Show filters
215 Total Results
Displaying 51-60 of 215
Sort by:
Attacker Value
Unknown
CVE-2023-41895
Disclosure Date: October 19, 2023 (last updated October 27, 2023)
Home assistant is an open source home automation. The Home Assistant login page allows users to use their local Home Assistant credentials and log in to another website that specifies the `redirect_uri` and `client_id` parameters. Although the `redirect_uri` validation typically ensures that it matches the `client_id` and the scheme represents either `http` or `https`, Home Assistant will fetch the `client_id` and check for `<link rel="redirect_uri" href="...">` HTML tags on the page. These URLs are not subjected to the same scheme validation and thus allow for arbitrary JavaScript execution on the Home Assistant administration page via usage of `javascript:` scheme URIs. This Cross-site Scripting (XSS) vulnerability can be executed on the Home Assistant frontend domain, which may be used for a full takeover of the Home Assistant account and installation. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vul…
0
Attacker Value
Unknown
CVE-2023-24385
Disclosure Date: October 17, 2023 (last updated October 25, 2023)
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in David Lingren Media Library Assistant plugin <= 3.11 versions.
0
Attacker Value
Unknown
CVE-2023-45063
Disclosure Date: October 12, 2023 (last updated October 18, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp AI Content Writing Assistant (Content Writer, GPT 3 & 4, ChatGPT, Image Generator) All in One plugin <= 1.1.5 versions.
0
Attacker Value
Unknown
CVE-2023-45356
Disclosure Date: October 09, 2023 (last updated October 13, 2023)
Atos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access, via dtb pages of the platform portal. This is also known as OSFOURK-23719.
0
Attacker Value
Unknown
CVE-2023-45355
Disclosure Date: October 09, 2023 (last updated October 13, 2023)
Atos Unify OpenScape 4000 Platform V10 R1 before Hotfix V10 R1.42.2 and 4000 and Manager Platform V10 R1 before Hotfix V10 R1.42.2 allow command injection by an authenticated attacker into the platform operating system, leading to administrative access via the webservice. This is also known as OSFOURK-24120.
0
Attacker Value
Unknown
CVE-2023-45351
Disclosure Date: October 09, 2023 (last updated October 13, 2023)
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.1, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.42.1, and 4000 Manager V10 R0 allow Authenticated Command Injection via AShbr. This is also known as OSFOURK-24039.
0
Attacker Value
Unknown
CVE-2023-45349
Disclosure Date: October 09, 2023 (last updated October 13, 2023)
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.34.7, 4000 Assistant V10 R1.42.0, 4000 Assistant V10 R0, 4000 Manager V10 R1 before V10 R1.34.7, 4000 Manager V10 R1.42.0, and 4000 Manager V10 R0 expose sensitive information that may allow lateral movement to the backup system via AShbr. This is also known as OSFOURK-23722.
0
Attacker Value
Unknown
CVE-2023-30736
Disclosure Date: October 04, 2023 (last updated October 09, 2023)
Improper authorization in PushMsgReceiver of Samsung Assistant prior to version 8.7.00.1 allows attacker to execute javascript interface. To trigger this vulnerability, user interaction is required.
0
Attacker Value
Unknown
CVE-2023-30735
Disclosure Date: October 04, 2023 (last updated October 09, 2023)
Improper Preservation of Permissions vulnerability in SAssistant prior to version 8.7 allows local attackers to access backup data in SAssistant.
0
Attacker Value
Unknown
CVE-2023-43256
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
0