Latest vulnerabilities of Thursday, November 9, 2023

Latest vulnerabilities of Thursday, November 9, 2023
https://www.securitricks.com/content/images/size/w600/format/webp/2023/12/VULNERABILITIES-REPORTS-LOGO.png
{{titre}}

Last update performed on 11/09/2023 at 11:57:03 PM

(3) CRITICAL VULNERABILITIES [9.0, 10.0]

Source : mitre.org

Vulnerability ID : CVE-2021-43609

First published on : 09-11-2023 00:15:07
Last modified on : 09-11-2023 13:46:10

Description :
An issue was discovered in Spiceworks Help Desk Server before 1.3.3. A Blind Boolean SQL injection vulnerability within the order_by_for_ticket function in app/models/reporting/database_query.rb allows an authenticated attacker to execute arbitrary SQL commands via the sort parameter. This can be leveraged to leak local files from the host system, leading to remote code execution (RCE) through deserialization of malicious data.

CVE ID : CVE-2021-43609
Source : cve@mitre.org
CVSS Score : 9.9

References :
https://community.spiceworks.com/blogs/help-desk-server-release-notes/3610-1-3-2-1-3-3 | source : cve@mitre.org
https://github.com/d5sec/CVE-2021-43609-POC | source : cve@mitre.org
https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe | source : cve@mitre.org


Source : github.com

Vulnerability ID : CVE-2023-43791

First published on : 09-11-2023 15:15:08
Last modified on : 09-11-2023 17:13:29

Description :
Label Studio is a multi-type data labeling and annotation tool with standardized output format. There is a vulnerability that can be chained within the ORM Leak vulnerability to impersonate any account on Label Studio. An attacker could exploit these vulnerabilities to escalate their privileges from a low privilege user to a Django Super Administrator user. The vulnerability was found to affect versions before `1.8.2`, where a patch was introduced.

CVE ID : CVE-2023-43791
Source : security-advisories@github.com
CVSS Score : 9.8

References :
https://github.com/HumanSignal/label-studio/commit/3d06c5131c15600621e08b06f07d976887cde81b | source : security-advisories@github.com
https://github.com/HumanSignal/label-studio/pull/4690 | source : security-advisories@github.com
https://github.com/HumanSignal/label-studio/releases/tag/1.8.2 | source : security-advisories@github.com
https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m | source : security-advisories@github.com

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-47110

First published on : 09-11-2023 16:15:34
Last modified on : 09-11-2023 17:13:29

Description :
blockreassurance adds an information block aimed at offering helpful information to reassure customers that their store is trustworthy. An ajax function in module blockreassurance allows modifying any value in the configuration table. This vulnerability has been patched in version 5.1.4.

CVE ID : CVE-2023-47110
Source : security-advisories@github.com
CVSS Score : 9.1

References :
https://github.com/PrestaShop/blockreassurance/security/advisories/GHSA-xfm3-hjcc-gv78 | source : security-advisories@github.com

Vulnerability : CWE-284


(8) HIGH VULNERABILITIES [7.0, 8.9]

Source : kaspersky.com

Vulnerability ID : CVE-2023-47610

First published on : 09-11-2023 17:15:08
Last modified on : 09-11-2023 19:32:04

Description :
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a remote unauthenticated attacker to execute arbitrary code on the targeted system by sending a specially crafted SMS message.

CVE ID : CVE-2023-47610
Source : vulnerability@kaspersky.com
CVSS Score : 8.1

References :
https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-23-018-telit-cinterion-thales-gemalto-modules-buffer-copy-without-checking-size-of-input-vulnerability/ | source : vulnerability@kaspersky.com

Vulnerability : CWE-120


Source : gitlab.com

Vulnerability ID : CVE-2023-4379

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
An issue has been discovered in GitLab EE affecting all versions starting from 15.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated.

CVE ID : CVE-2023-4379
Source : cve@gitlab.com
CVSS Score : 8.1

References :
https://gitlab.com/gitlab-org/gitlab/-/issues/415496 | source : cve@gitlab.com

Vulnerability : CWE-284


Source : solarwinds.com

Vulnerability ID : CVE-2023-40054

First published on : 09-11-2023 15:15:07
Last modified on : 09-11-2023 17:13:29

Description :
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226

CVE ID : CVE-2023-40054
Source : psirt@solarwinds.com
CVSS Score : 8.0

References :
https://documentation.solarwinds.com/en/success_center/ncm/content/release_notes/ncm_2023-4-1_release_notes.htm | source : psirt@solarwinds.com
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40054 | source : psirt@solarwinds.com

Vulnerability : CWE-22


Vulnerability ID : CVE-2023-40055

First published on : 09-11-2023 15:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33227

CVE ID : CVE-2023-40055
Source : psirt@solarwinds.com
CVSS Score : 8.0

References :
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-40055 | source : psirt@solarwinds.com

Vulnerability : CWE-22


Source : appcheck-ng.com

Vulnerability ID : CVE-2023-41137

First published on : 09-11-2023 15:15:08
Last modified on : 09-11-2023 17:13:29

Description :
Symmetric encryption used to protect messages between the AppsAnywhere server and client can be broken by reverse engineering the client and used to impersonate the AppsAnywhere server.

