2023.9.0, by editing the URL, a user can bypass the authentication of the Bull dashboard, which is the job queue management UI, and access it. Version 2023.9.0 contains a fix. There are no known workarounds.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43793]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43793')
[MISC]('https://github.com/misskey-dev/misskey/security/advisories/GHSA-9fj2-gjcf-cqqc')
[MISC]('https://github.com/misskey-dev/misskey/commit/c9aeccb2ab260ceedc126e6e366da8cd13ece4b2')
[MISC]('https://github.com/nexryai/nexkey/security/advisories/GHSA-g8w5-568f-ffwf')[/TD]
[/TR]
[TR]
[TD][LEFT]mozilla -- common_voice
[/LEFT][/TD]
[TD][LEFT]Common Voice is the web app for Mozilla Common Voice, a platform for collecting speech donations in order to create public domain datasets for training voice recognition-related tools. Version 1.88.2 is vulnerable to reflected Cross-Site Scripting given that user-controlled data flows to a path expression (path of a network request). This issue may lead to reflected Cross-Site Scripting (XSS) in the context of Common Voice's server origin. As of time of publication, it is unknown whether any patches or workarounds exist.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42808]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42808')
[MISC]('https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/')
[MISC]('https://github.com/mozilla/common-voice/blob/9d6ffd755e29b81918b86b9f5218b9c27d9c1c1a/server/src/fetch-legal-document.ts#LL21-L62C2')
[MISC]('https://github.com/mozilla/common-voice/blob/9d6ffd755e29b81918b86b9f5218b9c27d9c1c1a/server/src/server.ts#L214')[/TD]
[/TR]
[TR]
[TD][LEFT]national_instruments -- measurementlink
[/LEFT][/TD]
[TD][LEFT]An improper access restriction in NI MeasurementLink Python services could allow an attacker on an adjacent network to reach services exposed on localhost. These services were previously thought to be unreachable outside of the node. This affects measurement plug-ins written in Python using version 1.1.0 of the ni-measurementlink-service Python package and all previous versions.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-4570]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-4570')
[MISC]('https://www.ni.com/en/support/documentation/supplemental/23/improper-restriction-in-ni-measurementlink-python-services.html')[/TD]
[/TR]
[TR]
[TD][LEFT]netbsd_ftpd -- netbsd_ftpd
[/LEFT][/TD]
[TD][LEFT]ftpd before "NetBSD-ftpd 20230930" can leak information about the host filesystem before authentication via an MLSD or MLST command. tnftpd (the portable version of NetBSD ftpd) before 20231001 is also vulnerable.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45198]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45198')
[MISC]('https://mail-index.netbsd.org/source-changes/2023/09/22/msg147669.html')
[MISC]('http://cvsweb.netbsd.org/bsdweb.cgi/src/libexec/ftpd/ftpcmd.y.diff?r1=1.94&r2=1.95')[/TD]
[/TR]
[TR]
[TD][LEFT]netis_systems -- n3m_firmware
[/LEFT][/TD]
[TD][LEFT]An issue in NETIS SYSTEMS N3Mv2 v.1.0.1.865 allows a remote attacker to cause a denial of service via the authorization component in the HTTP request.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44860]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44860')
[MISC]('https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md')[/TD]
[/TR]
[TR]
[TD][LEFT]nexkey -- nexkey
[/LEFT][/TD]
[TD][LEFT]Nexkey is a fork of Misskey, an open source, decentralized social media platform. Prior to version 12.121.9, incomplete URL validation can allow users to bypass authentication for access to the job queue dashboard. Version 12.121.9 contains a fix for this issue. As a workaround, it may be possible to avoid this by blocking access using tools such as Cloudflare's WAF.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43805]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43805')
[MISC]('https://github.com/misskey-dev/misskey/security/advisories/GHSA-9fj2-gjcf-cqqc')
[MISC]('https://github.com/nexryai/nexkey/commit/d89575c521fd4492f5e2ba5a221c5e8f1382081d')
[MISC]('https://github.com/nexryai/nexkey/security/advisories/GHSA-g8w5-568f-ffwf')[/TD]
[/TR]
[TR]
[TD][LEFT]open_mct -- open_mct
[/LEFT][/TD]
[TD][LEFT]In NASA Open MCT (aka openmct) 2.2.5 before 545a177, prototype pollution can occur via an import action.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45282]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45282')
[MISC]('https://github.com/nasa/openmct/pull/7094/commits/545a1770c523ecc3410dca884c6809d5ff0f9d52')
[MISC]('https://nasa.github.io/openmct/')[/TD]
[/TR]
[TR]
[TD][LEFT]opentelemetry -- opentelemetry
[/LEFT][/TD]
