Dernières vulnérabilités du Lundi 21 Août 2023 + weekend

Dernières vulnérabilités du Lundi 21 Août 2023 + weekend
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Dernière mise à jour efféctuée le 21/08/2023 à 23:58:05

(3) Vulnérabilité(s) CRITICAL [9.0, 10.0]

Source : devolutions.net

Vulnérabilité ID : CVE-2023-4417

Première publication le : 21-08-2023 19:15:09
Dernière modification le : 21-08-2023 19:15:09

Description :
Improper access controls in the entry duplication component in Devolutions Remote Desktop Manager 2023.2.19 and earlier versions on Windows allows an authenticated user, under specific circumstances, to inadvertently share their personal vault entry with shared vaults via an incorrect vault in the duplication write process.

CVE ID : CVE-2023-4417
Source : security@devolutions.net
Score CVSS : 10.0

Références :
https://devolutions.net/security/advisories/DEVO-2023-0015 | source : security@devolutions.net


Source : divd.nl

Vulnérabilité ID : CVE-2023-25914

Première publication le : 21-08-2023 21:15:08
Dernière modification le : 21-08-2023 21:15:08

Description :
Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface.

CVE ID : CVE-2023-25914
Source : csirt@divd.nl
Score CVSS : 9.9

Références :
https://csirt.divd.nl/CVE-2023-25914 | source : csirt@divd.nl
https://csirt.divd.nl/DIVD-2023-00025 | source : csirt@divd.nl

Vulnérabilité : CWE-22


Vulnérabilité ID : CVE-2023-25915

Première publication le : 21-08-2023 21:15:09
Dernière modification le : 21-08-2023 21:15:09

Description :
Due to improper input validation, a remote attacker could execute arbitrary commands on the target system.

CVE ID : CVE-2023-25915
Source : csirt@divd.nl
Score CVSS : 9.9

Références :
https://csirt.divd.nl/CVE-2023-25915 | source : csirt@divd.nl
https://csirt.divd.nl/DIVD-2023-00025 | source : csirt@divd.nl

Vulnérabilité : CWE-20


(22) Vulnérabilité(s) HIGH [7.0, 8.9]

Source : microsoft.com

Vulnérabilité ID : CVE-2023-36787

Première publication le : 21-08-2023 20:15:08
Dernière modification le : 21-08-2023 20:15:08

Description :
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability

CVE ID : CVE-2023-36787
Source : secure@microsoft.com
Score CVSS : 8.8

Références :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36787 | source : secure@microsoft.com


Source : starlabs.sg

Vulnérabilité ID : CVE-2023-2317

Première publication le : 19-08-2023 06:15:46
Dernière modification le : 20-08-2023 00:48:59

Description :
DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.

CVE ID : CVE-2023-2317
Source : info@starlabs.sg
Score CVSS : 8.6

Références :
https://starlabs.sg/advisories/23/23-2317/ | source : info@starlabs.sg
https://support.typora.io/What's-New-1.6/ | source : info@starlabs.sg

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-2318

Première publication le : 19-08-2023 06:15:46
Dernière modification le : 20-08-2023 00:48:59

Description :
DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.

CVE ID : CVE-2023-2318
Source : info@starlabs.sg
Score CVSS : 8.6

Références :
https://github.com/marktext/marktext/issues/3618 | source : info@starlabs.sg
https://starlabs.sg/advisories/23/23-2318/ | source : info@starlabs.sg

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-2110

Première publication le : 19-08-2023 06:15:45
Dernière modification le : 20-08-2023 00:48:59

Description :
Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.

CVE ID : CVE-2023-2110
Source : info@starlabs.sg
Score CVSS : 8.2

Références :
https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ | source : info@starlabs.sg
https://starlabs.sg/advisories/23/23-2110/ | source : info@starlabs.sg

Vulnérabilité : CWE-22


Vulnérabilité ID : CVE-2023-2316

Première publication le : 19-08-2023 06:15:46
Dernière modification le : 20-08-2023 00:48:59

Description :
Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.

CVE ID : CVE-2023-2316
Source : info@starlabs.sg
Score CVSS : 7.4

Références :
https://starlabs.sg/advisories/23/23-2316/ | source : info@starlabs.sg
https://support.typora.io/What's-New-1.6/ | source : info@starlabs.sg

Vulnérabilité : CWE-22


Source : huntr.dev

Vulnérabilité ID : CVE-2023-4432

Première publication le : 19-08-2023 01:15:09
Dernière modification le : 20-08-2023 00:48:59

Description :
Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit prior to 2.6.4.

CVE ID : CVE-2023-4432
Source : security@huntr.dev
Score CVSS : 8.3

Références :
https://github.com/cockpit-hq/cockpit/commit/2a93d391fbd2dd9e730f65d43b29beb65903d195 | source : security@huntr.dev
https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f | source : security@huntr.dev

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4433

Première publication le : 19-08-2023 01:15:09
Dernière modification le : 20-08-2023 00:48:59

Description :
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.4.

CVE ID : CVE-2023-4433
Source : security@huntr.dev
Score CVSS : 8.3

Références :
https://github.com/cockpit-hq/cockpit/commit/36d1d4d256cbbab028342ba10cc493e5c119172c | source : security@huntr.dev
https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a | source : security@huntr.dev

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4435

Première publication le : 20-08-2023 01:15:10
Dernière modification le : 21-08-2023 12:47:18

Description :
Improper Input Validation in GitHub repository hamza417/inure prior to build88.

CVE ID : CVE-2023-4435
Source : security@huntr.dev
Score CVSS : 7.7

Références :
https://github.com/hamza417/inure/commit/e74062e439f860fd144da4bfc3f35e96c19c3abd | source : security@huntr.dev
https://huntr.dev/bounties/1875ee85-4b92-4aa4-861e-094137a29276 | source : security@huntr.dev

Vulnérabilité : CWE-20


Source : divd.nl

Vulnérabilité ID : CVE-2023-25913

Première publication le : 21-08-2023 21:15:07
Dernière modification le : 21-08-2023 21:15:07

Description :
Because of an authentication flaw an attacker would be capable of generating a web report that discloses sensitive information such as internal IP addresses, usernames, store names and other sensitive information.

CVE ID : CVE-2023-25913
Source : csirt@divd.nl
Score CVSS : 7.7

Références :
https://csirt.divd.nl/CVE-2023-25913 | source : csirt@divd.nl
https://csirt.divd.nl/DIVD-2023-00025 | source : csirt@divd.nl

Vulnérabilité : CWE-200
Vulnérabilité : CWE-287


Source : cisco.com

Vulnérabilité ID : CVE-2023-20212

Première publication le : 18-08-2023 20:15:09
Dernière modification le : 20-08-2023 00:48:59

Description :
A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.

CVE ID : CVE-2023-20212
Source : ykramarz@cisco.com
Score CVSS : 7.5

Références :
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ | source : ykramarz@cisco.com


Source : github.com

Vulnérabilité ID : CVE-2023-40173

Première publication le : 18-08-2023 22:15:11
Dernière modification le : 20-08-2023 00:48:59

Description :
Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. Prior to version 1.0.5 Social media skeleton did not properly salt passwords leaving user passwords susceptible to cracking should an attacker gain access to hashed passwords. This issue has been addressed in version 1.0.5 and users are advised to upgrade. There are no known workarounds for this issue.

