This is a valid RSS feed.
This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.
line 2512, column 0: (4 occurrences) [help]
<description>PCRS &lt;= 3.11 (d0de1e) &acirc;&euro;&oeli ...
<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="https://web.nvd.nist.gov/view/vuln/search">
<title>National Vulnerability Database</title>
<link>https://web.nvd.nist.gov/view/vuln/search</link>
<description>This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.</description>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20187" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7252" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25092" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25093" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28407" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4430" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3172" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43554" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43555" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44569" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45373" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45805" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46808" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46818" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46849" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46859" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46860" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47420" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47426" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47428" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47430" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47432" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47445" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47588" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48192" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48193" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48454" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48455" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48456" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48457" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48458" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48459" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48460" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48461" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4900" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1192" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1193" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1194" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1476" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1713" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1714" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1715" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1716" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1717" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1718" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1719" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1720" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20005" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20031" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20041" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20042" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20048" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20063" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20070" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20071" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20074" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20083" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20086" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20095" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20114" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20155" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20170" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20175" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20177" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20195" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20196" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20206" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20213" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20219" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20220" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20244" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20245" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20246" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20247" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20255" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20256" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20264" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20267" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20270" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20702" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23368" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23369" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23702" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25700" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25800" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25960" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25990" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26015" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26452" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26453" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26454" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26455" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26456" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27605" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28748" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28794" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29043" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29044" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29045" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29046" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29047" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31016" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31017" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31018" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31019" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31020" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31021" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31022" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31023" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31026" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31027" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31102" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31579" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32121" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3246" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32508" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32741" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3277" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32818" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32825" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32832" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32834" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32835" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32836" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32837" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32838" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32839" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32840" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33226" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33227" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33228" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33924" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3399" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34179" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34259" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34260" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34261" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34383" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35896" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35910" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35911" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36022" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36029" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36034" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36409" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36529" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36620" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36621" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36677" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36769" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38382" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38391" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38406" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38407" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38471" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38472" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38473" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3893" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38965" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39042" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39047" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39048" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39050" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39051" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39053" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39054" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39057" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3909" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39281" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39283" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39284" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39299" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39301" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39345" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3961" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3972" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40061" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40062" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40207" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40215" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4043" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40609" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40660" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40661" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4091" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40922" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41164" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41259" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41260" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41343" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41344" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41345" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41346" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41347" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41348" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41350" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41351" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41352" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41353" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41354" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41355" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41356" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41357" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41378" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41652" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41685" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41725" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41726" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41914" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4197" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4198" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42027" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42029" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4217" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42299" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42631" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42632" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42633" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42634" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42635" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42636" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42637" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42638" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42639" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42640" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42641" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42642" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42643" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42644" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42645" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42646" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42647" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42648" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42649" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42650" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42651" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42652" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42653" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42654" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42655" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42669" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42670" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42750" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42802" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43018" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43076" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43087" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43193" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43194" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43336" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43665" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43982" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44025" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44271" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44398" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4452" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44954" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45001" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45012" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45013" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45014" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45015" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45016" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45017" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45018" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45019" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45024" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45046" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45055" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45069" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45074" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45111" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45112" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45113" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45114" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45161" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45163" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45189" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45201" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45202" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45203" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45323" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45324" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45325" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45326" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45327" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45328" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45329" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45330" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45331" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45332" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45333" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45334" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45335" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45336" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45337" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45338" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45339" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45340" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45341" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45342" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45343" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45344" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45345" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45346" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45347" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4535" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45360" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45362" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45556" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45657" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45827" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45830" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4591" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4592" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46084" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46176" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4625" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46251" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46254" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46327" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46352" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46380" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46381" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46382" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46404" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46428" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46448" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46475" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46482" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46517" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46595" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46695" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46724" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46725" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46728" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46731" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46732" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46775" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46776" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46777" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46778" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46779" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46780" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46781" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46782" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46783" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46802" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46817" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46821" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46822" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46823" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46824" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46846" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46847" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46848" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46911" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46925" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46927" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46928" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46930" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46931" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46947" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46954" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46958" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46963" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46964" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46980" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46981" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4699" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4700" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47004" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47177" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47182" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47184" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47185" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47186" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47204" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47233" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47234" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47235" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47249" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47253" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47258" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47259" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47260" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47271" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47272" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4767" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4768" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4769" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4810" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4858" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4910" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4930" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4996" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5035" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5082" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5090" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5178" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5181" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5228" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5352" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5354" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5355" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5358" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5408" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5454" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5480" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5482" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5530" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5601" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5605" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5606" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5625" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5627" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5678" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5707" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5719" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5763" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5765" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5766" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5771" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5777" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5823" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5824" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5825" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5831" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5846" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5847" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5849" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5850" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5851" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5852" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5853" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5854" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5855" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5856" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5857" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5858" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5859" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5860" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5875" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5876" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5910" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5916" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5917" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5918" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5919" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5920" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5923" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5924" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5925" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5926" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5927" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5928" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5929" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5930" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5945" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5946" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5948" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5950" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5963" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5964" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5967" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5968" />
<rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5969" />
</rdf:Seq>
</items>
<dc:date>2023-11-07T01:00:00Z</dc:date>
<dc:language>en-us</dc:language>
<dc:rights>This material is not copywritten and may be freely used, however, attribution is requested.</dc:rights>
</channel>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20187">
<title>CVE-2017-20187</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-20187</link>
<description>** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Magnesium-PHP up to 0.3.0. It has been classified as problematic. Affected is the function formatEmailString of the file src/Magnesium/Message/Base.php. The manipulation of the argument email/name leads to injection. Upgrading to version 0.3.1 is able to address this issue. The patch is identified as 500d340e1f6421007413cc08a8383475221c2604. It is recommended to upgrade the affected component. VDB-244482 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.</description>
<dc:date>2023-11-05T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7252">
<title>CVE-2017-7252</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7252</link>
<description>bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password.</description>
<dc:date>2023-11-03T01:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25092">
<title>CVE-2018-25092</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25092</link>
<description>A vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Command Mention Handler. The manipulation leads to improper access controls. Upgrading to version 2.10.3 is able to address this issue. The patch is named cc12e0be82a5d05d9f359ed8e56088f4f8b8eb69. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244483.</description>