CVE ID : CVE-2023-41137
Source : info@appcheck-ng.com
CVSS Score : 8.0

References :
https://docs.appsanywhere.com/appsanywhere/3.1/2023-11-security-advisory | source : info@appcheck-ng.com

Vulnerability : CWE-321


Vulnerability ID : CVE-2023-41138

First published on : 09-11-2023 15:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The AppsAnywhere macOS client-privileged helper can be tricked into executing arbitrary commands with elevated permissions by a local user process.

CVE ID : CVE-2023-41138
Source : info@appcheck-ng.com
CVSS Score : 7.5

References :
https://docs.appsanywhere.com/appsanywhere/3.1/2023-11-security-advisory | source : info@appcheck-ng.com

Vulnerability : CWE-226


Source : redhat.com

Vulnerability ID : CVE-2023-39198

First published on : 09-11-2023 20:15:08
Last modified on : 09-11-2023 20:51:06

Description :
A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

CVE ID : CVE-2023-39198
Source : secalert@redhat.com
CVSS Score : 7.5

References :
https://access.redhat.com/security/cve/CVE-2023-39198 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2218332 | source : secalert@redhat.com

Vulnerability : CWE-416


Source : github.com

Vulnerability ID : CVE-2023-46743

First published on : 09-11-2023 16:15:34
Last modified on : 09-11-2023 17:13:29

Description :
application-collabora is an integration of Collabora Online in XWiki. As part of the application use cases, depending on the rights that a user has over a document, they should be able to open the office attachments files in view or edit mode. Currently, if a user opens an attachment file in edit mode in collabora, this right will be preserved for all future users, until the editing session is closes, even if some of them have only view right. Collabora server is the one issuing this request and it seems that the `userCanWrite` query parameter is cached, even if, for example, token is not. This issue has been patched in version 1.3.

CVE ID : CVE-2023-46743
Source : security-advisories@github.com
CVSS Score : 7.3

References :
https://github.com/xwikisas/application-collabora/security/advisories/GHSA-mvq3-xxg2-rj57 | source : security-advisories@github.com

Vulnerability : CWE-276


(16) MEDIUM VULNERABILITIES [4.0, 6.9]

Source : kaspersky.com

Vulnerability ID : CVE-2023-47612

First published on : 09-11-2023 12:15:07
Last modified on : 09-11-2023 13:46:10

Description :
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.

CVE ID : CVE-2023-47612
Source : vulnerability@kaspersky.com
CVSS Score : 6.8

References :
https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-194-telit-cinterion-thales-gemalto-modules-files-or-directories-accessible-to-external-parties-vulnerability/ | source : vulnerability@kaspersky.com

Vulnerability : CWE-552


Vulnerability ID : CVE-2023-47613

First published on : 09-11-2023 07:15:07
Last modified on : 09-11-2023 13:46:10

Description :
A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system.

CVE ID : CVE-2023-47613
Source : vulnerability@kaspersky.com
CVSS Score : 4.4

References :
https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/ | source : vulnerability@kaspersky.com

Vulnerability : CWE-23


Source : puiterwijk.org

Vulnerability ID : CVE-2023-5544

First published on : 09-11-2023 20:15:09
Last modified on : 09-11-2023 20:51:06

Description :
Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

CVE ID : CVE-2023-5544
Source : patrick@puiterwijk.org
CVSS Score : 6.5

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243443 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451585 | source : patrick@puiterwijk.org

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-5550

First published on : 09-11-2023 20:15:10
Last modified on : 09-11-2023 20:51:06

Description :
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.

CVE ID : CVE-2023-5550
Source : patrick@puiterwijk.org
CVSS Score : 6.5

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243452 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451591 | source : patrick@puiterwijk.org

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-5539

First published on : 09-11-2023 20:15:08
Last modified on : 09-11-2023 20:51:06

Description :
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.

CVE ID : CVE-2023-5539
Source : patrick@puiterwijk.org
CVSS Score : 4.7

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243352 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451580 | source : patrick@puiterwijk.org

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-5540

First published on : 09-11-2023 20:15:09
Last modified on : 09-11-2023 20:51:06

Description :
A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.