CVE ID : CVE-2023-40173
Source : security-advisories@github.com
Score CVSS : 7.5

Références :
https://github.com/fobybus/social-media-skeleton/commit/344d798e82d6cc39844962c6d3cb2560f5907848 | source : security-advisories@github.com
https://github.com/fobybus/social-media-skeleton/commit/df31da44ffed3ea065cbbadc3c8052d0d489a2ef | source : security-advisories@github.com
https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-rfmv-7m7g-v628 | source : security-advisories@github.com

Vulnérabilité : CWE-522


Vulnérabilité ID : CVE-2023-40175

Première publication le : 18-08-2023 22:15:11
Dernière modification le : 20-08-2023 00:48:59

Description :
Puma is a Ruby/Rack web server built for parallelism. Prior to versions 6.3.1 and 5.6.7, puma exhibited incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers in a way that allowed HTTP request smuggling. Severity of this issue is highly dependent on the nature of the web site using puma is. This could be caused by either incorrect parsing of trailing fields in chunked transfer encoding bodies or by parsing of blank/zero-length Content-Length headers. Both issues have been addressed and this vulnerability has been fixed in versions 6.3.1 and 5.6.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-40175
Source : security-advisories@github.com
Score CVSS : 7.3

Références :
https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a | source : security-advisories@github.com
https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8 | source : security-advisories@github.com

Vulnérabilité : CWE-444


Source : mitre.org

Vulnérabilité ID : CVE-2023-40735

Première publication le : 21-08-2023 12:15:09
Dernière modification le : 21-08-2023 12:47:08

Description :
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BUTTERFLY BUTTON PROJECT - BUTTERFLY BUTTON (Architecture) allows loss of plausible deniability, confidentiality.This issue affects BUTTERFLY BUTTON: As of 2023-08-21.

CVE ID : CVE-2023-40735
Source : cve@mitre.org
Score CVSS : 7.5

Références :
http://butterfly.com | source : cve@mitre.org
https://github.com/TheButterflyButton | source : cve@mitre.org
https://www.vulsec.org/advisories | source : cve@mitre.org

Vulnérabilité : CWE-200


Source : vuldb.com

Vulnérabilité ID : CVE-2023-4415

Première publication le : 18-08-2023 16:15:11
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4415
Source : cna@vuldb.com
Score CVSS : 7.3

Références :
https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic | source : cna@vuldb.com
https://vuldb.com/?ctiid.237518 | source : cna@vuldb.com
https://vuldb.com/?id.237518 | source : cna@vuldb.com

Vulnérabilité : CWE-287


Source : patchstack.com

Vulnérabilité ID : CVE-2023-31094

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lauri Karisola / WP Trio Stock Sync for WooCommerce plugin <= 2.4.0 versions.

CVE ID : CVE-2023-31094
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/stock-sync-for-woocommerce/wordpress-stock-sync-for-woocommerce-plugin-2-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-31218

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional plugin <= 1.0.6 versions.

CVE ID : CVE-2023-31218
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-6-cross-site-scripting-xss-via-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-352
Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32105

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ollybach WPPizza – A Restaurant Plugin plugin <= 3.17.1 versions.

CVE ID : CVE-2023-32105
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/wppizza/wordpress-wppizza-a-restaurant-plugin-plugin-3-17-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32106

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fahad Mahmood WP Docs plugin <= 1.9.9 versions.

CVE ID : CVE-2023-32106
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/wp-docs/wordpress-wp-docs-plugin-1-9-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32107

Première publication le : 18-08-2023 14:15:23
Dernière modification le : 18-08-2023 15:06:49

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Photo Gallery Team Photo Gallery by Ays – Responsive Image Gallery plugin <= 5.1.3 versions.

CVE ID : CVE-2023-32107
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/gallery-photo-gallery/wordpress-photo-gallery-by-ays-responsive-image-gallery-plugin-5-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-30499

Première publication le : 18-08-2023 15:15:09
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FolioVision FV Flowplayer Video Player plugin <= 7.5.32.7212 versions.

CVE ID : CVE-2023-30499
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-32-7212-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32108

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio Scimone Albo Pretorio On line plugin <= 4.6.3 versions.

CVE ID : CVE-2023-32108
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/albo-pretorio-on-line/wordpress-albo-pretorio-on-line-plugin-4-6-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32109

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio Scimone Albo Pretorio On line plugin <= 4.6.3 versions.

CVE ID : CVE-2023-32109
Source : audit@patchstack.com
Score CVSS : 7.1

Références :
https://patchstack.com/database/vulnerability/albo-pretorio-on-line/wordpress-albo-pretorio-on-line-plugin-4-6-3-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


(41) Vulnérabilité(s) MEDIUM [4.0, 6.9]

Source : huntr.dev

Vulnérabilité ID : CVE-2023-4422

Première publication le : 18-08-2023 19:15:13
Dernière modification le : 18-08-2023 20:11:33

Description :
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.

CVE ID : CVE-2023-4422
Source : security@huntr.dev
Score CVSS : 6.8

Références :
https://github.com/cockpit-hq/cockpit/commit/b8dad5e070608bb5e4ec58fabbee101b5af737cf | source : security@huntr.dev
https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e | source : security@huntr.dev

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4455

Première publication le : 21-08-2023 10:15:10
Dernière modification le : 21-08-2023 12:47:08

Description :
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.

CVE ID : CVE-2023-4455
Source : security@huntr.dev
Score CVSS : 6.5

Références :
https://github.com/wallabag/wallabag/commit/ffcc5c9062fcc8cd922d7d6d65edbe5efae96806 | source : security@huntr.dev
https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a | source : security@huntr.dev

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-4453

Première publication le : 21-08-2023 10:15:09
Dernière modification le : 21-08-2023 12:47:08

Description :
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.6.8.

CVE ID : CVE-2023-4453
Source : security@huntr.dev
Score CVSS : 6.4

Références :
https://github.com/pimcore/pimcore/commit/234c0c02ea7502071b00ab673fbe4a6ac253080e | source : security@huntr.dev
https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993 | source : security@huntr.dev

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4451

Première publication le : 20-08-2023 15:15:29
Dernière modification le : 21-08-2023 12:47:18

Description :
Cross-site Scripting (XSS) - Reflected in GitHub repository cockpit-hq/cockpit prior to 2.6.4.

CVE ID : CVE-2023-4451
Source : security@huntr.dev
Score CVSS : 6.1

Références :
https://github.com/cockpit-hq/cockpit/commit/30609466c817e39f9de1871559603e93cd4d0d0c | source : security@huntr.dev
https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa | source : security@huntr.dev

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-4434

Première publication le : 20-08-2023 01:15:10
Dernière modification le : 21-08-2023 12:47:18

Description :
Missing Authorization in GitHub repository hamza417/inure prior to build88.

CVE ID : CVE-2023-4434
Source : security@huntr.dev
Score CVSS : 5.1

Références :
https://github.com/hamza417/inure/commit/2176af74ca3a81fd001e6cc8eea5a8306f484fbb | source : security@huntr.dev
https://huntr.dev/bounties/19e68377-e071-4a8e-aa4c-cd84a426602e | source : security@huntr.dev

Vulnérabilité : CWE-862


Vulnérabilité ID : CVE-2023-4454

Première publication le : 21-08-2023 10:15:09
Dernière modification le : 21-08-2023 12:47:08

Description :
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.6.3.

CVE ID : CVE-2023-4454
Source : security@huntr.dev
Score CVSS : 4.3

Références :
https://github.com/wallabag/wallabag/commit/78b0b55c40511e1f22d5bbb4897aa10fca68441c | source : security@huntr.dev
https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299 | source : security@huntr.dev

Vulnérabilité : CWE-352


Source : github.com

Vulnérabilité ID : CVE-2023-40174

Première publication le : 18-08-2023 22:15:11
Dernière modification le : 20-08-2023 00:48:59

Description :
Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. Insufficient session expiration is a web application security vulnerability that occurs when a web application does not properly manage the lifecycle of a user's session. Social media skeleton releases prior to 1.0.5 did not properly limit manage user session lifecycles. This issue has been addressed in version 1.0.5 and users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-40174
Source : security-advisories@github.com
Score CVSS : 6.8

Références :
https://github.com/fobybus/social-media-skeleton/commit/99738b2cc5efb6a5739161c931daa43f99431e5a | source : security-advisories@github.com
https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-cr5c-ggwq-g4hq | source : security-advisories@github.com

Vulnérabilité : CWE-613


Vulnérabilité ID : CVE-2023-40172

Première publication le : 18-08-2023 22:15:11
Dernière modification le : 20-08-2023 00:48:59

Description :
Social media skeleton is an uncompleted/framework social media project implemented using a php, css ,javascript and html. A Cross-site request forgery (CSRF) attack is a type of malicious attack whereby an attacker tricks a victim into performing an action on a website that they do not intend to do. This can be done by sending the victim a malicious link or by exploiting a vulnerability in the website. Prior to version 1.0.5 Social media skeleton did not properly restrict CSRF attacks. This has been addressed in version 1.0.5 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE ID : CVE-2023-40172
Source : security-advisories@github.com
Score CVSS : 6.5

Références :
https://github.com/fobybus/social-media-skeleton/commit/344d798e82d6cc39844962c6d3cb2560f5907848 | source : security-advisories@github.com
https://github.com/fobybus/social-media-skeleton/security/advisories/GHSA-873h-pqjx-3pwg | source : security-advisories@github.com

Vulnérabilité : CWE-352


Source : patchstack.com

Vulnérabilité ID : CVE-2023-32103

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Theme Palace TP Education plugin <= 4.4 versions.

