<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://web.nvd.nist.gov/view/vuln/search">
    <title>National Vulnerability Database</title>
    <link>https://web.nvd.nist.gov/view/vuln/search</link>
    <description>This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.</description>
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-10013" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-10014" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5872" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-10104" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-10105" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21643" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23647" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23930" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36070" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4729" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8597" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23166" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23176" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23178" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23186" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23203" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26263" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26947" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27452" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32269" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32270" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32271" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33589" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33971" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33974" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3429" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36436" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38363" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38364" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43819" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44460" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44461" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44465" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44476" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44547" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44775" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45071" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45111" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2084" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23721" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24035" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24109" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24249" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25091" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25276" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27145" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27146" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27147" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27148" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27978" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27979" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28354" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29604" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29605" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29606" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29607" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29608" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29609" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29944" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31244" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35898" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36190" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36191" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36769" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36788" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36963" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37381" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38530" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38583" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3957" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39989" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40482" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40722" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40723" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40724" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40725" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41397" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41398" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41399" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41400" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41612" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41739" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42335" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43039" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43040" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43042" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43043" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43044" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43045" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43254" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43255" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45064" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45084" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45202" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45204" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45291" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45343" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45456" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45876" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46302" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46489" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46490" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46852" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47086" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47087" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47088" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47089" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47091" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47092" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47093" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47094" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47095" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47158" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47505" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47509" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47598" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47653" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47654" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47656" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47657" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47658" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47659" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47660" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47661" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47662" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47663" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47930" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48150" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48476" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48477" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48481" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0045" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0184" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0190" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0199" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0202" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0203" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0204" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0205" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0206" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0276" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0317" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0388" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0418" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0420" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0424" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0760" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0899" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1020" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1126" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1129" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1255" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1324" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1414" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1420" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1435" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1585" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1586" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1623" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1624" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1731" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1892" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1967" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1998" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2006" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2007" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2019" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20862" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20864" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20865" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20869" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20870" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20871" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20872" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20873" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2112" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2131" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2139" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2176" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2193" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2197" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2202" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2204" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2205" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2206" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2207" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2208" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2209" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2210" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2211" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2212" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2213" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2214" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2215" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2216" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2217" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2218" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2219" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2220" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2226" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2227" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2228" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22295" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2231" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22321" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2235" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22354" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2236" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2240" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2242" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2243" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2245" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2248" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2250" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2251" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2257" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22577" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2258" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22581" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2259" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2260" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22621" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22665" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22683" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22686" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2269" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22713" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22728" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22729" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2273" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2281" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2282" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22846" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22893" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22894" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22901" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2291" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22913" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22914" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22915" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22916" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22917" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22918" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22919" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22921" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22922" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22923" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22924" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2293" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2294" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22948" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22950" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2307" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2322" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2323" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2336" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2338" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2339" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2340" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2341" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2342" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2343" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2344" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2345" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23451" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2346" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2347" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2348" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2356" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23579" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2360" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2361" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2363" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2364" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2365" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2366" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2367" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2368" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2369" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2370" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23708" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2371" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2372" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23753" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23785" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2380" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2381" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2382" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23820" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2383" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23837" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23838" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23839" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2384" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2385" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2386" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2387" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23874" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23876" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2388" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2389" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23892" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2390" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2391" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2392" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2393" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23938" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2394" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2395" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2396" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2397" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2408" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2409" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2410" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2411" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2412" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2413" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2424" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2425" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2428" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2429" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24796" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24818" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24819" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24820" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24821" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24822" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24823" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24966" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25131" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25132" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25133" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25292" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25313" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25314" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25437" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25510" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25511" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25512" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25513" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25514" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25601" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25652" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25783" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25784" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25786" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25789" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25796" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25798" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25815" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25979" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26057" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26058" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26059" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26060" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26061" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26097" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26098" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26099" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26100" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26101" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26286" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26494" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26556" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26557" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26567" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26865" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26930" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26931" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26934" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26935" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26936" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26937" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26938" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26987" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27035" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27090" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27105" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27108" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27350" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27351" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27352" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27353" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27354" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27355" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27495" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27524" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27556" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27557" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27559" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27843" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27848" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27849" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27860" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27990" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27991" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28003" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28008" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28009" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28084" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28086" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28087" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28088" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28089" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28090" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28122" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28123" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28124" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28131" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28384" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28400" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28458" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28459" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28471" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28472" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28473" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28474" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28475" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28476" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28477" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28484" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28528" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28697" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28716" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28771" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28819" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28820" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28821" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28847" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28882" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28976" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28978" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28979" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28980" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28981" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28982" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28983" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28984" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29002" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29007" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29011" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29012" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29019" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29020" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29150" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29169" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29197" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29200" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29213" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29255" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29257" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29469" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29471" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29479" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29480" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29489" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29523" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29524" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29525" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29527" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29528" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29530" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29552" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29566" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29575" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29578" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29579" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29582" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29583" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29596" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29635" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29636" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29637" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29639" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29641" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29643" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29779" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29780" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29848" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29849" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29905" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29906" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29907" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29908" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29909" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29910" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29911" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29912" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29913" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29914" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29915" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29916" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29917" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29921" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30061" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30063" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30076" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30106" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30111" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30112" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30123" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30177" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30210" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30211" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30212" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30265" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30266" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30267" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30269" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30338" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30363" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30380" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30402" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30406" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30408" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30410" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30414" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30417" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30444" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30456" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30458" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30466" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30467" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30533" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30536" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30543" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30544" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30545" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30549" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30552" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30553" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30554" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30555" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30556" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30557" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30610" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30611" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30612" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30613" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30614" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30616" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30618" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30622" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30623" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30626" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30627" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30628" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30629" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30776" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30797" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30839" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30843" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30846" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30848" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30849" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31043" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31045" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31059" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31060" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31061" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31081" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31082" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31083" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31084" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31085" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31223" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31250" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31285" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31286" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31287" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31436" />
      </rdf:Seq>
    </items>
    <dc:date>2023-05-06T10:00:01Z</dc:date>
    <dc:language>en-us</dc:language>
    <dc:rights>This material is not copywritten and may be freely used, however, attribution is requested.</dc:rights>
  </channel>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-10013">
    <title>CVE-2012-10013 (backend_localization)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-10013</link>
    <description>A vulnerability was found in Kau-Boy Backend Localization Plugin up to 1.6.1 on WordPress. It has been rated as problematic. This issue affects some unknown processing of the file backend_localization.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.0 is able to address this issue. The name of the patch is 43dc96defd7944da12ff116476a6890acd7dd24b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-227231.</description>
    <dc:date>2023-04-24T18:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-10014">
    <title>CVE-2012-10014 (backend_localization)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-10014</link>
    <description>A vulnerability classified as problematic has been found in Kau-Boy Backend Localization Plugin 2.0 on WordPress. Affected is the function backend_localization_admin_settings/backend_localization_save_setting/backend_localization_login_form/localize_backend of the file backend_localization.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 36f457ee16dd114e510fd91a3ea9fbb3c1f87184. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227232.</description>
    <dc:date>2023-04-24T18:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5872">
    <title>CVE-2012-5872 (arc2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5872</link>
    <description>ARC (aka ARC2) through 2011-12-01 allows blind SQL Injection in getTriplePatternSQL in ARC2_StoreSelectQueryHandler.php via comments in a SPARQL WHERE clause.</description>
    <dc:date>2023-04-26T00:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-10104">
    <title>CVE-2015-10104 (icons_for_features)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-10104</link>