CVE ID : CVE-2023-5540
Source : patrick@puiterwijk.org
CVSS Score : 4.7

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243432 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451581 | source : patrick@puiterwijk.org

Vulnerability : CWE-94


Vulnerability ID : CVE-2023-5546

First published on : 09-11-2023 20:15:10
Last modified on : 09-11-2023 20:51:06

Description :
ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

CVE ID : CVE-2023-5546
Source : patrick@puiterwijk.org
CVSS Score : 4.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78971 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243445 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451587 | source : patrick@puiterwijk.org

Vulnerability : CWE-79


Source : vuldb.com

Vulnerability ID : CVE-2023-6052

First published on : 09-11-2023 13:15:07
Last modified on : 09-11-2023 13:46:10

Description :
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. Affected is an unknown function of the file general/system/censor_words/module/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-244872. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-6052
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/kenankkkkk/cve/blob/main/sql.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.244872 | source : cna@vuldb.com
https://vuldb.com/?id.244872 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-6053

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
A vulnerability, which was classified as critical, has been found in Tongda OA 2017 up to 11.9. Affected by this issue is some unknown functionality of the file general/system/censor_words/manage/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-244874 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-6053
Source : cna@vuldb.com
CVSS Score : 6.3

References :
https://github.com/Conan0313/cve/blob/main/sql.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.244874 | source : cna@vuldb.com
https://vuldb.com/?id.244874 | source : cna@vuldb.com

Vulnerability : CWE-89


Vulnerability ID : CVE-2023-6054

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/manage/lock.php. The manipulation of the argument TERM_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244875. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE ID : CVE-2023-6054
Source : cna@vuldb.com
CVSS Score : 5.5

References :
https://github.com/TinkAnet/cve/blob/main/sql2.md | source : cna@vuldb.com
https://vuldb.com/?ctiid.244875 | source : cna@vuldb.com
https://vuldb.com/?id.244875 | source : cna@vuldb.com

Vulnerability : CWE-89


Source : vmware.com

Vulnerability ID : CVE-2023-20902

First published on : 09-11-2023 01:15:07
Last modified on : 09-11-2023 13:46:10

Description :
A timing condition in Harbor 2.6.x and below, Harbor 2.7.2 and below, Harbor 2.8.2 and below, and Harbor 1.10.17 and below allows an attacker with network access to create jobs/stop job tasks and retrieve job task information.

CVE ID : CVE-2023-20902
Source : security@vmware.com
CVSS Score : 5.9

References :
https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf | source : security@vmware.com


Source : hashicorp.com

Vulnerability ID : CVE-2023-5954

First published on : 09-11-2023 21:15:25
Last modified on : 09-11-2023 21:15:25

Description :
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.

CVE ID : CVE-2023-5954
Source : security@hashicorp.com
CVSS Score : 5.9

References :
https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926 | source : security@hashicorp.com

Vulnerability : CWE-401


Source : snyk.io

Vulnerability ID : CVE-2023-26156

First published on : 09-11-2023 05:15:09
Last modified on : 09-11-2023 13:46:10

Description :
Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. **Note:** An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.

CVE ID : CVE-2023-26156
Source : report@snyk.io
CVSS Score : 5.6

References :
https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18 | source : report@snyk.io
https://github.com/giggio/node-chromedriver/commit/de961e34e023afcf4fa5c0faeeec69aaa6c3c815 | source : report@snyk.io
https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539 | source : report@snyk.io

Vulnerability : CWE-78


Source : redhat.com

Vulnerability ID : CVE-2023-6039

First published on : 09-11-2023 15:15:09
Last modified on : 09-11-2023 17:13:29

Description :
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.

CVE ID : CVE-2023-6039
Source : secalert@redhat.com
CVSS Score : 5.5

References :
https://access.redhat.com/security/cve/CVE-2023-6039 | source : secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2248755 | source : secalert@redhat.com
https://github.com/torvalds/linux/commit/1e7417c188d0a83fb385ba2dbe35fd2563f2b6f3 | source : secalert@redhat.com

Vulnerability : CWE-416


Source : hcl.com

Vulnerability ID : CVE-2023-37533

First published on : 09-11-2023 00:15:07
Last modified on : 09-11-2023 13:46:10

Description :
HCL Connections is vulnerable to reflected cross-site scripting (XSS) where an attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user after visiting the vulnerable URL which contains the malicious script code. This may allow the attacker to steal cookie-based authentication credentials and comprise a user's account then launch other attacks.

CVE ID : CVE-2023-37533
Source : psirt@hcl.com
CVSS Score : 5.4

References :
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108434 | source : psirt@hcl.com


Source : eclipse.org

Vulnerability ID : CVE-2023-4218

First published on : 09-11-2023 09:15:08
Last modified on : 09-11-2023 13:46:10

Description :
In Eclipse IDE versions < 2023-09 (4.29) some files with xml content are parsed vulnerable against all sorts of XXE attacks. The user just needs to open any evil project or update an open project with a vulnerable file (for example for review a foreign repository or patch).