CVE ID : CVE-2023-32103
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/tp-education/wordpress-tp-education-plugin-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-29387

Première publication le : 18-08-2023 15:15:09
Dernière modification le : 18-08-2023 16:39:17

Description :
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Julien Crego Manager for Icomoon plugin <= 2.0 versions.

CVE ID : CVE-2023-29387
Source : audit@patchstack.com
Score CVSS : 6.5

Références :
https://patchstack.com/database/vulnerability/manager-for-icomoon/wordpress-manager-for-icommon-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-30875

Première publication le : 18-08-2023 08:15:08
Dernière modification le : 18-08-2023 12:43:51

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in All My Web Needs Logo Scheduler plugin <= 1.2.0 versions.

CVE ID : CVE-2023-30875
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/logo-scheduler-great-for-holidays-events-and-more/wordpress-logo-scheduler-great-for-holidays-events-and-more-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-31228

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace plugin <= 1.3.0 versions.

CVE ID : CVE-2023-31228
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/cm-on-demand-search-and-replace/wordpress-cm-on-demand-search-and-replace-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-31232

Première publication le : 18-08-2023 14:15:22
Dernière modification le : 18-08-2023 15:06:49

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in David Artiss Plugins List plugin <= 2.5 versions.

CVE ID : CVE-2023-31232
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/plugins-list/wordpress-plugins-list-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32130

Première publication le : 18-08-2023 16:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Daniel Powney Multi Rating plugin <= 5.0.6 versions.

CVE ID : CVE-2023-32130
Source : audit@patchstack.com
Score CVSS : 5.9

Références :
https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-scripting-xss?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-32122

Première publication le : 18-08-2023 16:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spiffy Plugins Spiffy Calendar plugin <= 4.9.3 versions.

CVE ID : CVE-2023-32122
Source : audit@patchstack.com
Score CVSS : 5.8

Références :
https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnérabilité : CWE-79


Source : redhat.com

Vulnérabilité ID : CVE-2023-4459

Première publication le : 21-08-2023 19:15:09
Dernière modification le : 21-08-2023 19:15:09

Description :
A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.

CVE ID : CVE-2023-4459
Source : secalert@redhat.com
Score CVSS : 6.5

Références :
https://access.redhat.com/security/cve/CVE-2023-4459 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2219268 | source : secalert@redhat.com
https://github.com/torvalds/linux/commit/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd | source : secalert@redhat.com


Vulnérabilité ID : CVE-2023-4456

Première publication le : 21-08-2023 17:15:50
Dernière modification le : 21-08-2023 18:35:09

Description :
A flaw was found in openshift-logging LokiStack. The key used for caching is just the token, which is too broad. This issue allows a user with a token valid for one action to execute other actions as long as the authorization allowing the original action is still cached.

CVE ID : CVE-2023-4456
Source : secalert@redhat.com
Score CVSS : 5.7

Références :
https://access.redhat.com/security/cve/CVE-2023-4456 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2233087 | source : secalert@redhat.com


Source : vuldb.com

Vulnérabilité ID : CVE-2023-4407

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 21-08-2023 19:15:08

Description :
A vulnerability classified as critical was found in Codecanyon Credit Lite 1.5.4. Affected by this vulnerability is an unknown functionality of the file /portal/reports/account_statement of the component POST Request Handler. The manipulation of the argument date1/date2 leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-237511.

CVE ID : CVE-2023-4407
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQL-Injection.html | source : cna@vuldb.com
https://vuldb.com/?ctiid.237511 | source : cna@vuldb.com
https://vuldb.com/?id.237511 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4409

Première publication le : 18-08-2023 13:15:09
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability, which was classified as critical, has been found in NBS&HappySoftWeChat 1.1.6. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237512.

CVE ID : CVE-2023-4409
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/ApricityXX/cve/blob/main/upload/upload.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237512 | source : cna@vuldb.com
https://vuldb.com/?id.237512 | source : cna@vuldb.com

Vulnérabilité : CWE-434


Vulnérabilité ID : CVE-2023-4410

Première publication le : 18-08-2023 14:15:34
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023. This affects the function setDiagnosisCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237513 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4410
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237513 | source : cna@vuldb.com
https://vuldb.com/?id.237513 | source : cna@vuldb.com

Vulnérabilité : CWE-78


Vulnérabilité ID : CVE-2023-4411

Première publication le : 18-08-2023 14:15:35
Dernière modification le : 18-08-2023 15:06:49

Description :
A vulnerability has been found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-237514 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4411
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237514 | source : cna@vuldb.com
https://vuldb.com/?id.237514 | source : cna@vuldb.com

Vulnérabilité : CWE-78


Vulnérabilité ID : CVE-2023-4412

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237515. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4412
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237515 | source : cna@vuldb.com
https://vuldb.com/?id.237515 | source : cna@vuldb.com

Vulnérabilité : CWE-78


Vulnérabilité ID : CVE-2023-4414

Première publication le : 18-08-2023 16:15:11
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237517 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-4414
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/RCEraser/cve/blob/main/S85F.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237517 | source : cna@vuldb.com
https://vuldb.com/?id.237517 | source : cna@vuldb.com

Vulnérabilité : CWE-77


Vulnérabilité ID : CVE-2023-4436

Première publication le : 20-08-2023 22:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability, which was classified as critical, has been found in SourceCodester Inventory Management System 1.0. This issue affects some unknown processing of the file app/action/edit_update.php. The manipulation of the argument user_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237557 was assigned to this vulnerability.

CVE ID : CVE-2023-4436
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/E1CHO/cve_hub/blob/main/PUBLIC%20CVE%20HUB/Free%20and%20Open%20Source%20inventory%20management%20system%20-%20vuln%201.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.237557 | source : cna@vuldb.com
https://vuldb.com/?id.237557 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4437

Première publication le : 20-08-2023 22:15:11
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability, which was classified as critical, was found in SourceCodester Inventory Management System 1.0. Affected is an unknown function of the file app/ajax/search_sell_paymen_report.php. The manipulation of the argument customer leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-237558 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4437
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/E1CHO/cve_hub/blob/main/PUBLIC%20CVE%20HUB/Free%20and%20Open%20Source%20inventory%20management%20system%20-%20vuln%202.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.237558 | source : cna@vuldb.com
https://vuldb.com/?id.237558 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4438

Première publication le : 20-08-2023 23:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability has been found in SourceCodester Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file app/ajax/search_sales_report.php. The manipulation of the argument customer leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237559.

CVE ID : CVE-2023-4438
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/E1CHO/cve_hub/blob/main/PUBLIC%20CVE%20HUB/Free%20and%20Open%20Source%20inventory%20management%20system%20-%20vuln%203.pdf | source : cna@vuldb.com
https://vuldb.com/?ctiid.237559 | source : cna@vuldb.com
https://vuldb.com/?id.237559 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4440

Première publication le : 20-08-2023 23:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0. It has been classified as critical. This affects an unknown part of the file appointment.php. The manipulation of the argument sheduledate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237561 was assigned to this vulnerability.

