tripodworks_co._ltd. — gigapod_officehard_appliance_model
  GIGAPOD file servers (Appliance model and Software model) provide two web interfaces, 80/tcp and 443/tcp for user operation, and 8001/tcp for administrative operation. 8001/tcp is served by a version of Apache HTTP server containing a flaw in handling HTTP requests (CVE-2011-3192), which may lead to a denial-of-service (DoS) condition. 2023-09-08 not yet calculated CVE-2014-5329
MISC searchblox — searchblox
  SearchBlox before Version 9.2.1 is vulnerable to Privileged Escalation-Lower user is able to access Admin functionality. 2023-09-06 not yet calculated CVE-2020-10129
MISC searchblox — searchblox
  SearchBlox before Version 9.1 is vulnerable to business logic bypass where the user is able to create multiple super admin users in the system. 2023-09-06 not yet calculated CVE-2020-10130
MISC searchblox — searchblox
  SearchBlox before Version 9.2.1 is vulnerable to CSV macro injection in “Featured Results” parameter. 2023-09-06 not yet calculated CVE-2020-10131
MISC searchblox — searchblox
  SearchBlox before Version 9.1 is vulnerable to cross-origin resource sharing misconfiguration. 2023-09-06 not yet calculated CVE-2020-10132
MISC mofi_network — mofi4500-4gxelte-v2
  An issue was discovered in MoFi Network MOFI4500-4GXeLTE-V2 3.5.6-xnet-5052 allows attackers to bypass the authentication and execute arbitrary code via crafted HTTP request. 2023-09-08 not yet calculated CVE-2021-27715
MISC
MISC insyde_software — h20fft
  An issue was discovered in iscflashx64.sys 3.9.3.0 in Insyde H2OFFT 6.20.00. When handling IOCTL 0x22229a, the input used to allocate a buffer and copy memory is mishandled. This could cause memory corruption or a system crash. 2023-09-08 not yet calculated CVE-2021-33834
MISC
MISC kodexplorer — kodexplorer
  A Cross Site Scrtpting (XSS) vulnerability in KodExplorer 4.45 allows remote attackers to run arbitrary code via /index.php page. 2023-09-06 not yet calculated CVE-2021-36646
MISC osticket — osticket
  A SQL injection vulnerability in the “Search” functionality of “tickets.php” page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the “keywords” and “topic_id” URL parameters combination. 2023-09-08 not yet calculated CVE-2021-45811
MISC
MISC
MISC ibm — aspera_faspex
  IBM Aspera Faspex 5.0.5 could allow a remote attacker to gather or persuade a naive user to supply sensitive information. IBM X-Force ID: 222567. 2023-09-08 not yet calculated CVE-2022-22401
MISC
MISC ibm — aspera_faspex
  IBM Aspera Faspex 5.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 222571. 2023-09-08 not yet calculated CVE-2022-22402
MISC
MISC ibm — aspera_faspex
  IBM Aspera Faspex 5.0.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 222576. 2023-09-08 not yet calculated CVE-2022-22405
MISC
MISC ibm — aspera_faspex
  IBM Aspera Faspex 5.0.5 could allow a remote attacker to gather sensitive information about the web application, caused by an insecure configuration. IBM X-Force ID: 222592. 2023-09-08 not yet calculated CVE-2022-22409
MISC
MISC qnap_systems_inc. — qvr_pro_client
  An insertion of sensitive information into Log file vulnerability has been reported to affect product. If exploited, the vulnerability possibly provides local authenticated administrators with an additional, less-protected path to acquiring the information via unspecified vectors. We have already fixed the vulnerability in the following version: Windows 10 SP1, Windows 11, Mac OS, and Mac M1: QVR Pro Client 2.3.0.0420 and later 2023-09-08 not yet calculated CVE-2022-27599
MISC ibm — security_directory_integrator
  IBM Security Directory Server 7.2.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing “dot dot” sequences (/../) to view or write to arbitrary files on the system. IBM X-Force ID: 228579. 2023-09-08 not yet calculated CVE-2022-33164
MISC
MISC software_ag — webmethods_onedata
  Version 10.11 of webMethods OneData runs an embedded instance of Azul Zulu Java 11.0.15 which hosts a Java RMI registry (listening on TCP port 2099 by default) and two RMI interfaces (listening on a single, dynamically assigned TCP high port). Port 2099 serves as a Java Remote Method Invocation (RMI) registry which allows for remotely loading and processing data via RMI interfaces. An unauthenticated attacker with network connectivity to the RMI registry and RMI interface ports can abuse this functionality to instruct the webMethods OneData application to load a malicious serialized Java object as a parameter to one of the available Java methods presented by the RMI interface. Once deserialized on the vulnerable server, the malicious code runs as whichever operating system account is used to run the software, which in most cases is the local System account on Windows. 2023-09-06 not yet calculated CVE-2023-0925
MISC cisco — cisco_identity_services_engine_software
  A vulnerability in the Embedded Service Router (ESR) of Cisco ISE could allow an authenticated, local attacker to read, write, or delete arbitrary files on the underlying operating system and escalate their privileges to root. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to improper privilege management in the ESR console. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to elevate their privileges to root and read, write, or delete arbitrary files from the underlying operating system of the affected device. Note: The ESR is not enabled by default and must be licensed. To verify the status of the ESR in the Admin GUI, choose Administration > Settings > Protocols > IPSec. 2023-09-07 not yet calculated CVE-2023-20193
MISC samsung_mobile — samsung_mobile_devices
  A vulnerability in the ERS API of Cisco ISE could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to improper privilege management in the ERS API. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to elevate their privileges beyond the sphere of their intended access level, which would allow them to obtain sensitive information from the underlying operating system. Note: The ERS is not enabled by default. To verify the status of the ERS API in the Admin GUI, choose Administration > Settings > API Settings > API Service Settings. 2023-09-07 not yet calculated CVE-2023-20194
MISC cisco — cisco_broadworks
  A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system. This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system. 2023-09-06 not yet calculated CVE-2023-20238
MISC cisco — cisco_identity_services_engine_software
  A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause the affected system to stop processing RADIUS packets. This vulnerability is due to improper handling of certain RADIUS accounting requests. An attacker could exploit this vulnerability by sending a crafted authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). This would eventually result in the NAD sending a RADIUS accounting request packet to Cisco ISE. An attacker could also exploit this vulnerability by sending a crafted RADIUS accounting request packet to Cisco ISE directly if the RADIUS shared secret is known. A successful exploit could allow the attacker to cause the RADIUS process to unexpectedly restart, resulting in authentication or authorization timeouts and denying legitimate users access to the network or service. Clients already authenticated to the network would not be affected. Note: To recover the ability to process RADIUS packets, a manual restart of the affected Policy Service Node (PSN) may be required. For more information, see the Details [“#details”] section of this advisory. 2023-09-06 not yet calculated CVE-2023-20243
MISC cisco — cisco_small_business_rv_series_router_firmware
  A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code with root privileges on an affected device. To exploit this vulnerability, the attacker must have valid Administrator credentials on the affected device. 2023-09-06 not yet calculated CVE-2023-20250
MISC cisco — cisco_hyperflex_hx_data_platform
  A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. 2023-09-06 not yet calculated CVE-2023-20263
MISC cisco — cisco_adaptive_security_appliance_(asa)_software