<dc:date>2023-11-05T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25093">
<title>CVE-2018-25093</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25093</link>
<description>A vulnerability was found in Vaerys-Dawn DiscordSailv2 up to 2.10.2. It has been rated as critical. Affected by this issue is some unknown functionality of the component Tag Handler. The manipulation leads to improper access controls. Upgrading to version 2.10.3 is able to address this issue. The name of the patch is cc12e0be82a5d05d9f359ed8e56088f4f8b8eb69. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-244484.</description>
<dc:date>2023-11-06T01:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28407">
<title>CVE-2020-28407</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28407</link>
<description>In swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall.</description>
<dc:date>2023-11-03T04:15:15Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4430">
<title>CVE-2021-4430</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4430</link>
<description>A vulnerability classified as problematic has been found in Ortus Solutions ColdBox Elixir 3.1.6. This affects an unknown part of the file src/defaultConfig.js of the component ENV Variable Handler. The manipulation leads to information disclosure. Upgrading to version 3.1.7 is able to address this issue. The identifier of the patch is a3aa62daea2e44c76d08d1eac63768cd928cd69e. It is recommended to upgrade the affected component. The identifier VDB-244485 was assigned to this vulnerability.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3172">
<title>CVE-2022-3172</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3172</link>
<description>A security issue was discovered in kube-apiserver that allows an
aggregated API server to redirect client traffic to any URL. This could
lead to the client performing unexpected actions as well as forwarding
the client's API server credentials to third parties.</description>
<dc:date>2023-11-03T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43554">
<title>CVE-2022-43554</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43554</link>
<description>Ivanti Avalanche Smart Device Service Missing Authentication Local Privilege Escalation Vulnerability</description>
<dc:date>2023-11-03T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43555">
<title>CVE-2022-43555</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43555</link>
<description>Ivanti Avalanche Printer Device Service Missing Authentication Local Privilege Escalation Vulnerability</description>
<dc:date>2023-11-03T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44569">
<title>CVE-2022-44569</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44569</link>
<description>A locally authenticated attacker with low privileges can bypass authentication due to insecure inter-process communication.</description>
<dc:date>2023-11-03T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45373">
<title>CVE-2022-45373</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45373</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jason Crouse, VeronaLabs Slimstat Analytics allows SQL Injection.This issue affects Slimstat Analytics: from n/a through 5.0.4.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45805">
<title>CVE-2022-45805</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45805</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through 2.7.3.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46808">
<title>CVE-2022-46808</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46808</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Repute Infosystems ARMember armember-membership allows SQL Injection.This issue affects ARMember: from n/a through 3.4.11.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46818">
<title>CVE-2022-46818</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46818</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Gopi Ramasamy Email posts to subscribers allows SQL Injection.This issue affects Email posts to subscribers: from n/a through 6.2.</description>
<dc:date>2023-11-03T16:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46849">
<title>CVE-2022-46849</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46849</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar Coming Soon Page &acirc;&euro;&ldquo; Responsive Coming Soon &amp; Maintenance Mode allows SQL Injection.This issue affects Coming Soon Page &acirc;&euro;&ldquo; Responsive Coming Soon &amp; Maintenance Mode: from n/a through 1.5.9.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46859">
<title>CVE-2022-46859</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46859</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spiffy Plugins Spiffy Calendar spiffy-calendar allows SQL Injection.This issue affects Spiffy Calendar: from n/a through 4.9.1.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46860">
<title>CVE-2022-46860</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46860</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in KaizenCoders Short URL allows SQL Injection.This issue affects Short URL: from n/a through 1.6.4.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47420">
<title>CVE-2022-47420</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47420</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47426">
<title>CVE-2022-47426</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47426</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Neshan Maps Platform Neshan Maps neshan-maps allows SQL Injection.This issue affects Neshan Maps: from n/a through 1.1.4.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47428">
<title>CVE-2022-47428</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47428</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WpDevArt Booking calendar, Appointment Booking System allows SQL Injection.This issue affects Booking calendar, Appointment Booking System: from n/a through 3.2.7.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47430">
<title>CVE-2022-47430</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47430</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar The School Management &acirc;&euro;&ldquo; Education &amp; Learning Management allows SQL Injection.This issue affects The School Management &acirc;&euro;&ldquo; Education &amp; Learning Management: from n/a through 4.1.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47432">
<title>CVE-2022-47432</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47432</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kemal YAZICI - PluginPress Shortcode IMDB allows SQL Injection.This issue affects Shortcode IMDB: from n/a through 6.0.8.</description>
<dc:date>2023-11-06T08:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47445">
<title>CVE-2022-47445</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47445</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Web-X Be POPIA Compliant be-popia-compliant allows SQL Injection.This issue affects Be POPIA Compliant: from n/a through 1.2.0.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47588">
<title>CVE-2022-47588</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47588</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tips and Tricks HQ, Peter Petreski Simple Photo Gallery simple-photo-gallery allows SQL Injection.This issue affects Simple Photo Gallery: from n/a through v1.8.1.</description>
<dc:date>2023-11-03T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48192">
<title>CVE-2022-48192</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48192</link>
<description>Cross-site Scripting vulnerability in Softing smartLink SW-HT before 1.30, which allows an attacker to execute a dynamic script (JavaScript, VBScript) in the context of the application.</description>
<dc:date>2023-11-06T20:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48193">
<title>CVE-2022-48193</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48193</link>
<description>Weak ciphers in Softing smartLink SW-HT before 1.30 are enabled during secure communication (SSL).</description>
<dc:date>2023-11-06T20:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48454">
<title>CVE-2022-48454</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48454</link>
<description>In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48455">
<title>CVE-2022-48455</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48455</link>
<description>In wifi service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48456">
<title>CVE-2022-48456</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48456</link>
<description>In camera driver, there is a possible out of bounds write due to a incorrect bounds check. This could lead to local denial of service with System execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48457">
<title>CVE-2022-48457</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48457</link>
<description>In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48458">
<title>CVE-2022-48458</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48458</link>
<description>In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48459">
<title>CVE-2022-48459</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48459</link>
<description>In TeleService, there is a possible system crash due to improper input validation. This could lead to local denial of service with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48460">
<title>CVE-2022-48460</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48460</link>
<description>In setting service, there is a possible undefined behavior due to incorrect error handling. This could lead to local denial of service with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48461">
<title>CVE-2022-48461</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48461</link>
<description>In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4900">
<title>CVE-2022-4900</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4900</link>
<description>A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.</description>
<dc:date>2023-11-02T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1192">
<title>CVE-2023-1192</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1192</link>
<description>A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.</description>
<dc:date>2023-11-01T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1193">
<title>CVE-2023-1193</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1193</link>
<description>A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.</description>
<dc:date>2023-11-01T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1194">
<title>CVE-2023-1194</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1194</link>
<description>An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.</description>
<dc:date>2023-11-03T08:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1476">
<title>CVE-2023-1476</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1476</link>
<description>A use-after-free flaw was found in the Linux kernel&acirc;&euro;&trade;s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.</description>
<dc:date>2023-11-03T09:15:13Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1713">
<title>CVE-2023-1713</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1713</link>
<description>Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted &quot;.htaccess&quot; file.</description>
<dc:date>2023-11-01T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1714">
<title>CVE-2023-1714</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1714</link>
<description>Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1715">
<title>CVE-2023-1715</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1715</link>
<description>A logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1716">
<title>CVE-2023-1716</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1716</link>
<description>Cross-site scripting (XSS) vulnerability in Invoice Edit Page in Bitrix24 22.0.300 allows attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1717">
<title>CVE-2023-1717</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1717</link>
<description>Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim&acirc;&euro;&trade;s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1718">
<title>CVE-2023-1718</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1718</link>
<description>Improper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted &quot;tmp_url&quot;.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1719">
<title>CVE-2023-1719</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1719</link>
<description>Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1720">
<title>CVE-2023-1720</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1720</link>
<description>Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20005">
<title>CVE-2023-20005</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20005</link>
<description>Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.</description>
<dc:date>2023-11-01T17:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20031">
<title>CVE-2023-20031</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20031</link>
<description>A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a logic error that occurs when an SSL/TLS certificate that is under load is accessed when it is initiating an SSL connection. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a high rate of SSL/TLS connection requests to be inspected by the Snort 3 detection engine on an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in either a bypass or a denial of service (DoS) condition, depending on device configuration. The Snort detection engine will restart automatically. No manual intervention is required.</description>
<dc:date>2023-11-01T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20041">
<title>CVE-2023-20041</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20041</link>
<description>Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.</description>
<dc:date>2023-11-01T17:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20042">
<title>CVE-2023-20042</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20042</link>
<description>A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an implementation error within the SSL/TLS session handling process that can prevent the release of a session handler under specific conditions. An attacker could exploit this vulnerability by sending crafted SSL/TLS traffic to an affected device, increasing the probability of session handler leaks. A successful exploit could allow the attacker to eventually deplete the available session handler pool, preventing new sessions from being established and causing a DoS condition.</description>
<dc:date>2023-11-01T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20048">
<title>CVE-2023-20048</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20048</link>
<description>A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.</description>
<dc:date>2023-11-01T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20063">
<title>CVE-2023-20063</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20063</link>
<description>A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.</description>
<dc:date>2023-11-01T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20070">
<title>CVE-2023-20070</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20070</link>
<description>A vulnerability in the TLS 1.3 implementation of the Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to unexpectedly restart. This vulnerability is due to a logic error in how memory allocations are handled during a TLS 1.3 session. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a crafted TLS 1.3 message sequence through an affected device. A successful exploit could allow the attacker to cause the Snort 3 detection engine to reload, resulting in a denial of service (DoS) condition. While the Snort detection engine reloads, packets going through the FTD device that are sent to the Snort detection engine will be dropped. The Snort detection engine will restart automatically. No manual intervention is required.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20071">
<title>CVE-2023-20071</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20071</link>
<description>Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20074">
<title>CVE-2023-20074</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20074</link>
<description>Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.</description>
<dc:date>2023-11-01T17:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20083">
<title>CVE-2023-20083</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20083</link>
<description>A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the CPU of an affected device to spike to 100 percent, which could stop all traffic processing and result in a denial of service (DoS) condition. FTD management traffic is not affected by this vulnerability. This vulnerability is due to improper error checking when parsing fields within the ICMPv6 header. An attacker could exploit this vulnerability by sending a crafted ICMPv6 packet through an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition. Note: To recover from the DoS condition, the Snort 2 Detection Engine or the Cisco FTD device may need to be restarted.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20086">
<title>CVE-2023-20086</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20086</link>
<description>A vulnerability in ICMPv6 processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper processing of ICMPv6 messages. An attacker could exploit this vulnerability by sending crafted ICMPv6 messages to a targeted Cisco ASA or FTD system with IPv6 enabled. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20095">
<title>CVE-2023-20095</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20095</link>
<description>A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of HTTPS requests. An attacker could exploit this vulnerability by sending crafted HTTPS requests to an affected system. A successful exploit could allow the attacker to cause resource exhaustion, resulting in a DoS condition.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20114">
<title>CVE-2023-20114</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20114</link>
<description>A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to download arbitrary files from an affected system. This vulnerability is due to a lack of input sanitation. An attacker could exploit this vulnerability by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from the affected system.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20155">
<title>CVE-2023-20155</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20155</link>
<description>A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to cause the device to become unresponsive or trigger an unexpected reload. This vulnerability could also allow an attacker with valid user credentials, but not Administrator privileges, to view a system log file that they would not normally have access to. This vulnerability is due to a lack of rate-limiting of requests that are sent to a specific API that is related to an FMC log. An attacker could exploit this vulnerability by sending a high rate of HTTP requests to the API. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the FMC CPU spiking to 100 percent utilization or to the device reloading. CPU utilization would return to normal if the attack traffic was stopped before an unexpected reload was triggered.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20170">
<title>CVE-2023-20170</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20170</link>
<description>A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20175">
<title>CVE-2023-20175</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20175</link>
<description>A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Read-only-level privileges or higher on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20177">
<title>CVE-2023-20177</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20177</link>
<description>A vulnerability in the SSL file policy implementation of Cisco Firepower Threat Defense (FTD) Software that occurs when the SSL/TLS connection is configured with a URL Category and the Snort 3 detection engine could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to unexpectedly restart. This vulnerability exists because a logic error occurs when a Snort 3 detection engine inspects an SSL/TLS connection that has either a URL Category configured on the SSL file policy or a URL Category configured on an access control policy with TLS server identity discovery enabled. Under specific, time-based constraints, an attacker could exploit this vulnerability by sending a crafted SSL/TLS connection through an affected device. A successful exploit could allow the attacker to trigger an unexpected reload of the Snort 3 detection engine, resulting in either a bypass or denial of service (DoS) condition, depending on device configuration. The Snort 3 detection engine will restart automatically. No manual intervention is required.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20195">
<title>CVE-2023-20195</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20195</link>
<description>Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20196">
<title>CVE-2023-20196</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20196</link>
<description>Two vulnerabilities in Cisco ISE could allow an authenticated, remote attacker to upload arbitrary files to an affected device. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. These vulnerabilities are due to improper validation of files that are uploaded to the web-based management interface. An attacker could exploit these vulnerabilities by uploading a crafted file to an affected device. A successful exploit could allow the attacker to store malicious files in specific directories on the device. The attacker could later use those files to conduct additional attacks, including executing arbitrary code on the affected device with root privileges.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20206">
<title>CVE-2023-20206</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20206</link>
<description>Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20213">
<title>CVE-2023-20213</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20213</link>
<description>A vulnerability in the CDP processing feature of Cisco ISE could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of the CDP process on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes CDP traffic. An attacker could exploit this vulnerability by sending crafted CDP traffic to the device. A successful exploit could cause the CDP process to crash, impacting neighbor discovery and the ability of Cisco ISE to determine the reachability of remote devices. After a crash, the CDP process must be manually restarted using the cdp enable command in interface configuration mode.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20219">
<title>CVE-2023-20219</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20219</link>
<description>Multiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The attacker would need valid device credentials but does not require administrator privileges to exploit this vulnerability. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device including the underlying operating system which could also affect the availability of the device.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20220">
<title>CVE-2023-20220</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20220</link>
<description>Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20244">
<title>CVE-2023-20244</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20244</link>
<description>A vulnerability in the internal packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 2100 Series Firewalls could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain packets when they are sent to the inspection engine. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to deplete all 9,472 byte blocks on the device, resulting in traffic loss across the device or an unexpected reload of the device. If the device does not reload on its own, a manual reload of the device would be required to recover from this state.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20245">
<title>CVE-2023-20245</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20245</link>
<description>Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20246">
<title>CVE-2023-20246</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20246</link>
<description>Multiple Cisco products are affected by a vulnerability in Snort access control policies that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a logic error that occurs when the access control policies are being populated. An attacker could exploit this vulnerability by establishing a connection to an affected device. A successful exploit could allow the attacker to bypass configured access control rules on the affected system.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20247">
<title>CVE-2023-20247</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20247</link>
<description>A vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to bypass a configured multiple certificate authentication policy and connect using only a valid username and password. This vulnerability is due to improper error handling during remote access VPN authentication. An attacker could exploit this vulnerability by sending crafted requests during remote access VPN session establishment. A successful exploit could allow the attacker to bypass the configured multiple certificate authentication policy while retaining the privileges and permissions associated with the original connection profile.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20255">
<title>CVE-2023-20255</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20255</link>
<description>A vulnerability in an API of the Web Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause a partial availability condition, which could cause ongoing video calls to be dropped due to the invalid packets reaching the Web Bridge.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20256">
<title>CVE-2023-20256</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20256</link>
<description>Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured access control list (ACL) and allow traffic that should be denied to flow through an affected device. These vulnerabilities are due to a logic error that could occur when the affected software constructs and applies per-user-override rules. An attacker could exploit these vulnerabilities by connecting to a network through an affected device that has a vulnerable configuration. A successful exploit could allow the attacker to bypass the interface ACL and access resources that would should be protected.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20264">
<title>CVE-2023-20264</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20264</link>
<description>A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 single sign-on (SSO) for remote access VPN in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to intercept the SAML assertion of a user who is authenticating to a remote access VPN session. This vulnerability is due to insufficient validation of the login URL. An attacker could exploit this vulnerability by persuading a user to access a site that is under the control of the attacker, allowing the attacker to modify the login URL. A successful exploit could allow the attacker to intercept a successful SAML assertion and use that assertion to establish a remote access VPN session toward the affected device with the identity and permissions of the hijacked user, resulting in access to the protected network.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20267">
<title>CVE-2023-20267</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20267</link>
<description>A vulnerability in the IP geolocation rules of Snort 3 could allow an unauthenticated, remote attacker to potentially bypass IP address restrictions. This vulnerability exists because the configuration for IP geolocation rules is not parsed properly. An attacker could exploit this vulnerability by spoofing an IP address until they bypass the restriction. A successful exploit could allow the attacker to bypass location-based IP address restrictions.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20270">
<title>CVE-2023-20270</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20270</link>