    <description>A vulnerability, which was classified as problematic, has been found in Icons for Features Plugin 1.0.0 on WordPress. Affected by this issue is some unknown functionality of the file classes/class-icons-for-features-admin.php. The manipulation of the argument redirect_url leads to open redirect. The attack may be launched remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is 63124c021ae24b68e56872530df26eb4268ad633. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227756.</description>
    <dc:date>2023-04-30T21:15:30Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-10105">
    <title>CVE-2015-10105 (ip_blacklist_cloud)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-10105</link>
    <description>A vulnerability, which was classified as critical, was found in IP Blacklist Cloud Plugin up to 3.42 on WordPress. This affects the function valid_js_identifier of the file ip_blacklist_cloud.php of the component CSV File Import. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. Upgrading to version 3.43 is able to address this issue. The name of the patch is 6e6fe8c6fda7cbc252eef083105e08d759c07312. It is recommended to upgrade the affected component. The identifier VDB-227757 was assigned to this vulnerability.</description>
    <dc:date>2023-05-01T02:15:39Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21643">
    <title>CVE-2020-21643 (hongcms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21643</link>
    <description>Cross Site Scripting (XSS) vulnerability in HongCMS 3.0 allows attackers to run arbitrary code via the callback parameter to /ajax/myshop.</description>
    <dc:date>2023-04-28T20:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23647">
    <title>CVE-2020-23647 (boxbilling)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23647</link>
    <description>Cross Site Scripting (XSS) vulnerability in BoxBilling 4.19, 4.19.1, 4.20, and 4.21 allows remote attackers to run arbitrary code via the message field on the submit new ticket form.</description>
    <dc:date>2023-04-28T20:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23930">
    <title>CVE-2020-23930 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23930</link>
    <description>An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function nhmldump_send_header located in write_nhml.c. It allows an attacker to cause Denial of Service.</description>
    <dc:date>2021-04-21T18:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36070">
    <title>CVE-2020-36070 (voyager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36070</link>
    <description>Insecure Permission vulnerability found in Yoyager v.1.4 and before allows a remote attacker to execute arbitrary code via a crafted .php file to the media component.</description>
    <dc:date>2023-04-26T20:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4729">
    <title>CVE-2020-4729 (safer_payments)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4729</link>
    <description>IBM Counter Fraud Management for Safer Payments 5.7.0.00 through 5.7.0.10, 6.0.0.00 through 6.0.0.07, 6.1.0.00 through 6.1.0.05, and 6.2.0.00 through 6.2.1.00 could allow an authenticated attacker under special circumstances to send multiple specially crafted API requests that could cause the application to crash.  IBM X-Force ID:  188052.</description>
    <dc:date>2023-04-28T02:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8597">
    <title>CVE-2020-8597 (debian_linux, pfc_firmware, point-to-point_protocol, ubuntu_linux)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8597</link>
    <description>eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.</description>
    <dc:date>2020-02-03T23:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23166">
    <title>CVE-2021-23166 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23166</link>
    <description>A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read and write local files on the server.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23176">
    <title>CVE-2021-23176 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23176</link>
    <description>Improper access control in reporting engine of l10n_fr_fec module in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to extract accounting information via crafted RPC packets.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23178">
    <title>CVE-2021-23178 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23178</link>
    <description>Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23186">
    <title>CVE-2021-23186 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23186</link>
    <description>A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to access and modify database contents of other tenants, in a multi-tenant system.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23203">
    <title>CVE-2021-23203 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23203</link>
    <description>Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26263">
    <title>CVE-2021-26263 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26263</link>
    <description>Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26947">
    <title>CVE-2021-26947 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26947</link>
    <description>Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via a crafted link.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27452">
    <title>CVE-2021-27452 (mu320e_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27452</link>
    <description>The software contains a hard-coded password that could allow an attacker to take control of the merging unit using these hard-coded credentials on the MU320E (all firmware versions prior to v04A00.1).</description>
    <dc:date>2021-03-25T20:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32269">
    <title>CVE-2021-32269 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32269</link>
    <description>An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service.</description>
    <dc:date>2021-09-20T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32270">
    <title>CVE-2021-32270 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32270</link>
    <description>An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in box_code_base.c. It allows an attacker to cause Denial of Service.</description>
    <dc:date>2021-09-20T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32271">
    <title>CVE-2021-32271 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32271</link>
    <description>An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in odf_dump.c. It allows an attacker to cause code Execution.</description>
    <dc:date>2021-09-20T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33589">
    <title>CVE-2021-33589 (rnp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33589</link>
    <description>Ribose RNP before 0.15.1 does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than on the tin of the algorithm.</description>
    <dc:date>2023-04-21T12:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33971">
    <title>CVE-2021-33971 (total_security)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33971</link>
    <description>Qihoo 360 (https://www.360.cn/) Qihoo 360 Safeguard (https://www.360.cn/) Qihoo 360 Total Security (http://www.360totalsecurity.com/) is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: This is a set of vulnerabilities affecting popular software, &amp;quot;360 Safeguard(12.1.0.1004,12.1.0.1005,13.1.0.1001)&amp;quot; , &amp;quot;360 Total Security(10.8.0.1060,10.8.0.1213)&amp;quot;, &amp;quot;360 Safe Browser &amp;amp; 360 Chrome(13.0.2170.0)&amp;quot;. The attack vector is: On the browser vulnerability, just open a link to complete the vulnerability exploitation remotely; on the client software, you need to locally execute the vulnerability exploitation program, which of course can be achieved with the full chain of browser vulnerability. &amp;Acirc;&amp;para;&amp;Acirc;&amp;para; This is a set of the most serious vulnerabilities that exist on Qihoo 360's PC client a variety of popular software, remote vulnerabilities can be completed by opening a link to arbitrary code execution on both security browsers, with the use of local vulnerabilities, not only help the vulnerability code constitutes an escalation of privileges, er can make the spyware persistent without being scanned permanently resides on the target PC computer (because local vulnerability against Qihoo 360 company's antivirus kernel flaws); this group of remote and local vulnerability of the perfect match, to achieve an information security fallacy, in Qihoo 360's antivirus vulnerability, not only can not be scanned out of the virus, but will help the virus persistently control the target computer, while Qihoo 360 claims to be a safe browser, which exists in the kernel vulnerability but helped the composition of the remote vulnerability. (Security expert &amp;quot;Memory Corruptor&amp;quot; have reported this set of vulnerabilities to the corresponding vendor, all vulnerabilities have been fixed and the vendor rewarded thousands of dollars to the security experts)</description>
    <dc:date>2023-04-19T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33974">
    <title>CVE-2021-33974 (total_security)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33974</link>
    <description>Qihoo 360 (https://www.360.cn/) Qihoo 360 Safeguard (https://www.360.cn/) Qihoo 360 Chrome (https://browser.360.cn/ee/) is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: This is a set of vulnerabilities affecting popular software, and the installation packages correspond to versions &amp;quot;360 Safeguard(12.1.0.1004,12.1.0.1005,13.1.0.1001)&amp;quot; , &amp;quot;360 Total Security(10.8.0.1060,10.8.0.1213)&amp;quot;, &amp;quot;360 Safe Browser &amp;amp; 360 Chrome(12. The attack vector is: On the browser vulnerability, just open a link to complete the vulnerability exploitation remotely; on the client software, you need to locally execute the vulnerability exploitation program, which of course can be achieved with the full chain of browser vulnerability. &amp;Acirc;&amp;para;&amp;Acirc;&amp;para; This is a set of the most serious vulnerabilities that exist on Qihoo 360's PC client multiple popular software, remote vulnerabilities can be accomplished by opening a link to arbitrary code execution on both security browsers, in conjunction with the exploitation of local vulnerabilities that allow spyware to persist without being scanned to permanently reside on the target PC computer (because local vulnerabilities target Qihoo 360 company's antivirus software kernel flaws); this set of remote and local vulnerabilities in perfect coordination, to achieve an information security fallacy, on Qihoo 360's antivirus software vulnerability, not only can not be scanned out of the virus, but will help the virus persistently control the target computer, while Qihoo 360 claims to be a secure browser, which exists in the kernel vulnerability but help the composition of the remote vulnerability.(Security expert &amp;quot;Memory Corruptor&amp;quot; have reported this set of vulnerabilities to the corresponding vendor, all vulnerabilities have been fixed and the vendor rewarded thousands of dollars to this security expert)</description>
    <dc:date>2023-04-19T21:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3429">
    <title>CVE-2021-3429 (cloud-init)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3429</link>
    <description>When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user.</description>
    <dc:date>2023-04-19T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36436">
    <title>CVE-2021-36436 (mobicint)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36436</link>
    <description>An issue in Mobicint Backend for Credit Unions v3 allows attackers to retrieve partial email addresses and user entered information via submission to the forgotten-password endpoint.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38363">
    <title>CVE-2021-38363 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38363</link>
    <description>An issue was discovered in ONOS 2.5.1. In IntentManager, the install-requested intent (which causes an exception) remains in pendingMap (in memory) forever. Deletion is possible neither by a user nor by the intermittent Intent Cleanup process.</description>
    <dc:date>2023-04-20T13:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38364">
    <title>CVE-2021-38364 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38364</link>
    <description>An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of flow rules installed by intents. A remote attacker can install or remove a new intent, and consequently modify or delete the existing flow rules related to other intents.</description>
    <dc:date>2023-04-20T13:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43819">
    <title>CVE-2021-43819 (stargate-bukkit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43819</link>
    <description>Stargate-Bukkit is a mod for the minecraft video game which adds a portal focused environment. In affected versions Minecarts with chests will drop their items when teleporting through a portal; when they reappear, they will still have their items impacting the integrity of the game world. The teleport code has since been rewritten and is available in release `0.11.5.1`. Users are advised to upgrade. There are no known workarounds for this issue.</description>
    <dc:date>2023-04-19T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44460">
    <title>CVE-2021-44460 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44460</link>
    <description>Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows users with deactivated accounts to access the system with the deactivated account and any permission it still holds, via crafted RPC requests.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44461">
    <title>CVE-2021-44461 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44461</link>
    <description>Cross-site scripting (XSS) issue in Accounting app of Odoo Enterprise 13.0 through 15.0, allows remote attackers who are able to control the contents of accounting journal entries to inject arbitrary web script in the browser of a victim.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44465">
    <title>CVE-2021-44465 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44465</link>
    <description>Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44476">
    <title>CVE-2021-44476 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44476</link>
    <description>A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44547">
    <title>CVE-2021-44547 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44547</link>
    <description>A sandboxing issue in Odoo Community 15.0 and Odoo Enterprise 15.0 allows authenticated administrators to executed arbitrary code, leading to privilege escalation.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44775">
    <title>CVE-2021-44775 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44775</link>
    <description>Cross-site scripting (XSS) issue in Website app of Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45071">
    <title>CVE-2021-45071 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45071</link>
    <description>Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via crafted uploaded file names.</description>
    <dc:date>2023-04-25T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45111">
    <title>CVE-2021-45111 (odoo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45111</link>
    <description>Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to trigger the creation of demonstration data, including user accounts with known credentials.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2084">
    <title>CVE-2022-2084 (cloud-init, ubuntu_linux)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-2084</link>
    <description>Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords.</description>
    <dc:date>2023-04-19T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23721">
    <title>CVE-2022-23721 (pingid_integration_for_windows_login)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23721</link>
    <description>PingID integration for Windows login prior to 2.9 does not handle duplicate usernames, which can lead to a username collision when two people with the same username are provisioned onto the same machine at different times.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24035">
    <title>CVE-2022-24035 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24035</link>
    <description>An issue was discovered in ONOS 2.5.1. The purge-requested intent remains on the list, but it does not respond to changes in topology (e.g., link failure). In combination with other applications, it could lead to a failure of network management.</description>
    <dc:date>2023-04-20T13:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24109">
    <title>CVE-2022-24109 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24109</link>
    <description>An issue was discovered in ONOS 2.5.1. To attack an intent installed by a normal user, a remote attacker can install a duplicate intent with a different key, and then remove the duplicate one. This will remove the flow rules of the intent, even though the intent still exists in the controller.</description>
    <dc:date>2023-04-20T13:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24249">
    <title>CVE-2022-24249 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24249</link>
    <description>A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.</description>
    <dc:date>2022-02-04T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25091">
    <title>CVE-2022-25091 (ultimate_bulletin_board)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25091</link>
    <description>Infopop Ultimate Bulletin Board up to v5.47a was discovered to allow all messages posted inside private forums to be disclosed by unauthenticated users via the quote reply feature.</description>
    <dc:date>2023-04-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25276">
    <title>CVE-2022-25276 (drupal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25276</link>
    <description>The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.</description>
    <dc:date>2023-04-26T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27145">
    <title>CVE-2022-27145 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27145</link>
    <description>GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a stack-overflow vulnerability in function gf_isom_get_sample_for_movie_time of mp4box.</description>
    <dc:date>2022-04-08T16:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27146">
    <title>CVE-2022-27146 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27146</link>
    <description>GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a heap-buffer-overflow vulnerability in function gf_isom_apple_enum_tag.</description>
    <dc:date>2022-04-08T16:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27147">
    <title>CVE-2022-27147 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27147</link>
    <description>GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a use-after-free vulnerability in function gf_node_get_attribute_by_tag.</description>
    <dc:date>2022-04-08T16:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27148">
    <title>CVE-2022-27148 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27148</link>
    <description>GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integer Overflow.</description>
    <dc:date>2022-04-08T16:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27978">
    <title>CVE-2022-27978 (tooljet)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27978</link>
    <description>Tooljet v1.6 does not properly handle missing values in the API, allowing attackers to arbitrarily reset passwords via a crafted HTTP request.</description>
    <dc:date>2023-04-26T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27979">
    <title>CVE-2022-27979 (tooljet)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27979</link>
    <description>A cross-site scripting (XSS) vulnerability in ToolJet v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Comment Body component.</description>
    <dc:date>2023-04-26T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28354">
    <title>CVE-2022-28354 (active_threads)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28354</link>
    <description>In the Active Threads Plugin 1.3.0 for MyBB, the activethreads.php date parameter is vulnerable to XSS when setting a time period.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29604">
    <title>CVE-2022-29604 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29604</link>
    <description>An issue was discovered in ONOS 2.5.1. An intent with an uppercase letter in a device ID shows the CORRUPT state, which is misleading to a network operator. Improper handling of case sensitivity causes inconsistency between intent and flow rules in the network.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29605">
    <title>CVE-2022-29605 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29605</link>
    <description>An issue was discovered in ONOS 2.5.1. IntentManager attempts to install the IPv6 flow rules of an intent into an OpenFlow 1.0 switch that does not support IPv6. Improper handling of the difference in capabilities of the intent and switch is misleading to a network operator.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29606">
    <title>CVE-2022-29606 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29606</link>
    <description>An issue was discovered in ONOS 2.5.1. An intent with a large port number shows the CORRUPT state, which is misleading to a network operator. Improper handling of such port numbers causes inconsistency between intent and flow rules in the network.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29607">
    <title>CVE-2022-29607 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29607</link>
    <description>An issue was discovered in ONOS 2.5.1. Modification of an existing intent to have the same source and destination shows the INSTALLED state without any flow rule. Improper handling of such an intent is misleading to a network operator.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29608">
    <title>CVE-2022-29608 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29608</link>
    <description>An issue was discovered in ONOS 2.5.1. An intent with a port that is an intermediate point of its path installs an invalid flow rule, causing a network loop.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29609">
    <title>CVE-2022-29609 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29609</link>
    <description>An issue was discovered in ONOS 2.5.1. An intent with the same source and destination shows the INSTALLING state, indicating that its flow rules are installing. Improper handling of such an intent is misleading to a network operator.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29944">
    <title>CVE-2022-29944 (onos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-29944</link>
    <description>An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of paths installed by intents. An existing intents does not redirect to a new path, even if a new intent that shares the path with higher priority is installed.</description>
    <dc:date>2023-04-20T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31244">
    <title>CVE-2022-31244 (one-network_directory_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31244</link>
    <description>Nokia OneNDS 17r2 has Insecure Permissions vulnerability that allows for privilege escalation.</description>
    <dc:date>2023-04-25T16:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35898">
    <title>CVE-2022-35898 (bizmanager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35898</link>
    <description>OpenText BizManager before 16.6.0.1 does not perform proper validation during the change-password operation. This allows any authenticated user to change the password of any other user, including the Administrator account.</description>
    <dc:date>2023-05-01T20:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36190">
    <title>CVE-2022-36190 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36190</link>
    <description>GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerability in function gf_isom_dovi_config_get. This vulnerability was fixed in commit fef6242.</description>
    <dc:date>2022-08-17T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36191">
    <title>CVE-2022-36191 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36191</link>
    <description>A heap-buffer-overflow had occurred in function gf_isom_dovi_config_get of isomedia/avc_ext.c:2490, as demonstrated by MP4Box. This vulnerability was fixed in commit fef6242.</description>
    <dc:date>2022-08-17T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36769">
    <title>CVE-2022-36769 (cloud_pak_for_data)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36769</link>
    <description>IBM Cloud Pak for Data 4.5 and 4.6 could allow a privileged user to upload malicious files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 232034.</description>
    <dc:date>2023-04-26T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36788">
    <title>CVE-2022-36788 (libslic3r)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36788</link>
    <description>A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially-crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.</description>
    <dc:date>2023-04-20T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36963">
    <title>CVE-2022-36963 (orion_platform)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36963</link>
    <description>The SolarWinds Platform was susceptible to the Command Injection Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform admin account to execute arbitrary commands.</description>
    <dc:date>2023-04-21T20:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37381">
    <title>CVE-2022-37381 (pdf_editor, pdf_reader)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-37381</link>
    <description>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the AFSpecial_KeystrokeEx method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17110.</description>
    <dc:date>2023-03-29T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38530">
    <title>CVE-2022-38530 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38530</link>
    <description>GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow when processing ISOM_IOD.</description>
    <dc:date>2022-09-06T23:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38583">
    <title>CVE-2022-38583 (sage_300)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-38583</link>
    <description>On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a &amp;quot;Windows Peer-to-Peer Network&amp;quot; or &amp;quot;Client Server Network&amp;quot; configuration, a low-privileged Sage 300 workstation user could abuse their access to the &amp;quot;SharedData&amp;quot; folder on the connected Sage 300 server to view and/or modify the credentials associated with Sage 300 users and SQL accounts to impersonate users and/or access the SQL database as a system administrator. With system administrator-level access to the Sage 300 MS SQL database it would be possible to create, update, and delete all records associated with the program and, depending on the configuration, execute code on the underlying database server.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3957">
    <title>CVE-2022-3957 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3957</link>
    <description>A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.</description>
    <dc:date>2022-11-11T16:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39989">
    <title>CVE-2022-39989 (fighting_cock_information_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39989</link>
    <description>An issue was discovered in Fighting Cock Information System 1.0, which uses default credentials, but does not force nor prompt the administrators to change the credentials.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40482">
    <title>CVE-2022-40482 (framework)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40482</link>
    <description>The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40722">
    <title>CVE-2022-40722 (pingfederate, pingid_adapter_for_pingfederate, pingid_integration_kit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40722</link>
    <description>A misconfiguration of RSA padding implemented in the PingID Adapter for PingFederate to support Offline MFA with PingID mobile authenticators is vulnerable to pre-computed dictionary attacks, leading to a bypass of offline MFA.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40723">
    <title>CVE-2022-40723 (pingfederate, pingid_integration_kit, radius_pcv)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40723</link>
    <description>The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40724">
    <title>CVE-2022-40724 (pingfederate)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40724</link>
    <description>The PingFederate Local Identity Profiles '/pf/idprofile.ping' endpoint is vulnerable to Cross-Site Request Forgery (CSRF) through crafted GET requests.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40725">
    <title>CVE-2022-40725 (desktop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-40725</link>
    <description>PingID Desktop prior to the latest released version 1.7.4 contains a vulnerability that can be exploited to bypass the maximum PIN attempts permitted before the time-based lockout is activated.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41397">
    <title>CVE-2022-41397 (sage_300)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41397</link>
    <description>The optional Web Screens and Global Search features for Sage 300 through version 2022 use a hard-coded 40-byte blowfish key (&amp;quot;LandlordPassKey&amp;quot;) to encrypt and decrypt secrets stored in configuration files and in database tables.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41398">
    <title>CVE-2022-41398 (sage_300)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41398</link>
    <description>The optional Global Search feature for Sage 300 through version 2022 uses a set of hard-coded credentials for the accompanying Apache Solr instance. This issue could allow attackers to login to the Solr dashboard with admin privileges and access sensitive information.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41399">
    <title>CVE-2022-41399 (sage_300)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41399</link>
    <description>The optional Web Screens feature for Sage 300 through version 2022 uses a hard-coded 40-byte blowfish key (&amp;quot;PASS_KEY&amp;quot;) to encrypt and decrypt the database connection string for the PORTAL database found in the &amp;quot;dbconfig.xml&amp;quot;. This issue could allow attackers to obtain access to the SQL database.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41400">
    <title>CVE-2022-41400 (sage_300)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41400</link>
    <description>Sage 300 through 2022 uses a hard-coded 40-byte blowfish key to encrypt and decrypt user passwords and SQL connection strings stored in ISAM database files in the shared data directory. This issue could allow attackers to decrypt user passwords and SQL connection strings.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41612">
    <title>CVE-2022-41612 (similar_posts)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41612</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Shareaholic Similar Posts plugin &amp;lt;=&amp;Acirc;&amp;nbsp;3.1.6 versions.</description>
    <dc:date>2023-04-24T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41739">
    <title>CVE-2022-41739 (spectrum_scale_container_native_storage_access)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41739</link>
    <description>IBM Spectrum Scale (IBM Spectrum Scale Container Native Storage Access 5.1.2.1 through 5.1.6.0) could allow programs running inside the container to overcome isolation mechanism and gain additional capabilities or access sensitive information on the host. IBM X-Force ID: 237815.</description>
    <dc:date>2023-04-26T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42335">
    <title>CVE-2022-42335 (fedora, xen)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-42335</link>
    <description>x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.</description>
    <dc:date>2023-04-25T13:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43039">
    <title>CVE-2022-43039 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43039</link>
    <description>GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_isom_meta_restore_items_ref at /isomedia/meta.c.</description>
    <dc:date>2022-10-19T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43040">
    <title>CVE-2022-43040 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43040</link>
    <description>GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function gf_isom_box_dump_start_ex at /isomedia/box_funcs.c.</description>
    <dc:date>2022-10-19T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43042">
    <title>CVE-2022-43042 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43042</link>
    <description>GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap buffer overflow via the function FixSDTPInTRAF at isomedia/isom_intern.c.</description>
    <dc:date>2022-10-19T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43043">
    <title>CVE-2022-43043 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43043</link>
    <description>GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function BD_CheckSFTimeOffset at /bifs/field_decode.c.</description>
    <dc:date>2022-10-19T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43044">
    <title>CVE-2022-43044 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43044</link>
    <description>GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_isom_get_meta_item_info at /isomedia/meta.c.</description>
    <dc:date>2022-10-19T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43045">
    <title>CVE-2022-43045 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43045</link>
    <description>GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_dump_vrml_sffield at /scene_manager/scene_dump.c.</description>
    <dc:date>2022-10-19T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43254">
    <title>CVE-2022-43254 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43254</link>
    <description>GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_list_new at utils/list.c.</description>
    <dc:date>2022-11-02T14:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43255">
    <title>CVE-2022-43255 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-43255</link>
    <description>GPAC v2.1-DEV-rev368-gfd054169b-master was discovered to contain a memory leak via the component gf_odf_new_iod at odf/odf_code.c.</description>
    <dc:date>2022-11-02T14:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45064">
    <title>CVE-2022-45064 (sling)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45064</link>
    <description>The SlingRequestDispatcher doesn't correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power.