  A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user. This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following: Identify valid credentials that could then be used to establish an unauthorized remote access VPN session. Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier). Notes: Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured. This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured. Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability. 2023-09-06 not yet calculated CVE-2023-20269
MISC electron — electron
  Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. A Content-Security-Policy that disables eval, specifically setting a `script-src` directive and _not_ providing `unsafe-eval` in that directive, is not respected in renderers that have sandbox disabled. i.e., `sandbox: false` in the `webPreferences` object. This allows usage of methods like `eval()` and `new Function` unexpectedly which can result in an expanded attack surface. This issue only ever affected the 22 and 23 major versions of Electron and has been fixed in the latest versions of those release lines. Specifically, these versions contain the fixes: 22.0.1 and 23.0.0-alpha.2 We recommend all apps upgrade to the latest stable version of Electron. If upgrading isn’t possible, this issue can be addressed without upgrading by enabling `sandbox: true` on all renderers. 2023-09-06 not yet calculated CVE-2023-23623
MISC ibm — aspera_faspex
  IBM Aspera Faspex 5.0.5 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. IBM X-Force ID: 246713. 2023-09-08 not yet calculated CVE-2023-24965
MISC
MISC oracle — apache_superset
  Improper data authorization check on Jinja templated queries in Apache Superset up to and including 2.1.0 allows for an authenticated user to issue queries on database tables they may not have access to. 2023-09-06 not yet calculated CVE-2023-27523
MISC oracle — apache_superset
  A non Admin authenticated user could incorrectly create resources using the import charts feature, on Apache Superset up to and including 2.1.0.  2023-09-06 not yet calculated CVE-2023-27526
MISC hcl_software — hcl_domino_server
  In some configuration scenarios, the Domino server host name can be exposed. This information could be used to target future attacks. 2023-09-08 not yet calculated CVE-2023-28010
MISC wordpress — wordpress
  All of the above Aapna WordPress theme through 1.3, Anand WordPress theme through 1.2, Anfaust WordPress theme through 1.1, Arendelle WordPress theme before 1.1.13, Atlast Business WordPress theme through 1.5.8.5, Bazaar Lite WordPress theme before 1.8.6, Brain Power WordPress theme through 1.2, BunnyPressLite WordPress theme before 2.1, Cafe Bistro WordPress theme before 1.1.4, College WordPress theme before 1.5.1, Connections Reloaded WordPress theme through 3.1, Counterpoint WordPress theme through 1.8.1, Digitally WordPress theme through 1.0.8, Directory WordPress theme before 3.0.2, Drop WordPress theme before 1.22, Everse WordPress theme before 1.2.4, Fashionable Store WordPress theme through 1.3.4, Fullbase WordPress theme before 1.2.1, Ilex WordPress theme before 1.4.2, Js O3 Lite WordPress theme through 1.5.8.2, Js Paper WordPress theme through 2.5.7, Kata WordPress theme before 1.2.9, Kata App WordPress theme through 1.0.5, Kata Business WordPress theme through 1.0.2, Looki Lite WordPress theme before 1.3.0, moseter WordPress theme through 1.3.1, Nokke WordPress theme before 1.2.4, Nothing Personal WordPress theme through 1.0.7, Offset Writing WordPress theme through 1.2, Opor Ayam WordPress theme through 18, Pinzolo WordPress theme before 1.2.10, Plato WordPress theme before 1.1.9, Polka Dots WordPress theme through 1.2, Purity Of Soul WordPress theme through 1.9, Restaurant PT WordPress theme before 1.1.3, Saul WordPress theme before 1.1.0, Sean Lite WordPress theme before 1.4.6, Tantyyellow WordPress theme through 1.0.0.5, TIJAJI WordPress theme through 1.43, Tiki Time WordPress theme through 1.3, Tuaug4 WordPress theme through 1.4, Tydskrif WordPress theme through 1.1.3, UltraLight WordPress theme through 1.2, Venice Lite WordPress theme before 1.5.5, Viala WordPress theme through 1.3.1, viburno WordPress theme before 1.3.2, Wedding Bride WordPress theme before 1.0.2, Wlow WordPress theme before 1.2.7 suffer from the same issue about the search box reflecting the results causing XSS which allows an unauthenticated attacker to exploit against users if they click a malicious link. 2023-09-04 not yet calculated CVE-2023-2813
MISC qualcomm_inc — snapdragon
  Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers. 2023-09-05 not yet calculated CVE-2023-28544
MISC qualcomm_inc — snapdragon
  Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART. 2023-09-05 not yet calculated CVE-2023-28548
MISC qualcomm_inc — snapdragon
  Memory corruption in WLAN HAL while parsing Rx buffer in processing TLV payload. 2023-09-05 not yet calculated CVE-2023-28549
MISC qualcomm_inc — snapdragon
  Memory corruption in WLAN HAL while processing command parameters from untrusted WMI payload. 2023-09-05 not yet calculated CVE-2023-28557
MISC qualcomm_inc — snapdragon
  Memory corruption in WLAN HAL while processing devIndex from untrusted WMI payload. 2023-09-05 not yet calculated CVE-2023-28560
MISC electron — electron
  Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps using `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. This issue is only exploitable if an API exposed to the main world via `contextBridge` can return an object or array that contains a javascript object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`. The app side workaround is to ensure that such a case is not possible. Ensure all values returned from a function exposed over the context bridge are supported. This issue has been fixed in versions `25.0.0-alpha.2`, `24.0.1`, `23.2.3`, and `22.3.6`. 2023-09-06 not yet calculated CVE-2023-29198
MISC
MISC samsung_mobile — samsung_mobile_devices
  Improper export of android application components vulnerability in WifiApAutoHotspotEnablingActivity prior to SMR Sep-2023 Release 1 allows local attacker to change a Auto Hotspot setting. 2023-09-06 not yet calculated CVE-2023-30718
MISC mikrotik — routeros
  The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server’s heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected. 2023-09-07 not yet calculated CVE-2023-30800
MISC hpe — oneview
  Potential security vulnerability have been identified in Hewlett Packard Enterprise OneView Software. This vulnerability could be remotely exploited to allow authentication bypass, disclosure of sensitive information, and denial of service. 2023-09-07 not yet calculated CVE-2023-30908
MISC ibm — aspera_faspex
  IBM Aspera Faspex 5.0.5 could allow a malicious actor to bypass IP whitelist restrictions using a specially crafted HTTP request. IBM X-Force ID: 254268. 2023-09-08 not yet calculated CVE-2023-30995
MISC
MISC tp-link — archer_c50
  Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to ‘Archer C50(JP)_V3_230505’, Archer C55 firmware versions prior to ‘Archer C55(JP)_V1_230506’, and Archer C20 firmware versions prior to ‘Archer C20(JP)_V1_230616’. 2023-09-06 not yet calculated CVE-2023-31188
MISC
MISC
MISC
MISC wacom — drivers_for_windows
  Wacom Drivers for Windows Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the WacomInstallI.txt file by the PrefUtil.exe utility. The issue results from incorrect permissions on the WacomInstallI.txt file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16318. 2023-09-06 not yet calculated CVE-2023-32162
MISC wacom — drivers_for_windows
  Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16857. 2023-09-06 not yet calculated CVE-2023-32163
MISC ibm — maximo_asset_management
  IBM Maximo Application Suite 8.9, 8.10 and IBM Maximo Asset Management 7.6.1.2, 7.6.1.3 are vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim’s Web browser within the security context of the hosting site. IBM X-Force ID: 255072. 2023-09-08 not yet calculated CVE-2023-32332
MISC
MISC
MISC dell — dell_digital_delivery
  Dell Digital Delivery versions prior to 5.0.82.0 contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability to create arbitrary folder leading to permanent Denial of Service (DOS). 2023-09-08 not yet calculated CVE-2023-32470