CVE ID : CVE-2023-4218
Source : emo@eclipse.org
CVSS Score : 5.0

References :
https://github.com/eclipse-cdt/cdt/commit/c7169b3186d2fef20f97467c3e2ad78e2943ed1b | source : emo@eclipse.org
https://github.com/eclipse-emf/org.eclipse.emf/issues/10 | source : emo@eclipse.org
https://github.com/eclipse-jdt/eclipse.jdt.core/commit/38dd2a878f45cdb3d8d52090f1d6d1b532fd4c4d | source : emo@eclipse.org
https://github.com/eclipse-jdt/eclipse.jdt.ui/commit/13675b1f8a74f47de4da89ed0ded6af7c21dfbec | source : emo@eclipse.org
https://github.com/eclipse-pde/eclipse.pde/pull/632/ | source : emo@eclipse.org
https://github.com/eclipse-pde/eclipse.pde/pull/667/ | source : emo@eclipse.org
https://github.com/eclipse-platform/eclipse.platform.releng.buildtools/pull/45 | source : emo@eclipse.org
https://github.com/eclipse-platform/eclipse.platform.swt/commit/bf71db5ddcb967c0863dad4745367b54f49e06ba | source : emo@eclipse.org
https://github.com/eclipse-platform/eclipse.platform.ui/commit/f243cf0a28785b89b7c50bf4e1cce48a917d89bd | source : emo@eclipse.org
https://github.com/eclipse-platform/eclipse.platform/pull/761 | source : emo@eclipse.org
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/8 | source : emo@eclipse.org

Vulnerability : CWE-611


(10) LOW VULNERABILITIES [0.1, 3.9]

Source : kaspersky.com

Vulnerability ID : CVE-2023-47615

First published on : 09-11-2023 13:15:07
Last modified on : 09-11-2023 13:46:10

Description :
A CWE-526: Exposure of Sensitive Information Through Environmental Variables vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to get access to a sensitive data on the targeted system.

CVE ID : CVE-2023-47615
Source : vulnerability@kaspersky.com
CVSS Score : 3.3

References :
https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-212-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-through-environmental-variables/ | source : vulnerability@kaspersky.com

Vulnerability : CWE-526


Vulnerability ID : CVE-2023-47616

First published on : 09-11-2023 13:15:07
Last modified on : 09-11-2023 13:46:10

Description :
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.

CVE ID : CVE-2023-47616
Source : vulnerability@kaspersky.com
CVSS Score : 2.4

References :
https://ics-cert.kaspersky.com/advisories/2023/11/09/klcert-22-193-telit-cinterion-thales-gemalto-modules-exposure-of-sensitive-information-to-an-unauthorized-actor/ | source : vulnerability@kaspersky.com

Vulnerability : CWE-200


Source : puiterwijk.org

Vulnerability ID : CVE-2023-5541

First published on : 09-11-2023 20:15:09
Last modified on : 09-11-2023 20:51:06

Description :
The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.

CVE ID : CVE-2023-5541
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79426 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243437 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451582 | source : patrick@puiterwijk.org

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-5542

First published on : 09-11-2023 20:15:09
Last modified on : 09-11-2023 20:51:06

Description :
Students in "Only see own membership" groups could see other students in the group, which should be hidden.

CVE ID : CVE-2023-5542
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243441 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451583 | source : patrick@puiterwijk.org

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-5545

First published on : 09-11-2023 20:15:09
Last modified on : 09-11-2023 20:51:06

Description :
H5P metadata automatically populated the author with the user's username, which could be sensitive information.

CVE ID : CVE-2023-5545
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243444 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451586 | source : patrick@puiterwijk.org

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-5547

First published on : 09-11-2023 20:15:10
Last modified on : 09-11-2023 20:51:06

Description :
The course upload preview contained an XSS risk for users uploading unsafe data.

CVE ID : CVE-2023-5547
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243447 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451588 | source : patrick@puiterwijk.org

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-5548

First published on : 09-11-2023 20:15:10
Last modified on : 09-11-2023 20:51:06

Description :
Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.

CVE ID : CVE-2023-5548
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243449 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451589 | source : patrick@puiterwijk.org

Vulnerability : CWE-349


Vulnerability ID : CVE-2023-5549

First published on : 09-11-2023 20:15:10
Last modified on : 09-11-2023 20:51:06

Description :
Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.

CVE ID : CVE-2023-5549
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243451 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451590 | source : patrick@puiterwijk.org

Vulnerability : CWE-284


Vulnerability ID : CVE-2023-5551

First published on : 09-11-2023 20:15:11
Last modified on : 09-11-2023 20:51:06

Description :
Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.

