‼ CVE-2023-43374 ‼
📖 Read
via "National Vulnerability Database".
Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40619 ‼
📖 Read
via "National Vulnerability Database".
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-37410 ‼
📖 Read
via "National Vulnerability Database".
IBM Personal Communications 14.05, 14.06, and 15.0.0 could allow a local user to escalate their privileges to the SYSTEM user due to overly permissive access controls. IBM X-Force ID: 260138.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-22024 ‼
📖 Read
via "National Vulnerability Database".
In the Unbreakable Enterprise Kernel (UEK), the RDS module in UEK has two setsockopt(2) options, RDS_CONN_RESET and RDS6_CONN_RESET, that are not re-entrant. A malicious local user with CAP_NET_ADMIN can use this to crash the kernel. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38875 ‼
📖 Read
via "National Vulnerability Database".
A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'validator' parameter in '/reset-password'.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-41484 ‼
📖 Read
via "National Vulnerability Database".
An issue in cimg.eu Cimg Library v2.9.3 allows an attacker to obtain sensitive information via a crafted JPEG file.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42331 ‼
📖 Read
via "National Vulnerability Database".
A file upload vulnerability in EliteCMS 1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42334 ‼
📖 Read
via "National Vulnerability Database".
An Indirect Object Reference (IDOR) in Fl3xx Dispatch 2.10.37 and fl3xx Crew 2.10.37 allows a remote attacker to escalate privileges via the user parameter.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42147 ‼
📖 Read
via "National Vulnerability Database".
An issue in CloudExplorer Lite 1.3.1 allows an attacker to obtain sensitive information via the login key component.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38876 ‼
📖 Read
via "National Vulnerability Database".
A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'selector' parameter in '/reset-password'.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39052 ‼
📖 Read
via "National Vulnerability Database".
An information leak in Earthgarden_waiting 13.6.1 allows attackers to obtain the channel access token and send crafted messages.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39045 ‼
📖 Read
via "National Vulnerability Database".
An information leak in kokoroe_members card Line 13.6.1 allows attackers to obtain the channel access token and send crafted messages.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43138 ‼
📖 Read
via "National Vulnerability Database".
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds NAPT rules after authentication, and the rule name has an injection point.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-40930 ‼
📖 Read
via "National Vulnerability Database".
Skyworth 3.0 OS is vulnerable to Directory Traversal.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43137 ‼
📖 Read
via "National Vulnerability Database".
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds ACL rules after authentication, and the rule name parameter has injection points.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42322 ‼
📖 Read
via "National Vulnerability Database".
Insecure Permissions vulnerability in icmsdev iCMS v.7.0.16 allows a remote attacker to obtain sensitive information.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38718 ‼
📖 Read
via "National Vulnerability Database".
IBM Robotic Process Automation 21.0.0 through 21.0.7.8 could disclose sensitive information from access to RPA scripts, workflows and related data. IBM X-Force ID: 261606.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-3596 ‼
📖 Read
via "National Vulnerability Database".
An information leak was found in OpenStack's undercloud. This flaw allows unauthenticated, remote attackers to inspect sensitive data after discovering the IP address of the undercloud, possibly leading to compromising private information, including administrator access credentials.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-39677 ‼
📖 Read
via "National Vulnerability Database".
MyPrestaModules Prestashop Module v6.2.9 and UpdateProducts Prestashop Module v3.6.9 were discovered to contain a PHPInfo information disclosure vulnerability via send.php.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-42321 ‼
📖 Read
via "National Vulnerability Database".
Cross Site Request Forgery (CSRF) vulnerability in icmsdev iCMSv.7.0.16 allows a remote attacker to execute arbitrary code via the user.admincp.php, members.admincp.php, and group.admincp.php files.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-43134 ‼
📖 Read
via "National Vulnerability Database".
There is an unauthorized access vulnerability in Netis 360RAC1200 v1.3.4517, which allows attackers to obtain sensitive information of the device without authentication, obtain user tokens, and ultimately log in to the device backend management.📖 Read
via "National Vulnerability Database".