MISC tp-link — archer_c50
  Archer C50 firmware versions prior to ‘Archer C50(JP)_V3_230505’ and Archer C55 firmware versions prior to ‘Archer C55(JP)_V1_230506’ use hard-coded credentials to login to the affected device, which may allow a network-adjacent unauthenticated attacker to execute an arbitrary OS command. 2023-09-06 not yet calculated CVE-2023-32619
MISC
MISC
MISC oracle — apache_superset
  An Incorrect authorization check in SQLLab in Apache Superset versions up to and including 2.1.0. This vulnerability allows an authenticated user to query tables that they do not have proper access to within Superset. The vulnerability can be exploited by leveraging a SQL parsing vulnerability. 2023-09-06 not yet calculated CVE-2023-32672
MISC cloud_foundry — routing
  Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations. 2023-09-08 not yet calculated CVE-2023-34041
MISC isarnet_ag — isarflow
  A stored cross-site scripting (XSS) vulnerability in IsarNet AG IsarFlow v5.23 allows authenticated attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the dashboard title parameter in the IsarFlow Portal. 2023-09-05 not yet calculated CVE-2023-34637
MISC manageengine — adselfservice_plus
  ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009. 2023-09-06 not yet calculated CVE-2023-35719
MISC mysten_labs — sui
  Mysten Labs Sui blockchain v1.2.0 was discovered to contain a stack overflow via the component /spec/openrpc.json. 2023-09-08 not yet calculated CVE-2023-36184
MISC
MISC
MISC
MISC oracle — apache_superset
  An improper default REST API permission for Gamma users in Apache Superset up to and including 2.1.0 allows for an authenticated Gamma user to test database connections. 2023-09-06 not yet calculated CVE-2023-36387
MISC oracle — apache_superset
  Improper REST API permission in Apache Superset up to and including 2.1.0 allows for an authenticated Gamma users to test network connections, possible SSRF. 2023-09-06 not yet calculated CVE-2023-36388
MISC tp-link — tl-wr802n
  Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to ‘TL-WR802N(JP)_V4_221008’, TL-WR841N firmware versions prior to ‘TL-WR841N(JP)_V14_230506’, and TL-WR902AC firmware versions prior to ‘TL-WR902AC(JP)_V3_230506’. 2023-09-06 not yet calculated CVE-2023-36489
MISC
MISC
MISC
MISC fortinet — fortiswitchmanager
  An improper access control in Fortinet FortiSwitchManager version 7.2.0 through 7.2.2 7.0.0 through 7.0.1 may allow a remote authenticated read-only user to modify the interface settings via the API. 2023-09-07 not yet calculated CVE-2023-36635
MISC tp-link — archer_c20
  Improper authentication vulnerability in Archer C20 firmware versions prior to ‘Archer C20(JP)_V1_230616’ allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication. 2023-09-06 not yet calculated CVE-2023-37284
MISC
MISC samsung– exynos
  An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor, and Modem (Exynos 9820, Exynos 980, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. In the NAS Task, an improperly implemented security check for standard can disallow desired services for a while via consecutive NAS messages. 2023-09-08 not yet calculated CVE-2023-37367
MISC samsung– exynos
  An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor, and Modem (Exynos Mobile Processor, Automotive Processor, and Modem – Exynos 9810, Exynos 9610, Exynos 9820, Exynos 980, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123). In the Shannon MM Task, Missing validation of a NULL pointer can cause abnormal termination via a malformed NR MM packet. 2023-09-08 not yet calculated CVE-2023-37368
MISC samsung– exynos
  An issue was discovered in Samsung Exynos Mobile Processor and Wearable Processor (Exynos 980, Exynos 850, Exynos 2100, and Exynos W920). Improper handling of length parameter inconsistency can cause incorrect packet filtering. 2023-09-08 not yet calculated CVE-2023-37377
MISC cloudflare — warp_client
  Zero Trust Administrators have the ability to disallow end users from disabling WARP on their devices. Override codes can also be created by the Administrators to allow a device to temporarily be disconnected from WARP, however, due to lack of server side validation, an attacker with local access to the device, could extend the maximum allowed disconnected time of WARP client granted by an override code by changing the date & time on the local device where WARP is running. 2023-09-07 not yet calculated CVE-2023-3747
MISC
MISC crypto_currency_tracker — crypto_currency_tracker
  Incorrect access control in the User Registration page of Crypto Currency Tracker (CCT) before v9.5 allows unauthenticated attackers to register as an Admin account via a crafted POST request. 2023-09-08 not yet calculated CVE-2023-37759
MISC
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain’s owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8. 2023-09-06 not yet calculated CVE-2023-3777
MISC
MISC
MISC vanderbilt — redcap
  A stored cross-site scripting (XSS) vulnerability in the new REDCap project creation function of Vanderbilt REDCap 13.1.35 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the project title parameter. 2023-09-07 not yet calculated CVE-2023-37798
MISC
MISC
MISC oracle — apache_superset
  If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset’s web backend. This vulnerability impacts Apache Superset versions 1.5.0 up to and including 2.1.0. 2023-09-06 not yet calculated CVE-2023-37941
MISC hewlett_packard_enterprise  — aruba_9200/9000
  Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise. 2023-09-06 not yet calculated CVE-2023-38484
MISC hewlett_packard_enterprise  — aruba_9200/9000
  Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise. 2023-09-06 not yet calculated CVE-2023-38485
MISC hewlett_packard_enterprise — aruba_9200/9000
  A vulnerability in the secure boot implementation on affected Aruba 9200 and 9000 Series Controllers and Gateways allows an attacker to bypass security controls which would normally prohibit unsigned kernel images from executing. An attacker can use this vulnerability to execute arbitrary runtime operating systems, including unverified and unsigned OS images. 2023-09-06 not yet calculated CVE-2023-38486
MISC tp-link — archer_c1200
  Archer C1200 firmware versions prior to ‘Archer C1200(JP)_V2_230508’ and Archer C9 firmware versions prior to ‘Archer C9(JP)_V3_230508’ allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. 2023-09-06 not yet calculated CVE-2023-38563
MISC
MISC
MISC tp-link — archer_a10
  Archer A10 firmware versions prior to ‘Archer A10(JP)_V2_230504’ allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands. 2023-09-06 not yet calculated CVE-2023-38568
MISC
MISC i-pro_co_ltd — vi_web_client
  Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL. 2023-09-05 not yet calculated CVE-2023-38574
MISC
MISC tp-link — archer_c3150
  Archer C3150 firmware versions prior to ‘Archer C3150(JP)_V2_230511’ allows a network-adjacent authenticated attacker to execute arbitrary OS commands. 2023-09-06 not yet calculated CVE-2023-38588
MISC
MISC apple — macos
  This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.5. An app may be able to determine a user’s current location. 2023-09-06 not yet calculated CVE-2023-38605
MISC
MISC
MISC apple — macos
  A race condition was addressed with improved state handling. This issue is fixed in macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges. 2023-09-06 not yet calculated CVE-2023-38616
MISC ibm — qradar_wincollect_agent
  IBM QRadar WinCollect Agent 10.0 through 10.1.6, when installed to run as ADMIN or SYSTEM, is vulnerable to a local escalation of privilege attack that a normal user could utilize to gain SYSTEM permissions. IBM X-Force ID: 262542. 2023-09-08 not yet calculated CVE-2023-38736
MISC
MISC general_motors — chevrolet_equinox_2021_software
  Injecting random data into the USB memory area on a General Motors (GM) Chevrolet Equinox 2021 Software. 2021.03.26 (build version) vehicle causes a Denial of Service (DoS) in the in-car infotainment system. 2023-09-08 not yet calculated CVE-2023-39076
MISC tp-link — archer_c5
  Archer C5 firmware all versions and Archer C7 firmware versions prior to ‘Archer C7(JP)_V2_230602’ allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided. 2023-09-06 not yet calculated CVE-2023-39224