CVE ID : CVE-2023-4440
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/CookedMelon/cve/tree/master/hospital/patient | source : cna@vuldb.com
https://vuldb.com/?ctiid.237561 | source : cna@vuldb.com
https://vuldb.com/?id.237561 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4441

Première publication le : 21-08-2023 00:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /patient/appointment.php. The manipulation of the argument sheduledate leads to sql injection. The attack can be initiated remotely. VDB-237562 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4441
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://vuldb.com/?ctiid.237562 | source : cna@vuldb.com
https://vuldb.com/?id.237562 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4442

Première publication le : 21-08-2023 00:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability was found in SourceCodester Free Hospital Management System for Small Practices 1.0. It has been rated as critical. This issue affects some unknown processing of the file \vm\patient\booking-complete.php. The manipulation of the argument userid/apponum/scheduleid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237563.

CVE ID : CVE-2023-4442
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/CookedMelon/cve/tree/master/hospital/patient-book | source : cna@vuldb.com
https://vuldb.com/?ctiid.237563 | source : cna@vuldb.com
https://vuldb.com/?id.237563 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4443

Première publication le : 21-08-2023 01:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability classified as critical has been found in SourceCodester Free Hospital Management System for Small Practices 1.0/5.0.12. Affected is an unknown function of the file vm\doctor\edit-doc.php. The manipulation of the argument id00/nic/oldemail/email/spec/Tele leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237564.

CVE ID : CVE-2023-4443
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/CookedMelon/cve/tree/master/hospital/doctor-edit | source : cna@vuldb.com
https://vuldb.com/?ctiid.237564 | source : cna@vuldb.com
https://vuldb.com/?id.237564 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4444

Première publication le : 21-08-2023 01:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability classified as critical was found in SourceCodester Free Hospital Management System for Small Practices 1.0. Affected by this vulnerability is an unknown functionality of the file vm\patient\edit-user.php. The manipulation of the argument id00/nic/oldemail/email/spec/Tele leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237565 was assigned to this vulnerability.

CVE ID : CVE-2023-4444
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/CookedMelon/cve/tree/master/hospital/patient-edit | source : cna@vuldb.com
https://vuldb.com/?ctiid.237565 | source : cna@vuldb.com
https://vuldb.com/?id.237565 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4445

Première publication le : 21-08-2023 01:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability, which was classified as critical, has been found in Mini-Tmall up to 20230811. Affected by this issue is some unknown functionality of the file product/1/1?test=1&test2=2&. The manipulation of the argument orderBy leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237566 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4445
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/FFR66/Mini-Tmall_SQL/blob/main/README.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237566 | source : cna@vuldb.com
https://vuldb.com/?id.237566 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4447

Première publication le : 21-08-2023 02:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. This vulnerability affects unknown code of the file admin/article-chat.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237568.

CVE ID : CVE-2023-4447
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/OpenRapid/rapidcms/issues/4 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237568 | source : cna@vuldb.com
https://vuldb.com/?id.237568 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4448

Première publication le : 21-08-2023 02:15:10
Dernière modification le : 21-08-2023 12:47:08

Description :
A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.

CVE ID : CVE-2023-4448
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe#diff-fc57d4c69cf5912c6edb5233c6df069a91106ebd481c115faf1ea124478b26d0 | source : cna@vuldb.com
https://github.com/OpenRapid/rapidcms/issues/5 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237569 | source : cna@vuldb.com
https://vuldb.com/?id.237569 | source : cna@vuldb.com

Vulnérabilité : CWE-640


Vulnérabilité ID : CVE-2023-4449

Première publication le : 21-08-2023 02:15:10
Dernière modification le : 21-08-2023 12:47:08

Description :
A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php?page=member. The manipulation of the argument columns[0][data] leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-237570 is the identifier assigned to this vulnerability.

CVE ID : CVE-2023-4449
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/Jacky-Y/vuls/blob/main/README.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237570 | source : cna@vuldb.com
https://vuldb.com/?id.237570 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4450

Première publication le : 21-08-2023 03:15:13
Dernière modification le : 21-08-2023 12:47:08

Description :
A vulnerability was found in jeecgboot JimuReport up to 1.6.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Template Handler. The manipulation leads to injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.6.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-237571.

CVE ID : CVE-2023-4450
Source : cna@vuldb.com
Score CVSS : 6.3

Références :
https://github.com/keecth/bug/blob/main/jimureport%20ssti(RCE).md | source : cna@vuldb.com
https://vuldb.com/?ctiid.237571 | source : cna@vuldb.com
https://vuldb.com/?id.237571 | source : cna@vuldb.com

Vulnérabilité : CWE-74


Vulnérabilité ID : CVE-2023-4446

Première publication le : 21-08-2023 01:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability, which was classified as critical, was found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file template/default/category.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237567.

CVE ID : CVE-2023-4446
Source : cna@vuldb.com
Score CVSS : 5.5

Références :
https://github.com/OpenRapid/rapidcms/issues/3 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237567 | source : cna@vuldb.com
https://vuldb.com/?id.237567 | source : cna@vuldb.com

Vulnérabilité : CWE-89


Vulnérabilité ID : CVE-2023-4439

Première publication le : 20-08-2023 23:15:10
Dernière modification le : 21-08-2023 12:47:13

Description :
A vulnerability was found in SourceCodester Card Holder Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Minus Value Handler. The manipulation leads to improper validation of specified quantity in input. The attack may be launched remotely. The identifier of this vulnerability is VDB-237560.

CVE ID : CVE-2023-4439
Source : cna@vuldb.com
Score CVSS : 4.3

Références :
https://vuldb.com/?ctiid.237560 | source : cna@vuldb.com
https://vuldb.com/?id.237560 | source : cna@vuldb.com

Vulnérabilité : CWE-1284


Source : starlabs.sg

Vulnérabilité ID : CVE-2023-2971

Première publication le : 19-08-2023 06:15:47
Dernière modification le : 20-08-2023 00:48:59

Description :
Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.

CVE ID : CVE-2023-2971
Source : info@starlabs.sg
Score CVSS : 6.3

Références :
https://starlabs.sg/advisories/23/23-2971/ | source : info@starlabs.sg

Vulnérabilité : CWE-22


Source : google.com

Vulnérabilité ID : CVE-2023-3481

Première publication le : 21-08-2023 11:15:07
Dernière modification le : 21-08-2023 12:47:08

Description :
Critters versions 0.0.17-0.0.19 have an issue when parsing the HTML, which leads to a potential cross-site scripting (XSS) bug. We recommend upgrading to version 0.0.20 of the extension.

CVE ID : CVE-2023-3481
Source : cve-coordination@google.com
Score CVSS : 5.7

Références :
https://github.com/GoogleChromeLabs/critters/security/advisories/GHSA-cx3j-qqxj-9597 | source : cve-coordination@google.com

Vulnérabilité : CWE-116
Vulnérabilité : CWE-80


Source : wordfence.com

Vulnérabilité ID : CVE-2023-4040

Première publication le : 18-08-2023 07:15:09
Dernière modification le : 18-08-2023 12:43:51

Description :
The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the eh_callback_handler function in versions up to, and including, 3.7.9. This makes it possible for unauthenticated attackers to modify the order status of arbitrary WooCommerce orders.

CVE ID : CVE-2023-4040
Source : security@wordfence.com
Score CVSS : 5.3

Références :
https://plugins.trac.wordpress.org/changeset/2954934/ | source : security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/ef543c61-2acc-4b72-81ff-883960d4c7c3?source=cve | source : security@wordfence.com

Vulnérabilité : CWE-862


(2) Vulnérabilité(s) LOW [0.1, 3.9]

Source : microsoft.com

Vulnérabilité ID : CVE-2023-38158

Première publication le : 21-08-2023 20:15:08
Dernière modification le : 21-08-2023 20:15:08

Description :
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

CVE ID : CVE-2023-38158
Source : secure@microsoft.com
Score CVSS : 3.1

Références :
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38158 | source : secure@microsoft.com


Source : vuldb.com

Vulnérabilité ID : CVE-2023-4413

Première publication le : 18-08-2023 15:15:10
Dernière modification le : 18-08-2023 16:39:17

Description :
A vulnerability was found in rkhunter Rootkit Hunter 1.4.4/1.4.6. It has been classified as problematic. Affected is an unknown function of the file /var/log/rkhunter.log. The manipulation leads to sensitive information in log files. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237516.