<description>A vulnerability in the interaction between the Server Message Block (SMB) protocol preprocessor and the Snort 3 detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error-checking when the Snort 3 detection engine is processing SMB traffic. An attacker could exploit this vulnerability by sending a crafted SMB packet stream through an affected device. A successful exploit could allow the attacker to cause the Snort process to reload, resulting in a DoS condition.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20702">
<title>CVE-2023-20702</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20702</link>
<description>In 5G NRLC, there is a possible invalid memory access due to lack of error handling. This could lead to remote denial of service, if UE received invalid 1-byte rlc sdu, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00921261; Issue ID: MOLY01128895.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23368">
<title>CVE-2023-23368</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23368</link>
<description>An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2376 build 20230421 and later
QTS 4.5.4.2374 build 20230416 and later
QuTS hero h5.0.1.2376 build 20230421 and later
QuTS hero h4.5.4.2374 build 20230417 and later
QuTScloud c5.0.1.2374 and later</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23369">
<title>CVE-2023-23369</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23369</link>
<description>An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following versions:
Multimedia Console 2.1.2 ( 2023/05/04 ) and later
Multimedia Console 1.4.8 ( 2023/05/05 ) and later
QTS 5.1.0.2399 build 20230515 and later
QTS 4.3.6.2441 build 20230621 and later
QTS 4.3.4.2451 build 20230621 and later
QTS 4.3.3.2420 build 20230621 and later
QTS 4.2.6 build 20230621 and later
Media Streaming add-on 500.1.1.2 ( 2023/06/12 ) and later
Media Streaming add-on 500.0.0.11 ( 2023/06/16 ) and later</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23702">
<title>CVE-2023-23702</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23702</link>
<description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pixelgrade Comments Ratings plugin &lt;=&Acirc;&nbsp;1.1.7 versions.</description>
<dc:date>2023-11-06T10:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25700">
<title>CVE-2023-25700</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25700</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25800">
<title>CVE-2023-25800</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25800</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.2.0.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25960">
<title>CVE-2023-25960</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25960</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop &acirc;&euro;&ldquo; Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop &acirc;&euro;&ldquo; Global Dropshipping: from n/a through 1.0.0.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25990">
<title>CVE-2023-25990</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25990</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26015">
<title>CVE-2023-26015</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26015</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Chris Richardson MapPress Maps for WordPress mappress-google-maps-for-wordpress allows SQL Injection.This issue affects MapPress Maps for WordPress: from n/a through 2.85.4.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26452">
<title>CVE-2023-26452</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26452</link>
<description>Requests to cache an image and return its metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26453">
<title>CVE-2023-26453</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26453</link>
<description>Requests to cache an image could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26454">
<title>CVE-2023-26454</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26454</link>
<description>Requests to fetch image metadata could be abused to include SQL queries that would be executed unchecked. Exploiting this vulnerability requires at least access to adjacent networks of the imageconverter service, which is not exposed to public networks by default. Arbitrary SQL statements could be executed in the context of the services database user account. API requests are now properly checked for valid content and attempts to circumvent this check are being logged as error. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26455">
<title>CVE-2023-26455</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26455</link>
<description>RMI was not requiring authentication when calling ChronosRMIService:setEventOrganizer. Attackers with local or adjacent network access could abuse the RMI service to modify calendar items using RMI. RMI access is restricted to localhost by default. The interface has been updated to require authenticated requests. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26456">
<title>CVE-2023-26456</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26456</link>
<description>Users were able to set an arbitrary &quot;product name&quot; for OX Guard. The chosen value was not sufficiently sanitized before processing it at the user interface, allowing for indirect cross-site scripting attacks. Accounts that were temporarily taken over could be configured to trigger persistent code execution, allowing an attacker to build a foothold. Sanitization is in place for product names now. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27605">
<title>CVE-2023-27605</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27605</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sajjad Hossain WP Reroute Email allows SQL Injection.This issue affects WP Reroute Email: from n/a through 1.4.6.</description>
<dc:date>2023-11-06T09:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28748">
<title>CVE-2023-28748</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28748</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.</description>
<dc:date>2023-11-06T09:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28794">
<title>CVE-2023-28794</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28794</link>
<description>Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.</description>
<dc:date>2023-11-06T08:15:22Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29043">
<title>CVE-2023-29043</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29043</link>
<description>Presentations may contain references to images, which are user-controlled, and could include malicious script code that is being processed when editing a document. Script code embedded in malicious documents could be executed in the context of the user editing the document when performing certain actions, like copying content. The relevant attribute does now get encoded to avoid the possibility of executing script code. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29044">
<title>CVE-2023-29044</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29044</link>
<description>Documents operations could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now get escaped to avoid code execution. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29045">
<title>CVE-2023-29045</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29045</link>
<description>Documents operations, in this case &quot;drawing&quot;, could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29046">
<title>CVE-2023-29046</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29046</link>
<description>Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29047">
<title>CVE-2023-29047</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29047</link>
<description>Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31016">
<title>CVE-2023-31016</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31016</link>
<description>NVIDIA GPU Display Driver for Windows contains a vulnerability where an uncontrolled search path element may allow an attacker to execute arbitrary code, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.</description>
<dc:date>2023-11-02T19:15:40Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31017">
<title>CVE-2023-31017</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31017</link>
<description>NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may be able to write arbitrary data to privileged locations by using reparse points. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31018">
<title>CVE-2023-31018</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31018</link>
<description>NVIDIA GPU Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause a NULL-pointer dereference, which may lead to denial of service.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31019">
<title>CVE-2023-31019</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31019</link>
<description>NVIDIA GPU Display Driver for Windows contains a vulnerability in wksServicePlugin.dll, where the driver implementation does not restrict or incorrectly restricts access from the named pipe server to a connecting client, which may lead to potential impersonation to the client's secure context.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31020">
<title>CVE-2023-31020</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31020</link>
<description>NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause improper access control, which may lead to denial of service or data tampering.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31021">
<title>CVE-2023-31021</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31021</link>
<description>NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a malicious user in the guest VM can cause a NULL-pointer dereference, which may lead to denial of service.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31022">
<title>CVE-2023-31022</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31022</link>
<description>NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31023">
<title>CVE-2023-31023</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31023</link>
<description>NVIDIA Display Driver for Windows contains a vulnerability where an attacker may cause a pointer dereference of an untrusted value, which may lead to denial of service.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31026">
<title>CVE-2023-31026</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31026</link>
<description>NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a NULL-pointer dereference may lead to denial of service.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31027">
<title>CVE-2023-31027</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31027</link>
<description>NVIDIA GPU Display Driver for Windows contains a vulnerability that allows Windows users with low levels of privilege to escalate privileges when an administrator is updating GPU drivers, which may lead to escalation of privileges.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31102">
<title>CVE-2023-31102</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31102</link>
<description>7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive.</description>
<dc:date>2023-11-03T04:15:20Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31579">
<title>CVE-2023-31579</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31579</link>
<description>Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164">
<title>CVE-2023-3164</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3164</link>
<description>A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.</description>
<dc:date>2023-11-02T12:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32121">
<title>CVE-2023-32121</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32121</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Highfivery LLC Zero Spam for WordPress allows SQL Injection.This issue affects Zero Spam for WordPress: from n/a through 5.4.4.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3246">
<title>CVE-2023-3246</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3246</link>
<description>An issue has been discovered in GitLab EE/CE affecting all versions starting before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1 which allows an attackers to block Sidekiq job processor.</description>
<dc:date>2023-11-06T13:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32508">
<title>CVE-2023-32508</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32508</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rolf van Gelder Order Your Posts Manually allows SQL Injection.This issue affects Order Your Posts Manually: from n/a through 2.2.5.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32741">
<title>CVE-2023-32741</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32741</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in IT Path Solutions PVT LTD Contact Form to Any API allows SQL Injection.This issue affects Contact Form to Any API: from n/a through 1.1.2.</description>
<dc:date>2023-11-04T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3277">
<title>CVE-2023-3277</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3277</link>
<description>The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago.</description>
<dc:date>2023-11-03T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32818">
<title>CVE-2023-32818</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32818</link>
<description>In vdec, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08163896 &amp; ALPS08013430; Issue ID: ALPS07867715.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32825">
<title>CVE-2023-32825</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32825</link>
<description>In bluethooth service, there is a possible out of bounds reads due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07884130; Issue ID: ALPS07884130.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32832">
<title>CVE-2023-32832</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32832</link>
<description>In video, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08235273.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32834">
<title>CVE-2023-32834</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32834</link>
<description>In secmem, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08161762; Issue ID: ALPS08161762.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32835">
<title>CVE-2023-32835</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32835</link>
<description>In keyinstall, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08157918; Issue ID: ALPS08157918.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32836">
<title>CVE-2023-32836</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32836</link>
<description>In display, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08126725; Issue ID: ALPS08126725.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32837">
<title>CVE-2023-32837</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32837</link>
<description>In video, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08250357.</description>
<dc:date>2023-11-06T04:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32838">
<title>CVE-2023-32838</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32838</link>
<description>In dpe, there is a possible out of bounds write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310805; Issue ID: ALPS07310805.</description>
<dc:date>2023-11-06T04:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32839">
<title>CVE-2023-32839</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32839</link>
<description>In dpe, there is a possible out of bounds write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262576; Issue ID: ALPS07262576.</description>
<dc:date>2023-11-06T04:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32840">
<title>CVE-2023-32840</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32840</link>
<description>In modem CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction may be also needed for exploitation Patch ID: MOLY01138425; Issue ID: MOLY01138425 (MSV-862).</description>
<dc:date>2023-11-06T04:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33226">
<title>CVE-2023-33226</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33226</link>
<description>The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33227">
<title>CVE-2023-33227</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33227</link>
<description>The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability This vulnerability allows a low level user to perform the actions with SYSTEM privileges.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33228">
<title>CVE-2023-33228</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33228</link>
<description>The SolarWinds Network Configuration Manager was susceptible to the Exposure of Sensitive Information Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to obtain sensitive information.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33924">
<title>CVE-2023-33924</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33924</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Felix Welberg SIS Handball allows SQL Injection.This issue affects SIS Handball: from n/a through 1.0.45.</description>
<dc:date>2023-11-06T09:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397">
<title>CVE-2023-3397</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3397</link>
<description>A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information.</description>
<dc:date>2023-11-01T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3399">
<title>CVE-2023-3399</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3399</link>
<description>An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.</description>
<dc:date>2023-11-06T13:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34179">
<title>CVE-2023-34179</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34179</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Groundhogg Inc. Groundhogg allows SQL Injection.This issue affects Groundhogg: from n/a through 2.7.11.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34259">
<title>CVE-2023-34259</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34259</link>
<description>Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575.</description>
<dc:date>2023-11-03T04:15:20Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34260">
<title>CVE-2023-34260</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34260</link>
<description>Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory.</description>
<dc:date>2023-11-03T04:15:20Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34261">
<title>CVE-2023-34261</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34261</link>
<description>Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow identification of valid user accounts via username enumeration because they lead to a &quot;nicht einloggen&quot; error rather than a falsch error.</description>
<dc:date>2023-11-03T04:15:20Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34383">
<title>CVE-2023-34383</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34383</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.</description>
<dc:date>2023-11-03T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35896">
<title>CVE-2023-35896</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35896</link>
<description>IBM Content Navigator 3.0.13 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 259247.</description>
<dc:date>2023-11-03T03:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35910">
<title>CVE-2023-35910</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35910</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nucleus_genius Quasar form free &acirc;&euro;&ldquo; Contact Form Builder for WordPress allows SQL Injection.This issue affects Quasar form free &acirc;&euro;&ldquo; Contact Form Builder for WordPress: from n/a through 6.0.</description>
<dc:date>2023-11-04T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35911">
<title>CVE-2023-35911</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-35911</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Creative Solutions Contact Form Generator : Creative form builder for WordPress allows SQL Injection.This issue affects Contact Form Generator : Creative form builder for WordPress: from n/a through 2.6.0.</description>
<dc:date>2023-11-06T09:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36022">
<title>CVE-2023-36022</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36022</link>
<description>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability</description>
<dc:date>2023-11-03T01:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36029">
<title>CVE-2023-36029</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36029</link>
<description>Microsoft Edge (Chromium-based) Spoofing Vulnerability</description>
<dc:date>2023-11-03T01:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36034">
<title>CVE-2023-36034</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36034</link>
<description>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability</description>
<dc:date>2023-11-03T01:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36409">
<title>CVE-2023-36409</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36409</link>
<description>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</description>
<dc:date>2023-11-07T00:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36529">
<title>CVE-2023-36529</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36529</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Favethemes Houzez - Real Estate WordPress Theme allows SQL Injection.This issue affects Houzez - Real Estate WordPress Theme: from n/a through 1.3.4.</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36620">
<title>CVE-2023-36620</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36620</link>
<description>An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup=&quot;false&quot; attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API.</description>
<dc:date>2023-11-03T04:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36621">
<title>CVE-2023-36621</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36621</link>
<description>An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing.</description>
<dc:date>2023-11-03T04:15:21Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36677">
<title>CVE-2023-36677</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36677</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smartypants SP Project &amp; Document Manager allows SQL Injection.This issue affects SP Project &amp; Document Manager: from n/a through 4.67.</description>
<dc:date>2023-11-03T23:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36769">
<title>CVE-2023-36769</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36769</link>
<description>Microsoft OneNote Spoofing Vulnerability</description>
<dc:date>2023-11-06T23:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38382">
<title>CVE-2023-38382</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38382</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daniel S&Atilde;&para;derstr&Atilde;&para;m / Sidney van de Stouwe Subscribe to Category allows SQL Injection.This issue affects Subscribe to Category: from n/a through 2.7.4.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38391">
<title>CVE-2023-38391</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38391</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themesgrove Onepage Builder allows SQL Injection.This issue affects Onepage Builder: from n/a through 2.4.1.</description>
<dc:date>2023-11-04T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38406">
<title>CVE-2023-38406</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38406</link>
<description>bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a &quot;flowspec overflow.&quot;</description>
<dc:date>2023-11-06T06:15:40Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38407">
<title>CVE-2023-38407</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38407</link>
<description>bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.</description>
<dc:date>2023-11-06T06:15:40Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469">
<title>CVE-2023-38469</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469</link>
<description>A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470">
<title>CVE-2023-38470</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470</link>
<description>A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38471">
<title>CVE-2023-38471</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38471</link>
<description>A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38472">
<title>CVE-2023-38472</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38472</link>
<description>A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38473">
<title>CVE-2023-38473</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38473</link>
<description>A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.</description>
<dc:date>2023-11-02T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3893">
<title>CVE-2023-3893</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3893</link>
<description>A security issue was discovered in Kubernetes where a user that can
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.</description>
<dc:date>2023-11-03T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38965">
<title>CVE-2023-38965</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38965</link>
<description>Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39042">
<title>CVE-2023-39042</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39042</link>
<description>An information leak in Gyouza-newhushimi v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39047">
<title>CVE-2023-39047</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39047</link>
<description>An information leak in shouzu sweets oz v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39048">
<title>CVE-2023-39048</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39048</link>
<description>An information leak in Tokudaya.honten v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39050">
<title>CVE-2023-39050</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39050</link>
<description>An information leak in Daiky-value.Fukueten v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39051">
<title>CVE-2023-39051</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39051</link>
<description>An information leak in VISION MEAT WORKS Track Diner 10/10mbl v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39053">
<title>CVE-2023-39053</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39053</link>
<description>An information leak in Hattoriya v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39054">
<title>CVE-2023-39054</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39054</link>
<description>An information leak in Tokudaya.ekimae_mc v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39057">
<title>CVE-2023-39057</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39057</link>
<description>An information leak in hirochanKAKIwaiting v13.6.1 allows attackers to obtain the channel access token and send crafted messages.</description>
<dc:date>2023-11-02T22:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3909">
<title>CVE-2023-3909</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3909</link>
<description>An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.3 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A Regular Expression Denial of Service was possible by adding a large string in timeout input in gitlab-ci.yml file.</description>
<dc:date>2023-11-06T13:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39281">
<title>CVE-2023-39281</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39281</link>
<description>A stack buffer overflow vulnerability discovered in AsfSecureBootDxe in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to run arbitrary code execution during the DXE phase.</description>
<dc:date>2023-11-01T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39283">
<title>CVE-2023-39283</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39283</link>
<description>An SMM memory corruption vulnerability in the SMM driver (SMRAM write) in CsmInt10HookSmm in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to send arbitrary data to SMM which could lead to privilege escalation.</description>
<dc:date>2023-11-02T22:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39284">
<title>CVE-2023-39284</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39284</link>
<description>An issue was discovered in IhisiServicesSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There are arbitrary calls to SetVariable with unsanitized arguments in the SMI handler.</description>
<dc:date>2023-11-02T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39299">
<title>CVE-2023-39299</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39299</link>
<description>A path traversal vulnerability has been reported to affect Music Station. If exploited, the vulnerability could allow users to read the contents of unexpected files and expose sensitive data via a network.