MISC
MISC oracle — apache_superset
  By default, stack traces for errors were enabled, which resulted in the exposure of internal traces on REST API endpoints to users. This vulnerability exists in Apache Superset versions up to and including 2.1.0. 2023-09-06 not yet calculated CVE-2023-39264
MISC oracle — apache_superset
  Apache Superset would allow for SQLite database connections to be incorrectly registered when an attacker uses alternative driver names like sqlite+pysqlite or by using database imports. This could allow for unexpected file creation on Superset webservers. Additionally, if Apache Superset is using a SQLite database for its metadata (not advised for production use) it could result in more severe vulnerabilities related to confidentiality and integrity. This vulnerability exists in Apache Superset versions up to and including 2.1.0. 2023-09-06 not yet calculated CVE-2023-39265
MISC go_standard_library — html_template
  The html/template package does not properly handle HTML-like “” comment tokens, nor hashbang “#!” comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack. 2023-09-08 not yet calculated CVE-2023-39318
MISC
MISC
MISC
MISC go_standard_library — html_template
  The html/template package does not apply the proper rules for handling occurrences of “<script”, “<!–“, and “</script” within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack. 2023-09-08 not yet calculated CVE-2023-39319
MISC
MISC
MISC
MISC go_toolchain — cmd/go
  The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the “go” command was executed within the module. This applies to modules downloaded using the “go” command from the module proxy, as well as modules downloaded directly using VCS software. 2023-09-08 not yet calculated CVE-2023-39320
MISC
MISC
MISC
MISC go_standard_library — crypto/tls
  Processing an incomplete post-handshake message for a QUIC connection can cause a panic. 2023-09-08 not yet calculated CVE-2023-39321
MISC
MISC
MISC
MISC go_standard_library — crypto/tls
  QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size. 2023-09-08 not yet calculated CVE-2023-39322
MISC
MISC
MISC
MISC cacti — cacti
  Cacti is an open source operational monitoring and fault management framework. In Cacti 1.2.24, users with console access can be redirected to an arbitrary website after a change password performed via a specifically crafted URL. The `auth_changepassword.php` file accepts `ref` as a URL parameter and reflects it in the form used to perform the change password. It’s value is used to perform a redirect via `header` PHP function. A user can be tricked in performing the change password operation, e.g., via a phishing message, and then interacting with the malicious website where the redirection has been performed, e.g., downloading malwares, providing credentials, etc. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-09-05 not yet calculated CVE-2023-39364
MISC resort_data_processing,_inc. — irm_next_generation
  The RDPCore.dll component as used in the IRM Next Generation booking engine, allows a remote user to connect to customers with an “admin” account and a corresponding password computed daily by a routine inside the DLL file. Once reverse-engineered, this routine can help an attacker generate the daily password and connect to application customers. Given that this is an administrative account, anyone logging into a customer deployment has full, unrestricted access to the application. 2023-09-07 not yet calculated CVE-2023-39420
MISC resort_data_processing,_inc. — irm_next_generation
  The RDPWin.dll component as used in the IRM Next Generation booking engine includes a set of hardcoded API keys for third-party services such as Twilio and Vonage. These keys allow unrestricted interaction with these services. 2023-09-07 not yet calculated CVE-2023-39421
MISC resort_data_processing,_inc. — irm_next_generation
  The /irmdata/api/ endpoints exposed by the IRM Next Generation booking engine authenticates requests using HMAC tokens. These tokens are however exposed in a JavaScript file loaded on the client side, thus rendering this extra safety mechanism useless. 2023-09-07 not yet calculated CVE-2023-39422
MISC resort_data_processing,_inc. — irm_next_generation
  The RDPData.dll file exposes the /irmdata/api/common endpoint that handles session IDs,  among other features. By using a UNION SQL operator, an attacker can leak the sessions table, obtain the currently valid sessions and impersonate a currently logged-in user. 2023-09-07 not yet calculated CVE-2023-39423
MISC resort_data_processing,_inc. — irm_next_generation
  A vulnerability in RDPngFileUpload.dll, as used in the IRM Next Generation booking system, allows a remote attacker to upload arbitrary content (such as a web shell component) to the SQL database and execute it with SYSTEM privileges. This vulnerability requires authentication to be exploited but can be paired with another vulnerability in the platform (CVE-2023-39420, which grants access to hardcoded credentials) to carry the attack without having assigned credentials.  2023-09-07 not yet calculated CVE-2023-39424
MISC cacti — cacti
  Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability which allows an authenticated user to poison data stored in the _cacti_’s database. These data will be viewed by administrative _cacti_ accounts and execute JavaScript code in the victim’s browser at view-time. The script under `reports_admin.php` displays reporting information about graphs, devices, data sources etc. _CENSUS_ found that an adversary that is able to configure a malicious device name, related to a graph attached to a report, can deploy a stored XSS attack against any super user who has privileges of viewing the `reports_admin.php` page, such as administrative accounts. A user that possesses the _General Administration>Sites/Devices/Data_ permissions can configure the device names in _cacti_. This configuration occurs through `http://<HOST>/cacti/host.php`, while the rendered malicious payload is exhibited at `http://<HOST>/cacti/reports_admin.php` when the a graph with the maliciously altered device name is linked to the report. This issue has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to upgrade should manually filter HTML output. 2023-09-06 not yet calculated CVE-2023-39511
MISC hexo — hexo
  Hexo up to v7.0.0 (RC2) was discovered to contain an arbitrary file read vulnerability. 2023-09-08 not yet calculated CVE-2023-39584
MISC
MISC
MISC icewarp_inc. — webclient
  Cross Site Scripting vulnerability in IceWarp Corporation WebClient v.10.2.1 allows a remote attacker to execute arbitrary code via a crafted payload to the mid parameter. 2023-09-05 not yet calculated CVE-2023-39598
MISC buffalo_america_inc. — terastation_nas_ts5410r
  An Issue in Buffalo America, Inc. TeraStation NAS TS5410R v.5.00 thru v.0.07 allows a remote attacker to obtain sensitive information via the guest account function. 2023-09-08 not yet calculated CVE-2023-39620
MISC prestasho — prestashop
  FieldPopupNewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php. 2023-09-08 not yet calculated CVE-2023-39676
MISC
MISC
MISC sourcecodester — free_and_open_source_inventory_management_system
  Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Subtotal and Paidbill parameters under the Add New Put section. 2023-09-07 not yet calculated CVE-2023-39711
MISC
MISC
MISC sourcecodester — free_and_open_source_inventory_management_system
  Multiple cross-site scripting (XSS) vulnerabilities in Free and Open Source Inventory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name, Address, and Company parameters under the Add New Put section. 2023-09-08 not yet calculated CVE-2023-39712
MISC
MISC
MISC tp-link — archer_c5400
  Archer C5400 firmware versions prior to ‘Archer C5400(JP)_V2_230506’ allows a network-adjacent authenticated attacker to execute arbitrary OS commands. 2023-09-06 not yet calculated CVE-2023-39935
MISC
MISC electron — electron
  Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron. 2023-09-06 not yet calculated CVE-2023-39956
MISC wiremock — wiremock