CVE ID : CVE-2023-4413
Source : cna@vuldb.com
Score CVSS : 2.5

Références :
https://gist.github.com/MatheuZSecurity/16ef0219db8f85f49f945a25d5eb42d7 | source : cna@vuldb.com
https://vuldb.com/?ctiid.237516 | source : cna@vuldb.com
https://vuldb.com/?id.237516 | source : cna@vuldb.com
https://youtu.be/etHt1TNAgs8 | source : cna@vuldb.com

Vulnérabilité : CWE-532


(73) Vulnérabilité(s) NO SCORE [0.0, 0.0]

Source : mitre.org

Vulnérabilité ID : CVE-2023-39125

Première publication le : 18-08-2023 00:15:10
Dernière modification le : 18-08-2023 12:43:51

Description :
NTSC-CRT 2.2.1 has an integer overflow and out-of-bounds write in loadBMP in bmp_rw.c because a file's width, height, and BPP are not validated. NOTE: the vendor's perspective is "this main application was not intended to be a well tested program, it's just something to demonstrate it works and for the user to see how to integrate it into their own programs."

CVE ID : CVE-2023-39125
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/LMP88959/NTSC-CRT/issues/32 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39665

Première publication le : 18-08-2023 03:15:21
Dernière modification le : 18-08-2023 12:43:51

Description :
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the acStack_50 parameter.

CVE ID : CVE-2023-39665
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L-bufferoverflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39666

Première publication le : 18-08-2023 03:15:21
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-842 fw_revA_1-02_eu_multi_20151008 was discovered to contain multiple buffer overflows in the fgets function via the acStack_120 and acStack_220 parameters.

CVE ID : CVE-2023-39666
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-842%20buffer%20overflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39667

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the FUN_0000acb4 function.

CVE ID : CVE-2023-39667
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20httpd-Improper%20Input%20Validation.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39668

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
** UNSUPPORTED WHEN ASSIGNED ** D-Link DIR-868L fw_revA_1-12_eu_multi_20170316 was discovered to contain a buffer overflow via the param_2 parameter in the inet_ntoa() function.

CVE ID : CVE-2023-39668
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR-868L%20Buffer%20overflow%202.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39669

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-880 A1_FW107WWb08 was discovered to contain a NULL pointer dereference in the function FUN_00010824.

CVE ID : CVE-2023-39669
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/880%20unchecked%20return%20value.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39670

Première publication le : 18-08-2023 03:15:22
Dernière modification le : 18-08-2023 12:43:51

Description :
Tenda AC6 _US_AC6V1.0BR_V15.03.05.16 was discovered to contain a buffer overflow via the function fgets.

CVE ID : CVE-2023-39670
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/AC6%20buffer%20overflow.md | source : cve@mitre.org
https://www.tendacn.com/download/list-3.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39671

Première publication le : 18-08-2023 03:15:23
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function FUN_0001be68.

CVE ID : CVE-2023-39671
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffer%20overflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39672

Première publication le : 18-08-2023 03:15:23
Dernière modification le : 18-08-2023 12:43:51

Description :
Tenda WH450 v1.0.0.18 was discovered to contain a buffer overflow via the function fgets.

CVE ID : CVE-2023-39672
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/WH450%20buffer%20overflow.md | source : cve@mitre.org
https://www.tendacn.com/download/list-3.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39673

Première publication le : 18-08-2023 03:15:24
Dernière modification le : 18-08-2023 12:43:51

Description :
Tenda AC15 V1.0BR_V15.03.05.18_multi_TD01 was discovered to contain a buffer overflow via the function FUN_00010e34().

CVE ID : CVE-2023-39673
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/Tenda/AC15%20Impoper%20Input%20Validation.md | source : cve@mitre.org
https://www.tendacn.com/download/list-3.html | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39674

Première publication le : 18-08-2023 03:15:24
Dernière modification le : 18-08-2023 12:43:51

Description :
D-Link DIR-880 A1_FW107WWb08 was discovered to contain a buffer overflow via the function fgets.

CVE ID : CVE-2023-39674
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/Davidteeri/Bug-Report/blob/main/D-Link/DIR880%20buffe%20overflow.md | source : cve@mitre.org
https://support.dlink.com/ | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-27576

Première publication le : 18-08-2023 15:15:09
Dernière modification le : 18-08-2023 16:39:17

Description :
An issue was discovered in phpList 3.6.12. Due to an access error, it was possible to manipulate and edit data of the system's super admin, allowing one to perform an account takeover of the user with super-admin permission.

CVE ID : CVE-2023-27576
Source : cve@mitre.org
Score CVSS : /

Références :
https://cupc4k3.lol/cve-2023-27576-hacking-phplist-how-i-gained-super-admin-access-44c7c90d82da | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-27471

Première publication le : 18-08-2023 19:15:12
Dernière modification le : 18-08-2023 20:11:33

Description :
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. UEFI implementations do not correctly protect and validate information contained in the 'MeSetup' UEFI variable. On some systems, this variable can be overwritten using operating system APIs. Exploitation of this vulnerability could potentially lead to denial of service for the platform.

CVE ID : CVE-2023-27471
Source : cve@mitre.org
Score CVSS : /

Références :
https://www.insyde.com/security-pledge/SA-2023036 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38890

Première publication le : 18-08-2023 19:15:12
Dernière modification le : 18-08-2023 20:11:33

Description :
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.

CVE ID : CVE-2023-38890
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/akshadjoshi/CVE-2023-38890 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38910

Première publication le : 18-08-2023 19:15:13
Dernière modification le : 21-08-2023 12:15:08

Description :
CSZ CMS 1.3.0 is vulnerable to cross-site scripting (XSS), which allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered in the 'Carousel Wiget' section and choosing our carousel widget created above, in 'Photo URL' and 'YouTube URL' plugin.

CVE ID : CVE-2023-38910
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38911

Première publication le : 18-08-2023 19:15:13
Dernière modification le : 21-08-2023 12:15:09

Description :
A Cross-Site Scripting (XSS) vulnerability in CSZ CMS 1.3.0 allows attackers to execute arbitrary code via a crafted payload to the Gallery parameter in the YouTube URL fields.

CVE ID : CVE-2023-38911
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/desencrypt/CVE/blob/main/CVE-2023-38911/Readme.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38839

Première publication le : 18-08-2023 22:15:09
Dernière modification le : 20-08-2023 00:48:59

Description :
SQL injection vulnerability in Kidus Minimati v.1.0.0 allows a remote attacker to obtain sensitive information via theID parameter in the fulldelete.php component.

CVE ID : CVE-2023-38839
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/kiduswb/minimati/issues/2 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40711

Première publication le : 20-08-2023 01:15:08
Dernière modification le : 21-08-2023 12:47:18

Description :
Veilid before 0.1.9 does not check the size of uncompressed data during decompression upon an envelope receipt, which allows remote attackers to cause a denial of service (out-of-memory abort) via crafted packet data, as exploited in the wild in August 2023.

CVE ID : CVE-2023-40711
Source : cve@mitre.org
Score CVSS : /

Références :
https://gitlab.com/veilid/veilid/-/blob/main/CHANGELOG.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-37369

Première publication le : 20-08-2023 07:15:08
Dernière modification le : 21-08-2023 12:47:18

Description :
In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.

CVE ID : CVE-2023-37369
Source : cve@mitre.org
Score CVSS : /

Références :
https://bugreports.qt.io/browse/QTBUG-114829 | source : cve@mitre.org
https://codereview.qt-project.org/c/qt/qtbase/+/455027 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-37250

Première publication le : 20-08-2023 08:15:09
Dernière modification le : 21-08-2023 19:15:08

Description :
Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.