[TD][LEFT]OpenTelemetry, also known as OTel for short, is a vendor-neutral open-source Observability framework for instrumenting, generating, collecting, and exporting telemetry data such as traces, metrics, logs. Autoinstrumentation out of the box adds the label [ICODE]http_method[/ICODE] that has unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. HTTP method for requests can be easily set by an attacker to be random and long. In order to be affected program has to be instrumented for HTTP handlers and does not filter any unknown HTTP methods on the level of CDN, LB, previous middleware, etc. This issue has been patched in version 0.41b0.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43810]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43810')
[MISC]('https://github.com/open-telemetry/opentelemetry-python-contrib/releases/tag/v0.41b0')
[MISC]('https://github.com/open-telemetry/opentelemetry-python-contrib/commit/6007e0c013071e7f8b9612d3bc68aeb9d600d74e')
[MISC]('https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v')[/TD]
[/TR]
[TR]
[TD][LEFT]openvswitch -- openvswitch
[/LEFT][/TD]
[TD][LEFT]A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5366]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5366')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-5366')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2006347')[/TD]
[/TR]
[TR]
[TD][LEFT]pigcms -- pigcms
[/LEFT][/TD]
[TD][LEFT]pigcms up to 7.0 was discovered to contain an arbitrary file upload vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43269]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43269')
[MISC]('https://github.com/pwnero/vul/issues/1')[/TD]
[/TR]
[TR]
[TD][LEFT]prixan -- connect
[/LEFT][/TD]
[TD][LEFT]Prixan prixanconnect up to v1.62 was discovered to contain a SQL injection vulnerability via the component CartsGuruCatalogModuleFrontController::importProducts().[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-40920]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40920')
[MISC]('https://security.friendsofpresta.org/modules/2023/10/05/prixanconnect.html')[/TD]
[/TR]
[TR]
[TD][LEFT]puppet -- bolt
[/LEFT][/TD]
[TD][LEFT]In Puppet Bolt versions prior to 3.27.4, a path to escalate privileges was identified.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5214]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5214')
[MISC]('https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates')[/TD]
[/TR]
[TR]
[TD][LEFT]qnap_systems_inc. -- multiple_products
[/LEFT][/TD]
[TD][LEFT]A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-32971]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32971')
[MISC]('https://www.qnap.com/en/security-advisory/qsa-23-37')[/TD]
[/TR]
[TR]
[TD][LEFT]qnap_systems_inc. -- multiple_products
[/LEFT][/TD]
[TD][LEFT]A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later QuTScloud c5.1.0.2498 and later[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-32972]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-32972')
[MISC]('https://www.qnap.com/en/security-advisory/qsa-23-37')[/TD]
[/TR]
[TR]
[TD][LEFT]qnap_systems_inc. -- music_station
[/LEFT][/TD]
[TD][LEFT]A path traversal vulnerability has been reported to affect Music Station. If exploited, the vulnerability could allow authenticated users to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following version: Music Station 5.3.22 and later[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-23365]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23365')
[MISC]('https://www.qnap.com/en/security-advisory/qsa-23-28')[/TD]
[/TR]
[TR]
[TD][LEFT]qnap_systems_inc. -- music_station
[/LEFT][/TD]
[TD][LEFT]A path traversal vulnerability has been reported to affect Music Station. If exploited, the vulnerability could allow authenticated users to read the contents of unexpected files and expose sensitive data via a network. We have already fixed the vulnerability in the following version: Music Station 5.3.22 and later[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-23366]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23366')
[MISC]('https://www.qnap.com/en/security-advisory/qsa-23-28')[/TD]
[/TR]
[TR]
[TD][LEFT]qnap_systems_inc. -- qvpn_windows
[/LEFT][/TD]
[TD][LEFT]An insufficiently protected credentials vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to gain access to user accounts and access sensitive data used by the user account via unspecified vectors. We have already fixed the vulnerability in the following version: QVPN Windows 2.1.0.0518 and later[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-23370]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23370')
[MISC]('https://www.qnap.com/en/security-advisory/qsa-23-36')[/TD]
[/TR]
[TR]
[TD][LEFT]qnap_systems_inc. -- qvpn_windows
[/LEFT][/TD]
[TD][LEFT]A cleartext transmission of sensitive information vulnerability has been reported to affect QVPN Device Client. If exploited, the vulnerability could allow local authenticated administrators to read sensitive data via unspecified vectors. We have already fixed the vulnerability in the following version: QVPN Windows 2.2.0.0823 and later[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-23371]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-23371')
[MISC]('https://www.qnap.com/en/security-advisory/qsa-23-39')[/TD]
[/TR]
[TR]
[TD][LEFT]qognify -- nicevision
[/LEFT][/TD]