CVE ID : CVE-2023-5551
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243453 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451592 | source : patrick@puiterwijk.org

Vulnerability : CWE-200


Vulnerability ID : CVE-2023-5543

First published on : 09-11-2023 22:15:11
Last modified on : 09-11-2023 22:15:11

Description :
When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.

CVE ID : CVE-2023-5543
Source : patrick@puiterwijk.org
CVSS Score : 3.3

References :
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795 | source : patrick@puiterwijk.org
https://bugzilla.redhat.com/show_bug.cgi?id=2243442 | source : patrick@puiterwijk.org
https://moodle.org/mod/forum/discuss.php?d=451584 | source : patrick@puiterwijk.org

Vulnerability : CWE-284


(56) NO SCORE VULNERABILITIES [0.0, 0.0]

Source : mitre.org

Vulnerability ID : CVE-2023-37790

First published on : 09-11-2023 00:15:08
Last modified on : 09-11-2023 13:46:10

Description :
Jaspersoft Clarity PPM version 14.3.0.298 was discovered to contain an arbitrary file upload vulnerability via the Profile Picture Upload function.

CVE ID : CVE-2023-37790
Source : cve@mitre.org
CVSS Score : /

References :
https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html | source : cve@mitre.org


Vulnerability ID : CVE-2023-47005

First published on : 09-11-2023 01:15:07
Last modified on : 09-11-2023 13:46:10

Description :
An issue in ASUS RT-AX57 v.3.0.0.4_386_52041 allows a remote attacker to execute arbitrary code via a crafted request to the lan_ifname field in the sub_ln 2C318 function.

CVE ID : CVE-2023-47005
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/XYIYM/Digging/blob/main/ASUS/RT-AX57/3/1.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47006

First published on : 09-11-2023 01:15:07
Last modified on : 09-11-2023 13:46:10

Description :
An issue in ASUS RT-AX57 v.3.0.0.4_386_52041 allows a remote attacker to execute arbitrary code via a crafted request to the lan_ipaddr field in the sub_6FC74 function.

CVE ID : CVE-2023-47006
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/XYIYM/Digging/blob/main/ASUS/RT-AX57/1/1.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47007

First published on : 09-11-2023 01:15:07
Last modified on : 09-11-2023 13:46:10

Description :
An issue in ASUS RT-AX57 v.3.0.0.4_386_52041 allows a remote attacker to execute arbitrary code via a crafted request to the lan_ifname field in the sub_391B8 function.

CVE ID : CVE-2023-47007
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/XYIYM/Digging/blob/main/ASUS/RT-AX57/2/1.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47008

First published on : 09-11-2023 01:15:07
Last modified on : 09-11-2023 13:46:10

Description :
An issue in ASUS RT-AX57 v.3.0.0.4_386_52041 allows a remote attacker to execute arbitrary code via a crafted request to the ifname field in the sub_4CCE4 function.

CVE ID : CVE-2023-47008
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/XYIYM/Digging/blob/main/ASUS/RT-AX57/4/1.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46492

First published on : 09-11-2023 05:15:11
Last modified on : 09-11-2023 13:46:10

Description :
Cross Site Scripting vulnerability in MLDB.ai v.2017.04.17.0 allows a remote attacker to execute arbitrary code via a crafted payload to the public_html/doc/index.html.

CVE ID : CVE-2023-46492
Source : cve@mitre.org
CVSS Score : /

References :
https://gist.github.com/cd80/a75b618419d5afb137cd5a29e8156420 | source : cve@mitre.org


Vulnerability ID : CVE-2023-47488

First published on : 09-11-2023 06:15:24
Last modified on : 09-11-2023 13:46:10

Description :
Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page.

CVE ID : CVE-2023-47488
Source : cve@mitre.org
CVSS Score : /

References :
https://bugplorer.github.io/cve-xss-itop/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-47489

First published on : 09-11-2023 06:15:24
Last modified on : 09-11-2023 13:46:10

Description :
An issue in Combodo iTop v.3.1.0-2-11973 allows a local attacker to execute arbitrary code via a crafted script to the export-v2.php and ajax.render.php components.