CVE ID : CVE-2023-37250
Source : cve@mitre.org
Score CVSS : /

Références :
https://support.parsec.app/hc/en-us/articles/18311425588237-CVE-2023-37250 | source : cve@mitre.org
https://unity3d.com | source : cve@mitre.org
https://www.kb.cert.org/vuls/id/287122 | source : cve@mitre.org


Vulnérabilité ID : CVE-2022-24989

Première publication le : 20-08-2023 18:15:09
Dernière modification le : 21-08-2023 12:47:18

Description :
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.

CVE ID : CVE-2022-24989
Source : cve@mitre.org
Score CVSS : /

Références :
https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990 | source : cve@mitre.org
https://forum.terra-master.com/en/viewforum.php?f=28 | source : cve@mitre.org
https://github.com/0xf4n9x/CVE-2022-24990 | source : cve@mitre.org
https://octagon.net/blog/2022/03/07/cve-2022-24990-terrmaster-tos-unauthenticated-remote-command-execution-via-php-object-instantiation | source : cve@mitre.org
https://packetstormsecurity.com/files/172904 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-36674

Première publication le : 20-08-2023 18:15:09
Dernière modification le : 21-08-2023 12:47:18

Description :
An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. It is possible to bypass the Bad image list (aka badFile) by using the thumb parameter (aka Manualthumb) of the File syntax.

CVE ID : CVE-2023-36674
Source : cve@mitre.org
Score CVSS : /

Références :
https://phabricator.wikimedia.org/T335612 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39784

Première publication le : 21-08-2023 01:15:08
Dernière modification le : 21-08-2023 12:47:13

Description :
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the list parameter in the save_virtualser_data function.

CVE ID : CVE-2023-39784
Source : cve@mitre.org
Score CVSS : /

Références :
http://tenda.com | source : cve@mitre.org
https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39785

Première publication le : 21-08-2023 01:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the list parameter in the set_qosMib_list function.

CVE ID : CVE-2023-39785
Source : cve@mitre.org
Score CVSS : /

Références :
http://tenda.com | source : cve@mitre.org
https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/2 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39786

Première publication le : 21-08-2023 01:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the time parameter in the sscanf function.

CVE ID : CVE-2023-39786
Source : cve@mitre.org
Score CVSS : /

Références :
http://tenda.com | source : cve@mitre.org
https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/3 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39807

Première publication le : 21-08-2023 01:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
N.V.K.INTER CO., LTD. (NVK) iBSG v3.5 was discovered to contain a SQL injection vulnerability via the a_passwd parameter at /portal/user-register.php.

CVE ID : CVE-2023-39807
Source : cve@mitre.org
Score CVSS : /

Références :
http://ibsg.com | source : cve@mitre.org
http://nvkinter.com | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39808

Première publication le : 21-08-2023 01:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
N.V.K.INTER CO., LTD. (NVK) iBSG v3.5 was discovered to contain a hardcoded root password which allows attackers to login with root privileges via the SSH service.

CVE ID : CVE-2023-39808
Source : cve@mitre.org
Score CVSS : /

Références :
http://ibsg.com | source : cve@mitre.org
http://nvkinter.com | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39809

Première publication le : 21-08-2023 01:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
N.V.K.INTER CO., LTD. (NVK) iBSG v3.5 was discovered to contain a command injection vulnerability via the system_hostname parameter at /manage/network-basic.php.

CVE ID : CVE-2023-39809
Source : cve@mitre.org
Score CVSS : /

Références :
http://ibsg.com | source : cve@mitre.org
http://nvkinter.com | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39617

Première publication le : 21-08-2023 02:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
TOTOLINK X5000R_V9.1.0cu.2089_B20211224 and X5000R_V9.1.0cu.2350_B20230313 were discovered to contain a remote code execution (RCE) vulnerability via the lang parameter in the setLanguageCfg function.

CVE ID : CVE-2023-39617
Source : cve@mitre.org
Score CVSS : /

Références :
https://sedate-class-393.notion.site/TOTOlink-ee7eb0d4cd5d43e9983296200371eff1?pvs=4 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39618

Première publication le : 21-08-2023 02:15:09
Dernière modification le : 21-08-2023 12:47:13

Description :
TOTOLINK X5000R B20210419 was discovered to contain a remote code execution (RCE) vulnerability via the setTracerouteCfg interface.

CVE ID : CVE-2023-39618
Source : cve@mitre.org
Score CVSS : /

Références :
https://sedate-class-393.notion.site/TOTOlink-3567fd9f93d84afab0d81cd8c063f9a1?pvs=4 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39745

Première publication le : 21-08-2023 03:15:11
Dernière modification le : 21-08-2023 12:47:08

Description :
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.

CVE ID : CVE-2023-39745
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/16/TP-Link%20WR940N%20WR941ND%20WR841N%20wireless%20router%20userRpmAccessCtrlAccessRulesRpm%20buffer%20read%20out-of-bounds%20vulnerability.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39747

Première publication le : 21-08-2023 03:15:11
Dernière modification le : 21-08-2023 12:47:08

Description :
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.

CVE ID : CVE-2023-39747
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/17/TP-Link%20WR841N%20wireless%20router%20WlanSecurityRpm%20Stack%20Overflow%20vulnerability.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39748

Première publication le : 21-08-2023 03:15:11
Dernière modification le : 21-08-2023 12:47:08

Description :
An issue in the component /userRpm/NetworkCfgRpm of TP-Link TL-WR1041N V2 allows attackers to cause a Denial of Service (DoS) via a crafted GET request.

CVE ID : CVE-2023-39748
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/19/TL_WR1041N_NetworkCfgRpm_denial_of_service_vulnerability.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39749

Première publication le : 21-08-2023 03:15:11
Dernière modification le : 21-08-2023 12:47:08

Description :
D-Link DAP-2660 v1.13 was discovered to contain a buffer overflow via the component /adv_resource. This vulnerability is exploited via a crafted GET request.

CVE ID : CVE-2023-39749
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/a101e-IoTvul/iotvul/blob/main/d-link/2/D-Link%20DAP-2660%20adv_resource.md | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39750

Première publication le : 21-08-2023 03:15:11
Dernière modification le : 21-08-2023 12:47:08

Description :
D-Link DAP-2660 v1.13 was discovered to contain a buffer overflow via the f_ipv6_enable parameter at /bsc_ipv6. This vulnerability is exploited via a crafted POST request.

CVE ID : CVE-2023-39750
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/a101e-IoTvul/iotvul/blob/main/d-link/1/D-Link%20DAP-2660%20bsc_ipv6.md | source : cve@mitre.org
https://www.dlink.com/en/security-bulletin/ | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39751

Première publication le : 21-08-2023 03:15:11
Dernière modification le : 21-08-2023 12:47:08

Description :
TP-Link TL-WR941ND V6 were discovered to contain a buffer overflow via the pSize parameter at /userRpm/PingIframeRpm.

CVE ID : CVE-2023-39751
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/20/WR941ND_userRpm_PingIframeRpm_buffer_write_out-of-bounds_vulnerability.md | source : cve@mitre.org


Vulnérabilité ID : CVE-2020-28715

Première publication le : 21-08-2023 12:15:07
Dernière modification le : 21-08-2023 12:47:08

Description :
An issue was discovered in kdmserver service in LeEco LeTV X43 version V2401RCN02C080080B04121S, allows attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS).

CVE ID : CVE-2020-28715
Source : cve@mitre.org
Score CVSS : /

Références :
http://leeco.com | source : cve@mitre.org
https://www.cnvd.org.cn/flaw/show/2602948 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38899

Première publication le : 21-08-2023 12:15:08
Dernière modification le : 21-08-2023 12:47:08

Description :
SQL injection vulnerability in berkaygediz O_Blog v.1.0 allows a local attacker to escalate privileges via the secure_file_priv component.