Please update to Apache Sling Engine &amp;gt;= 2.14.0 and enable the &amp;quot;Check Content-Type overrides&amp;quot; configuration option.</description>
    <dc:date>2023-04-13T11:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45084">
    <title>CVE-2022-45084 (loginizer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45084</link>
    <description>Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Softaculous Loginizer plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.7.5 versions.</description>
    <dc:date>2023-04-24T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45202">
    <title>CVE-2022-45202 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45202</link>
    <description>GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c.</description>
    <dc:date>2022-11-29T04:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45204">
    <title>CVE-2022-45204 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45204</link>
    <description>GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c.</description>
    <dc:date>2022-11-29T04:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45291">
    <title>CVE-2022-45291 (personal_weather_station_dashboard)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45291</link>
    <description>PWS Personal Weather Station Dashboard (PWS_Dashboard) LTS December 2020 (2012_lts) allows remote code execution by injecting PHP code into settings.php. Attacks can use the PWS_printfile.php, PWS_frame_text.php, PWS_listfile.php, PWS_winter.php, and PWS_easyweathersetup.php endpoints. A contributing factor is a hardcoded login password of support, which is not documented. (This is not the same as the documented setup password, which is 12345.) The issue was fixed in late 2022.</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45343">
    <title>CVE-2022-45343 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45343</link>
    <description>GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.</description>
    <dc:date>2022-11-29T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45456">
    <title>CVE-2022-45456 (agent)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45456</link>
    <description>Denial of service due to unauthenticated API endpoint. The following products are affected: Acronis Agent (Windows, macOS, Linux) before build 30161.</description>
    <dc:date>2023-04-26T20:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45876">
    <title>CVE-2022-45876 (vbase)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-45876</link>
    <description>Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.</description>
    <dc:date>2023-04-26T22:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46302">
    <title>CVE-2022-46302 (checkmk)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46302</link>
    <description>Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk &amp;lt;= 2.1.0p6, Checkmk &amp;lt;= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.</description>
    <dc:date>2023-04-20T14:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46489">
    <title>CVE-2022-46489 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46489</link>
    <description>GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the gf_isom_box_parse_ex function at box_funcs.c.</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46490">
    <title>CVE-2022-46490 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46490</link>
    <description>GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contain a memory leak via the afrt_box_read function at box_code_adobe.c.</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46852">
    <title>CVE-2022-46852 (wp_table_builder)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-46852</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Table Builder plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.4.6 versions.</description>
    <dc:date>2023-05-03T15:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47086">
    <title>CVE-2022-47086 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47086</link>
    <description>GPAC MP4Box v2.1-DEV-rev574-g9d5bb184b contains a segmentation violation via the function gf_sm_load_init_swf at scene_manager/swf_parse.c</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47087">
    <title>CVE-2022-47087 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47087</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b has a Buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47088">
    <title>CVE-2022-47088 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47088</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow.</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47089">
    <title>CVE-2022-47089 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47089</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow via gf_vvc_read_sps_bs_internal function of media_tools/av_parsers.c</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47091">
    <title>CVE-2022-47091 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47091</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow in gf_text_process_sub function of filters/load_text.c</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47092">
    <title>CVE-2022-47092 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47092</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is contains an Integer overflow vulnerability in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8316</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47093">
    <title>CVE-2022-47093 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47093</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to heap use-after-free via filters/dmx_m2ts.c:470 in m2tsdmx_declare_pid</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47094">
    <title>CVE-2022-47094 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47094</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer dereference via filters/dmx_m2ts.c:343 in m2tsdmx_declare_pid</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47095">
    <title>CVE-2022-47095 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47095</link>
    <description>GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer overflow in hevc_parse_vps_extension function of media_tools/av_parsers.c</description>
    <dc:date>2023-01-05T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47158">
    <title>CVE-2022-47158 (alfred24_click_&amp;_collect)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47158</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pakpobox alfred24 Click &amp;amp; Collect plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.1.7 versions.</description>
    <dc:date>2023-04-24T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47505">
    <title>CVE-2022-47505 (orion_platform)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47505</link>
    <description>The SolarWinds Platform was susceptible to the Local Privilege Escalation Vulnerability. This vulnerability allows a local adversary with a valid system user account to escalate local privileges.</description>
    <dc:date>2023-04-21T20:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47509">
    <title>CVE-2022-47509 (orion_platform)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47509</link>
    <description>The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject HTML.</description>
    <dc:date>2023-04-21T20:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47598">
    <title>CVE-2022-47598 (wp_super_popup)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47598</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Plugins Pro WP Super Popup plugin&amp;Acirc;&amp;nbsp;&amp;lt;= 1.1.2 versions.</description>
    <dc:date>2023-04-24T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47653">
    <title>CVE-2022-47653 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47653</link>
    <description>GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113</description>
    <dc:date>2023-01-05T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47654">
    <title>CVE-2022-47654 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47654</link>
    <description>GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8261</description>
    <dc:date>2023-01-05T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47656">
    <title>CVE-2022-47656 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47656</link>
    <description>GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow in gf_hevc_read_sps_bs_internal function of media_tools/av_parsers.c:8273</description>
    <dc:date>2023-01-05T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47657">
    <title>CVE-2022-47657 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47657</link>
    <description>GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662</description>
    <dc:date>2023-01-05T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47658">
    <title>CVE-2022-47658 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47658</link>
    <description>GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039</description>
    <dc:date>2023-01-05T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47659">
    <title>CVE-2022-47659 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47659</link>
    <description>GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data</description>
    <dc:date>2023-01-05T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47660">
    <title>CVE-2022-47660 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47660</link>
    <description>GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c</description>
    <dc:date>2023-01-05T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47661">
    <title>CVE-2022-47661 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47661</link>
    <description>GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes</description>
    <dc:date>2023-01-05T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47662">
    <title>CVE-2022-47662 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47662</link>
    <description>GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662</description>
    <dc:date>2023-01-05T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47663">
    <title>CVE-2022-47663 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47663</link>
    <description>GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609</description>
    <dc:date>2023-01-05T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47930">
    <title>CVE-2022-47930 (tss-lib)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47930</link>
    <description>An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.</description>
    <dc:date>2023-04-21T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48150">
    <title>CVE-2022-48150 (shopware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48150</link>
    <description>Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI.</description>
    <dc:date>2023-04-21T14:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48476">
    <title>CVE-2022-48476 (ktor)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48476</link>
    <description>In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible</description>
    <dc:date>2023-04-24T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48477">
    <title>CVE-2022-48477 (hub)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48477</link>
    <description>In JetBrains Hub before 2023.1.15725 SSRF protection in Auth Module integration was missing</description>
    <dc:date>2023-04-24T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48481">
    <title>CVE-2022-48481 (toolbox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48481</link>
    <description>In JetBrains Toolbox App before 1.28 a DYLIB injection on macOS was possible</description>
    <dc:date>2023-04-28T10:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0045">
    <title>CVE-2023-0045 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0045</link>
    <description>The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set &amp;Acirc;&amp;nbsp;function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. &amp;Acirc;&amp;nbsp;The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.