  WireMock is a tool for mocking HTTP services. When certain request URLs like “@127.0.0.1:1234″ are used in WireMock Studio configuration fields, the request might be forwarded to an arbitrary service reachable from WireMock’s instance. There are 3 identified potential attack vectors: via “TestRequester” functionality, webhooks and the proxy mode. As we can control HTTP Method, HTTP Headers, HTTP Data, it allows sending requests with the default level of credentials for the WireMock instance. The vendor has discontinued the affected Wiremock studio product and there will be no fix. Users are advised to find alternatives. 2023-09-06 not yet calculated CVE-2023-39967
MISC argo_cd — argo_cd
  Argo CD is a declarative continuous deployment for Kubernetes. Argo CD Cluster secrets might be managed declaratively using Argo CD / kubectl apply. As a result, the full secret body is stored in`kubectl.kubernetes.io/last-applied-configuration` annotation. pull request #7139 introduced the ability to manage cluster labels and annotations. Since clusters are stored as secrets it also exposes the `kubectl.kubernetes.io/last-applied-configuration` annotation which includes full secret body. In order to view the cluster annotations via the Argo CD API, the user must have `clusters, get` RBAC access. **Note:** In many cases, cluster secrets do not contain any actually-secret information. But sometimes, as in bearer-token auth, the contents might be very sensitive. The bug has been patched in versions 2.8.3, 2.7.14, and 2.6.15. Users are advised to upgrade. Users unable to upgrade should update/deploy cluster secret with `server-side-apply` flag which does not use or rely on `kubectl.kubernetes.io/last-applied-configuration` annotation. Note: annotation for existing secrets will require manual removal. 2023-09-07 not yet calculated CVE-2023-40029
MISC
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation. On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used. We recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2. 2023-09-06 not yet calculated CVE-2023-4015
MISC
MISC
MISC wordpress — wordpress
  The Media from FTP WordPress plugin before 11.17 does not properly limit who can use the plugin, which may allow users with author+ privileges to move files around, like wp-config.php, which may lead to RCE in some cases. 2023-09-04 not yet calculated CVE-2023-4019
MISC tp-link — deco_m4
  Deco M4 firmware versions prior to ‘Deco M4(JP)_V2_1.5.8 Build 20230619’ allows a network-adjacent authenticated attacker to execute arbitrary OS commands. 2023-09-06 not yet calculated CVE-2023-40193
MISC
MISC trusted_firmware-m — trusted_firmware-m
  In Trusted Firmware-M through TF-Mv1.8.0, for platforms that integrate the CryptoCell accelerator, when the CryptoCell PSA Driver software Interface is selected, and the Authenticated Encryption with Associated Data Chacha20-Poly1305 algorithm is used, with the single-part verification function (defined during the build-time configuration phase) implemented with a dedicated function (i.e., not relying on usage of multipart functions), the buffer comparison during the verification of the authentication tag does not happen on the full 16 bytes but just on the first 4 bytes, thus leading to the possibility that unauthenticated payloads might be identified as authentic. This affects TF-Mv1.6.0, TF-Mv1.6.1, TF-Mv1.7.0, and TF-Mv1.8. 2023-09-08 not yet calculated CVE-2023-40271
MISC
MISC sap_se — sap_s/4hana
  SAP S/4HANA Manage Catalog Items and Cross-Catalog searches Fiori apps allow an attacker to redirect users to a malicious site due to insufficient URL validation. As a result, it may have a slight impact on confidentiality and integrity. 2023-09-08 not yet calculated CVE-2023-40306
MISC samsung– exynos
  An issue was discovered in Exynos Mobile Processor 980 and 2100. An integer overflow at a buffer index can prevent the execution of requested services via a crafted application. 2023-09-08 not yet calculated CVE-2023-40353
MISC tp-link — multiple_products
  Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to ‘Archer AX50(JP)_V1_230529’, Archer A10 firmware versions prior to ‘Archer A10(JP)_V2_230504’, Archer AX10 firmware versions prior to ‘Archer AX10(JP)_V1.2_230508’, and Archer AX11000 firmware versions prior to ‘Archer AX11000(JP)_V1_230523’. 2023-09-06 not yet calculated CVE-2023-40357
MISC
MISC
MISC
MISC
MISC apple — macos_ventura
  A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.5. An app may be able to read sensitive location information. 2023-09-06 not yet calculated CVE-2023-40392
MISC
MISC
MISC
MISC apple — macos_ventura
  The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution. 2023-09-06 not yet calculated CVE-2023-40397
MISC tp-link — archer_ax6000
  Archer AX6000 firmware versions prior to ‘Archer AX6000(JP)_V1_1.3.0 Build 20221208’ allows a network-adjacent authenticated attacker to execute arbitrary OS commands. 2023-09-06 not yet calculated CVE-2023-40531
MISC
MISC argo_cd — argo_cd
  Argo CD is a declarative continuous deployment for Kubernetes. All versions of ArgoCD starting from v2.4 have a bug where the ArgoCD repo-server component is vulnerable to a Denial-of-Service attack vector. Specifically, the said component extracts a user-controlled tar.gz file without validating the size of its inner files. As a result, a malicious, low-privileged user can send a malicious tar.gz file that exploits this vulnerability to the repo-server, thereby harming the system’s functionality and availability. Additionally, the repo-server is susceptible to another vulnerability due to the fact that it does not check the extracted file permissions before attempting to delete them. Consequently, an attacker can craft a malicious tar.gz archive in a way that prevents the deletion of its inner files when the manifest generation process is completed. A patch for this vulnerability has been released in versions 2.6.15, 2.7.14, and 2.8.3. Users are advised to upgrade. The only way to completely resolve the issue is to upgrade, however users unable to upgrade should configure RBAC (Role-Based Access Control) and provide access for configuring applications only to a limited number of administrators. These administrators should utilize trusted and verified Helm charts. 2023-09-07 not yet calculated CVE-2023-40584
MISC
MISC golang — golang
  go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be made to consume unbounded amounts of memory when handling specially crafted p2p messages sent from an attacker node. The fix is included in geth version `1.12.1-stable`, i.e, `1.12.2-unstable` and onwards. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-09-06 not yet calculated CVE-2023-40591
MISC
MISC
MISC solarview_compact — solarview_compact
  SolarView Compact < 6.00 is vulnerable to Directory Traversal. 2023-09-08 not yet calculated CVE-2023-40924
MISC
MISC tenda — ac9
  Tenda AC9 V3.0BR_V15.03.06.42_multi_TD01 was discovered stack overflow via parameter ‘firewall_value’ at url /goform/SetFirewallCfg. 2023-09-07 not yet calculated CVE-2023-40942
MISC icms — icms
  icms 7.0.16 is vulnerable to Cross Site Request Forgery (CSRF). 2023-09-08 not yet calculated CVE-2023-40953
MISC
MISC china_mobile_communications — china_mobile_intelligent_home_gateway
  An issue in China Mobile Communications China Mobile Intelligent Home Gateway v.HG6543C4 allows a remote attacker to execute arbitrary code via the authentication mechanism. 2023-09-05 not yet calculated CVE-2023-41012
MISC zope — zope
  AccessControl provides a general security framework for use in Zope. Python’s “format” functionality allows someone controlling the format string to “read” objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python’s full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-09-06 not yet calculated CVE-2023-41050
MISC
MISC redis — redis
  Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-09-06 not yet calculated CVE-2023-41053
MISC
MISC apple — multiple_products
  A validation issue was addressed with improved logic. This issue is fixed in watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1. A maliciously crafted attachment may result in arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. 2023-09-07 not yet calculated CVE-2023-41061
MISC
