Security
Headlines
HeadlinesLatestCVEs

Source

CVE

CVE-2023-45682: stb/stb_vorbis.c at 5736b15f7ea0ffb08dd38af21067c314d6a3aae9 · nothings/stb

stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of bounds read in `DECODE` macro when `var` is negative. As it can be seen in the definition of `DECODE_RAW` a negative `var` is a valid value. This issue may be used to leak internal memory allocation information.

CVE
#vulnerability#mac#git
CVE-2023-43346: GitHub - sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend: Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a

Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component.

CVE-2023-32786: Markdown export of a Jupyter notebook demonstrating the abuse of LangChain's APIChain module to access arbitrary URLs

In Langchain through 0.0.155, prompt injection allows an attacker to force the service to retrieve data from an arbitrary URL, essentially providing SSRF and potentially injecting content into downstream tasks.

CVE-2023-32785: Markdown export of a Jupyter notebook demonstrating an SQL injection via LangChain

In Langchain through 0.0.155, prompt injection allows execution of arbitrary code against the SQL service provided by the chain.

CVE-2023-43353: GitHub - sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted s

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the extra parameter in the news menu component.

CVE-2023-43355: GitHub - sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted sc

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again parameters in the My Preferences - Add user component.

CVE-2023-43354: GitHub - sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a cr

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Profiles parameter in the Extensions -MicroTiny WYSIWYG editor component.

CVE-2023-43357: GitHub - sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted scrip

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Title parameter in the Manage Shortcuts component.

CVE-2023-43356: GitHub - sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafte

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata parameter in the Global Settings Menu component.

CVE-2023-5682: cve/sql.md at main · Godfather-onec/cve

A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/training/record/delete.php. The manipulation of the argument RECORD_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-243058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.