We recommend upgrading past commit&amp;Acirc;&amp;nbsp;a664ec9158eeddd75121d39c9a0758016097fa96</description>
    <dc:date>2023-04-25T23:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0184">
    <title>CVE-2023-0184 (gpu_display_driver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0184</link>
    <description>NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.</description>
    <dc:date>2023-04-22T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0190">
    <title>CVE-2023-0190 (gpu_display_driver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0190</link>
    <description>NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.</description>
    <dc:date>2023-04-22T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0199">
    <title>CVE-2023-0199 (gpu_display_driver)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0199</link>
    <description>NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.</description>
    <dc:date>2023-04-22T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0202">
    <title>CVE-2023-0202 (dgx_a100_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0202</link>
    <description>NVIDIA DGX A100 SBIOS contains a vulnerability where an attacker may modify arbitrary memory of SMRAM by exploiting the GenericSio and LegacySmmSredir SMM APIs. A successful exploit of this vulnerability may lead to denial of service, escalation of privileges, and information disclosure.</description>
    <dc:date>2023-04-22T03:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0203">
    <title>CVE-2023-0203 (connectx_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0203</link>
    <description>NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can exploit insufficient granularity of access control, which may lead to denial of service.</description>
    <dc:date>2023-04-22T03:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0204">
    <title>CVE-2023-0204 (connectx_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0204</link>
    <description>NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can cause improper handling of exceptional conditions, which may lead to denial of service.</description>
    <dc:date>2023-04-22T03:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0205">
    <title>CVE-2023-0205 (connectx_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0205</link>
    <description>NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can exploit insufficient granularity of access control, which may lead to denial of service.</description>
    <dc:date>2023-04-22T03:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0206">
    <title>CVE-2023-0206 (dgx_a100_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0206</link>
    <description>NVIDIA DGX A100 SBIOS contains a vulnerability where an attacker may modify arbitrary memory of SMRAM by exploiting the NVME SMM API. A successful exploit of this vulnerability may lead to denial of service, escalation of privileges, and information disclosure.</description>
    <dc:date>2023-04-22T03:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0276">
    <title>CVE-2023-0276 (weaver_xtreme_theme_support)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0276</link>
    <description>The Weaver Xtreme Theme Support WordPress plugin before 6.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.</description>
    <dc:date>2023-04-24T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0317">
    <title>CVE-2023-0317 (gatemanager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0317</link>
    <description>Unprotected Alternate Channel vulnerability in debug console of  GateManager allows system administrator to obtain sensitive information.</description>
    <dc:date>2023-04-19T12:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0388">
    <title>CVE-2023-0388 (random_text)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0388</link>
    <description>The Random Text WordPress plugin through 0.3.0 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscribers.</description>
    <dc:date>2023-04-24T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0418">
    <title>CVE-2023-0418 (video_central)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0418</link>
    <description>The Video Central for WordPress plugin through 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks</description>
    <dc:date>2023-04-24T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0420">
    <title>CVE-2023-0420 (custom_post_type_and_taxonomy_gui_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0420</link>
    <description>The Custom Post Type and Taxonomy GUI Manager WordPress plugin through 1.1 does not have CSRF, and is lacking sanitising as well as escaping in some parameters, allowing attackers to make a logged in admin put Stored Cross-Site Scripting payloads via CSRF</description>
    <dc:date>2023-04-24T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0424">
    <title>CVE-2023-0424 (ms-reviews)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0424</link>
    <description>The MS-Reviews WordPress plugin through 1.5 does not sanitise and escape reviews, which could allow users any authenticated users, such as Subscribers to perform Stored Cross-Site Scripting attacks</description>
    <dc:date>2023-04-24T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0760">
    <title>CVE-2023-0760 (gpac)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0760</link>
    <description>Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.</description>
    <dc:date>2023-02-09T14:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0899">
    <title>CVE-2023-0899 (wp_live_chat_shoutbox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0899</link>
    <description>The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before outputting it back in the Shoutbox, leading to Stored Cross-Site Scripting which could be used against high privilege users such as admins.</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1020">
    <title>CVE-2023-1020 (wp_live_chat_shoutbox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1020</link>
    <description>The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1126">
    <title>CVE-2023-1126 (wp_fevents_book)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1126</link>
    <description>The WP FEvents Book WordPress plugin through 0.46 does not sanitise and escape some parameters, which could allow any authenticated users, such as subscriber to perform Cross-Site Scripting attacks</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1129">
    <title>CVE-2023-1129 (wp_fevents_book)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1129</link>
    <description>The WP FEvents Book WordPress plugin through 0.46 does not ensures that bookings to be updated belong to the user making the request, allowing any authenticated user to book, add notes, or cancel booking on behalf of other users.</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1255">
    <title>CVE-2023-1255 (openssl)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1255</link>
    <description>Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM
platform contains a bug that could cause it to read past the input buffer,
leading to a crash.

Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM
platform can crash in rare circumstances. The AES-XTS algorithm is usually
used for disk encryption.

The AES-XTS cipher decryption implementation for 64 bit ARM platform will read
past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16
byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext
buffer is unmapped, this will trigger a crash which results in a denial of
service.

If an attacker can control the size and location of the ciphertext buffer
being decrypted by an application using AES-XTS on 64 bit ARM, the
application is affected. This is fairly unlikely making this issue
a Low severity one.</description>
    <dc:date>2023-04-20T17:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1324">
    <title>CVE-2023-1324 (easy_forms_for_mailchimp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1324</link>
    <description>The Easy Forms for Mailchimp WordPress plugin before 6.8.8 does not sanitise and escape some parameters before outputting them back in the response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1414">
    <title>CVE-2023-1414 (wp_vr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1414</link>
    <description>The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1420">
    <title>CVE-2023-1420 (ajax_search)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1420</link>
    <description>The Ajax Search Lite WordPress plugin before 4.11.1, Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape a parameter before outputting it back in a response of an AJAX action, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1435">
    <title>CVE-2023-1435 (ajax_search)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1435</link>
    <description>The Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape various parameters before outputting them back in pages, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1585">
    <title>CVE-2023-1585 (anti-virus, antivirus)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1585</link>
    <description>Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU)  vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later.</description>
    <dc:date>2023-04-19T19:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1586">
    <title>CVE-2023-1586 (anti-virus, antivirus)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1586</link>
    <description>Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU)  vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11</description>
    <dc:date>2023-04-19T19:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1623">
    <title>CVE-2023-1623 (custom_post_type_ui)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1623</link>
    <description>The Custom Post Type UI WordPress plugin before 1.13.5 does not properly check for CSRF when sending the debug information to a user supplied email, which could allow attackers to make a logged in admin send such information to an arbitrary email address via a CSRF attack.</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1624">
    <title>CVE-2023-1624 (wpcode)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1624</link>
    <description>The WPCode WordPress plugin before 2.0.9 has a flawed CSRF when deleting log, and does not ensure that the file to be deleted is inside the expected folder. This could allow attackers to make users with the wpcode_activate_snippets capability delete arbitrary log files on the server, including outside of the blog folders</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1731">
    <title>CVE-2023-1731 (lantime_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1731</link>
    <description>In LTOS versions prior to V7.06.013, the configuration file upload function would not correctly validate the input, which would allow an remote authenticated attacker with high privileges to execute arbitrary commands.</description>
    <dc:date>2023-04-24T14:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1892">
    <title>CVE-2023-1892 (sidekiq)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1892</link>
    <description>Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq prior to 7.0.8.</description>
    <dc:date>2023-04-21T05:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1967">
    <title>CVE-2023-1967 (n8844a)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1967</link>
    <description>Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid.</description>
    <dc:date>2023-04-27T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1998">
    <title>CVE-2023-1998 (debian_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1998</link>
    <description>The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.