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. 2023-09-07 not yet calculated CVE-2023-41064
MISC
MISC
MISC
MISC
MISC
MISC tef-dokumentation_gmbh — tef_portal TEF portal 2023-07-17 is vulnerable to a persistent cross site scripting (XSS)attack. 2023-09-05 not yet calculated CVE-2023-41107
MISC
MISC tef-dokumentation_gmbh — tef_portal TEF portal 2023-07-17 is vulnerable to authenticated remote code execution. 2023-09-05 not yet calculated CVE-2023-41108
MISC
MISC usermin — usermin
  Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab. 2023-09-07 not yet calculated CVE-2023-41161
MISC
MISC tolgee — tolgee
  Tolgee is an open-source localization platform. Due to lack of validation field – Org Name, bad actor can send emails with HTML injected code to the victims. Registered users can inject HTML into unsanitized emails from the Tolgee instance to other users. This unsanitized HTML ends up in invitation emails which appear as legitimate org invitations. Bad actors may direct users to malicious website or execute javascript in the context of the users browser. This vulnerability has been addressed in version 3.29.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-09-07 not yet calculated CVE-2023-41316
MISC
MISC matrix-media-repo — matrix-media-repo
  matrix-media-repo is a highly customizable multi-domain media repository for the Matrix chat ecosystem. In affected versions an attacker could upload a malicious piece of media to the media repo, which would then be served with `Content-Disposition: inline` upon download. This vulnerability could be leveraged to execute scripts embedded in SVG content. Commits `77ec235` and `bf8abdd` fix the issue and are included in the 1.3.0 release. Operators should upgrade to v1.3.0 as soon as possible. Operators unable to upgrade should override the `Content-Disposition` header returned by matrix-media-repo as a workaround. 2023-09-08 not yet calculated CVE-2023-41318
MISC
MISC
MISC
MISC ethyca — fides Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code. The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is `root`, and leverage that access to attack underlying infrastructure and integrated systems. This vulnerability affects Fides versions `2.11.0` through `2.19.0`. Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role. Exploitation is only possible if the security configuration parameter `allow_custom_connector_functions` is enabled by the user deploying the Fides webserver container, either in `fides.toml` or by setting the env var `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS=True`. By default, this configuration parameter is disabled. The vulnerability has been patched in Fides version `2.19.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. Users unable to upgrade should ensure that `allow_custom_connector_functions` in `fides.toml` and the `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS` are both either unset or explicit set to `False`. 2023-09-06 not yet calculated CVE-2023-41319
MISC
MISC wiremock — wiremock
  WireMock is a tool for mocking HTTP services. WireMock can be configured to only permit proxying (and therefore recording) to certain addresses. This is achieved via a list of allowed address rules and a list of denied address rules, where the allowed list is evaluated first. Until WireMock Webhooks Extension 3.0.0-beta-15, the filtering of target addresses from the proxy mode DID NOT work for Webhooks, so the users were potentially vulnerable regardless of the `limitProxyTargets` settings. Via the WireMock webhooks configuration, POST requests from a webhook might be forwarded to an arbitrary service reachable from WireMock’s instance. For example, if someone is running the WireMock docker Container inside a private cluster, they can trigger internal POST requests against unsecured APIs or even against secure ones by passing a token, discovered using another exploit, via authentication headers. This issue has been addressed in versions 2.35.1 and 3.0.3 of wiremock. Wiremock studio has been discontinued and will not see a fix. Users unable to upgrade should use external firewall rules to define the list of permitted destinations. 2023-09-06 not yet calculated CVE-2023-41327
MISC
MISC
MISC frappe — frappe
  Frappe is a low code web framework written in Python and Javascript. A SQL Injection vulnerability has been identified in the Frappe Framework which could allow a malicious actor to access sensitive information. This issue has been addressed in versions 13.46.1 and 14.20.0. Users are advised to upgrade. There’s no workaround to fix this without upgrading. 2023-09-06 not yet calculated CVE-2023-41328
MISC
MISC
MISC wiremock — wiremock
  WireMock is a tool for mocking HTTP services. The proxy mode of WireMock, can be protected by the network restrictions configuration, as documented in Preventing proxying to and recording from specific target addresses. These restrictions can be configured using the domain names, and in such a case the configuration is vulnerable to the DNS rebinding attacks. A similar patch was applied in WireMock 3.0.0-beta-15 for the WireMock Webhook Extensions. The root cause of the attack is a defect in the logic which allows for a race condition triggered by a DNS server whose address expires in between the initial validation and the outbound network request that might go to a domain that was supposed to be prohibited. Control over a DNS service is required to exploit this attack, so it has high execution complexity and limited impact. This issue has been addressed in version 2.35.1 of wiremock-jre8 and wiremock-jre8-standalone, version 3.0.3 of wiremock and wiremock-standalone, version 2.6.1 of the python version of wiremock, and versions 2.35.1-1 and 3.0.3-1 of the wiremock/wiremock Docker container. Users are advised to upgrade. Users unable to upgrade should either configure firewall rules to define the list of permitted destinations or to configure WireMock to use IP addresses instead of the domain names. 2023-09-06 not yet calculated CVE-2023-41329
MISC
MISC knplabs — knplabs/knp-snappy
  knplabs/knp-snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. ## Issue On March 17th the vulnerability CVE-2023-28115 was disclosed, allowing an attacker to gain remote code execution through PHAR deserialization. Version 1.4.2 added a check `if (strpos($filename, ‘phar://’) === 0)` in the `prepareOutput` function to resolve this CVE, however if the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files. To fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`. A successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8. This issue has been addressed in commit `d3b742d61a` which has been included in version 1.4.3. Users are advised to upgrade. Users unable to upgrade should ensure that only trusted users may submit data to the `AbstractGenerator->generate(…)` function. 2023-09-06 not yet calculated CVE-2023-41330
MISC
MISC
MISC gofiber — fiber
  Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version. 2023-09-08 not yet calculated CVE-2023-41338
MISC
MISC
MISC
MISC super_store_finder — super_store_finder
  A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. 2023-09-05 not yet calculated CVE-2023-41508
MISC
MISC cockpit-hq — cockpit_cms
  An arbitrary file upload vulnerability in the Upload Asset function of Cockpit CMS v2.6.3 allows attackers to execute arbitrary code via uploading a crafted .shtml file. 2023-09-08 not yet calculated CVE-2023-41564
MISC blood_bank_&_donor_management — blood_bank_&_donor_management
  Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters. 2023-09-08 not yet calculated CVE-2023-41575
MISC jeecg — jeecg
  Jeecg boot up to v3.5.3 was discovered to contain an arbitrary file read vulnerability via the interface /testConnection. 2023-09-08 not yet calculated CVE-2023-41578
MISC dairy_farm_shop_management_system — dairy_farm_shop_management_system
  Dairy Farm Shop Management System Using PHP and MySQL v1.1 was discovered to contain multiple SQL injection vulnerabilities in the Login function via the Username and Password parameters. 2023-09-08 not yet calculated CVE-2023-41594
MISC
MISC
MISC csz_cms — csz_cms
