Show filters
563 Total Results
Displaying 101-110 of 563
Sort by:
Attacker Value
Unknown

CVE-2023-43295

Disclosure Date: October 31, 2023 (last updated November 09, 2023)
Cross Site Request Forgery vulnerability in Click Studios (SA) Pty Ltd Passwordstate v.Build 9785 and before allows a local attacker to execute arbitrary code via a crafted request.
Attacker Value
Unknown

CVE-2023-45378

Disclosure Date: October 31, 2023 (last updated November 08, 2023)
In the module "PrestaBlog" (prestablog) version 4.4.7 and before from HDclic for PrestaShop, a guest can perform SQL injection. The script ajax slider_positions.php has a sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection.
Attacker Value
Unknown

CVE-2023-46071

Disclosure Date: October 25, 2023 (last updated November 02, 2023)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ClickDatos Protección de Datos RGPD plugin <= 3.1.0 versions.
Attacker Value
Unknown

CVE-2023-44690

Disclosure Date: October 19, 2023 (last updated October 26, 2023)
Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive information via /mycli/config.py
Attacker Value
Unknown

CVE-2023-5632

Disclosure Date: October 18, 2023 (last updated October 26, 2023)
In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6
Attacker Value
Unknown

CVE-2023-36478

Disclosure Date: October 10, 2023 (last updated February 17, 2024)
Eclipse Jetty provides a web server and servlet container. In versions 11.0.0 through 11.0.15, 10.0.0 through 10.0.15, and 9.0.0 through 9.4.52, an integer overflow in `MetaDataBuilder.checkSize` allows for HTTP/2 HPACK header values to exceed their size limit. `MetaDataBuilder.java` determines if a header name or value exceeds the size limit, and throws an exception if the limit is exceeded. However, when length is very large and huffman is true, the multiplication by 4 in line 295 will overflow, and length will become negative. `(_size+length)` will now be negative, and the check on line 296 will not be triggered. Furthermore, `MetaDataBuilder.checkSize` allows for user-entered HPACK header value sizes to be negative, potentially leading to a very large buffer allocation later on when the user-entered size is multiplied by 2. This means that if a user provides a negative length value (or, more precisely, a length value which, when multiplied by the 4/3 fudge factor, is negative), an…
Attacker Value
Unknown

CVE-2023-3592

Disclosure Date: October 02, 2023 (last updated February 14, 2025)
In Mosquitto before 2.0.16, a memory leak occurs when clients send v5 CONNECT packets with a will message that contains invalid property types.
Attacker Value
Unknown

CVE-2023-0809

Disclosure Date: October 02, 2023 (last updated October 09, 2023)
In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.
Attacker Value
Unknown

CVE-2023-41856

Disclosure Date: October 02, 2023 (last updated October 09, 2023)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ClickToTweet.Com Click To Tweet plugin <= 2.0.14 versions.
Attacker Value
Unknown

CVE-2023-4760

Disclosure Date: September 21, 2023 (last updated October 08, 2023)
In Eclipse RAP versions from 3.0.0 up to and including 3.25.0, Remote Code Execution is possible on Windows when using the FileUpload component. The reason for this is a not completely secure extraction of the file name in the FileUploadProcessor.stripFileName(String name) method. As soon as this finds a / in the path, everything before it is removed, but potentially \ (backslashes) coming further back are kept. For example, a file name such as /..\..\webapps\shell.war can be used to upload a file to a Tomcat server under Windows, which is then saved as ..\..\webapps\shell.war in its webapps directory and can then be executed.