CVE ID : CVE-2023-38899
Source : cve@mitre.org
Score CVSS : /

Références :
http://o.com | source : cve@mitre.org
https://github.com/berkaygediz/O_Blog | source : cve@mitre.org
https://github.com/berkaygediz/O_Blog/issues | source : cve@mitre.org
https://github.com/berkaygediz/O_Blog/issues/2 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-31447

Première publication le : 21-08-2023 17:15:46
Dernière modification le : 21-08-2023 18:35:09

Description :
user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.

CVE ID : CVE-2023-31447
Source : cve@mitre.org
Score CVSS : /

Références :
https://draytek.com | source : cve@mitre.org
https://gist.github.com/rrrrrrri/013c9eef64b265af4163478bfcf29ff4 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38836

Première publication le : 21-08-2023 17:15:47
Dernière modification le : 21-08-2023 18:35:09

Description :
File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code via the GIF header component.

CVE ID : CVE-2023-38836
Source : cve@mitre.org
Score CVSS : /

Références :
http://boidcms.com | source : cve@mitre.org
https://github.com/BoidCMS/BoidCMS/issues/27 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38961

Première publication le : 21-08-2023 17:15:47
Dernière modification le : 21-08-2023 18:35:09

Description :
Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c.

CVE ID : CVE-2023-38961
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/jerryscript-project/jerryscript/issues/5092 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-38976

Première publication le : 21-08-2023 17:15:48
Dernière modification le : 21-08-2023 18:35:09

Description :
An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function.

CVE ID : CVE-2023-38976
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/weaviate/weaviate/issues/3258 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39061

Première publication le : 21-08-2023 17:15:48
Dernière modification le : 21-08-2023 18:35:09

Description :
Cross Site Request Forgery (CSRF) vulnerability in Chamilo v.1.11 thru v.1.11.20 allows a remote authenticated privileged attacker to execute arbitrary code.

CVE ID : CVE-2023-39061
Source : cve@mitre.org
Score CVSS : /

Références :
http://chamilo.com | source : cve@mitre.org
https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-123-2023-07-08-Moderate-impact-Moderate-risk-CSRF-through-admin-account-forum-posts | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39094

Première publication le : 21-08-2023 17:15:48
Dernière modification le : 21-08-2023 18:35:09

Description :
Cross Site Scripting vulnerability in ZeroWdd studentmanager v.1.0 allows a remote attacker to execute arbitrary code via the username parameter in the student list function.

CVE ID : CVE-2023-39094
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/ZeroWdd/studentmanager/issues/12 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39106

Première publication le : 21-08-2023 17:15:48
Dernière modification le : 21-08-2023 18:35:09

Description :
An issue in Nacos Group Nacos Spring Project v.1.1.1 and before allows a remote attacker to execute arbitrary code via the SnakeYamls Constructor() component.

CVE ID : CVE-2023-39106
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/nacos-group/nacos-spring-project/issues/314 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-39660

Première publication le : 21-08-2023 17:15:48
Dernière modification le : 21-08-2023 18:35:09

Description :
An issue in Gaberiele Venturi pandasai v.0.8.0 and before allows a remote attacker to execute arbitrary code via a crafted request to the prompt function.

CVE ID : CVE-2023-39660
Source : cve@mitre.org
Score CVSS : /

Références :
https://github.com/gventuri/pandas-ai/issues/399 | source : cve@mitre.org
https://github.com/gventuri/pandas-ai/pull/409 | source : cve@mitre.org


Vulnérabilité ID : CVE-2023-40352

Première publication le : 21-08-2023 19:15:08
Dernière modification le : 21-08-2023 19:15:08

Description :
McAfee Safe Connect before 2.16.1.126 may allow an adversary with system privileges to achieve privilege escalation by loading arbitrary DLLs.

CVE ID : CVE-2023-40352
Source : cve@mitre.org
Score CVSS : /

Références :
https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html | source : cve@mitre.org
https://www.mcafee.com/support/?articleId=TS103462&page=shell&shell=article-view | source : cve@mitre.org


Source : jpcert.or.jp

Vulnérabilité ID : CVE-2023-32626

Première publication le : 18-08-2023 10:15:09
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LAN-W300N/RS all versions, and LAN-W300N/PR5 all versions allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands.

CVE ID : CVE-2023-32626
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-35991

Première publication le : 18-08-2023 10:15:10
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.

CVE ID : CVE-2023-35991
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-38132

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
LAN-W451NGR all versions provided by LOGITEC CORPORATION contains an improper access control vulnerability, which allows an unauthenticated attacker to log in to telnet service.

CVE ID : CVE-2023-38132
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-38576

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an authenticated user to execute arbitrary OS commands on a certain management console.

CVE ID : CVE-2023-38576
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39415

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
Improper authentication vulnerability in Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote unauthenticated attacker to log in to the product's Control Panel and perform an unintended operation.

CVE ID : CVE-2023-39415
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN19661362/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/149/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/150/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39416

Première publication le : 18-08-2023 10:15:11
Dernière modification le : 18-08-2023 12:43:51

Description :
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.

CVE ID : CVE-2023-39416
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN19661362/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/149/ | source : vultures@jpcert.or.jp
https://www.proself.jp/information/150/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39445

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an unauthenticated attacker to execute arbitrary code by sending a specially crafted file to the product's certain management console.

CVE ID : CVE-2023-39445
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39454

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
Buffer overflow vulnerability in WRC-X1800GS-B v1.13 and earlier, WRC-X1800GSA-B v1.13 and earlier, and WRC-X1800GSH-B v1.13 and earlier allows an unauthenticated attacker to execute arbitrary code.

CVE ID : CVE-2023-39454
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230711-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39455

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in ELECOM wireless LAN routers allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-600GHBK-A all versions, WRC-1467GHBK-A all versions, WRC-1900GHBK-A all versions, WRC-733FEBK2-A all versions, WRC-F1167ACF2 all versions, WRC-1467GHBK-S all versions, and WRC-1900GHBK-S all versions.

CVE ID : CVE-2023-39455
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39944

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in WRC-F1167ACF all versions, and WRC-1750GHBK all versions allows an attacker who can access the product to execute an arbitrary OS command by sending a specially crafted request.

CVE ID : CVE-2023-39944
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-40069

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in ELECOM wireless LAN routers allows an attacker who can access the product to execute an arbitrary OS command by sending a specially crafted request. Affected products and versions are as follows: WRC-F1167ACF all versions, WRC-1750GHBK all versions, WRC-1167GHBK2 all versions, WRC-1750GHBK2-I all versions, and WRC-1750GHBK-E all versions.

CVE ID : CVE-2023-40069
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-40072

Première publication le : 18-08-2023 10:15:12
Dernière modification le : 18-08-2023 12:43:51

Description :
OS command injection vulnerability in WAB-S600-PS all versions, and WAB-S300 all versions allows an authenticated user to execute an arbitrary OS command by sending a specially crafted request.

CVE ID : CVE-2023-40072
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/vu/JVNVU91630351/ | source : vultures@jpcert.or.jp
https://www.elecom.co.jp/news/security/20230810-01/ | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39543

Première publication le : 21-08-2023 09:15:09
Dernière modification le : 21-08-2023 12:47:08

Description :
Cross-site scripting vulnerability in LuxCal Web Calendar prior to 5.2.3M (MySQL version) and LuxCal Web Calendar prior to 5.2.3L (SQLite version) allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is using the product.

CVE ID : CVE-2023-39543
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN04876736/ | source : vultures@jpcert.or.jp
https://www.luxsoft.eu/ | source : vultures@jpcert.or.jp
https://www.luxsoft.eu/?download | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-39939

Première publication le : 21-08-2023 09:15:10
Dernière modification le : 21-08-2023 12:47:08

Description :
SQL injection vulnerability in LuxCal Web Calendar prior to 5.2.3M (MySQL version) and LuxCal Web Calendar prior to 5.2.3L (SQLite version) allows a remote unauthenticated attacker to execute arbitrary queries against the database and obtain or alter the information in it.