  Multiple cross-site scripting (XSS) vulnerabilities in install/index.php of CSZ CMS v1.3.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Database Username or Database Host parameters. 2023-09-06 not yet calculated CVE-2023-41601
MISC
MISC phpgurukul — zoo_management_system
  Zoo Management System v1.0 was discovered to contain multiple SQL injection vulnerabilities in the Admin sign-in page via the username and password fields. 2023-09-08 not yet calculated CVE-2023-41615
MISC
MISC
MISC buttercup — buttercup
  Buttercup v2.20.3 allows attackers to obtain the hash of the master password for the password manager via accessing the file /vaults.json/ 2023-09-07 not yet calculated CVE-2023-41646
MISC
MISC apple — macos
  Improper access control vulnerability in ‘direct’ Desktop App for macOS ver 2.6.0 and earlier allows a local attacker to bypass access restriction and to use camrea, microphone, etc. of the device where the product is installed without the user’s consent. 2023-09-08 not yet calculated CVE-2023-41775
MISC
MISC openpmix — pmix
  OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0. 2023-09-09 not yet calculated CVE-2023-41915
MISC
CONFIRM
CONFIRM jenkins — jenkins
  Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict the ‘name’ query parameter when rendering a history entry, allowing attackers to have Jenkins render a manipulated configuration history that was not created by the plugin. 2023-09-06 not yet calculated CVE-2023-41930
MISC
MISC jenkins — jenkins
  Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not property sanitize or escape the timestamp value from history entries when rendering a history entry on the history view, resulting in a stored cross-site scripting (XSS) vulnerability. 2023-09-06 not yet calculated CVE-2023-41931
MISC
MISC jenkins — jenkins
  Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict ‘timestamp’ query parameters in multiple endpoints, allowing attackers with to delete attacker-specified directories on the Jenkins controller file system as long as they contain a file called ‘history.xml’. 2023-09-06 not yet calculated CVE-2023-41932
MISC
MISC jenkins — jenkins
  Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. 2023-09-06 not yet calculated CVE-2023-41933
MISC
MISC jenkins — jenkins
  Jenkins Pipeline Maven Integration Plugin 1330.v18e473854496 and earlier does not properly mask (i.e., replace with asterisks) usernames of credentials specified in custom Maven settings in Pipeline build logs if “Treat username as secret” is checked. 2023-09-06 not yet calculated CVE-2023-41934
MISC
MISC jenkins — jenkins
  Jenkins Azure AD Plugin 396.v86ce29279947 and earlier, except 378.380.v545b_1154b_3fb_, uses a non-constant time comparison function when checking whether the provided and expected CSRF protection nonce are equal, potentially allowing attackers to use statistical methods to obtain a valid nonce. 2023-09-06 not yet calculated CVE-2023-41935
MISC
MISC jenkins — jenkins
  Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token. 2023-09-06 not yet calculated CVE-2023-41936
MISC
MISC jenkins — jenkins
  Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload. 2023-09-06 not yet calculated CVE-2023-41937
MISC
MISC jenkins — jenkins
  A cross-site request forgery (CSRF) vulnerability in Jenkins Ivy Plugin 2.5 and earlier allows attackers to delete disabled modules. 2023-09-06 not yet calculated CVE-2023-41938
MISC
MISC jenkins — jenkins
  Jenkins SSH2 Easy Plugin 1.4 and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they’re no longer entitled to. 2023-09-06 not yet calculated CVE-2023-41939
MISC
MISC jenkins — jenkins
  Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents. 2023-09-06 not yet calculated CVE-2023-41940
MISC
MISC jenkins — jenkins
  A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins. 2023-09-06 not yet calculated CVE-2023-41941
MISC
MISC jenkins — jenkins
  A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue. 2023-09-06 not yet calculated CVE-2023-41942
MISC
MISC jenkins — jenkins
  Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to clear the SQS queue. 2023-09-06 not yet calculated CVE-2023-41943
MISC
MISC jenkins — jenkins
  Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability. 2023-09-06 not yet calculated CVE-2023-41944
MISC
MISC jenkins — jenkins
  Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted. 2023-09-06 not yet calculated CVE-2023-41945
MISC
MISC jenkins — jenkins
  A cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username. 2023-09-06 not yet calculated CVE-2023-41946
MISC
MISC jenkins — jenkins
  A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials. 2023-09-06 not yet calculated CVE-2023-41947
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8. 2023-09-06 not yet calculated CVE-2023-4206
MISC
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec. 2023-09-06 not yet calculated CVE-2023-4207
MISC
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81. 2023-09-06 not yet calculated CVE-2023-4208
MISC
MISC
MISC jeecg — jeecg Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component /jeecg-boot/jmreport/show. 2023-09-08 not yet calculated CVE-2023-42268
MISC hutool — hutool
  hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonArray. 2023-09-08 not yet calculated CVE-2023-42276
MISC hutool — hutool
  hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonObject.putByPath. 2023-09-08 not yet calculated CVE-2023-42277
MISC hutool — hutool
  hutool v5.8.21 was discovered to contain a buffer overflow via the component JSONUtil.parse(). 2023-09-08 not yet calculated CVE-2023-42278
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s netfilter: nf_tables component can be exploited to achieve local privilege escalation. Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability. We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8. 2023-09-06 not yet calculated CVE-2023-4244
MISC
MISC wordpress — wordpress
  This User Activity Log WordPress plugin before 1.6.7 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic. 2023-09-04 not yet calculated CVE-2023-4279
MISC beyondtrust — privileged_remote_access
  BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) versions 23.2.1 and 23.2.2 contain a command injection vulnerability which can be exploited through a malicious HTTP request. Successful exploitation of this vulnerability can allow an unauthenticated remote attacker to execute underlying operating system commands within the context of the site user. This issue is fixed in version 23.2.3. 2023-09-05 not yet calculated CVE-2023-4310
MISC
MISC ardereg — sistemas_scada
  ARDEREG Sistema SCADA Central versions 2.203 and prior login page are vulnerable to an unauthenticated blind SQL injection attack. An attacker could manipulate the application’s SQL query logic to extract sensitive information or perform unauthorized actions within the database. In this case, the vulnerability could allow an attacker to execute arbitrary SQL queries through the login page, potentially leading to unauthorized access, data leakage, or even disruption of critical industrial processes. 2023-09-06 not yet calculated CVE-2023-4485
MISC tenda — n300
  Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only 2023-09-06 not yet calculated CVE-2023-4498
MISC redwood_software — jscape_mft_server
  Unsafe deserialization in JSCAPE MFT Server versions prior to 2023.1.9 (Windows, Linux, and MacOS) permits an attacker to run arbitrary Java code (including OS commands) via its management interface 2023-09-07 not yet calculated CVE-2023-4528
MISC
MISC delinea — secret_server
  File accessibility vulnerability in Delinea Secret Server, in its v10.9.000002 and v11.4.000002 versions. Exploitation of this vulnerability could allow an authenticated user with administrative privileges to create a backup file in the application’s webroot directory, changing the default backup directory to the wwwroot folder, and download it with some configuration files such as encryption.config/ and database.config stored in the wwwroot directory, exposing the database credentials in plain text. 2023-09-06 not yet calculated CVE-2023-4588
MISC delinea — secret_server