This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2006">
    <title>CVE-2023-2006 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2006</link>
    <description>A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2007">
    <title>CVE-2023-2007 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2007</link>
    <description>The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.</description>
    <dc:date>2023-04-24T23:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2019">
    <title>CVE-2023-2019 (enterprise_linux, linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2019</link>
    <description>A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20862">
    <title>CVE-2023-20862 (spring_security)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20862</link>
    <description>In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3.</description>
    <dc:date>2023-04-19T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20864">
    <title>CVE-2023-20864 (aria_operations_for_logs, cloud_foundation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20864</link>
    <description>VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20865">
    <title>CVE-2023-20865 (aria_operations_for_logs, cloud_foundation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20865</link>
    <description>VMware Aria Operations for Logs contains a command injection vulnerability. A malicious actor with administrative privileges in VMware Aria Operations for Logs can execute arbitrary commands as root.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20869">
    <title>CVE-2023-20869 (fusion, workstation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20869</link>
    <description>VMware Workstation (17.x) and VMware Fusion (13.x) contain a stack-based buffer-overflow vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.</description>
    <dc:date>2023-04-25T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20870">
    <title>CVE-2023-20870 (fusion, workstation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20870</link>
    <description>VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine.</description>
    <dc:date>2023-04-25T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20871">
    <title>CVE-2023-20871 (fusion)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20871</link>
    <description>VMware Fusion contains a local privilege escalation vulnerability. A malicious actor with read/write access to the host operating system can elevate privileges to gain root access to the host operating system.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20872">
    <title>CVE-2023-20872 (fusion, workstation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20872</link>
    <description>VMware Workstation and Fusion contain an out-of-bounds read/write vulnerability in SCSI CD/DVD device emulation.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20873">
    <title>CVE-2023-20873 (spring_boot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20873</link>
    <description>In Spring Boot versions 3.0.0 - 3.0.5, 2.7.0 - 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2112">
    <title>CVE-2023-2112 (m-files_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2112</link>
    <description>Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0.&amp;Acirc;&amp;nbsp;</description>
    <dc:date>2023-04-20T09:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2131">
    <title>CVE-2023-2131 (me_rtu_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2131</link>
    <description>Versions of INEA ME RTU firmware prior to 3.36 are vulnerable to OS command injection, which could allow an attacker to remotely execute arbitrary code.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2139">
    <title>CVE-2023-2139 (delmia_apriso)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2139</link>
    <description>A reflected Cross-site Scripting (XSS) Vulnerability in DELMIA Apriso Release 2017 through Release 2022 allows an attacker to execute arbitrary script code.</description>
    <dc:date>2023-04-21T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2176">
    <title>CVE-2023-2176 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2176</link>
    <description>A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2193">
    <title>CVE-2023-2193 (mattermost)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2193</link>
    <description>Mattermost fails to invalidate existing authorization codes when deauthorizing an OAuth2 app, allowing an attacker possessing an authorization code to generate an access token.</description>
    <dc:date>2023-04-20T09:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2197">
    <title>CVE-2023-2197 (vault)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2197</link>
    <description>HashiCorp Vault Enterprise 1.13.0 up to 1.13.1 is vulnerable to a padding oracle attack when using an HSM in conjunction with the&amp;Acirc;&amp;nbsp;CKM_AES_CBC_PAD or&amp;Acirc;&amp;nbsp;CKM_AES_CBC encryption mechanisms.&amp;Acirc;&amp;nbsp;An attacker with privileges to modify storage and restart Vault may be able to intercept or modify cipher text in order to derive Vault&amp;acirc;&amp;euro;&amp;trade;s root key. Fixed in 1.13.2</description>
    <dc:date>2023-05-01T20:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2202">
    <title>CVE-2023-2202 (rosariosis)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2202</link>
    <description>Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.9.3.</description>
    <dc:date>2023-04-21T02:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2204">
    <title>CVE-2023-2204 (retro_basketball_shoes_online_store)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2204</link>
    <description>A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file faqs.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226969 was assigned to this vulnerability.</description>
    <dc:date>2023-04-21T07:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2205">
    <title>CVE-2023-2205 (retro_basketball_shoes_online_store)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2205</link>
    <description>A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226970 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-21T07:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2206">
    <title>CVE-2023-2206 (retro_basketball_shoes_online_store)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2206</link>
    <description>A vulnerability classified as critical has been found in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file contactus.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226971.</description>
    <dc:date>2023-04-21T08:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2207">
    <title>CVE-2023-2207 (retro_basketball_shoes_online_store)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2207</link>
    <description>A vulnerability classified as critical was found in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file contactus1.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226972.</description>
    <dc:date>2023-04-21T08:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2208">
    <title>CVE-2023-2208 (retro_basketball_shoes_online_store)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2208</link>
    <description>A vulnerability, which was classified as critical, has been found in Campcodes Retro Basketball Shoes Online Store 1.0. This issue affects some unknown processing of the file details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226973 was assigned to this vulnerability.</description>
    <dc:date>2023-04-21T08:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2209">
    <title>CVE-2023-2209 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2209</link>
    <description>A vulnerability, which was classified as critical, was found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/sales/view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226974 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-21T09:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2210">
    <title>CVE-2023-2210 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2210</link>
    <description>A vulnerability has been found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/categories/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226975.</description>
    <dc:date>2023-04-21T09:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2211">
    <title>CVE-2023-2211 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2211</link>
    <description>A vulnerability was found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226976.</description>
    <dc:date>2023-04-21T09:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2212">
    <title>CVE-2023-2212 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2212</link>
    <description>A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226977 was assigned to this vulnerability.</description>
    <dc:date>2023-04-21T10:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2213">
    <title>CVE-2023-2213 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2213</link>
    <description>A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/products/manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226978 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-21T10:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2214">
    <title>CVE-2023-2214 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2214</link>
    <description>A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/sales/manage_sale.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226979.</description>
    <dc:date>2023-04-21T10:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2215">
    <title>CVE-2023-2215 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2215</link>
    <description>A vulnerability classified as critical has been found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226980.</description>
    <dc:date>2023-04-21T10:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2216">
    <title>CVE-2023-2216 (coffee_shop_pos_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2216</link>
    <description>A vulnerability classified as problematic was found in Campcodes Coffee Shop POS System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument firstname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226981 was assigned to this vulnerability.</description>
    <dc:date>2023-04-21T11:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2217">
    <title>CVE-2023-2217 (task_reminder_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2217</link>
    <description>A vulnerability, which was classified as critical, was found in SourceCodester Task Reminder System 1.0. This affects an unknown part of the file /admin/reminders/manage_reminder.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226983.</description>
    <dc:date>2023-04-21T11:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2218">
    <title>CVE-2023-2218 (task_reminder_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2218</link>
    <description>A vulnerability has been found in SourceCodester Task Reminder System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226984.</description>
    <dc:date>2023-04-21T11:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2219">
    <title>CVE-2023-2219 (task_reminder_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2219</link>
    <description>A vulnerability was found in SourceCodester Task Reminder System 1.0 and classified as problematic. This issue affects some unknown processing of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226985 was assigned to this vulnerability.</description>
    <dc:date>2023-04-21T11:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2220">
    <title>CVE-2023-2220 (mica)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2220</link>
    <description>A vulnerability was found in Dream Technology mica up to 3.0.5. It has been classified as problematic. Affected is an unknown function of the component Form Object Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-226986 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-21T12:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2226">
    <title>CVE-2023-2226 (velociraptor)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2226</link>
    <description>Due to insufficient validation in the PE and OLE parsers in Rapid7's Velociraptor versions earlier than 0.6.8 allows attacker to crash Velociraptor during parsing of maliciously malformed files.&amp;Acirc;&amp;nbsp;

For this attack to succeed, the attacker needs to be able to introduce malicious files to the system at the same time that Velociraptor attempts to collect any artifacts that attempt to parse PE files, Authenticode signatures, or OLE files. After crashing, the Velociraptor service will restart and it will still be possible to collect other artifacts.</description>
    <dc:date>2023-04-21T12:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2227">
    <title>CVE-2023-2227 (modoboa)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2227</link>
    <description>Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.</description>
    <dc:date>2023-04-21T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2228">
    <title>CVE-2023-2228 (modoboa)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2228</link>
    <description>Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.1.0.</description>
    <dc:date>2023-04-21T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22295">
    <title>CVE-2023-22295 (crosscadware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22295</link>
    <description>Datakit CrossCadWare_x64.dll contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information.</description>
    <dc:date>2023-04-20T19:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2231">
    <title>CVE-2023-2231 (max-g866ac_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2231</link>
    <description>A vulnerability, which was classified as critical, was found in MAXTECH MAX-G866ac 0.4.1_TBRO_20160314. This affects an unknown part of the component Remote Management. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227001 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22321">
    <title>CVE-2023-22321 (crosscadware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22321</link>
    <description>Datakit CrossCadWare_x64.dll contains an out-of-bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information.</description>
    <dc:date>2023-04-20T19:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2235">
    <title>CVE-2023-2235 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2235</link>
    <description>A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.

The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but&amp;Acirc;&amp;nbsp;remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.

We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.</description>
    <dc:date>2023-05-01T13:15:44Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22354">
    <title>CVE-2023-22354 (crosscadware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22354</link>
    <description>Datakit CrossCadWare_x64.dll contains an out-of-bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information.</description>
    <dc:date>2023-04-20T19:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2236">
    <title>CVE-2023-2236 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2236</link>
    <description>A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.

Both&amp;Acirc;&amp;nbsp;io_install_fixed_file&amp;Acirc;&amp;nbsp;and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.

We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.</description>
    <dc:date>2023-05-01T13:15:44Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2240">
    <title>CVE-2023-2240 (microweber)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2240</link>
    <description>Improper Privilege Management in GitHub repository microweber/microweber prior to 1.3.4.</description>
    <dc:date>2023-04-22T01:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2242">
    <title>CVE-2023-2242 (online_computer_and_laptop_store)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2242</link>
    <description>A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component GET Parameter Handler. The manipulation of the argument c/s leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227227.</description>
    <dc:date>2023-04-22T16:15:42Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2243">
    <title>CVE-2023-2243 (complaint_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2243</link>
    <description>A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file users/registration.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227228.</description>
    <dc:date>2023-04-22T17:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2245">
    <title>CVE-2023-2245 (hansuncms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2245</link>
    <description>A vulnerability was found in hansunCMS 1.4.3. It has been declared as critical. This vulnerability affects unknown code of the file /ueditor/net/controller.ashx?action=catchimage. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227230 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-22T17:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2248">
    <title>CVE-2023-2248 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2248</link>
    <description>A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic control (QoS) subsystem can be exploited to achieve local privilege escalation.

The&amp;Acirc;&amp;nbsp;qfq_change_class function does not properly limit the lmax variable which can lead to out-of-bounds read/write.&amp;Acirc;&amp;nbsp;If the TCA_QFQ_LMAX value is not offered through nlattr, lmax is determined by the MTU value of the network device. The MTU of the loopback device can be set up to 2^31-1 and as a result, it is possible to have an lmax value that exceeds QFQ_MIN_LMAX.

We recommend upgrading past commit 3037933448f60f9acb705997eae62013ecb81e0d.</description>
    <dc:date>2023-05-01T13:15:44Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2250">
    <title>CVE-2023-2250 (open_cluster_management)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2250</link>
    <description>A flaw was found in the Open Cluster Management (OCM) when a user have access to the worker nodes which has the cluster-manager-registration-controller or cluster-manager deployments. A malicious user can take advantage of this and bind the cluster-admin to any service account or using the service account to list all secrets for all kubernetes namespaces, leading into a cluster-level privilege escalation.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2251">
    <title>CVE-2023-2251 (yaml)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2251</link>
    <description>Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-4.</description>
    <dc:date>2023-04-24T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2257">
    <title>CVE-2023-2257 (workspace)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2257</link>
    <description>Authentication Bypass in Hub Business integration in Devolutions Workspace Desktop 2023.1.1.3 and earlier on Windows and macOS allows an attacker with access to the user interface to unlock a Hub 
Business space without being prompted to enter the password via an 
unimplemented &amp;quot;Force Login&amp;quot; security feature.