CVE ID : CVE-2023-47489
Source : cve@mitre.org
CVSS Score : /

References :
https://bugplorer.github.io/cve-csv-itop/ | source : cve@mitre.org


Vulnerability ID : CVE-2023-47363

First published on : 09-11-2023 14:15:07
Last modified on : 09-11-2023 17:13:32

Description :
The leakage of channel access token in F.B.P members Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47363
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/F.B.P%20members.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47364

First published on : 09-11-2023 14:15:07
Last modified on : 09-11-2023 17:13:32

Description :
The leakage of channel access token in nagaoka taxi Line 13.6.1 allows remote attackers to send malicious notifications to victims

CVE ID : CVE-2023-47364
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/nagaoka%20taxi.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47365

First published on : 09-11-2023 14:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in Lil.OFF-PRICE STORE Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47365
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/Lil.OFF-PRICE%20STORE.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47366

First published on : 09-11-2023 14:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in craft_members Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47366
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/craft_members.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47367

First published on : 09-11-2023 14:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in platinum clinic Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47367
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/platinum%20clinic.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47369

First published on : 09-11-2023 14:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in best_training_member Line 13.6.1 allows remote attackers to send malicious notifications.

CVE ID : CVE-2023-47369
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/best_training_member.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47368

First published on : 09-11-2023 15:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in taketorinoyu Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47368
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/taketorinoyu.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47370

First published on : 09-11-2023 15:15:08
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in bluetrick Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47370
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/bluetrick.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47372

First published on : 09-11-2023 15:15:09
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in UPDATESALON C-LOUNGE Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47372
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/UPDATESALON%20C-LOUNGE.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-47373

First published on : 09-11-2023 15:15:09
Last modified on : 09-11-2023 17:13:29

Description :
The leakage of channel access token in DRAGON FAMILY Line 13.6.1 allows remote attackers to send malicious notifications to victims.

CVE ID : CVE-2023-47373
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/syz913/CVE-reports/blob/main/DRAGON%20FAMILY.md | source : cve@mitre.org


Vulnerability ID : CVE-2023-46894

First published on : 09-11-2023 16:15:34
Last modified on : 09-11-2023 17:13:29

Description :
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.

CVE ID : CVE-2023-46894
Source : cve@mitre.org
CVSS Score : /

References :
https://github.com/espressif/esptool/issues/926 | source : cve@mitre.org


Vulnerability ID : CVE-2023-45884

First published on : 09-11-2023 17:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross Site Request Forgery (CSRF) vulnerability in NASA Open MCT (aka openmct) through 3.1.0 allows attackers to view sensitive information via the flexibleLayout plugin.

CVE ID : CVE-2023-45884
Source : cve@mitre.org
CVSS Score : /

References :
https://www.linkedin.com/pulse/xss-nasas-open-mct-v302-visionspace-technologies-ubg4f | source : cve@mitre.org


Vulnerability ID : CVE-2023-45885

First published on : 09-11-2023 17:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross Site Scripting (XSS) vulnerability in NASA Open MCT (aka openmct) through 3.1.0 allows attackers to run arbitrary code via the new component feature in the flexibleLayout plugin.

CVE ID : CVE-2023-45885
Source : cve@mitre.org
CVSS Score : /

References :
https://www.linkedin.com/pulse/xss-nasas-open-mct-v302-visionspace-technologies-ubg4f | source : cve@mitre.org


Vulnerability ID : CVE-2023-29975

First published on : 09-11-2023 22:15:10
Last modified on : 09-11-2023 22:15:10

Description :
An issue discovered in Pfsense CE version 2.6.0 allows attackers to change the password of any user without verification.

CVE ID : CVE-2023-29975
Source : cve@mitre.org
CVSS Score : /

References :
https://www.esecforte.com/cve-2023-29975-unverified-password-changed/ | source : cve@mitre.org


Source : apache.org

Vulnerability ID : CVE-2023-47248

First published on : 09-11-2023 09:15:08
Last modified on : 09-11-2023 13:46:10

Description :
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon. If it is not possible to upgrade, we provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.

CVE ID : CVE-2023-47248
Source : security@apache.org
CVSS Score : /

References :
https://lists.apache.org/thread/yhy7tdfjf9hrl9vfrtzo8p2cyjq87v7n | source : security@apache.org

Vulnerability : CWE-502


Source : cert.pl

Vulnerability ID : CVE-2023-4612

First published on : 09-11-2023 14:15:08
Last modified on : 09-11-2023 17:13:29

Description :
Improper Authentication vulnerability in Apereo CAS in jakarta.servlet.http.HttpServletRequest.getRemoteAddr method allows Multi-Factor Authentication bypass.This issue affects CAS: through 7.0.0-RC7. It is unknown whether in new versions the issue will be fixed. For the date of publication there is no patch, and the vendor does not treat it as a vulnerability.

CVE ID : CVE-2023-4612
Source : cvd@cert.pl
CVSS Score : /

References :
https://cert.pl/en/posts/2023/11/CVE-2023-4612/ | source : cvd@cert.pl
https://cert.pl/posts/2023/11/CVE-2023-4612/ | source : cvd@cert.pl

Vulnerability : CWE-287


Source : patchstack.com

Vulnerability ID : CVE-2023-25994

First published on : 09-11-2023 16:15:34
Last modified on : 09-11-2023 17:13:29

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Alex Benfica Publish to Schedule plugin <= 4.4.2 versions.