  Insufficient verification of data authenticity vulnerability in Delinea Secret Server, in its v10.9.000002 version. An attacker with an administrator account could perform software updates without proper integrity verification mechanisms. In this scenario, the update process lacks digital signatures and fails to validate the integrity of the update package, allowing the attacker to inject malicious applications during the update. 2023-09-06 not yet calculated CVE-2023-4589
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer’s recv queue without locking the queue. Thus, there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c. 2023-09-06 not yet calculated CVE-2023-4622
MISC
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux kernel’s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation. If a class with a link-sharing curve (i.e., with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free. We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. 2023-09-06 not yet calculated CVE-2023-4623
MISC
MISC delta_electronics — cncsoft-b_dopsoft
  Delta Electronics’ CNCSoft-B version 1.0.0.4 and DOPSoft versions 4.0.0.82 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code. 2023-09-07 not yet calculated CVE-2023-4685
MISC dreamer_cms — dreamer_cms
  A vulnerability was found in Dreamer CMS up to 4.1.3. It has been classified as problematic. Affected is an unknown function of the file /upload/ueditorConfig?action=config. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-238632. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-09-03 not yet calculated CVE-2023-4743
MISC
MISC
MISC byzoro — smart_s85f_management_platform
  A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230822. It has been rated as critical. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-238634 is the identifier assigned to this vulnerability. 2023-09-04 not yet calculated CVE-2023-4745
MISC
MISC
MISC jenkins — jenkins
  An incorrect permission check in Qualys Container Scanning Connector Plugin 1.6.2.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credentials IDs of credentials stored in Jenkins and to connect to an attacker-specified URL using attacker-specified credentials IDs, capturing credentials stored in Jenkins.  2023-09-08 not yet calculated CVE-2023-4777
MISC hashicorp — terraform
  Terraform version 1.0.8 through 1.5.6 allows arbitrary file write during the `init` operation if run on maliciously crafted Terraform configuration. This vulnerability is fixed in Terraform 1.5.7. 2023-09-08 not yet calculated CVE-2023-4782
MISC openssl — openssl
  Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various – from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However, given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However, we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue. 2023-09-08 not yet calculated CVE-2023-4807
MISC
MISC
MISC
MISC
MISC
MISC answerdev — answerdev/answer
  In pf packet processing with a ‘scrub fragment reassemble’ rule, a packet containing multiple IPv6 fragment headers would be reassembled, and then immediately processed. That is, a packet with multiple fragment extension headers would not be recognized as the correct ultimate payload. Instead, a packet with multiple IPv6 fragment headers would unexpectedly be interpreted as a fragmented packet, rather than as whatever the real payload is. As a result, IPv6 fragments may bypass pf firewall rules written on the assumption all fragments have been reassembled and, as a result, be forwarded or processed by the host. 2023-09-06 not yet calculated CVE-2023-4809
MISC
MISC
MISC
MISC answerdev — answerdev/answer
  Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3. 2023-09-07 not yet calculated CVE-2023-4815
MISC
MISC pegasystems — pega_platform
  Pega Platform versions 7.1 to 8.8.3 are affected by an HTML Injection issue with a name field utilized in Visual Business Director, however this field can only be modified by an authenticated administrative user. 2023-09-08 not yet calculated CVE-2023-4843
MISC sourcecodester — inventory_management_system
  A vulnerability was found in SourceCodester Simple Membership System 1.0. It has been classified as critical. This affects an unknown part of the file club_edit_query.php. The manipulation of the argument club_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239253 was assigned to this vulnerability. 2023-09-08 not yet calculated CVE-2023-4844
MISC
MISC
MISC sourcecodester — simple_membership_system
  A vulnerability was found in SourceCodester Simple Membership System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file account_edit_query.php. The manipulation of the argument admin_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239254 is the identifier assigned to this vulnerability. 2023-09-09 not yet calculated CVE-2023-4845
MISC
MISC
MISC sourcecodester — simple_membership_system
  A vulnerability was found in SourceCodester Simple Membership System 1.0. It has been rated as critical. This issue affects some unknown processing of the file delete_member.php. The manipulation of the argument mem_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239255. 2023-09-09 not yet calculated CVE-2023-4846
MISC
MISC
MISC sourcecodester — simple_book_catalog_app
  A vulnerability classified as problematic has been found in SourceCodester Simple Book Catalog App 1.0. Affected is an unknown function of the component Update Book Form. The manipulation of the argument book_title/book_author leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239256. 2023-09-09 not yet calculated CVE-2023-4847
MISC
MISC
MISC sourcecodester — simple_book_catalog_app
  A vulnerability classified as critical was found in SourceCodester Simple Book Catalog App 1.0. Affected by this vulnerability is an unknown functionality of the file delete_book.php. The manipulation of the argument delete leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239257 was assigned to this vulnerability. 2023-09-09 not yet calculated CVE-2023-4848
MISC
MISC
MISC ibos — ibos
  A vulnerability, which was classified as critical, has been found in IBOS OA 4.5.5. Affected by this issue is some unknown functionality of the file ?r=file/dashboard/trash&op=del. The manipulation of the argument fids leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-239258 is the identifier assigned to this vulnerability. 2023-09-09 not yet calculated CVE-2023-4849
MISC
MISC
MISC ibos — ibos
  A vulnerability, which was classified as critical, was found in IBOS OA 4.5.5. This affects an unknown part of the file ?r=dashboard/position/del. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239259. 2023-09-09 not yet calculated CVE-2023-4850
MISC
MISC
MISC ibos — ibos
  A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects unknown code of the file ?r=dashboard/position/edit&op=member. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239260. 2023-09-09 not yet calculated CVE-2023-4851
MISC
MISC
MISC ibos — ibos
  A vulnerability was found in IBOS OA 4.5.5 and classified as critical. This issue affects some unknown processing of the file ?r=dashboard/database/optimize. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239261 was assigned to this vulnerability. 2023-09-09 not yet calculated CVE-2023-4852
MISC
MISC
MISC sourcecodester — take-note_app
  A vulnerability, which was classified as problematic, was found in SourceCodester Take-Note App 1.0. This affects an unknown part of the file index.php. The manipulation of the argument noteContent with the input <script>alert(‘xss’)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239349 was assigned to this vulnerability. 2023-09-09 not yet calculated CVE-2023-4864
MISC
MISC
MISC sourcecodester — take-note_app
  A vulnerability has been found in SourceCodester Take-Note App 1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239350 is the identifier assigned to this vulnerability. 2023-09-09 not yet calculated CVE-2023-4865
MISC
MISC
MISC mutt — mutt
  Null pointer dereference when viewing a specially crafted email in Mutt >1.5.2 <2.2.12 2023-09-09 not yet calculated CVE-2023-4874
MISC
MISC
MISC mutt — mutt
  Null pointer dereference when composing from a specially crafted draft message in Mutt >1.5.2 <2.2.12 2023-09-09 not yet calculated CVE-2023-4875
MISC
MISC
MISC