This vulnerability occurs only if &amp;quot;Force Login&amp;quot; feature is enabled on the Hub Business instance and that an attacker has access to a locked Workspace desktop application configured with a Hub Business space.</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22577">
    <title>CVE-2023-22577 (white_rabbit_switch_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22577</link>
    <description>Within White Rabbit Switch it's possible as an unauthenticated user to retrieve sensitive information such as password hashes and the SNMP community strings.</description>
    <dc:date>2023-04-24T09:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2258">
    <title>CVE-2023-2258 (alf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2258</link>
    <description>Improper Neutralization of Formula Elements in a CSV File in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22581">
    <title>CVE-2023-22581 (white_rabbit_switch_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22581</link>
    <description>White Rabbit Switch contains a vulnerability which makes it possible for an attacker&amp;Acirc;&amp;nbsp;to perform system commands under the context of the web application (the default&amp;Acirc;&amp;nbsp;installation makes the webserver run as the root user).</description>
    <dc:date>2023-04-24T09:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2259">
    <title>CVE-2023-2259 (alf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2259</link>
    <description>Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2260">
    <title>CVE-2023-2260 (alf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2260</link>
    <description>Improper Authorization of Index Containing Sensitive Information in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22621">
    <title>CVE-2023-22621 (strapi)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22621</link>
    <description>Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution.</description>
    <dc:date>2023-04-19T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22665">
    <title>CVE-2023-22665 (jena)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22665</link>
    <description>There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.</description>
    <dc:date>2023-04-25T07:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22683">
    <title>CVE-2023-22683 (clio_grow)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22683</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Themis Solutions, Inc. Clio Grow plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.0.0 versions.</description>
    <dc:date>2023-05-03T14:15:30Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22686">
    <title>CVE-2023-22686 (nice_paypal_button_lite)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22686</link>
    <description>Cross-Site Request Forgery (CSRF) vulnerability in TriniTronic Nice PayPal Button Lite plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.3.5 versions.</description>
    <dc:date>2023-04-23T12:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2269">
    <title>CVE-2023-2269 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2269</link>
    <description>A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22713">
    <title>CVE-2023-22713 (gutenberg_blocks_for_wordpress_download_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22713</link>
    <description>Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress Download Manager Gutenberg Blocks by WordPress Download Manager plugin &amp;lt;=&amp;Acirc;&amp;nbsp;2.1.8 versions.</description>
    <dc:date>2023-05-03T12:16:45Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22728">
    <title>CVE-2023-22728 (framework)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22728</link>
    <description>Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, the GridField print view incorrectly validates the permission of DataObjects potentially allowing a content author to view records they are not authorised to access. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22729">
    <title>CVE-2023-22729 (framework)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22729</link>
    <description>Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, an attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.</description>
    <dc:date>2023-04-26T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2273">
    <title>CVE-2023-2273 (insight_agent)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2273</link>
    <description>Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.</description>
    <dc:date>2023-04-26T09:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2281">
    <title>CVE-2023-2281 (mattermost_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2281</link>
    <description>When archiving a team, Mattermost fails to sanitize the related Websocket event sent to currently connected clients. This allows the clients to see the name, display name, description, and other data about the archived team.</description>
    <dc:date>2023-04-25T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2282">
    <title>CVE-2023-2282 (remote_desktop_manager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2282</link>
    <description>Improper access control in the Web Login listener in Devolutions Remote Desktop Manager 2023.1.22 and earlier on Windows allows an authenticated user to bypass administrator-enforced Web Login restrictions and gain access to entries via an unexpected vector.</description>
    <dc:date>2023-04-25T19:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22846">
    <title>CVE-2023-22846 (crosscadware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22846</link>
    <description>Datakit CrossCadWare_x64.dll contains an out-of-bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information.</description>
    <dc:date>2023-04-20T19:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22893">
    <title>CVE-2023-22893 (strapi)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22893</link>
    <description>Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the 'None' type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication.</description>
    <dc:date>2023-04-19T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22894">
    <title>CVE-2023-22894 (strapi)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22894</link>
    <description>Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts.</description>
    <dc:date>2023-04-19T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22901">
    <title>CVE-2023-22901 (mobile_one_time_password)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22901</link>
    <description>ChangingTec MOTP system has a path traversal vulnerability. A remote attacker with administrator&amp;acirc;&amp;euro;&amp;trade;s privilege can exploit this vulnerability to access arbitrary system files.</description>
    <dc:date>2023-04-27T02:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2291">
    <title>CVE-2023-2291 (manageengine_access_manager_plus, manageengine_pam360, manageengine_password_manager_pro)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2291</link>
    <description>Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user.</description>
    <dc:date>2023-04-26T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22913">
    <title>CVE-2023-22913 (usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22913</link>
    <description>A post-authentication command injection vulnerability in the &amp;acirc;&amp;euro;&amp;oelig;account_operator.cgi&amp;acirc;&amp;euro;&amp;#65533; CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker to modify device configuration data, resulting in denial-of-service (DoS) conditions on an affected device.</description>
    <dc:date>2023-04-24T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22914">
    <title>CVE-2023-22914 (usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22914</link>
    <description>A path traversal vulnerability in the &amp;acirc;&amp;euro;&amp;oelig;account_print.cgi&amp;acirc;&amp;euro;&amp;#65533; CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker with administrator privileges to execute unauthorized OS commands in the &amp;acirc;&amp;euro;&amp;oelig;tmp&amp;acirc;&amp;euro;&amp;#65533; directory by uploading a crafted file if the hotspot function were enabled.</description>
    <dc:date>2023-04-24T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22915">
    <title>CVE-2023-22915 (usg_20w-vpn_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22915</link>
    <description>A buffer overflow vulnerability in the &amp;acirc;&amp;euro;&amp;oelig;fbwifi_forward.cgi&amp;acirc;&amp;euro;&amp;#65533; CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.30 through 5.35, USG20(W)-VPN firmware versions 4.30 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote unauthenticated attacker to cause DoS conditions by sending a crafted HTTP request if the Facebook WiFi function were enabled on an affected device.</description>
    <dc:date>2023-04-24T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22916">
    <title>CVE-2023-22916 (atp100_firmware, atp100w_firmware, atp200_firmware, atp500_firmware, atp700_firmware, atp800_firmware, usg_20w-vpn_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22916</link>
    <description>The configuration parser of Zyxel ATP series firmware versions 5.10 through 5.35, USG FLEX series firmware versions 5.00 through 5.35, USG FLEX 50(W) firmware versions 5.10 through 5.35, USG20(W)-VPN firmware versions 5.10 through 5.35, and VPN series firmware versions 5.00 through 5.35, which fails to properly sanitize user input. A remote unauthenticated attacker could leverage the vulnerability to modify device configuration data, resulting in DoS conditions on an affected device if the attacker could trick an authorized administrator to switch the management mode to the cloud mode.</description>
    <dc:date>2023-04-24T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22917">
    <title>CVE-2023-22917 (atp100_firmware, atp100w_firmware, atp200_firmware, atp500_firmware, atp700_firmware, atp800_firmware, usg_20w-vpn_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22917</link>
    <description>A buffer overflow vulnerability in the &amp;acirc;&amp;euro;&amp;oelig;sdwan_iface_ipc&amp;acirc;&amp;euro;&amp;#65533; binary of Zyxel ATP series firmware versions 5.10 through 5.32, USG FLEX series firmware versions 5.00 through 5.32, USG FLEX 50(W) firmware versions 5.10 through 5.32, USG20(W)-VPN firmware versions 5.10 through 5.32, and VPN series firmware versions 5.00 through 5.35, which could allow a remote unauthenticated attacker to cause a core dump with a request error message on a vulnerable device by uploading a crafted configuration file.</description>
    <dc:date>2023-04-24T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22918">
    <title>CVE-2023-22918 (atp100_firmware, atp100w_firmware, atp200_firmware, atp500_firmware, atp700_firmware, atp800_firmware, nap203_firmware, nap303_firmware, nap353_firmware, nwa110ax_firmware, nwa1123-ac-pro_firmware, nwa1123-ac_hd_firmware, nwa1123acv3_firmware, nwa210ax_firmware, nwa220ax-6e_firmware, nwa50ax-pro_firmware, nwa50ax_firmware, nwa5123-ac_hd_firmware, nwa55axe_firmware, nwa90ax-pro_firmware, nwa90ax_firmware, usg_20w-vpn_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, usg20-vpn_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware, wac500_firmware, wac500h_firmware, wac5302d-sv2_firmware, wac6103d-i_firmware, wac6303d-s_firmware, wac6502d-e_firmware, wac6502d-s_firmware, wac6503d-s_firmware, wac6552d-s_firmware, wac6553d-e_firmware, wax510d_firmware, wax610d_firmware, wax620d-6e_firmware, wax630s_firmware, wax640s-6e_firmware, wax650s_firmware, wax655e_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22918</link>
    <description>A post-authentication information exposure vulnerability in the CGI program of Zyxel ATP series firmware versions 4.32 through 5.35, USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.16 through 5.35, USG20(W)-VPN firmware versions 4.16 through 5.35, VPN series firmware versions 4.30 through 5.35, NWA110AX firmware version 6.50(ABTG.2) and earlier versions, WAC500 firmware version 6.50(ABVS.0) and earlier versions, and WAX510D firmware version 6.50(ABTF.2) and earlier versions, which could allow a remote authenticated attacker to retrieve encrypted information of the administrator on an affected device.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22919">
    <title>CVE-2023-22919 (nbg6604_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22919</link>
    <description>The post-authentication command injection vulnerability in the Zyxel NBG6604 firmware version V1.01(ABIR.0)C0 could allow an authenticated attacker to execute some OS commands remotely by sending a crafted HTTP request.</description>
    <dc:date>2023-05-01T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22921">
    <title>CVE-2023-22921 (nbg-418n_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22921</link>
    <description>A cross-site scripting (XSS) vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to store malicious scripts using a web management interface parameter, resulting in denial-of-service (DoS) conditions on an affected device.</description>
    <dc:date>2023-05-01T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22922">
    <title>CVE-2023-22922 (nbg-418n_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22922</link>
    <description>A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote unauthenticated attacker to cause DoS conditions by sending crafted packets if Telnet is enabled on a vulnerable device.</description>
    <dc:date>2023-05-01T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22923">
    <title>CVE-2023-22923 (nbg-418n_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22923</link>
    <description>A format string vulnerability in a binary of the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker to cause denial-of-service (DoS) conditions on an affected device.</description>
    <dc:date>2023-05-01T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22924">
    <title>CVE-2023-22924 (nbg-418n_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22924</link>
    <description>A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to cause denial-of-service (DoS) conditions by executing crafted CLI commands on a vulnerable device.</description>
    <dc:date>2023-05-01T17:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2293">
    <title>CVE-2023-2293 (purchase_order_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2293</link>
    <description>A vulnerability was found in SourceCodester Purchase Order Management System 1.0. It has been classified as problematic. This affects an unknown part of the file classes/Master.php?f=save_item. The manipulation of the argument description with the input &amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt; leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227463.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2294">
    <title>CVE-2023-2294 (ucms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2294</link>
    <description>A vulnerability was found in UCMS 1.6.0. It has been classified as problematic. This affects an unknown part of the file saddpost.php of the component Column Configuration. The manipulation of the argument strorder leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227481 was assigned to this vulnerability.</description>
    <dc:date>2023-04-26T06:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22948">
    <title>CVE-2023-22948 (tigergraph)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22948</link>
    <description>An issue was discovered in TigerGraph Enterprise Free Edition 3.x. There is unsecured read access to an SSH private key. Any code that runs as the tigergraph user is able to read the SSH private key. With this, an attacker is granted password-less SSH access to all machines in the TigerGraph cluster.</description>
    <dc:date>2023-04-13T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22950">
    <title>CVE-2023-22950 (tigergraph)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22950</link>
    <description>An issue was discovered in TigerGraph Enterprise Free Edition 3.x. Data loading jobs in gsql_server, created by any user with designer permissions, can read sensitive data from arbitrary locations.</description>
    <dc:date>2023-04-13T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2307">
    <title>CVE-2023-2307 (qwik)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2307</link>
    <description>Cross-Site Request Forgery (CSRF) in GitHub repository builderio/qwik prior to 0.104.0.</description>
    <dc:date>2023-04-26T17:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2322">
    <title>CVE-2023-2322 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2322</link>
    <description>Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T09:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2323">
    <title>CVE-2023-2323 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2323</link>
    <description>Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T09:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2336">
    <title>CVE-2023-2336 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2336</link>
    <description>Path Traversal in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2338">
    <title>CVE-2023-2338 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2338</link>
    <description>SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2339">
    <title>CVE-2023-2339 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2339</link>
    <description>Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2340">
    <title>CVE-2023-2340 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2340</link>
    <description>Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T13:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2341">
    <title>CVE-2023-2341 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2341</link>
    <description>Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2342">
    <title>CVE-2023-2342 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2342</link>
    <description>Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2343">
    <title>CVE-2023-2343 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2343</link>
    <description>Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-27T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2344">
    <title>CVE-2023-2344 (service_provider_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2344</link>
    <description>A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POST Request Handler. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227587.</description>
    <dc:date>2023-04-27T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2345">
    <title>CVE-2023-2345 (service_provider_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2345</link>
    <description>A vulnerability was found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_inquiry. The manipulation leads to improper authorization. The attack may be launched remotely. The identifier of this vulnerability is VDB-227588.</description>
    <dc:date>2023-04-27T15:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23451">
    <title>CVE-2023-23451 (fx0-gent00000_firmware, fx0-gent00030_firmware, fx0-gmod00000_firmware, fx0-gmod00010_firmware, fx0-gpnt00000_firmware, fx0-gpnt00030_firmware, ue410-en1_firmware, ue410-en3_firmware, ue410-en3s04_firmware, ue410-en4_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23451</link>
    <description>The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW., SICK UE410-EN1 FLEXI ETHERNET GATEW., SICK UE410-EN3S04 FLEXI ETHERNET GATEW., SICK UE410-EN4 FLEXI ETHERNET GATEW., SICK FX0-GENT00000 FLEXISOFT EIP GATEW., SICK FX0-GMOD00000 FLEXISOFT MOD GATEW., SICK FX0-GPNT00000 FLEXISOFT PNET GATEW., SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 and SICK FX0-GMOD00010 FLEXISOFT MOD GW. have Telnet enabled by factory default. No password is set in the default configuration. Gateways with a serial number &amp;gt;2311xxxx have the Telnet interface disabled by factory default.</description>
    <dc:date>2023-04-19T23:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2346">
    <title>CVE-2023-2346 (service_provider_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2346</link>
    <description>A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227589 was assigned to this vulnerability.</description>
    <dc:date>2023-04-27T15:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2347">
    <title>CVE-2023-2347 (service_provider_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2347</link>
    <description>A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/services/manage_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227590 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-27T15:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2348">
    <title>CVE-2023-2348 (service_provider_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2348</link>
    <description>A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227591.</description>
    <dc:date>2023-04-27T15:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2356">
    <title>CVE-2023-2356 (mlflow)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2356</link>
    <description>Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1.</description>
    <dc:date>2023-04-28T00:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23579">
    <title>CVE-2023-23579 (crosscadware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23579</link>
    <description>Datakit CrossCadWare_x64.dll contains an out-of-bounds write past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This could allow an attacker to execute code in the context of the current process.</description>
    <dc:date>2023-04-20T19:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2360">
    <title>CVE-2023-2360 (cyber_infrastructure)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2360</link>
    <description>Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135.</description>
    <dc:date>2023-04-28T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2361">
    <title>CVE-2023-2361 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2361</link>
    <description>Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.</description>
    <dc:date>2023-04-28T08:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2363">
    <title>CVE-2023-2363 (resort_reservation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2363</link>
    <description>A vulnerability, which was classified as critical, has been found in SourceCodester Resort Reservation System 1.0. This issue affects some unknown processing of the file view_room.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227639.</description>
    <dc:date>2023-04-28T11:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2364">
    <title>CVE-2023-2364 (resort_reservation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2364</link>
    <description>A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640.</description>
    <dc:date>2023-04-28T11:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2365">
    <title>CVE-2023-2365 (faculty_evaluation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2365</link>
    <description>A vulnerability has been found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file ajax.php?action=delete_subject. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227641 was assigned to this vulnerability.</description>
    <dc:date>2023-04-28T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2366">
    <title>CVE-2023-2366 (faculty_evaluation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2366</link>
    <description>A vulnerability was found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ajax.php?action=delete_class. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227642 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-28T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2367">
    <title>CVE-2023-2367 (faculty_evaluation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2367</link>
    <description>A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/manage_academic.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227643.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2368">
    <title>CVE-2023-2368 (faculty_evaluation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2368</link>
    <description>A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php?page=manage_questionnaire. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227644.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2369">
    <title>CVE-2023-2369 (faculty_evaluation_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2369</link>
    <description>A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/manage_restriction.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227645 was assigned to this vulnerability.</description>
    <dc:date>2023-04-28T13:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2370">
    <title>CVE-2023-2370 (online_dj_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2370</link>
    <description>A vulnerability classified as critical has been found in SourceCodester Online DJ Management System 1.0. Affected is an unknown function of the file admin/events/manage_event.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227646 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23708">
    <title>CVE-2023-23708 (visualizer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23708</link>
    <description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Themeisle Visualizer: Tables and Charts Manager for WordPress plugin &amp;lt;=&amp;Acirc;&amp;nbsp;3.9.4 versions.</description>
    <dc:date>2023-05-03T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2371">
    <title>CVE-2023-2371 (online_dj_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2371</link>
    <description>A vulnerability classified as critical was found in SourceCodester Online DJ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/inquiries/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227647.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2372">
    <title>CVE-2023-2372 (online_dj_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2372</link>
    <description>A vulnerability, which was classified as problematic, has been found in SourceCodester Online DJ Management System 1.0. Affected by this issue is some unknown functionality of the file classes/Master.php?f=save_event. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227648.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23753">
    <title>CVE-2023-23753 (visforms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23753</link>
    <description>The 'Visforms Base Package for Joomla 3' extension is vulnerable to SQL Injection as concatenation is used to construct an SQL Query. An attacker can interact with the database and could be able to read, modify and delete data on it.</description>
    <dc:date>2023-04-23T21:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23785">
    <title>CVE-2023-23785 (exquisite_paypal_donation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23785</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in DgCult Exquisite PayPal Donation plugin &amp;lt;=&amp;Acirc;&amp;nbsp;v2.0.0 versions.</description>
    <dc:date>2023-05-03T15:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2380">
    <title>CVE-2023-2380 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2380</link>
    <description>A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227658 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T17:15:43Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2381">
    <title>CVE-2023-2381 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2381</link>
    <description>A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=bandwidth_profile.htm of the component Web Management Interface. The manipulation of the argument BandWidthProfile.ProfileName leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227659. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T17:15:43Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2382">
    <title>CVE-2023-2382 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2382</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument sysLogInfo.serverName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T17:15:43Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23820">
    <title>CVE-2023-23820 (profilepress)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23820</link>
    <description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ProfilePress Membership Team ProfilePress plugin &amp;lt;=&amp;Acirc;&amp;nbsp;4.5.4 versions.</description>
    <dc:date>2023-05-03T13:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2383">
    <title>CVE-2023-2383 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2383</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T18:15:26Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23837">
    <title>CVE-2023-23837 (database_performance_analyzer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23837</link>
    <description>No exception handling vulnerability which revealed sensitive or excessive information to users.</description>
    <dc:date>2023-04-25T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23838">
    <title>CVE-2023-23838 (database_performance_analyzer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23838</link>
    <description>Directory traversal and file enumeration vulnerability which allowed users to enumerate to different folders of the server.</description>
    <dc:date>2023-04-25T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23839">
    <title>CVE-2023-23839 (solarwinds_platform)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23839</link>
    <description>The SolarWinds Platform was susceptible to the Exposure of Sensitive Information Vulnerability. This vulnerability allows users to access Orion.WebCommunityStrings SWIS schema object and obtain sensitive information.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2384">
    <title>CVE-2023-2384 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2384</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been declared as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument dhcp.SecDnsIPByte2 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T18:15:26Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2385">
    <title>CVE-2023-2385 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2385</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been rated as problematic. This issue affects some unknown processing of the file scgi-bin/platform.cgi?page=ike_policies.htm of the component Web Management Interface. The manipulation of the argument IpsecIKEPolicy.IKEPolicyName leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227663. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T18:15:26Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2386">
    <title>CVE-2023-2386 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2386</link>
    <description>A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.toAddr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2387">
    <title>CVE-2023-2387 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2387</link>
    <description>A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument winsServer1 leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23874">
    <title>CVE-2023-23874 (ditty)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23874</link>
    <description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Metaphor Creations Ditty plugin &amp;lt;=&amp;Acirc;&amp;nbsp;3.0.32 versions.</description>
    <dc:date>2023-05-03T14:15:31Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23876">
    <title>CVE-2023-23876 (wpdatatables)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23876</link>
    <description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in TMS-Plugins wpDataTables plugin &amp;lt;=&amp;Acirc;&amp;nbsp;2.1.49 versions.</description>
    <dc:date>2023-05-03T14:15:32Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2388">
    <title>CVE-2023-2388 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2388</link>
    <description>A vulnerability, which was classified as problematic, has been found in Netgear SRX5308 up to 4.3.5-3. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T20:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2389">
    <title>CVE-2023-2389 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2389</link>
    <description>A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.emailServer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227667. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T20:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23892">
    <title>CVE-2023-23892 (m_chart)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23892</link>
    <description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Jamie Poitra M Chart plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.9.4 versions.</description>
    <dc:date>2023-04-24T14:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2390">
    <title>CVE-2023-2390 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2390</link>
    <description>A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server1 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227668. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T20:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2391">
    <title>CVE-2023-2391 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2391</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This issue affects some unknown processing of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server2 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227669 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2392">
    <title>CVE-2023-2392 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2392</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. Affected is an unknown function of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ManualDate.minutes leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2393">
    <title>CVE-2023-2393 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2393</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument ConfigPort.LogicalIfName leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227671. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23938">
    <title>CVE-2023-23938 (tuleap)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23938</link>
    <description>Tuleap is a Free &amp;amp; Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue.</description>
    <dc:date>2023-04-20T17:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2394">
    <title>CVE-2023-2394 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2394</link>
    <description>A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation of the argument wanName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227672. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2395">
    <title>CVE-2023-2395 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2395</link>
    <description>A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the component Web Management Interface. The manipulation of the argument Login.userAgent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2396">
    <title>CVE-2023-2396 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2396</link>
    <description>A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument USERDBUsers.Password leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</description>
    <dc:date>2023-04-28T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2397">
    <title>CVE-2023-2397 (simple_mobile_comparison_website)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2397</link>
    <description>A vulnerability, which was classified as problematic, has been found in SourceCodester Simple Mobile Comparison Website 1.0. This issue affects some unknown processing of the file classes/Master.php?f=save_field. The manipulation of the argument Field Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227675.</description>
    <dc:date>2023-04-28T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2408">
    <title>CVE-2023-2408 (ac_repair_and_services_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2408</link>
    <description>A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. Affected by this issue is some unknown functionality of the file services/view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227702 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-28T23:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2409">
    <title>CVE-2023-2409 (ac_repair_and_services_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2409</link>
    <description>A vulnerability, which was classified as critical, was found in SourceCodester AC Repair and Services System 1.0. This affects an unknown part of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227703.</description>
    <dc:date>2023-04-28T23:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2410">
    <title>CVE-2023-2410 (ac_repair_and_services_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2410</link>
    <description>A vulnerability has been found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/bookings/view_booking.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227704.</description>
    <dc:date>2023-04-28T23:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2411">
    <title>CVE-2023-2411 (ac_repair_and_services_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2411</link>
    <description>A vulnerability was found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227705 was assigned to this vulnerability.</description>
    <dc:date>2023-04-28T23:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2412">
    <title>CVE-2023-2412 (ac_repair_and_services_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2412</link>
    <description>A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227706 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-29T00:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2413">
    <title>CVE-2023-2413 (ac_repair_and_services_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2413</link>
    <description>A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/bookings/manage_booking.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227707.</description>
    <dc:date>2023-04-29T00:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2424">
    <title>CVE-2023-2424 (dedecms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2424</link>
    <description>A vulnerability was found in DedeCMS 5.7.106 and classified as critical. Affected by this issue is the function UpDateMemberModCache of the file uploads/dede/config.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227750 is the identifier assigned to this vulnerability.</description>
    <dc:date>2023-04-29T08:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2425">
    <title>CVE-2023-2425 (simple_student_information_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2425</link>
    <description>A vulnerability was found in SourceCodester Simple Student Information System 1.0. It has been classified as problematic. This affects an unknown part of the file /classes/Master.php?f=save_course of the component Add New Course. The manipulation of the argument name with the input &amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt; leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227751.</description>
    <dc:date>2023-04-29T08:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2428">
    <title>CVE-2023-2428 (phpmyfaq)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2428</link>
    <description>Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.</description>
    <dc:date>2023-04-30T01:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2429">
    <title>CVE-2023-2429 (phpmyfaq)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2429</link>
    <description>Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.13.</description>
    <dc:date>2023-04-30T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24796">
    <title>CVE-2023-24796 (wr-ac1200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24796</link>
    <description>Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.</description>
    <dc:date>2023-04-26T13:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24818">
    <title>CVE-2023-24818 (riot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24818</link>
    <description>RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference. During forwarding of a fragment an uninitialized entry in the reassembly buffer is used. The NULL pointer dereference triggers a hard fault exception resulting in denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.</description>
    <dc:date>2023-04-24T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24819">
    <title>CVE-2023-24819 (riot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24819</link>
    <description>RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.</description>
    <dc:date>2023-04-24T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24820">
    <title>CVE-2023-24820 (riot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24820</link>
    <description>RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. An attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset. Thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patch manually.</description>
    <dc:date>2023-04-24T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24821">
    <title>CVE-2023-24821 (riot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24821</link>
    <description>RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset, thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.</description>
    <dc:date>2023-04-24T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24822">
    <title>CVE-2023-24822 (riot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24822</link>
    <description>RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference while encoding a 6LoWPAN IPHC header. The NULL pointer dereference causes a hard fault exception, leading to denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patches manually.</description>
    <dc:date>2023-04-24T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24823">
    <title>CVE-2023-24823 (riot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24823</link>
    <description>RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a type confusion between IPv6 extension headers and a UDP header. This occurs while encoding a 6LoWPAN IPHC header. The type confusion manifests in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, apply the patches manually.</description>
    <dc:date>2023-04-24T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24966">
    <title>CVE-2023-24966 (websphere_application_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-24966</link>
    <description>IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.  IBM X-Force ID:  246904.</description>
    <dc:date>2023-04-27T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25131">
    <title>CVE-2023-25131 (powerpanel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25131</link>
    <description>Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the 'admin' password.</description>
    <dc:date>2023-04-24T10:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25132">
    <title>CVE-2023-25132 (powerpanel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25132</link>
    <description>Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.</description>
    <dc:date>2023-04-24T10:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25133">
    <title>CVE-2023-25133 (powerpanel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25133</link>
    <description>Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.</description>
    <dc:date>2023-04-24T11:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25292">
    <title>CVE-2023-25292 (group_office)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25292</link>
    <description>Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie.</description>
    <dc:date>2023-04-27T01:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25313">
    <title>CVE-2023-25313 (avideo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25313</link>
    <description>OS injection vulnerability in World Wide Broadcast Network AVideo version before 12.4, allows attackers to execute arbitrary code via the video link field to the Embed a video link feature.</description>
    <dc:date>2023-04-25T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25314">
    <title>CVE-2023-25314 (avideo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25314</link>
    <description>Cross Site Scripting (XSS) vulnerability in World Wide Broadcast Network AVideo before 12.4, allows attackers to gain sensitive information via the success parameter to /user.</description>
    <dc:date>2023-04-25T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25437">
    <title>CVE-2023-25437 (vcs754a_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25437</link>
    <description>An issue was discovered in vTech VCS754 version 1.1.1.A before 1.1.1.H, allows attackers to gain escalated privileges and gain sensitive information due to cleartext passwords passed in the raw HTML.</description>
    <dc:date>2023-04-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25510">
    <title>CVE-2023-25510 (cuda_toolkit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25510</link>
    <description>NVIDIA CUDA Toolkit SDK for Linux and Windows contains a NULL pointer dereference in cuobjdump, where a local user running the tool against a malformed binary may cause a limited denial of service.</description>
    <dc:date>2023-04-22T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25511">
    <title>CVE-2023-25511 (cuda_toolkit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25511</link>
    <description>NVIDIA CUDA Toolkit for Linux and Windows contains a vulnerability in cuobjdump, where a division-by-zero error may enable a user to cause a crash, which may lead to a limited denial of service.</description>
    <dc:date>2023-04-22T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25512">
    <title>CVE-2023-25512 (cuda_toolkit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25512</link>
    <description>NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds memory read by running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.</description>
    <dc:date>2023-04-22T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25513">
    <title>CVE-2023-25513 (cuda_toolkit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25513</link>
    <description>NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.</description>
    <dc:date>2023-04-22T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25514">
    <title>CVE-2023-25514 (cuda_toolkit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25514</link>
    <description>NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.</description>
    <dc:date>2023-04-22T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25601">
    <title>CVE-2023-25601 (dolphinscheduler)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25601</link>
    <description>On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.</description>
    <dc:date>2023-04-20T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25652">
    <title>CVE-2023-25652 (fedora, git)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25652</link>
    <description>Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.</description>
    <dc:date>2023-04-25T20:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25783">
    <title>CVE-2023-25783 (firecask_like_&amp;_share_button)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25783</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alex Moss FireCask Like &amp;amp; Share Button plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.1.5 versions.</description>
    <dc:date>2023-05-03T11:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25784">
    <title>CVE-2023-25784 (sticky_ad_bar)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25784</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bon Plan Gratos Sticky Ad Bar plugin&amp;Acirc;&amp;nbsp;&amp;lt;= 1.3.1 versions.</description>
    <dc:date>2023-05-03T11:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25786">
    <title>CVE-2023-25786 (eyes_only_user_access_shortcode)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25786</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Thom Stark Eyes Only: User Access Shortcode plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.8.2 versions.</description>
    <dc:date>2023-05-03T11:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25789">
    <title>CVE-2023-25789 (tapfiliate)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25789</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tapfiliate plugin &amp;lt;=&amp;Acirc;&amp;nbsp;3.0.12 versions.</description>
    <dc:date>2023-05-03T11:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25796">
    <title>CVE-2023-25796 (wp_baidu_submit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25796</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Include WP BaiDu Submit plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.2.1 versions.</description>
    <dc:date>2023-05-03T12:16:46Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25798">
    <title>CVE-2023-25798 (olevmedia_shortcodes)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25798</link>
    <description>Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Olevmedia Olevmedia Shortcodes plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.1.9 versions.</description>
    <dc:date>2023-05-03T12:16:46Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25815">
    <title>CVE-2023-25815 (fedora, git_for_windows)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25815</link>
    <description>In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.