We have already fixed the vulnerability in the following versions:
Music Station 4.8.11 and later
Music Station 5.1.16 and later
Music Station 5.3.23 and later</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39301">
<title>CVE-2023-39301</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39301</link>
<description>A server-side request forgery (SSRF) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read application data via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2514 build 20230906 and later
QTS 5.1.1.2491 build 20230815 and later
QuTS hero h5.0.1.2515 build 20230907 and later
QuTS hero h5.1.1.2488 build 20230812 and later
QuTScloud c5.1.0.2498 and later</description>
<dc:date>2023-11-03T17:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39345">
<title>CVE-2023-39345</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39345</link>
<description>strapi is an open-source headless CMS. Versions prior to 4.13.1 did not properly restrict write access to fielded marked as private in the user registration endpoint. As such malicious users may be able to errantly modify their user records. This issue has been addressed in version 4.13.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
<dc:date>2023-11-06T19:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3961">
<title>CVE-2023-3961</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3961</link>
<description>A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3972">
<title>CVE-2023-3972</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3972</link>
<description>A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40061">
<title>CVE-2023-40061</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40061</link>
<description>&Acirc;&nbsp;Insecure
job execution mechanism vulnerability. This
vulnerability can lead to other attacks as a result.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40062">
<title>CVE-2023-40062</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40062</link>
<description>SolarWinds Platform Incomplete List of Disallowed Inputs Remote Code Execution Vulnerability. If executed, this vulnerability would allow a low-privileged user to execute commands with SYSTEM privileges.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40207">
<title>CVE-2023-40207</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40207</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RedNao Donations Made Easy &acirc;&euro;&ldquo; Smart Donations allows SQL Injection.This issue affects Donations Made Easy &acirc;&euro;&ldquo; Smart Donations: from n/a through 4.0.12.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40215">
<title>CVE-2023-40215</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40215</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Demonisblack demon image annotation allows SQL Injection.This issue affects demon image annotation: from n/a through 5.1.</description>
<dc:date>2023-11-04T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4043">
<title>CVE-2023-4043</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4043</link>
<description>In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect.
To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.</description>
<dc:date>2023-11-03T09:15:13Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40609">
<title>CVE-2023-40609</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40609</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aiyaz, maheshpatel Contact form 7 Custom validation allows SQL Injection.This issue affects Contact form 7 Custom validation: from n/a through 1.1.3.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40660">
<title>CVE-2023-40660</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40660</link>
<description>A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.</description>
<dc:date>2023-11-06T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40661">
<title>CVE-2023-40661</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40661</link>
<description>Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow 
compromise key generation, certificate loading, and other card management operations during enrollment.</description>
<dc:date>2023-11-06T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4091">
<title>CVE-2023-4091</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4091</link>
<description>A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module &quot;acl_xattr&quot; is configured with &quot;acl_xattr:ignore system acls = yes&quot;. The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.</description>
<dc:date>2023-11-03T08:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40922">
<title>CVE-2023-40922</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40922</link>
<description>kerawen before v2.5.1 was discovered to contain a SQL injection vulnerability via the ocs_id_cart parameter at KerawenDeliveryModuleFrontController::initContent().</description>
<dc:date>2023-11-04T23:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41164">
<title>CVE-2023-41164</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41164</link>
<description>In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uri_to_iri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41259">
<title>CVE-2023-41259</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41259</link>
<description>Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41260">
<title>CVE-2023-41260</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41260</link>
<description>Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Exposure in responses to mail-gateway REST API calls.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41343">
<title>CVE-2023-41343</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41343</link>
<description>Rogic No-Code Database Builder's file uploading function has insufficient filtering for special characters. A remote attacker with regular user privilege can inject JavaScript to perform XSS (Stored Cross-Site Scripting) attack.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41344">
<title>CVE-2023-41344</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41344</link>
<description>NCSIST ManageEngine Mobile Device Manager(MDM) APP's special function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and read arbitrary system files.</description>
<dc:date>2023-11-03T07:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41345">
<title>CVE-2023-41345</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41345</link>
<description>ASUS RT-AX55&acirc;&euro;&trade;s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-generated module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system, or terminate services.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41346">
<title>CVE-2023-41346</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41346</link>
<description>ASUS RT-AX55&acirc;&euro;&trade;s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41347">
<title>CVE-2023-41347</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41347</link>
<description>ASUS RT-AX55&acirc;&euro;&trade;s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41348">
<title>CVE-2023-41348</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41348</link>
<description>ASUS RT-AX55&acirc;&euro;&trade;s authentication-related function has a vulnerability of insufficient filtering of special characters within its code-authentication module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41350">
<title>CVE-2023-41350</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41350</link>
<description>Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of insufficient measures to prevent multiple failed authentication attempts. An unauthenticated remote attacker can execute a crafted Javascript to expose captcha in page, making it very easy for bots to bypass the captcha check and more susceptible to brute force attacks.</description>
<dc:date>2023-11-03T05:15:29Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41351">
<title>CVE-2023-41351</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41351</link>
<description>Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service.</description>
<dc:date>2023-11-03T06:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41352">
<title>CVE-2023-41352</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41352</link>
<description>Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of insufficient filtering for user input. A remote attacker with administrator privilege can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.</description>
<dc:date>2023-11-03T06:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41353">
<title>CVE-2023-41353</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41353</link>
<description>Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of weak password requirements. A remote attacker with regular user privilege can easily infer the administrator password from system information after logging system, resulting in admin access and performing arbitrary system operations or disrupt service.</description>
<dc:date>2023-11-03T06:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41354">
<title>CVE-2023-41354</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41354</link>
<description>Chunghwa Telecom NOKIA G-040W-Q Firewall function does not block ICMP TIMESTAMP requests by default, an unauthenticated remote attacker can exploit this vulnerability by sending a crafted package, resulting in partially sensitive information exposed to an actor.</description>
<dc:date>2023-11-03T06:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41355">
<title>CVE-2023-41355</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41355</link>
<description>Chunghwa Telecom NOKIA G-040W-Q Firewall function has a vulnerability of input validation for ICMP redirect messages. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted package to modify the network routing table, resulting in a denial of service or sensitive information leaking.</description>
<dc:date>2023-11-03T06:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41356">
<title>CVE-2023-41356</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41356</link>
<description>NCSIST ManageEngine Mobile Device Manager(MDM) APP's special function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and read arbitrary system files.</description>
<dc:date>2023-11-03T07:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41357">
<title>CVE-2023-41357</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41357</link>
<description>Galaxy Software Services Corporation Vitals ESP is an online knowledge base management portal, it has insufficient filtering and validation during file upload. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload and execute scripts onto arbitrary directories to perform arbitrary system operations or disrupt service.</description>
<dc:date>2023-11-03T07:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41378">
<title>CVE-2023-41378</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41378</link>
<description>In certain conditions for Calico Typha (v3.26.2, v3.25.1 and below), and Calico Enterprise Typha (v3.17.1, v3.16.3, v3.15.3 and below), a client TLS handshake can block the Calico Typha server indefinitely, resulting in denial of service. The TLS Handshake() call is performed inside the main server handle for loop without any timeout allowing an unclean TLS handshake to block the main loop indefinitely while other connections will be idle waiting for that handshake to finish.</description>
<dc:date>2023-11-06T16:15:42Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41652">
<title>CVE-2023-41652</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41652</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 10.6.6.</description>
<dc:date>2023-11-03T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41685">
<title>CVE-2023-41685</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41685</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ilGhera Woocommerce Support System allows SQL Injection.This issue affects Woocommerce Support System: from n/a through 1.2.1.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41725">
<title>CVE-2023-41725</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41725</link>
<description>Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability</description>
<dc:date>2023-11-03T20:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41726">
<title>CVE-2023-41726</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41726</link>
<description>Ivanti Avalanche Incorrect Default Permissions allows Local Privilege Escalation Vulnerability</description>
<dc:date>2023-11-03T20:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41914">
<title>CVE-2023-41914</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41914</link>
<description>SchedMD Slurm 23.02.x before 23.02.6 and 22.05.x before 22.05.10 allows filesystem race conditions for gaining ownership of a file, overwriting a file, or deleting files.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4197">
<title>CVE-2023-4197</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4197</link>
<description>Improper input validation in Dolibarr ERP CRM &lt;= v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code.</description>
<dc:date>2023-11-01T08:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4198">
<title>CVE-2023-4198</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4198</link>
<description>Improper Access Control in Dolibarr ERP CRM &lt;= v17.0.3 allows an unauthorized authenticated user to read a database table containing customer data</description>
<dc:date>2023-11-01T09:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42027">
<title>CVE-2023-42027</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42027</link>
<description>IBM CICS TX Standard 11.1, Advanced 10.1, 11.1, and TXSeries for Multiplatforms 8.1, 8.2, 9.1 are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 266057.</description>
<dc:date>2023-11-03T00:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42029">
<title>CVE-2023-42029</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42029</link>
<description>IBM CICS TX Standard 11.1, Advanced 10.1, 11.1, and TXSeries for Multiplatforms 8.1, 8.2, 9.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 266059.</description>
<dc:date>2023-11-03T00:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4217">
<title>CVE-2023-4217</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4217</link>
<description>A vulnerability has been identified in PT-G503 Series versions prior to v5.2, where the session cookies attribute is not set properly in the affected application. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.</description>
<dc:date>2023-11-02T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42299">
<title>CVE-2023-42299</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42299</link>
<description>Buffer Overflow vulnerability in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_subimage_data function.</description>
<dc:date>2023-11-02T22:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42631">
<title>CVE-2023-42631</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42631</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42632">
<title>CVE-2023-42632</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42632</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42633">
<title>CVE-2023-42633</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42633</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42634">
<title>CVE-2023-42634</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42634</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42635">
<title>CVE-2023-42635</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42635</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42636">
<title>CVE-2023-42636</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42636</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42637">
<title>CVE-2023-42637</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42637</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42638">
<title>CVE-2023-42638</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42638</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42639">
<title>CVE-2023-42639</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42639</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42640">
<title>CVE-2023-42640</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42640</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42641">
<title>CVE-2023-42641</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42641</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42642">
<title>CVE-2023-42642</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42642</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42643">
<title>CVE-2023-42643</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42643</link>
<description>In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42644">
<title>CVE-2023-42644</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42644</link>
<description>In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42645">
<title>CVE-2023-42645</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42645</link>
<description>In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42646">
<title>CVE-2023-42646</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42646</link>
<description>In Ifaa service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42647">
<title>CVE-2023-42647</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42647</link>
<description>In Ifaa service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42648">
<title>CVE-2023-42648</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42648</link>
<description>In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42649">
<title>CVE-2023-42649</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42649</link>
<description>In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42650">
<title>CVE-2023-42650</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42650</link>
<description>In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42651">
<title>CVE-2023-42651</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42651</link>
<description>In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42652">
<title>CVE-2023-42652</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42652</link>
<description>In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42653">
<title>CVE-2023-42653</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42653</link>
<description>In faceid service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42654">
<title>CVE-2023-42654</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42654</link>
<description>In dm service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42655">
<title>CVE-2023-42655</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42655</link>
<description>In sim service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42669">
<title>CVE-2023-42669</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42669</link>
<description>A vulnerability was found in Samba's &quot;rpcecho&quot; development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the &quot;rpcecho&quot; service operates with only one worker in the main RPC task, allowing calls to the &quot;rpcecho&quot; server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a &quot;sleep()&quot; call in the &quot;dcesrv_echo_TestSleep()&quot; function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the &quot;rpcecho&quot; server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as &quot;rpcecho&quot; runs in the main RPC task.</description>
<dc:date>2023-11-06T07:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42670">