[TD][LEFT]Qognify NiceVision versions 3.1 and prior are vulnerable to exposing sensitive information using hard-coded credentials. With these credentials an attacker can retrieve information about the cameras, user information, and modify database records.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-2306]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-2306')
[MISC]('https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02')[/TD]
[/TR]
[TR]
[TD][LEFT]quarkus_oidc -- quarkus_oidc
[/LEFT][/TD]
[TD][LEFT]A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-1584]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-1584')
[MISC]('https://github.com/quarkusio/quarkus/pull/32192')
[MISC]('https://access.redhat.com/security/cve/CVE-2023-1584')
[MISC]('https://access.redhat.com/errata/RHSA-2023:3809')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2180886')
[MISC]('https://github.com/quarkusio/quarkus/pull/33414')[/TD]
[/TR]
[TR]
[TD][LEFT]red_hat -- multiple_products
[/LEFT][/TD]
[TD][LEFT]A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-3248]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-3248')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2072188')
[MISC]('https://access.redhat.com/security/cve/CVE-2022-3248')[/TD]
[/TR]
[TR]
[TD][LEFT]red_hat -- openshift
[/LEFT][/TD]
[TD][LEFT]A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-4145]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-4145')
[MISC]('https://access.redhat.com/security/cve/CVE-2022-4145')
[MISC]('https://bugzilla.redhat.com/show_bug.cgi?id=2148667')[/TD]
[/TR]
[TR]
[TD][LEFT]redisson -- redisson
[/LEFT][/TD]
[TD][LEFT]Redisson is a Java Redis client that uses the Netty framework. Prior to version 3.22.0, some of the messages received from the Redis server contain Java objects that the client deserializes without further validation. Attackers that manage to trick clients into communicating with a malicious server can include especially crafted objects in its responses that, once deserialized by the client, force it to execute arbitrary code. This can be abused to take control of the machine the client is running in. Version 3.22.0 contains a patch for this issue. Some post-fix advice is available. Do NOT use [ICODE]Kryo5Codec[/ICODE] as deserialization codec, as it is still vulnerable to arbitrary object deserialization due to the [ICODE]setRegistrationRequired(false)[/ICODE] call. On the contrary, [ICODE]KryoCodec[/ICODE] is safe to use. The fix applied to [ICODE]SerializationCodec[/ICODE] only consists of adding an optional allowlist of class names, even though making this behavior the default is recommended. When instantiating [ICODE]SerializationCodec[/ICODE] please use the [ICODE]SerializationCodec(ClassLoader classLoader, Set allowedClasses)[/ICODE] constructor to restrict the allowed classes for deserialization.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-42809]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-42809')
[MISC]('https://github.com/redisson/redisson/commit/fe6a2571801656ff1599ef87bdee20f519a5d1fe')
[MISC]('https://securitylab.github.com/advisories/GHSL-2023-053_Redisson/')[/TD]
[/TR]
[TR]
[TD][LEFT]samsung_mobile -- samsung_mobile_devices
[/LEFT][/TD]
[TD][LEFT]Improper input validation vulnerability in Duo prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-30690]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-30690')
[MISC]('https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10')[/TD]
[/TR]
[TR]
[TD][LEFT]schneider_electric -- c-bus_toolkit
[/LEFT][/TD]
[TD][LEFT]A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause a path traversal issue when using the File Command. [/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5399]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5399')
[MISC]('https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-01.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]schneider_electric -- c-bus_toolkit
[/LEFT][/TD]
[TD][LEFT]A CWE-269: Improper Privilege Management vulnerability exists that could cause a local privilege escalation when the transfer command is used.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5402]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5402')
[MISC]('https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-01.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]schneider_electric -- ecostruxure_power_monitoring_expert
[/LEFT][/TD]
[TD][LEFT]A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker to execute arbitrary code on the targeted system by sending a specifically crafted packet to the application. [/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5391]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5391')
[MISC]('https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-02.pdf')[/TD]
[/TR]
[TR]
[TD][LEFT]silicon_labs -- ember_znet
[/LEFT][/TD]