CVE ID : CVE-2023-25994
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/publish-to-schedule/wordpress-publish-to-schedule-plugin-4-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-36688

First published on : 09-11-2023 16:15:34
Last modified on : 09-11-2023 17:13:29

Description :
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Mann Simple Site Verify plugin <= 1.0.7 versions.

CVE ID : CVE-2023-36688
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/simple-site-verify/wordpress-simple-site-verify-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-79


Vulnerability ID : CVE-2023-25975

First published on : 09-11-2023 18:15:07
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Frédéric Sheedy Etsy Shop plugin <= 3.0.3 versions.

CVE ID : CVE-2023-25975
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/etsy-shop/wordpress-etsy-shop-plugin-3-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-31087

First published on : 09-11-2023 18:15:07
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in JoomSky JS Job Manager plugin <= 2.0.0 versions.

CVE ID : CVE-2023-31087
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/js-jobs/wordpress-js-jobs-manager-plugin-2-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34002

First published on : 09-11-2023 18:15:07
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WP Inventory Manager plugin <= 2.1.0.13 versions.

CVE ID : CVE-2023-34002
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-inventory-manager/wordpress-wp-inventory-manager-plugin-2-1-0-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34386

First published on : 09-11-2023 18:15:07
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WPClever WPC Smart Wishlist for WooCommerce plugin <= 4.7.1 versions.

CVE ID : CVE-2023-34386
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/woo-smart-wishlist/wordpress-wpc-smart-wishlist-for-woocommerce-plugin-4-6-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-46614

First published on : 09-11-2023 18:15:07
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Mat Bao Corp WP Helper Premium plugin <= 4.5.1 versions.

CVE ID : CVE-2023-46614
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-helper-lite/wordpress-wp-helper-premium-plugin-4-5-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34178

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Groundhogg Inc. Groundhogg plugin <= 2.7.11 versions.

CVE ID : CVE-2023-34178
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/groundhogg/wordpress-groundhogg-plugin-2-7-10-3-cross-site-request-forgery-csrf?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34181

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WP-Cirrus plugin <= 0.6.11 versions.

CVE ID : CVE-2023-34181
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-cirrus/wordpress-wp-cirrus-plugin-0-6-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34182

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Peter Shaw LH Password Changer plugin <= 1.55 versions.

CVE ID : CVE-2023-34182
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/lh-password-changer/wordpress-lh-password-changer-plugin-1-55-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34371

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Didier Sampaolo SpamReferrerBlock plugin <= 2.22 versions.

CVE ID : CVE-2023-34371
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/spamreferrerblock/wordpress-spamreferrerblock-plugin-2-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-47237

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Martin Gibson Auto Publish for Google My Business plugin <= 3.7 versions.

CVE ID : CVE-2023-47237
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-google-my-business-auto-publish/wordpress-auto-publish-for-google-my-business-plugin-3-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-47238

First published on : 09-11-2023 19:15:08
Last modified on : 09-11-2023 19:32:04

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WebberZone Top 10 – WordPress Popular posts by WebberZone plugin <= 3.3.2 versions.

CVE ID : CVE-2023-47238
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/top-10/wordpress-top-10-plugin-3-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34033

First published on : 09-11-2023 20:15:08
Last modified on : 09-11-2023 20:51:06

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Malinky Ajax Pagination and Infinite Scroll plugin <= 2.0.1 versions.

CVE ID : CVE-2023-34033
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/malinky-ajax-pagination/wordpress-ajax-pagination-and-infinite-scroll-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34169

First published on : 09-11-2023 20:15:08
Last modified on : 09-11-2023 20:51:06

Description :
Cross-Site Request Forgery (CSRF) vulnerability in SAKURA Internet Inc. TS Webfonts for ??????????? plugin <= 3.1.2 versions.

CVE ID : CVE-2023-34169
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/ts-webfonts-for-sakura/wordpress-ts-webfonts-for-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34171

First published on : 09-11-2023 20:15:08
Last modified on : 09-11-2023 20:51:06

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Alex Raven WP Report Post plugin <= 2.1.2 versions.

CVE ID : CVE-2023-34171
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-report-post/wordpress-wp-report-post-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34177

First published on : 09-11-2023 20:15:08
Last modified on : 09-11-2023 20:51:06

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Kenth Hagström WP-Cache.Com plugin <= 1.1.1 versions.

CVE ID : CVE-2023-34177
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-cachecom/wordpress-wp-cache-com-plugin-1-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32594

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Benedict B., Maciej Gryniuk Hyphenator plugin <= 5.1.5 versions.