<title>CVE-2023-42670</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42670</link>
<description>A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation &quot;classic DCs&quot;) can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as &quot;The procedure number is out of range&quot; when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.</description>
<dc:date>2023-11-03T08:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42750">
<title>CVE-2023-42750</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42750</link>
<description>In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed</description>
<dc:date>2023-11-01T10:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42802">
<title>CVE-2023-42802</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42802</link>
<description>GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10, an unverified object instantiation allows one to upload malicious PHP files to unwanted directories. Depending on web server configuration and available system libraries, malicious PHP files can then be executed through a web server request. Version 10.0.10 fixes this issue. As a workaround, remove write access on `/ajax` and `/front` files to the web server.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43018">
<title>CVE-2023-43018</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43018</link>
<description>IBM CICS TX Standard 11.1 and Advanced 10.1, 11.1 performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 266163.</description>
<dc:date>2023-11-03T00:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43076">
<title>CVE-2023-43076</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43076</link>
<description>Dell PowerScale OneFS 8.2.x,9.0.0.x-9.5.0.x contains a denial-of-service vulnerability. A low privilege remote attacker could potentially exploit this vulnerability to cause an out of memory (OOM) condition.</description>
<dc:date>2023-11-02T11:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43087">
<title>CVE-2023-43087</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43087</link>
<description>Dell PowerScale OneFS 8.2.x, 9.0.0.x-9.5.0.x contains an improper handling of insufficient permissions. A low privileged remote attacker could potentially exploit this vulnerability to cause information disclosure.</description>
<dc:date>2023-11-02T11:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43193">
<title>CVE-2023-43193</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43193</link>
<description>Submitty before v22.06.00 is vulnerable to Cross Site Scripting (XSS). An attacker can create a malicious link in the forum that leads to XSS.</description>
<dc:date>2023-11-02T12:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43194">
<title>CVE-2023-43194</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43194</link>
<description>Submitty before v22.06.00 is vulnerable to Incorrect Access Control. An attacker can delete any post in the forum by modifying request parameter.</description>
<dc:date>2023-11-02T22:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43336">
<title>CVE-2023-43336</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43336</link>
<description>Sangoma Technologies FreePBX before cdr 15.0.18, 16.0.40, 15.0.16, and 16.0.17 was discovered to contain an access control issue via a modified parameter value, e.g., changing extension=self to extension=101.</description>
<dc:date>2023-11-02T12:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43665">
<title>CVE-2023-43665</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43665</link>
<description>In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43982">
<title>CVE-2023-43982</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43982</link>
<description>Bon Presta boninstagramcarousel between v5.2.1 to v7.0.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the url parameter at insta_parser.php. This vulnerability allows attackers to use the vulnerable website as proxy to attack other websites or exfiltrate data via a HTTP call.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44025">
<title>CVE-2023-44025</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44025</link>
<description>SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component.</description>
<dc:date>2023-11-01T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44271">
<title>CVE-2023-44271</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44271</link>
<description>An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44398">
<title>CVE-2023-44398</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44398</link>
<description>Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
<dc:date>2023-11-06T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4452">
<title>CVE-2023-4452</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4452</link>
<description>A vulnerability has been identified in the EDR-810, EDR-G902, and EDR-G903 Series, making them vulnerable to the denial-of-service vulnerability. This vulnerability stems from insufficient input validation in the URI, potentially enabling malicious users to trigger the device reboot.</description>
<dc:date>2023-11-01T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44954">
<title>CVE-2023-44954</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44954</link>
<description>Cross Site Scripting vulnerability in BigTree CMS v.4.5.7 allows a remote attacker to execute arbitrary code via the ID parameter in the Developer Settings functions.</description>
<dc:date>2023-11-01T23:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45001">
<title>CVE-2023-45001</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45001</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Castos Seriously Simple Stats allows SQL Injection.This issue affects Seriously Simple Stats: from n/a through 1.5.0.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45012">
<title>CVE-2023-45012</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45012</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.&Acirc;&nbsp;The 'user_email' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45013">
<title>CVE-2023-45013</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45013</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'user_query' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45014">
<title>CVE-2023-45014</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45014</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'bus_id' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45015">
<title>CVE-2023-45015</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45015</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'date' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45016">
<title>CVE-2023-45016</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45016</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'source' parameter of the search.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45017">
<title>CVE-2023-45017</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45017</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'destination' parameter of the search.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45018">
<title>CVE-2023-45018</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45018</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the includes/login.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45019">
<title>CVE-2023-45019</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45019</link>
<description>Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'category' parameter of the category.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T03:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45024">
<title>CVE-2023-45024</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45024</link>
<description>Best Practical Request Tracker (RT) 5 before 5.0.5 allows Information Disclosure via a transaction search in the transaction query builder.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45046">
<title>CVE-2023-45046</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45046</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pressference Pressference Exporter allows SQL Injection.This issue affects Pressference Exporter: from n/a through 1.0.3.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45055">
<title>CVE-2023-45055</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45055</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in InspireUI MStore API allows SQL Injection.This issue affects MStore API: from n/a through 4.0.6.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45069">
<title>CVE-2023-45069</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45069</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Video Gallery by Total-Soft Video Gallery &acirc;&euro;&ldquo; Best WordPress YouTube Gallery Plugin allows SQL Injection.This issue affects Video Gallery &acirc;&euro;&ldquo; Best WordPress YouTube Gallery Plugin: from n/a through 2.1.3.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45074">
<title>CVE-2023-45074</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45074</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Page Visit Counter Advanced Page Visit Counter &acirc;&euro;&ldquo; Most Wanted Analytics Plugin for WordPress allows SQL Injection.This issue affects Advanced Page Visit Counter &acirc;&euro;&ldquo; Most Wanted Analytics Plugin for WordPress: from n/a through 7.1.1.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45111">
<title>CVE-2023-45111</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45111</link>
<description>Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.&Acirc;&nbsp;The 'email' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T02:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45112">
<title>CVE-2023-45112</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45112</link>
<description>Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'feedback' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T02:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45113">
<title>CVE-2023-45113</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45113</link>
<description>Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'name' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T02:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45114">
<title>CVE-2023-45114</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45114</link>
<description>Online Examination System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'subject' parameter of the feed.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T02:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45161">
<title>CVE-2023-45161</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45161</link>
<description>The 1E-Exchange-URLResponseTime instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the URL parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions.
To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-URLResponseTime instruction to v20.1 by uploading it through the 1E Platform instruction upload UI</description>
<dc:date>2023-11-06T13:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45163">
<title>CVE-2023-45163</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45163</link>
<description>The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions.
To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI</description>
<dc:date>2023-11-06T13:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45189">
<title>CVE-2023-45189</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45189</link>
<description>A vulnerability in IBM Robotic Process Automation and IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.10, 23.0.0 through 23.0.10 may result in access to client vault credentials. This difficult to exploit vulnerability could allow a low privileged attacker to programmatically access client vault credentials. IBM X-Force ID: 268752.</description>
<dc:date>2023-11-03T23:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45201">
<title>CVE-2023-45201</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45201</link>
<description>Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities.&Acirc;&nbsp;The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.</description>
<dc:date>2023-11-01T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45202">
<title>CVE-2023-45202</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45202</link>
<description>Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the feed.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.</description>
<dc:date>2023-11-01T23:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45203">
<title>CVE-2023-45203</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45203</link>
<description>Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the login.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.</description>
<dc:date>2023-11-01T23:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45323">
<title>CVE-2023-45323</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45323</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities.&Acirc;&nbsp;The 'name' parameter of the routers/add-item.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45324">
<title>CVE-2023-45324</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45324</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'price' parameter of the routers/add-item.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45325">
<title>CVE-2023-45325</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45325</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'address' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45326">
<title>CVE-2023-45326</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45326</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'email' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45327">
<title>CVE-2023-45327</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45327</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'name' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45328">
<title>CVE-2023-45328</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45328</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45329">
<title>CVE-2023-45329</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45329</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'role' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45330">
<title>CVE-2023-45330</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45330</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45331">
<title>CVE-2023-45331</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45331</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'contact' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45332">
<title>CVE-2023-45332</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45332</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'deleted' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45333">
<title>CVE-2023-45333</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45333</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'verified' parameter of the routers/add-users.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45334">
<title>CVE-2023-45334</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45334</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'status' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45335">
<title>CVE-2023-45335</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45335</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45336">
<title>CVE-2023-45336</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45336</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45337">
<title>CVE-2023-45337</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45337</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45338">
<title>CVE-2023-45338</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45338</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45339">
<title>CVE-2023-45339</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45339</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'type' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45340">
<title>CVE-2023-45340</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45340</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/details-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45341">
<title>CVE-2023-45341</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45341</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_price' parameter of the routers/menu-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45342">
<title>CVE-2023-45342</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45342</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/register-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45343">
<title>CVE-2023-45343</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45343</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'ticket_id' parameter of the routers/ticket-message.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:13Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45344">
<title>CVE-2023-45344</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45344</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_balance' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T14:15:13Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45345">
<title>CVE-2023-45345</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45345</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45346">
<title>CVE-2023-45346</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45346</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_role' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45347">
<title>CVE-2023-45347</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45347</link>
<description>Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_verified' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4535">
<title>CVE-2023-4535</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4535</link>
<description>An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.</description>
<dc:date>2023-11-06T17:15:12Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45360">
<title>CVE-2023-45360</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45360</link>
<description>An issue was discovered in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is XSS in youhavenewmessagesmanyusers and youhavenewmessages i18n messages. This is related to MediaWiki:Youhavenewmessagesfromusers.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45362">
<title>CVE-2023-45362</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45362</link>
<description>An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka &quot;X intermediate revisions by the same user not shown&quot;) ignores username suppression. This is an information leak.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45556">
<title>CVE-2023-45556</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45556</link>
<description>Cross Site Scripting vulnerability in Mybb Mybb Forums v.1.8.33 allows a local attacker to execute arbitrary code via the theme Name parameter in the theme management component.</description>
<dc:date>2023-11-06T22:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45657">
<title>CVE-2023-45657</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45657</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSIMYTH Nexter allows SQL Injection.This issue affects Nexter: from n/a through 2.0.3.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45827">
<title>CVE-2023-45827</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45827</link>