[TD][LEFT]TouchLink packets processed after timeout or out of range due to Operation on a Resource after Expiration and Missing Release of Resource after Effective Lifetime may allow a device to be added outside of valid TouchLink range or pairing duration This issue affects Ember ZNet 7.1.x from 7.1.3 through 7.1.5; 7.2.x from 7.2.0 through 7.2.3; Version 7.3 and later are unaffected[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41094]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41094')
[MISC]('https://community.silabs.com/0688Y00000aIPzL')[/TD]
[/TR]
[TR]
[TD][LEFT]snipe -- snipe-it
[/LEFT][/TD]
[TD][LEFT]Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-it prior to v6.2.2.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5452]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5452')
[MISC]('https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8')
[MISC]('https://github.com/snipe/snipe-it/commit/eea2eabaeef16fc8f3a1d61b19c06e9fc8ed942a')[/TD]
[/TR]
[TR]
[TD][LEFT]soft_serve -- soft_serve
[/LEFT][/TD]
[TD][LEFT]Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the [ICODE]allow-keyless[/ICODE] setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve. Users should upgrade to the latest Soft Serve version [ICODE]v0.6.2[/ICODE] to receive the patch for this issue. To work around this vulnerability without upgrading, users can temporarily disable Keyboard-Interactive SSH Authentication using the [ICODE]allow-keyless[/ICODE] setting.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43809]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43809')
[MISC]('https://github.com/charmbracelet/soft-serve/releases/tag/v0.6.2')
[MISC]('https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-mc97-99j4-vm2v')
[MISC]('https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89')
[MISC]('https://github.com/charmbracelet/soft-serve/issues/389')[/TD]
[/TR]
[TR]
[TD][LEFT]sourcecodester -- online_pizza_ordering_system
[/LEFT][/TD]
[TD][LEFT]A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=confirm_order. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-241384.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5423]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5423')
[MISC]('https://vuldb.com/?ctiid.241384')
[MISC]('https://vuldb.com/?id.241384')[/TD]
[/TR]
[TR]
[TD][LEFT]thingsboard -- thingboard
[/LEFT][/TD]
[TD][LEFT]ThingsBoard before 3.5 allows Server-Side Template Injection if users are allowed to modify an email template, because Apache FreeMarker supports freemarker.template.utility.Execute (for content sent to the /api/admin/settings endpoint).[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-45303]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-45303')
[MISC]('https://freemarker.apache.org/docs/api/freemarker/template/utility/Execute.html')
[MISC]('https://herolab.usd.de/security-advisories/usd-2023-0010/')[/TD]
[/TR]
[TR]
[TD][LEFT]trellix_ -- trellix_endpoint_security
[/LEFT][/TD]
[TD][LEFT]A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-3665]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3665')
[MISC]('https://kcm.trellix.com/corporate/index?page=content&id=SB10405')[/TD]
[/TR]
[TR]
[TD][LEFT]urllib3 -- urllib3
[/LEFT][/TD]
[TD][LEFT]urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the [ICODE]Cookie[/ICODE] HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a [ICODE]Cookie[/ICODE] header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-43804]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-43804')
[MISC]('https://github.com/urllib3/urllib3/commit/644124ecd0b6e417c527191f866daa05a5a2056d')
[MISC]('https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f')
[MISC]('https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb')
[MISC]('https://lists.debian.org/debian-lts-announce/2023/10/msg00012.html')[/TD]
[/TR]
[TR]
[TD][LEFT]vapor -- vapor
[/LEFT][/TD]
[TD][LEFT]Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44386]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44386')
[MISC]('https://github.com/vapor/vapor/security/advisories/GHSA-3mwq-h3g6-ffhm')
[MISC]('https://github.com/vapor/vapor/releases/tag/4.84.2')
[MISC]('https://github.com/vapor/vapor/commit/090464a654b03148b139a81f8f5ac63b0856f6f3')[/TD]
[/TR]
[TR]
[TD][LEFT]vim -- vim
[/LEFT][/TD]
[TD][LEFT]NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5441]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5441')
[MISC]('https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2')
[MISC]('https://github.com/vim/vim/commit/20d161ace307e28690229b68584f2d84556f8960')[/TD]
[/TR]
[TR]
[TD][LEFT]watchguard -- epdr[/LEFT][/TD]
[TD][LEFT]An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of message handling between WatchGuard EPDR processes, it is possible to perform a Local Privilege Escalation on Windows by sending a crafted message to a named pipe.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-26236]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26236')
[CONFIRM]('https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00004')[/TD]
[/TR]
[TR]
[TD][LEFT]watchguard -- epdr[/LEFT][/TD]
[TD][LEFT]An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to bypass the defensive capabilities by adding a registry key as SYSTEM.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-26237]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26237')