CVE ID : CVE-2023-32594
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/hyphenator/wordpress-hyphenator-plugin-5-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32602

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in LOKALYZE CALL ME NOW plugin <= 3.0 versions.

CVE ID : CVE-2023-32602
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/lokalyze-call-now/wordpress-call-me-now-plugin-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32739

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Web_Trendy WP Custom Cursors | WordPress Cursor Plugin plugin < 3.2 versions.

CVE ID : CVE-2023-32739
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-custom-cursors/wordpress-wp-custom-cursors-plugin-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32744

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Recommendations plugin <= 2.3.0 versions.

CVE ID : CVE-2023-32744
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/woocommerce-product-recommendations/wordpress-woocommerce-product-recommendations-plugin-2-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32745

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce AutomateWoo plugin <= 5.7.1 versions.

CVE ID : CVE-2023-32745
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/automatewoo/wordpress-automatewoo-plugin-5-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32794

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Add-Ons plugin <= 6.1.3 versions.

CVE ID : CVE-2023-32794
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/woocommerce-product-addons/wordpress-woocommerce-product-add-ons-plugin-6-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34024

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Guillemant David WP Full Auto Tags Manager plugin <= 2.2 versions.

CVE ID : CVE-2023-34024
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-full-auto-tags-manager/wordpress-wp-full-auto-tags-manager-plugin-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34025

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in LWS LWS Hide Login plugin <= 2.1.6 versions.

CVE ID : CVE-2023-34025
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/lws-hide-login/wordpress-lws-hide-login-plugin-2-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-34031

First published on : 09-11-2023 21:15:24
Last modified on : 09-11-2023 21:15:24

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier bbPress Toolkit plugin <= 1.0.12 versions.

CVE ID : CVE-2023-34031
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/bbp-toolkit/wordpress-bbpress-toolkit-plugin-1-0-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32512

First published on : 09-11-2023 22:15:10
Last modified on : 09-11-2023 22:15:10

Description :
Cross-Site Request Forgery (CSRF) vulnerability in ShortPixel ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin <= 3.7.1 versions.

CVE ID : CVE-2023-32512
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/shortpixel-adaptive-images/wordpress-shortpixel-adaptive-images-webp-avif-cdn-image-optimization-plugin-3-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32579

First published on : 09-11-2023 22:15:10
Last modified on : 09-11-2023 22:15:10

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Designs & Code Forget About Shortcode Buttons plugin <= 2.1.2 versions.

CVE ID : CVE-2023-32579
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/forget-about-shortcode-buttons/wordpress-forget-about-shortcode-buttons-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32587

First published on : 09-11-2023 22:15:10
Last modified on : 09-11-2023 22:15:10

Description :
Cross-Site Request Forgery (CSRF) vulnerability in WP Reactions, LLC WP Reactions Lite plugin <= 1.3.8 versions.

CVE ID : CVE-2023-32587
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/wp-reactions-lite/wordpress-wp-reactions-lite-plugin-1-3-8-cross-site-request-forgery-csrf?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Vulnerability ID : CVE-2023-32592

First published on : 09-11-2023 22:15:10
Last modified on : 09-11-2023 22:15:10

Description :
Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel by Edward Bock, Katharina Rompf Sunny Search plugin <= 1.0.2 versions.

CVE ID : CVE-2023-32592
Source : audit@patchstack.com
CVSS Score : /

References :
https://patchstack.com/database/vulnerability/fast-search-powered-by-solr/wordpress-sunny-search-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | source : audit@patchstack.com

Vulnerability : CWE-352


Source : golang.org

Vulnerability ID : CVE-2023-45283

First published on : 09-11-2023 17:15:08
Last modified on : 09-11-2023 19:32:04

Description :
The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name.

CVE ID : CVE-2023-45283
Source : security@golang.org
CVSS Score : /

References :
https://go.dev/cl/540277 | source : security@golang.org
https://go.dev/issue/63713 | source : security@golang.org
https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY | source : security@golang.org
https://pkg.go.dev/vuln/GO-2023-2185 | source : security@golang.org


Vulnerability ID : CVE-2023-45284

First published on : 09-11-2023 17:15:08
Last modified on : 09-11-2023 19:32:04

Description :
On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and "LPT" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local.

CVE ID : CVE-2023-45284
Source : security@golang.org
CVSS Score : /

References :
https://go.dev/cl/540277 | source : security@golang.org
https://go.dev/issue/63713 | source : security@golang.org
https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY | source : security@golang.org
https://pkg.go.dev/vuln/GO-2023-2186 | source : security@golang.org


This website uses the NVD API, but is not approved or certified by it.

About the author
Julien B.

Securitricks

Up-to-Date Cybersecurity Insights & Malware Reports

Securitricks

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Securitricks.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.