<description>Dot diver is a lightweight, powerful, and dependency-free TypeScript utility library that provides types and functions to work with object paths in dot notation. In versions prior to 1.0.2 there is a Prototype Pollution vulnerability in the `setByPath` function which can leads to remote code execution (RCE). This issue has been addressed in commit `98daf567` which has been included in release 1.0.2. Users are advised to upgrade. There are no known workarounds to this vulnerability.</description>
<dc:date>2023-11-06T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45830">
<title>CVE-2023-45830</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-45830</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Online ADA Accessibility Suite by Online ADA allows SQL Injection.This issue affects Accessibility Suite by Online ADA: from n/a through 4.11.</description>
<dc:date>2023-11-06T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4591">
<title>CVE-2023-4591</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4591</link>
<description>A local file inclusion vulnerability has been found in WPN-XM Serverstack affecting version 0.8.6, which would allow an unauthenticated user to perform a local file inclusion (LFI) via the /tools/webinterface/index.php?page parameter by sending a GET request. This vulnerability could lead to the loading of a PHP file on the server, leading to a critical webshell exploit.</description>
<dc:date>2023-11-03T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4592">
<title>CVE-2023-4592</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4592</link>
<description>A Cross-Site Scripting vulnerability has been detected in WPN-XM Serverstack affecting version 0.8.6. This vulnerability could allow a remote attacker to send a specially crafted JavaScript payload through the /tools/webinterface/index.php parameter and retrieve the cookie session details of an authenticated user, resulting in a session hijacking.</description>
<dc:date>2023-11-03T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46084">
<title>CVE-2023-46084</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46084</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bPlugins LLC Icons Font Loader allows SQL Injection.This issue affects Icons Font Loader: from n/a through 1.1.2.</description>
<dc:date>2023-11-06T10:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46176">
<title>CVE-2023-46176</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46176</link>
<description>IBM MQ Appliance 9.3 CD could allow a local attacker to gain elevated privileges on the system, caused by improper validation of security keys. IBM X-Force ID: 269535.</description>
<dc:date>2023-11-03T01:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4625">
<title>CVE-2023-4625</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4625</link>
<description>Improper Restriction of Excessive Authentication Attempts vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules Web server function allows a remote unauthenticated attacker to prevent legitimate users from logging into the Web server function for a certain period after the attacker has attempted to log in illegally by continuously attempting unauthorized login to the Web server function. The impact of this vulnerability will persist while the attacker continues to attempt unauthorized login.</description>
<dc:date>2023-11-06T05:15:15Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46251">
<title>CVE-2023-46251</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46251</link>
<description>MyBB is a free and open source forum software. Custom MyCode (BBCode) for the visual editor (_SCEditor_) doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. This weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Message) and operates on a maliciously crafted MyCode message. This may occur on pages where message content is pre-filled using a GET/POST parameter, or on reply pages where a previously saved malicious message is quoted. The impact is be mitigated when: 1. the visual editor is disabled globally (_Admin CP ? Configuration ? Settings ? Clickable Smilies and BB Code: [Clickable MyCode Editor](https://github.com/mybb/mybb/blob/mybb_1836/install/resources/settings.xml#L2087-L2094)_ is set to _Off_), or 2. the visual editor is disabled for individual user accounts (_User CP ? Your Profile ? Edit Options_: _Show the MyCode formatting options on the posting pages_ checkbox is not checked). MyBB 1.8.37 resolves this issue with the commit `6dcaf0b4d`. Users are advised to upgrade. Users unable to upgrade may mitigate the impact without upgrading MyBB by changing the following setting (_Admin CP ? Configuration ? Settings_):
- _Clickable Smilies and BB Code ? [Clickable MyCode Editor](https://github.com/mybb/mybb/blob/mybb_1836/install/resources/settings.xml#L2087-L2094)_: _Off_. Similarly, individual MyBB forum users are able to disable the visual editor by diabling the account option (_User CP ? Your Profile ? Edit Options_) _Show the MyCode formatting options on the posting pages_.</description>
<dc:date>2023-11-06T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46254">
<title>CVE-2023-46254</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46254</link>
<description>capsule-proxy is a reverse proxy for Capsule kubernetes multi-tenancy framework. A bug in the RoleBinding reflector used by `capsule-proxy` gives ServiceAccount tenant owners the right to list Namespaces of other tenants backed by the same owner kind and name. For example consider two tenants `solar` and `wind`. Tenant `solar`, owned by a ServiceAccount named `tenant-owner` in the Namespace `solar`. Tenant `wind`, owned by a ServiceAccount named `tenant-owner` in the Namespace `wind`. The Tenant owner `solar` would be able to list the namespaces of the Tenant `wind` and vice-versa, although this is not correct. The bug introduces an exfiltration vulnerability since allows the listing of Namespace resources of other Tenants, although just in some specific conditions: 1. `capsule-proxy` runs with the `--disable-caching=false` (default value: `false`) and 2. Tenant owners are ServiceAccount, with the same resource name, but in different Namespaces. This vulnerability doesn't allow any privilege escalation on the outer tenant Namespace-scoped resources, since the Kubernetes RBAC is enforcing this. This issue has been addressed in version 0.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
<dc:date>2023-11-06T19:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46327">
<title>CVE-2023-46327</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46327</link>
<description>Multiple MFPs (multifunction printers) provided by FUJIFILM Business Innovation Corp. and Xerox Corporation provide a facility to export the contents of their Address Book with encrypted form, but the encryption strength is insufficient. With the knowledge of the encryption process and the encryption key, the information such as the server credentials may be obtained from the exported Address Book data. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].</description>
<dc:date>2023-11-02T03:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46352">
<title>CVE-2023-46352</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46352</link>
<description>In the module &quot;Pixel Plus: Events + CAPI + Pixel Catalog for Facebook Module&quot; (facebookconversiontrackingplus) up to version 2.4.9 from Smart Modules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer table such as name / surname / email.</description>
<dc:date>2023-11-02T22:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46380">
<title>CVE-2023-46380</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46380</link>
<description>LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices send password-change requests via cleartext HTTP.</description>
<dc:date>2023-11-04T23:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46381">
<title>CVE-2023-46381</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46381</link>
<description>LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI.</description>
<dc:date>2023-11-04T23:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46382">
<title>CVE-2023-46382</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46382</link>
<description>LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login.</description>
<dc:date>2023-11-04T23:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46404">
<title>CVE-2023-46404</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46404</link>
<description>PCRS &lt;= 3.11 (d0de1e) &acirc;&euro;&oelig;Questions&acirc;&euro;&#65533; page and &acirc;&euro;&oelig;Code editor&acirc;&euro;&#65533; page are vulnerable to remote code execution (RCE) by escaping Python sandboxing.</description>
<dc:date>2023-11-03T16:15:31Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46428">
<title>CVE-2023-46428 (hadsky)</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46428</link>
<description>An arbitrary file upload vulnerability in HadSky v7.12.10 allows attackers to execute arbitrary code via a crafted file.</description>
<dc:date>2023-11-01T21:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46448">
<title>CVE-2023-46448</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46448</link>
<description>Reflected Cross-Site Scripting (XSS) vulnerability in dmpop Mejiro Commit Versions Prior To 3096393 allows attackers to run arbitrary code via crafted string in metadata of uploaded images.</description>
<dc:date>2023-11-01T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46475">
<title>CVE-2023-46475</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46475</link>
<description>A Stored Cross-Site Scripting vulnerability was discovered in ZenTao 18.3 where a user can create a project, and in the name field of the project, they can inject malicious JavaScript code.</description>
<dc:date>2023-11-02T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46482">
<title>CVE-2023-46482</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46482</link>
<description>SQL injection vulnerability in wuzhicms v.4.1.0 allows a remote attacker to execute arbitrary code via the Database Backup Functionality in the coreframe/app/database/admin/index.php component.</description>
<dc:date>2023-11-01T19:15:45Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46517">
<title>CVE-2023-46517</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46517</link>
<description>** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46595">
<title>CVE-2023-46595</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46595</link>
<description>Net-NTLM leak in Fireflow A32.20 and A32.50 allows an attacker&Acirc;&nbsp;to obtain victim&acirc;&euro;&trade;s domain credentials and Net-NTLM hash which can lead&Acirc;&nbsp;to relay domain attacks.</description>
<dc:date>2023-11-02T08:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46695">
<title>CVE-2023-46695</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46695</link>
<description>An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.</description>
<dc:date>2023-11-02T06:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46724">
<title>CVE-2023-46724</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46724</link>
<description>Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.</description>
<dc:date>2023-11-01T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46725">
<title>CVE-2023-46725</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46725</link>
<description>FoodCoopShop is open source software for food coops and local shops. Versions starting with 3.2.0 prior to 3.6.1 are vulnerable to server-side request forgery. In the Network module, a manufacturer account can use the `/api/updateProducts.json` endpoint to make the server send a request to an arbitrary host. This means that the server can be used as a proxy into the internal network where the server is. Furthermore, the checks on a valid image are not adequate, leading to a time of check time of use issue. For example, by using a custom server that returns 200 on HEAD requests, then return a valid image on first GET request and then a 302 redirect to final target on second GET request, the server will copy whatever file is at the redirect destination, making this a full SSRF. Version 3.6.1 fixes this vulnerability.</description>
<dc:date>2023-11-02T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46728">
<title>CVE-2023-46728</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46728</link>
<description>Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.</description>
<dc:date>2023-11-06T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46731">
<title>CVE-2023-46731</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46731</link>
<description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki doesn't properly escape the section URL parameter that is used in the code for displaying administration sections. This allows any user with read access to the document `XWiki.AdminSheet` (by default, everyone including unauthenticated users) to execute code including Groovy code. This impacts the confidentiality, integrity and availability of the whole XWiki instance. This vulnerability has been patched in XWiki 14.10.14, 15.6 RC1 and 15.5.1. Users are advised to upgrade. Users unablr to upgrade may apply the fix in commit `fec8e0e53f9` manually. Alternatively, to protect against attacks from unauthenticated users, view right for guests can be removed from this document (it is only needed for space and wiki admins).</description>
<dc:date>2023-11-06T19:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46732">
<title>CVE-2023-46732</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46732</link>
<description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.</description>
<dc:date>2023-11-06T19:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46775">
<title>CVE-2023-46775</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46775</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in Djo Original texts Yandex WebMaster plugin &lt;=&Acirc;&nbsp;1.18 versions.</description>
<dc:date>2023-11-06T11:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46776">
<title>CVE-2023-46776</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46776</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in Serena Villa Auto Excerpt everywhere plugin &lt;=&Acirc;&nbsp;1.5 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46777">
<title>CVE-2023-46777</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46777</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in Custom Login Page | Temporary Users | Rebrand Login | Login Captcha plugin &lt;=&Acirc;&nbsp;1.1.3 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46778">
<title>CVE-2023-46778</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46778</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in TheFreeWindows Auto Limit Posts Reloaded plugin &lt;=&Acirc;&nbsp;2.5 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46779">
<title>CVE-2023-46779</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46779</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in EasyRecipe plugin &lt;=&Acirc;&nbsp;3.5.3251 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46780">
<title>CVE-2023-46780</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46780</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in Alter plugin &lt;=&Acirc;&nbsp;1.0 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46781">
<title>CVE-2023-46781</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46781</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in Roland Murg Current Menu Item for Custom Post Types plugin &lt;=&Acirc;&nbsp;1.5 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46782">
<title>CVE-2023-46782</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46782</link>
<description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Chris Yee MomentoPress for Momento360 plugin &lt;=&Acirc;&nbsp;1.0.1 versions.</description>
<dc:date>2023-11-06T10:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46783">
<title>CVE-2023-46783</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46783</link>
<description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Bright Plugins Pre-Orders for WooCommerce plugin &lt;=&Acirc;&nbsp;1.2.13 versions.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46802">
<title>CVE-2023-46802</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46802</link>
<description>e-Tax software Version3.0.10 and earlier improperly restricts XML external entity references (XXE) due to the configuration of the embedded XML parser. By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.</description>
<dc:date>2023-11-06T02:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46817">
<title>CVE-2023-46817</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46817</link>
<description>An issue was discovered in phpFox before 4.8.14. The url request parameter passed to the /core/redirect route is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by remote, unauthenticated attackers to inject arbitrary PHP objects into the application scope, allowing them to perform a variety of attacks, such as executing arbitrary PHP code.</description>
<dc:date>2023-11-03T05:15:30Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46821">
<title>CVE-2023-46821</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46821</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Milan Petrovic GD Security Headers allows auth. (admin+) SQL Injection.This issue affects GD Security Headers: from n/a through 1.7.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46822">
<title>CVE-2023-46822</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46822</link>
<description>Unauth. Reflected Cross-Site Scripting') vulnerability in Visser Labs Store Exporter for WooCommerce &acirc;&euro;&ldquo; Export Products, Export Orders, Export Subscriptions, and More plugin &lt;=&Acirc;&nbsp;2.7.2 versions.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46823">
<title>CVE-2023-46823</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46823</link>
<description>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Avirtum ImageLinks Interactive Image Builder for WordPress allows SQL Injection.This issue affects ImageLinks Interactive Image Builder for WordPress: from n/a through 1.5.4.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46824">
<title>CVE-2023-46824</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46824</link>
<description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Om Ak Solutions Slick Popup: Contact Form 7 Popup Plugin plugin &lt;=&Acirc;&nbsp;1.7.14 versions.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46846">
<title>CVE-2023-46846</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46846</link>
<description>SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.</description>
<dc:date>2023-11-03T08:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46847">
<title>CVE-2023-46847</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46847</link>
<description>Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.</description>
<dc:date>2023-11-03T08:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46848">
<title>CVE-2023-46848</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46848</link>
<description>Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.</description>
<dc:date>2023-11-03T08:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46911">
<title>CVE-2023-46911</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46911</link>
<description>There is a Cross Site Scripting (XSS) vulnerability in the choose_style_tree.do interface of Jspxcms v10.2.0 backend.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46925">
<title>CVE-2023-46925</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46925</link>
<description>Reportico 7.1.21 is vulnerable to Cross Site Scripting (XSS).</description>