[CONFIRM]('https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00005')[/TD]
[/TR]
[TR]
[TD][LEFT]watchguard -- epdr[/LEFT][/TD]
[TD][LEFT]An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to enable or disable defensive capabilities by sending a crafted message to a named pipe.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-26238]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26238')
[CONFIRM]('https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00006')[/TD]
[/TR]
[TR]
[TD][LEFT]watchguard -- epdr[/LEFT][/TD]
[TD][LEFT]An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of a password check, it is possible to obtain credentials to access the management console as a non-privileged user.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-26239]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-26239')
[CONFIRM]('https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2023-00007')[/TD]
[/TR]
[TR]
[TD][LEFT]webkit -- webkit
[/LEFT][/TD]
[TD][LEFT]A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-39928]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-39928')
[MISC]('https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831')
[MISC]('https://webkitgtk.org/security/WSA-2023-0009.html')[/TD]
[/TR]
[TR]
[TD][LEFT]wireshark -- wireshark
[/LEFT][/TD]
[TD][LEFT]RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-5371]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-5371')
[MISC]('https://gitlab.com/wireshark/wireshark/-/issues/19322')
[MISC]('https://www.wireshark.org/security/wnpa-sec-2023-27.html')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Sumo Social Share Boost plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-25033]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25033')
[MISC]('https://patchstack.com/database/vulnerability/social-share-boost/wordpress-social-share-boost-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in BoldGrid Post and Page Builder by BoldGrid - Visual Drag and Drop Editor plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-25480]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-25480')
[MISC]('https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-24-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in MakeStories Team MakeStories (for Google Web Stories) plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-27448]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27448')
[MISC]('https://patchstack.com/database/vulnerability/makestories-helper/wordpress-makestories-for-google-web-stories-plugin-2-8-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Dipak C. Gajjar WP Super Minify plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-27615]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-27615')
[MISC]('https://patchstack.com/database/vulnerability/wp-super-minify/wordpress-wp-super-minify-plugin-1-5-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Gangesh Matta Simple Org Chart plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-40008]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40008')
[MISC]('https://patchstack.com/database/vulnerability/simple-org-chart/wordpress-simple-org-chart-plugin-2-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Greg Ross Schedule Posts Calendar plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-40556]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40556')
[MISC]('https://patchstack.com/database/vulnerability/schedule-posts-calendar/wordpress-schedule-posts-calendar-plugin-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in ??wp DX-auto-save-images plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-40671]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-40671')
[MISC]('https://patchstack.com/database/vulnerability/dx-auto-save-images/wordpress-dx-auto-save-images-plugin-1-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Venugopal Remove/hide Author, Date, Category Like Entry-Meta plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41650]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41650')
[MISC]('https://patchstack.com/database/vulnerability/removehide-author-date-category-like-entry-meta/wordpress-remove-hide-author-date-category-like-entry-meta-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Andreas Heigl authLdap plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41654]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41654')
[MISC]('https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Jules Colle, BDWM Responsive Gallery Grid plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41659]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41659')
[MISC]('https://patchstack.com/database/vulnerability/responsive-gallery-grid/wordpress-responsive-gallery-grid-plugin-2-3-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in CodePeople CP Blocks plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41732]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41732')