CVE ID : CVE-2023-39939
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN04876736/ | source : vultures@jpcert.or.jp
https://www.luxsoft.eu/ | source : vultures@jpcert.or.jp
https://www.luxsoft.eu/?download | source : vultures@jpcert.or.jp


Vulnérabilité ID : CVE-2023-40068

Première publication le : 21-08-2023 09:15:10
Dernière modification le : 21-08-2023 12:47:08

Description :
Cross-site scripting vulnerability in Advanced Custom Fields versions 6.1.0 to 6.1.7 and Advanced Custom Fields Pro versions 6.1.0 to 6.1.7 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product with the administrative privilege.

CVE ID : CVE-2023-40068
Source : vultures@jpcert.or.jp
Score CVSS : /

Références :
https://jvn.jp/en/jp/JVN98946408/ | source : vultures@jpcert.or.jp
https://wordpress.org/plugins/advanced-custom-fields/ | source : vultures@jpcert.or.jp
https://www.advancedcustomfields.com/ | source : vultures@jpcert.or.jp
https://www.advancedcustomfields.com/blog/acf-6-1-8/ | source : vultures@jpcert.or.jp


Source : apache.org

Vulnérabilité ID : CVE-2023-40037

Première publication le : 18-08-2023 22:15:10
Dernière modification le : 20-08-2023 00:48:59

Description :
Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection URL validation and introduces validation for additional related properties. Upgrading to Apache NiFi 1.23.1 is the recommended mitigation.

CVE ID : CVE-2023-40037
Source : security@apache.org
Score CVSS : /

Références :
http://www.openwall.com/lists/oss-security/2023/08/18/2 | source : security@apache.org
https://lists.apache.org/thread/bqbjlrs2p5ghh8sbk5nsxb8xpf9l687q | source : security@apache.org
https://nifi.apache.org/security.html#CVE-2023-40037 | source : security@apache.org

Vulnérabilité : CWE-184


Vulnérabilité ID : CVE-2022-46751

Première publication le : 21-08-2023 07:15:33
Dernière modification le : 21-08-2023 12:47:08

Description :
Improper Restriction of XML External Entity Reference, XML Injection (aka Blind XPath Injection) vulnerability in Apache Software Foundation Apache Ivy.This issue affects any version of Apache Ivy prior to 2.5.2. When Apache Ivy prior to 2.5.2 parses XML files - either its own configuration, Ivy files or Apache Maven POMs - it will allow downloading external document type definitions and expand any entity references contained therein when used. This can be used to exfiltrate data, access resources only the machine running Ivy has access to or disturb the execution of Ivy in different ways. Starting with Ivy 2.5.2 DTD processing is disabled by default except when parsing Maven POMs where the default is to allow DTD processing but only to include a DTD snippet shipping with Ivy that is needed to deal with existing Maven POMs that are not valid XML files but are nevertheless accepted by Maven. Access can be be made more lenient via newly introduced system properties where needed. Users of Ivy prior to version 2.5.2 can use Java system properties to restrict processing of external DTDs, see the section about "JAXP Properties for External Access restrictions" inside Oracle's "Java API for XML Processing (JAXP) Security Guide".

CVE ID : CVE-2022-46751
Source : security@apache.org
Score CVSS : /

Références :
https://docs.oracle.com/en/java/javase/13/security/java-api-xml-processing-jaxp-security-guide.html#GUID-94ABC0EE-9DC8-44F0-84AD-47ADD5340477 | source : security@apache.org
https://gitbox.apache.org/repos/asf?p=ant-ivy.git;a=commit;h=2be17bc18b0e1d4123007d579e43ba1a4b6fab3d | source : security@apache.org
https://lists.apache.org/thread/1dj60hg5nr36kjr4p1100dwjrqookps8 | source : security@apache.org
https://lists.apache.org/thread/9gcz4xrsn8c7o9gb377xfzvkb8jltffr | source : security@apache.org

Vulnérabilité : CWE-611
Vulnérabilité : CWE-91


Source : wordfence.com

Vulnérabilité ID : CVE-2022-4367

Première publication le : 21-08-2023 17:15:46
Dernière modification le : 21-08-2023 17:15:46

Description :
** REJECT ** Duplicate, use CVE-2023-4279 instead.

CVE ID : CVE-2022-4367
Source : security@wordfence.com
Score CVSS : /

Références :


Source : hackerone.com

Vulnérabilité ID : CVE-2023-32002

Première publication le : 21-08-2023 17:15:47
Dernière modification le : 21-08-2023 18:35:09

Description :
The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module. This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.

CVE ID : CVE-2023-32002
Source : support@hackerone.com
Score CVSS : /

Références :
https://hackerone.com/reports/1960870 | source : support@hackerone.com


Vulnérabilité ID : CVE-2023-38035

Première publication le : 21-08-2023 17:15:47
Dernière modification le : 21-08-2023 18:35:09

Description :
A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

CVE ID : CVE-2023-38035
Source : support@hackerone.com
Score CVSS : /

Références :
https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface | source : support@hackerone.com


Source : wpscan.com

Vulnérabilité ID : CVE-2023-3366

Première publication le : 21-08-2023 17:15:48
Dernière modification le : 21-08-2023 18:35:09

Description :
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.2 does not have CRSF check when deleting a shipment, allowing attackers to make any logged in user, delete arbitrary shipment via a CSRF attack

CVE ID : CVE-2023-3366
Source : contact@wpscan.com
Score CVSS : /

Références :
https://wpscan.com/vulnerability/b2f06223-9352-4227-ae94-32061e2c5611 | source : contact@wpscan.com

Vulnérabilité : CWE-352


Vulnérabilité ID : CVE-2023-3604

Première publication le : 21-08-2023 17:15:49
Dernière modification le : 21-08-2023 18:35:09

Description :
The Change WP Admin Login WordPress plugin before 1.1.4 discloses the URL of the hidden login page when accessing a crafted URL, bypassing the protection offered.

CVE ID : CVE-2023-3604
Source : contact@wpscan.com
Score CVSS : /

Références :
https://wpscan.com/vulnerability/8f6615e8-f607-4ce4-a0e0-d5fc841ead16 | source : contact@wpscan.com

Vulnérabilité : CWE-203


Vulnérabilité ID : CVE-2023-3667

Première publication le : 21-08-2023 17:15:49
Dernière modification le : 21-08-2023 18:35:09

Description :
The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVE ID : CVE-2023-3667
Source : contact@wpscan.com
Score CVSS : /

Références :
https://wpscan.com/vulnerability/9f2f3f85-6812-46b5-9175-c56f6852afd7 | source : contact@wpscan.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3936

Première publication le : 21-08-2023 17:15:49
Dernière modification le : 21-08-2023 18:35:09

Description :
The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CVE ID : CVE-2023-3936
Source : contact@wpscan.com
Score CVSS : /

Références :
https://wpscan.com/vulnerability/6d09a5d3-046d-47ef-86b4-c024ea09dc0f | source : contact@wpscan.com

Vulnérabilité : CWE-79


Vulnérabilité ID : CVE-2023-3954

Première publication le : 21-08-2023 17:15:50
Dernière modification le : 21-08-2023 18:35:09

Description :
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CVE ID : CVE-2023-3954
Source : contact@wpscan.com
Score CVSS : /

Références :
https://wpscan.com/vulnerability/b463ccbb-2dc1-479f-bc88-becd204b2dc0 | source : contact@wpscan.com

Vulnérabilité : CWE-79


Source : devolutions.net

Vulnérabilité ID : CVE-2023-4373

Première publication le : 21-08-2023 19:15:08
Dernière modification le : 21-08-2023 19:15:08

Description :
Inadequate validation of permissions when employing remote tools and macros within Devolutions Remote Desktop Manager versions 2023.2.19 and earlier permits a user to initiate a connection without proper execution rights via the remote tools feature.

CVE ID : CVE-2023-4373
Source : security@devolutions.net
Score CVSS : /

Références :
https://devolutions.net/security/advisories/DEVO-2023-0015/ | source : security@devolutions.net


Ce site web utilise l'API de la NVD, mais n'est pas approuvé ou certifié par la NVD.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.