<dc:date>2023-11-02T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46927">
<title>CVE-2023-46927</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46927</link>
<description>GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box.</description>
<dc:date>2023-11-01T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46928">
<title>CVE-2023-46928</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46928</link>
<description>GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.</description>
<dc:date>2023-11-01T15:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46930">
<title>CVE-2023-46930</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46930</link>
<description>GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.</description>
<dc:date>2023-11-01T14:15:38Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46931">
<title>CVE-2023-46931</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46931</link>
<description>GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box.</description>
<dc:date>2023-11-01T14:15:38Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46947">
<title>CVE-2023-46947</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46947</link>
<description>Subrion 4.2.1 has a remote command execution vulnerability in the backend.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46954">
<title>CVE-2023-46954</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46954</link>
<description>SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter.</description>
<dc:date>2023-11-03T03:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46958">
<title>CVE-2023-46958</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46958</link>
<description>An issue in lmxcms v.1.41 allows a remote attacker to execute arbitrary code via a crafted script to the admin.php file.</description>
<dc:date>2023-11-02T22:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46963">
<title>CVE-2023-46963</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46963</link>
<description>An issue in Beijing Yunfan Internet Technology Co., Ltd, Yunfan Learning Examination System v.6.5 allows a remote attacker to obtain sensitive information via the password parameter in the login function.</description>
<dc:date>2023-11-04T23:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46964">
<title>CVE-2023-46964</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46964</link>
<description>Cross Site Scripting (XSS) vulnerability in Hillstone Next Generation FireWall SG-6000-e3960 v.5.5 allows a remote attacker to execute arbitrary code via the use front-end filtering instead of back-end filtering.</description>
<dc:date>2023-11-05T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46980">
<title>CVE-2023-46980</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46980</link>
<description>An issue in Best Courier Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the userID parameter.</description>
<dc:date>2023-11-03T16:15:31Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46981">
<title>CVE-2023-46981</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46981</link>
<description>SQL injection vulnerability in Novel-Plus v.4.2.0 allows a remote attacker to execute arbitrary code via a crafted script to the sort parameter in /common/log/list.</description>
<dc:date>2023-11-05T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4699">
<title>CVE-2023-4699</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4699</link>
<description>Insufficient Verification of Data Authenticity vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules and MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to reset the memory of the products to factory default state and cause denial-of-service (DoS) condition on the products by sending specific packets.</description>
<dc:date>2023-11-06T06:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4700">
<title>CVE-2023-4700</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4700</link>
<description>An authorization issue affecting GitLab EE affecting all versions from 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1, allowed a user to run jobs in protected environments, bypassing any required approvals.</description>
<dc:date>2023-11-06T18:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47004">
<title>CVE-2023-47004</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47004</link>
<description>Buffer Overflow vulnerability in Redis RedisGraph v.2.x through v.2.12.8 and fixed in v.2.12.9 allows an attacker to execute arbitrary code via the code logic after valid authentication.</description>
<dc:date>2023-11-06T22:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47177">
<title>CVE-2023-47177</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47177</link>
<description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Yakir Sitbon, Ariel Klikstein Linker plugin &lt;=&Acirc;&nbsp;1.2.1 versions.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47182">
<title>CVE-2023-47182</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47182</link>
<description>Cross-Site Request Forgery (CSRF) leading to a Stored Cross-Site Scripting (XSS) vulnerability in Nazmul Hossain Nihal Login Screen Manager plugin &lt;=&Acirc;&nbsp;3.5.2 versions.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47184">
<title>CVE-2023-47184</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47184</link>
<description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Proper Fraction LLC. Admin Bar &amp; Dashboard Access Control plugin &lt;=&Acirc;&nbsp;1.2.8 versions.</description>
<dc:date>2023-11-06T10:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47185">
<title>CVE-2023-47185</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47185</link>
<description>Unauth. Stored Cross-Site Scripting (XSS) vulnerability in gVectors Team Comments &acirc;&euro;&rdquo; wpDiscuz plugin &lt;=&Acirc;&nbsp;7.6.11 versions.</description>
<dc:date>2023-11-06T11:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47186">
<title>CVE-2023-47186</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47186</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in Kadence WP Kadence WooCommerce Email Designer plugin &lt;=&Acirc;&nbsp;1.5.11 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47204">
<title>CVE-2023-47204</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47204</link>
<description>Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attackers to execute arbitrary Python code.</description>
<dc:date>2023-11-02T06:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47233">
<title>CVE-2023-47233</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47233</link>
<description>The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this &quot;could be exploited in a real world scenario.&quot; This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.</description>
<dc:date>2023-11-03T21:15:17Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47234">
<title>CVE-2023-47234</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47234</link>
<description>An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).</description>
<dc:date>2023-11-03T21:15:17Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47235">
<title>CVE-2023-47235</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47235</link>
<description>An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.</description>
<dc:date>2023-11-03T21:15:17Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47249">
<title>CVE-2023-47249</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47249</link>
<description>In International Color Consortium DemoIccMAX 79ecb74, a CIccXmlArrayType:::ParseText function (for unsigned short) in IccUtilXml.cpp in libIccXML.a has an out-of-bounds read.</description>
<dc:date>2023-11-05T00:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47253">
<title>CVE-2023-47253</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47253</link>
<description>Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.</description>
<dc:date>2023-11-06T06:15:40Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47258">
<title>CVE-2023-47258</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47258</link>
<description>Redmine before 4.2.11 and 5.0.x before 5.0.6 allows XSS in a Markdown formatter.</description>
<dc:date>2023-11-05T04:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47259">
<title>CVE-2023-47259</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47259</link>
<description>Redmine before 4.2.11 and 5.0.x before 5.0.6 allows XSS in the Textile formatter.</description>
<dc:date>2023-11-05T04:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47260">
<title>CVE-2023-47260</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47260</link>
<description>Redmine before 4.2.11 and 5.0.x before 5.0.6 allows XSS via thumbnails.</description>
<dc:date>2023-11-05T04:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47271">
<title>CVE-2023-47271</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47271</link>
<description>PKP-WAL (aka PKP Web Application Library or pkp-lib) before 3.3.0-16, as used in Open Journal Systems (OJS) and other products, does not verify that the file named in an XML document (used for the native import/export plugin) is an image file, before trying to use it for an issue cover image.</description>
<dc:date>2023-11-06T00:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47272">
<title>CVE-2023-47272</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-47272</link>
<description>Roundcube 1.5.x before 1.5.6 and 1.6.x before 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download).</description>
<dc:date>2023-11-06T00:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4767">
<title>CVE-2023-4767</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4767</link>
<description>A CRLF injection vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0. This vulnerability could allow a remote attacker to inject arbitrary HTTP headers and perform HTTP response splitting attacks via the fileName parameter in /STATE_ID/1613157927228/InvSWMetering.csv.</description>
<dc:date>2023-11-03T11:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4768">
<title>CVE-2023-4768</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4768</link>
<description>A CRLF injection vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0. This vulnerability could allow a remote attacker to inject arbitrary HTTP headers and perform HTTP response splitting attacks via the fileName parameter in /STATE_ID/1613157927228/InvSWMetering.pdf.</description>
<dc:date>2023-11-03T11:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4769">
<title>CVE-2023-4769</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4769</link>
<description>A SSRF vulnerability has been found in ManageEngine Desktop Central affecting version 9.1.0, specifically the /smtpConfig.do component. This vulnerability could allow an authenticated attacker to launch targeted attacks, such as a cross-port attack, service enumeration and other attacks via HTTP requests.</description>
<dc:date>2023-11-03T11:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4810">
<title>CVE-2023-4810</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4810</link>
<description>The Responsive Pricing Table WordPress plugin before 5.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)</description>
<dc:date>2023-11-06T21:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4858">
<title>CVE-2023-4858</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4858</link>
<description>The Simple Table Manager WordPress plugin through 1.5.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</description>
<dc:date>2023-11-06T21:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4910">
<title>CVE-2023-4910</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4910</link>
<description>A flaw was found In 3Scale Admin Portal. If a user logs out from the personal tokens page and then presses the back button in the browser, the tokens page is rendered from the browser cache.</description>
<dc:date>2023-11-06T13:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4930">
<title>CVE-2023-4930</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4930</link>
<description>The Front End PM WordPress plugin before 11.4.3 does not block listing the contents of the directories where it stores attachments to private messages, allowing unauthenticated visitors to list and download private attachments if the autoindex feature of the web server is enabled.</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4996">
<title>CVE-2023-4996</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4996</link>
<description>Netskope was made aware of a security vulnerability in its NSClient product for version 100 &amp; prior where a malicious non-admin user can disable the Netskope client by using a specially-crafted package. The root cause of the problem was a user control code when called by a Windows ServiceController did not validate the permissions associated with the user before executing the user control code. This user control code had permissions to terminate the NSClient service.&Acirc;&nbsp;</description>
<dc:date>2023-11-06T11:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5035">
<title>CVE-2023-5035</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5035</link>
<description>A vulnerability has been identified in PT-G503 Series firmware versions prior to v5.2, where the Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the cookie to be transmitted in plaintext over an HTTP session. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.</description>
<dc:date>2023-11-02T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5082">
<title>CVE-2023-5082</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5082</link>
<description>The History Log by click5 WordPress plugin before 1.0.13 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin users when using the Smash Balloon Social Photo Feed plugin alongside it.</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088">
<title>CVE-2023-5088</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5088</link>
<description>A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.</description>
<dc:date>2023-11-03T14:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5090">
<title>CVE-2023-5090</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5090</link>
<description>A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.</description>
<dc:date>2023-11-06T11:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5178">
<title>CVE-2023-5178</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5178</link>
<description>A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation in case that the attacker already has local privileges.</description>
<dc:date>2023-11-01T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5181">
<title>CVE-2023-5181</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5181</link>
<description>The WP Discord Invite WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5228">
<title>CVE-2023-5228</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5228</link>
<description>The User Registration WordPress plugin before 3.0.4.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5352">
<title>CVE-2023-5352</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5352</link>
<description>The Awesome Support WordPress plugin before 6.1.5 does not correctly authorize the wpas_edit_reply function, allowing users to edit posts for which they do not have permission.</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5354">
<title>CVE-2023-5354</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5354</link>
<description>The Awesome Support WordPress plugin before 6.1.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5355">
<title>CVE-2023-5355</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5355</link>
<description>The Awesome Support WordPress plugin before 6.1.5 does not sanitize file paths when deleting temporary attachment files, allowing a ticket submitter to delete arbitrary files on the server.</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5358">
<title>CVE-2023-5358</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5358</link>
<description>Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5408">
<title>CVE-2023-5408</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5408</link>
<description>A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.</description>
<dc:date>2023-11-02T03:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5454">
<title>CVE-2023-5454</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5454</link>
<description>The Templately WordPress plugin before 2.2.6 does not properly authorize the `saved-templates/delete` REST API call, allowing unauthenticated users to delete arbitrary posts.</description>
<dc:date>2023-11-06T21:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5480">
<title>CVE-2023-5480</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5480</link>
<description>Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High)</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5482">
<title>CVE-2023-5482</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5482</link>
<description>Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)</description>
<dc:date>2023-11-01T18:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5530">
<title>CVE-2023-5530</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5530</link>
<description>The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue</description>
<dc:date>2023-11-06T21:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5601">
<title>CVE-2023-5601</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5601</link>
<description>The WooCommerce Ninja Forms Product Add-ons WordPress plugin before 1.7.1 does not validate the file to be uploaded, allowing any unauthenticated users to upload arbitrary files to the server, leading to RCE.</description>
<dc:date>2023-11-06T21:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5605">
<title>CVE-2023-5605</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5605</link>
<description>The URL Shortify WordPress plugin through 1.7.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)</description>
<dc:date>2023-11-06T21:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5606">
<title>CVE-2023-5606</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5606</link>
<description>The ChatBot for WordPress is vulnerable to Stored Cross-Site Scripting via the FAQ Builder in versions 4.8.6 through 4.9.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. NOTE: This vulnerability is a re-introduction of CVE-2023-4253.</description>
<dc:date>2023-11-02T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5625">
<title>CVE-2023-5625</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5625</link>
<description>A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.</description>
<dc:date>2023-11-01T14:15:38Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5627">
<title>CVE-2023-5627</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5627</link>
<description>A vulnerability has been identified in NPort 6000 Series, making the authentication mechanism vulnerable. This vulnerability arises from the incorrect implementation of sensitive information protection, potentially allowing malicious users to gain unauthorized access to the web service.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5678">
<title>CVE-2023-5678</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5678</link>
<description>Issue summary: Generating excessively long X9.42 DH keys or checking
excessively long X9.42 DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_generate_key() to
generate an X9.42 DH key may experience long delays. Likewise, applications
that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.