[MISC]('https://patchstack.com/database/vulnerability/cp-blocks/wordpress-cp-blocks-plugin-1-0-20-csrf-leading-to-plugin-settings-change-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in AWP Classifieds Team Ad Directory & Listings by AWP Classifieds plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41801]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41801')
[MISC]('https://patchstack.com/database/vulnerability/another-wordpress-classifieds-plugin/wordpress-classifieds-plugin-ad-directory-listings-plugin-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Laposta - Roel Bousardt Laposta Signup Basic plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-41950]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-41950')
[MISC]('https://patchstack.com/database/vulnerability/laposta-signup-basic/wordpress-laposta-signup-basic-plugin-1-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress
[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as problematic has been found in WP Ultimate CSV Importer Plugin 3.7.2 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.7.3 is able to address this issue. The identifier of the patch is 13c30af721d3f989caac72dd0f56cf0dc40fad7e. It is recommended to upgrade the affected component. The identifier VDB-241317 was assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-05[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2015-10125]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-10125')
[MISC]('https://github.com/wp-plugins/wp-ultimate-csv-importer/releases/tag/3.7.3')
[MISC]('https://vuldb.com/?id.241317')
[MISC]('https://github.com/wp-plugins/wp-ultimate-csv-importer/commit/13c30af721d3f989caac72dd0f56cf0dc40fad7e')
[MISC]('https://vuldb.com/?ctiid.241317')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress
[/LEFT][/TD]
[TD][LEFT]A vulnerability classified as critical was found in Easy2Map Photos Plugin 1.0.1 on WordPress. This vulnerability affects unknown code. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The patch is identified as 503d9ee2482d27c065f78d9546f076a406189908. It is recommended to upgrade the affected component. VDB-241318 is the identifier assigned to this vulnerability.[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2015-10126]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-10126')
[MISC]('https://vuldb.com/?id.241318')
[MISC]('https://github.com/wp-plugins/easy2map-photos/commit/503d9ee2482d27c065f78d9546f076a406189908')
[MISC]('https://vuldb.com/?ctiid.241318')[/TD]
[/TR]
[TR]
[TD][LEFT]wordpress -- wordpress
[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in P Royal Royal Elementor Addons and Templates plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2022-47175]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2022-47175')
[MISC]('https://patchstack.com/database/vulnerability/royal-elementor-addons/wordpress-royal-elementor-addons-plugin-1-3-75-multiple-cross-site-request-forgery-csrf?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress
[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in FooPlugins Best WordPress Gallery Plugin - FooGallery plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44233]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44233')
[MISC]('https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]wordpress -- wordpress
[/LEFT][/TD]
[TD][LEFT]Cross-Site Request Forgery (CSRF) vulnerability in Dylan Blokhuis Instant CSS plugin td> [TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44243]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44243')
[MISC]('https://patchstack.com/database/vulnerability/instant-css/wordpress-instant-css-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve')[/TD]
[/LEFT][/TD]
[/TR]
[TD][LEFT][TR]
[TD][LEFT]zephyr -- zephyr
[/LEFT][/TD]
[TD][LEFT]Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem[/LEFT][/TD]
[TD][CENTER]2023-10-06[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-3725]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-3725')
[MISC]('https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3')[/TD]
[/TR]
[TR]
[TD][LEFT]zope_foundation -- zope
[/LEFT][/TD]
[TD][LEFT]Zope is an open-source web application server. The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected. Patches will be released with Zope versions 4.8.11 and 5.8.6[/LEFT][/TD]
[TD][CENTER]2023-10-04[/CENTER][/TD]
[TD][CENTER]not yet calculated[/CENTER][/TD]
[TD][CVE-2023-44389]('https://nvd.nist.gov/nvd.cfm?cvename=CVE-2023-44389')
[MISC]('https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh')
[MISC]('https://github.com/zopefoundation/Zope/commit/aeaf2cdc80dff60815e3706af448f086ddc3b98d')
[MISC]('https://github.com/zopefoundation/Zope/commit/21dfa78609ffd8b6bd8143805678ebbacae5141a')[/TD]
[/TR][/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TABLE][/CENTER]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT]
[Back to top]('https://www.cisa.gov/uscert/ncas/#top')
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT][TD][LEFT] [/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/LEFT][/TD]
[/TD]
Continue reading…