While DH_check() performs all the necessary checks (as of CVE-2023-3817),
DH_check_pub_key() doesn't make any of these checks, and is therefore
vulnerable for excessively large P and Q parameters.
Likewise, while DH_generate_key() performs a check for an excessively large
P, it doesn't check for an excessively large Q.
An application that calls DH_generate_key() or DH_check_pub_key() and
supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.
DH_generate_key() and DH_check_pub_key() are also called by a number of
other OpenSSL functions. An application calling any of those other
functions may similarly be affected. The other functions affected by this
are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().
Also vulnerable are the OpenSSL pkey command line application when using the
&quot;-pubcheck&quot; option, as well as the OpenSSL genpkey command line application.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.</description>
<dc:date>2023-11-06T16:15:42Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5707">
<title>CVE-2023-5707</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5707</link>
<description>The SEO Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slider' shortcode and post meta in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5719">
<title>CVE-2023-5719</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5719</link>
<description>The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.</description>
<dc:date>2023-11-06T20:15:07Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5763">
<title>CVE-2023-5763</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5763</link>
<description>In Eclipse Glassfish 5 or 6, running with old versions of JDK (lower than 6u211, or &lt; 7u201, or &lt; 8u191), allows remote attackers to load malicious code on the server via access to insecure ORB listeners.</description>
<dc:date>2023-11-03T07:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5765">
<title>CVE-2023-5765</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5765</link>
<description>Improper access control in the password analyzer feature in Devolutions Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to bypass permissions via data source switching.</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5766">
<title>CVE-2023-5766</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5766</link>
<description>A remote code execution vulnerability in Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to remotely execute code from another windows user session on the same host via a specially crafted TCP packet.</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5771">
<title>CVE-2023-5771</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5771</link>
<description>Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages.&Acirc;&nbsp;&Acirc;&nbsp;This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.</description>
<dc:date>2023-11-06T21:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5777">
<title>CVE-2023-5777</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5777</link>
<description>Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately deleted after the crash report transmission is finished, the private key is exposed to the public, which could result in obtaining remote control of the crash report server.</description>
<dc:date>2023-11-06T20:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5823">
<title>CVE-2023-5823</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5823</link>
<description>Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin &lt;=&Acirc;&nbsp;2.2.11 versions.</description>
<dc:date>2023-11-06T12:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5824">
<title>CVE-2023-5824</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5824</link>
<description>Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.</description>
<dc:date>2023-11-03T08:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5825">
<title>CVE-2023-5825</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5825</link>
<description>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.2 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A low-privileged attacker can point a CI/CD Component to an incorrect path and cause the server to exhaust all available memory through an infinite loop and cause Denial of Service.</description>
<dc:date>2023-11-06T11:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5831">
<title>CVE-2023-5831</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5831</link>
<description>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the `super_sidebar_logged_out` feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors.</description>
<dc:date>2023-11-06T11:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5846">
<title>CVE-2023-5846</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5846</link>
<description>Franklin Fueling System TS-550 versions prior to 1.9.23.8960 are vulnerable to attackers decoding admin credentials, resulting in unauthenticated access to the device.</description>
<dc:date>2023-11-02T17:15:11Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5847">
<title>CVE-2023-5847</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5847</link>
<description>Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.</description>
<dc:date>2023-11-01T16:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5849">
<title>CVE-2023-5849</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5849</link>
<description>Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5850">
<title>CVE-2023-5850</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5850</link>
<description>Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5851">
<title>CVE-2023-5851</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5851</link>
<description>Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5852">
<title>CVE-2023-5852</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5852</link>
<description>Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5853">
<title>CVE-2023-5853</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5853</link>
<description>Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5854">
<title>CVE-2023-5854</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5854</link>
<description>Use after free in Profiles in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5855">
<title>CVE-2023-5855</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5855</link>
<description>Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5856">
<title>CVE-2023-5856</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5856</link>
<description>Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5857">
<title>CVE-2023-5857</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5857</link>
<description>Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5858">
<title>CVE-2023-5858</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5858</link>
<description>Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Low)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5859">
<title>CVE-2023-5859</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5859</link>
<description>Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low)</description>
<dc:date>2023-11-01T18:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5860">
<title>CVE-2023-5860</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5860</link>
<description>The Icons Font Loader plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.</description>
<dc:date>2023-11-02T12:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5875">
<title>CVE-2023-5875</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5875</link>
<description>Mattermost Desktop fails to correctly&Acirc;&nbsp;handle permissions or prompt the user for consent on certain sensitive ones allowing media exploitation from a malicious mattermost server</description>
<dc:date>2023-11-02T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5876">
<title>CVE-2023-5876</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5876</link>
<description>Mattermost fails to properly validate a RegExp built off the server URL path, allowing an attacker in control of an enrolled server to mount a Denial Of Service.</description>
<dc:date>2023-11-02T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5910">
<title>CVE-2023-5910</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5910</link>
<description>A vulnerability was found in PopojiCMS 2.0.1 and classified as problematic. This issue affects some unknown processing of the file install.php of the component Web Config. The manipulation of the argument Site Title with the input &lt;script&gt;alert(1)&lt;/script&gt; leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-244229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
<dc:date>2023-11-02T00:15:23Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5916">
<title>CVE-2023-5916</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5916</link>
<description>A vulnerability classified as critical has been found in Lissy93 Dashy 2.1.1. This affects an unknown part of the file /config-manager/save of the component Configuration Handler. The manipulation of the argument config leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-244305 was assigned to this vulnerability.</description>
<dc:date>2023-11-02T11:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5917">
<title>CVE-2023-5917</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5917</link>
<description>A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307.</description>
<dc:date>2023-11-02T11:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5918">
<title>CVE-2023-5918</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5918</link>
<description>A vulnerability, which was classified as critical, was found in SourceCodester Visitor Management System 1.0. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-244308.</description>
<dc:date>2023-11-02T12:15:09Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5919">
<title>CVE-2023-5919</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5919</link>
<description>A vulnerability was found in SourceCodester Company Website CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /dashboard/createblog of the component Create Blog Page. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-244310 is the identifier assigned to this vulnerability.</description>
<dc:date>2023-11-02T14:15:13Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5920">
<title>CVE-2023-5920</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5920</link>
<description>Mattermost Desktop for MacOS fails to utilize the secure keyboard input functionality provided by macOS, allowing for other processes to read the keyboard input.</description>
<dc:date>2023-11-02T09:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5923">
<title>CVE-2023-5923</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5923</link>
<description>A vulnerability classified as critical has been found in Campcodes Simple Student Information System 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-244323.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5924">
<title>CVE-2023-5924</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5924</link>
<description>A vulnerability classified as critical was found in Campcodes Simple Student Information System 1.0. This vulnerability affects unknown code of the file /admin/courses/view_course.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-244324.</description>
<dc:date>2023-11-02T19:15:41Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5925">
<title>CVE-2023-5925</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5925</link>
<description>A vulnerability, which was classified as critical, has been found in Campcodes Simple Student Information System 1.0. This issue affects some unknown processing of the file /classes/Master.php. The manipulation of the argument f leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-244325 was assigned to this vulnerability.</description>
<dc:date>2023-11-02T20:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5926">
<title>CVE-2023-5926</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5926</link>
<description>A vulnerability, which was classified as critical, was found in Campcodes Simple Student Information System 1.0. Affected is an unknown function of the file /admin/students/update_status.php. The manipulation of the argument student_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-244326 is the identifier assigned to this vulnerability.</description>
<dc:date>2023-11-02T20:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5927">
<title>CVE-2023-5927</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5927</link>
<description>A vulnerability has been found in Campcodes Simple Student Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/courses/manage_course.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-244327.</description>
<dc:date>2023-11-02T20:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5928">
<title>CVE-2023-5928</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5928</link>
<description>A vulnerability was found in Campcodes Simple Student Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/departments/manage_department.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-244328.</description>
<dc:date>2023-11-02T20:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5929">
<title>CVE-2023-5929</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5929</link>
<description>A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/students/manage_academic.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-244329 was assigned to this vulnerability.</description>
<dc:date>2023-11-02T21:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5930">
<title>CVE-2023-5930</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5930</link>
<description>A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/students/manage_academic.php. The manipulation of the argument student_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-244330 is the identifier assigned to this vulnerability.</description>
<dc:date>2023-11-02T21:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5945">
<title>CVE-2023-5945</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5945</link>
<description>The video carousel slider with lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the responsive_video_gallery_with_lightbox_video_management_func() function. This makes it possible for unauthenticated attackers to delete videos hosted from the video slider via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</description>
<dc:date>2023-11-03T13:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5946">
<title>CVE-2023-5946</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5946</link>
<description>The Digirisk plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'current_group_id' parameter in version 6.0.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</description>
<dc:date>2023-11-03T14:15:08Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5948">
<title>CVE-2023-5948</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5948</link>
<description>Improper Authorization in GitHub repository teamamaze/amazefileutilities prior to 1.91.</description>
<dc:date>2023-11-03T07:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5950">
<title>CVE-2023-5950</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5950</link>
<description>Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a reflected cross site scripting vulnerability. This vulnerability allows attackers to inject JS into the error path, potentially leading to unauthorized execution of scripts within a user's web browser.&Acirc;&nbsp;This vulnerability is fixed in&Acirc;&nbsp;version 0.7.0-04 and a&Acirc;&nbsp;patch is available to download. Patches are also available for version 0.6.9 (0.6.9-1).</description>
<dc:date>2023-11-06T15:15:14Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5963">
<title>CVE-2023-5963</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5963</link>
<description>An issue has been discovered in GitLab EE with Advanced Search affecting all versions from 13.9 to 16.3.6, 16.4 prior to 16.4.2 and 16.5 prior to 16.5.1 that could allow a denial of service in the Advanced Search function by chaining too many syntax operators.</description>
<dc:date>2023-11-06T13:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5964">
<title>CVE-2023-5964</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5964</link>
<description>The 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions.
To remediate this issue DELETE the instruction&Acirc;&nbsp;&acirc;&euro;&oelig;Show dialogue with caption %Caption% and message %Message%&acirc;&euro;&#65533; from the list of instructions in the Settings UI, and replace it with the new instruction&Acirc;&nbsp;1E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as&Acirc;&nbsp;&acirc;&euro;&oelig;Show %Type% type notification with header %Header% and message %Message%&acirc;&euro;&#65533; with a version of 7.1 or above.</description>
<dc:date>2023-11-06T13:15:10Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5967">
<title>CVE-2023-5967</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5967</link>
<description>Mattermost fails to properly validate requests to the Calls plugin, allowing an attacker sending a request without a User Agent header to cause a panic and crash the Calls plugin</description>
<dc:date>2023-11-06T16:15:42Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5968">
<title>CVE-2023-5968</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5968</link>
<description>Mattermost fails to properly sanitize the user object when updating the username, resulting in the password hash being included in the response body.&Acirc;&nbsp;</description>
<dc:date>2023-11-06T16:15:42Z</dc:date>
</item>
<item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5969">
<title>CVE-2023-5969</title>
<link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5969</link>
<description>Mattermost fails to properly sanitize the request to&Acirc;&nbsp;/api/v4/redirect_location allowing an&Acirc;&nbsp;attacker,&Acirc;&nbsp;sending a specially crafted request to /api/v4/redirect_location,&Acirc;&nbsp;to fill up the memory due to caching large items.</description>
<dc:date>2023-11-06T16:15:42Z</dc:date>
</item>
</rdf:RDF>
If you would like to create a banner that links to this page (i.e. this validation result), do the following:
Download the "valid RSS" banner.
Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)
Add this HTML to your page (change the image src
attribute if necessary):
If you would like to create a text link instead, here is the URL you can use:
http://www.feedvalidator.org/check.cgi?url=https%3A//nvd.nist.gov/feeds/xml/cve/misc/nvd-rss.xml