This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\`.</description>
    <dc:date>2023-04-25T20:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25979">
    <title>CVE-2023-25979 (video_gallery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25979</link>
    <description>Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Video Gallery by Total-Soft Video Gallery plugin &amp;lt;=&amp;Acirc;&amp;nbsp;1.7.6 versions.</description>
    <dc:date>2023-05-03T14:15:32Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26057">
    <title>CVE-2023-26057 (netact)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26057</link>
    <description>An XXE issue was discovered in Nokia NetAct before 22 FP2211 via an XML document to the Configuration Dashboard page. Input validation and a proper XML parser configuration are missing. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.</description>
    <dc:date>2023-04-25T13:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26058">
    <title>CVE-2023-26058 (netact)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26058</link>
    <description>An XXE issue was discovered in Nokia NetAct before 22 FP2211 via an XML document to a Performance Manager page. Input validation and a proper XML parser configuration are missing. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.</description>
    <dc:date>2023-04-25T13:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26059">
    <title>CVE-2023-26059 (netact)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26059</link>
    <description>An issue was discovered in Nokia NetAct before 22 SP1037. On the Site Configuration Tool tab, attackers can upload a ZIP file which, when processed, exploits Stored XSS. The upload option of the Site Configuration tool does not validate the file contents. The application is in a demilitarised zone behind a perimeter firewall and without exposure to the internet. The attack can only be performed by an internal user.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26060">
    <title>CVE-2023-26060 (netact)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26060</link>
    <description>An issue was discovered in Nokia NetAct before 22 FP2211. On the Working Set Manager page, users can create a Working Set with a name that has a client-side template injection payload. Input validation is missing during creation of the working set. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.</description>
    <dc:date>2023-04-24T17:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26061">
    <title>CVE-2023-26061 (netact)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26061</link>
    <description>An issue was discovered in Nokia NetAct before 22 FP2211. On the Scheduled Search tab under the Alarm Reports Dashboard page, users can create a script to inject XSS. Input validation was missing during creation of a scheduled task. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user.</description>
    <dc:date>2023-04-24T17:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26097">
    <title>CVE-2023-26097 (apsal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26097</link>
    <description>An issue was discovered in Telindus Apsal 3.14.2022.235 b. Unauthorized actions that could modify the application behaviour may not be blocked.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26098">
    <title>CVE-2023-26098 (apsal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26098</link>
    <description>An issue was discovered in the Open Document feature in Telindus Apsal 3.14.2022.235 b. An attacker may upload a crafted file to execute arbitrary code.</description>
    <dc:date>2023-04-25T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26099">
    <title>CVE-2023-26099 (apsal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26099</link>
    <description>An issue was discovered in Telindus Apsal 3.14.2022.235 b. The consultation permission is insecure.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26100">
    <title>CVE-2023-26100 (flowmon_os)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26100</link>
    <description>In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user's web browser.</description>
    <dc:date>2023-04-21T12:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26101">
    <title>CVE-2023-26101 (flowmon_packet_investigator)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26101</link>
    <description>In Progress Flowmon Packet Investigator before 12.1.0, a Flowmon user with access to Flowmon Packet Investigator could leverage a path-traversal vulnerability to retrieve files on the Flowmon appliance's local filesystem.</description>
    <dc:date>2023-04-21T12:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26286">
    <title>CVE-2023-26286 (aix, vios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26286</link>
    <description>IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX runtime services library to execute arbitrary commands.  IBM X-Force ID:  248421.</description>
    <dc:date>2023-04-26T12:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26494">
    <title>CVE-2023-26494 (lorawan-stack)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26494</link>
    <description>lorawan-stack is an open source LoRaWAN network server. Prior to version 3.24.1, an open redirect exists on the login page of the lorawan stack server, allowing an attacker to supply a user controlled redirect upon sign in. This issue may allows malicious actors to phish users, as users assume they were redirected to the homepage on login. Version 3.24.1 contains a fix.</description>
    <dc:date>2023-04-24T17:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26556">
    <title>CVE-2023-26556 (tss-lib)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26556</link>
    <description>io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)</description>
    <dc:date>2023-04-21T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26557">
    <title>CVE-2023-26557 (tss-lib)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26557</link>
    <description>io.finnet tss-lib before 2.0.0 can leak the lambda value of a private key via a timing side-channel attack because it relies on Go big.Int, which is not constant time for Cmp, modular exponentiation, or modular inverse. An example leak is in crypto/paillier/paillier.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)</description>
    <dc:date>2023-04-21T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26567">
    <title>CVE-2023-26567 (freepbx_linux_7)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26567</link>
    <description>Sangoma FreePBX 1805 through 2302 (when obtained as a ,.ISO file) places AMPDBUSER, AMPDBPASS, AMPMGRUSER, and AMPMGRPASS in the list of global variables. This exposes cleartext authentication credentials for the Asterisk Database (MariaDB/MySQL) and Asterisk Manager Interface. For example, an attacker can make a /ari/asterisk/variable?variable=AMPDBPASS API call.</description>
    <dc:date>2023-04-26T20:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26865">
    <title>CVE-2023-26865 (bdroppy)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26865</link>
    <description>SQL injection vulnerability found in PrestaShop bdroppy v.2.2.12 and before allowing a remote attacker to gain privileges via the BdroppyCronModuleFrontController::importProducts component.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26930">
    <title>CVE-2023-26930 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26930</link>
    <description>Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the PDFDoc malloc in the pdftotext.cc function.</description>
    <dc:date>2023-04-26T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26931">
    <title>CVE-2023-26931 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26931</link>
    <description>Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the TextOutputDev.cc function.</description>
    <dc:date>2023-04-26T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26934">
    <title>CVE-2023-26934 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26934</link>
    <description>An issue found in XPDF v.4.04 allows an attacker to cause a denial of service via a crafted pdf file in the object.cc parameter.</description>
    <dc:date>2023-04-26T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26935">
    <title>CVE-2023-26935 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26935</link>
    <description>Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via SharedFile::readBlock at /xpdf/Stream.cc.</description>
    <dc:date>2023-04-26T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26936">
    <title>CVE-2023-26936 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26936</link>
    <description>Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via gmalloc in gmem.cc</description>
    <dc:date>2023-04-26T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26937">
    <title>CVE-2023-26937 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26937</link>
    <description>Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via GString::resize located in goo/GString.cc</description>
    <dc:date>2023-04-26T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26938">
    <title>CVE-2023-26938 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26938</link>
    <description>Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service viaSharedFile::readBlock located in goo/gfile.cc.</description>
    <dc:date>2023-04-26T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26987">
    <title>CVE-2023-26987 (konga)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26987</link>
    <description>An issue discovered in Konga 0.14.9 allows remote attackers to manipulate user accounts regardless of privilege via crafted POST request.</description>
    <dc:date>2023-05-01T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27035">
    <title>CVE-2023-27035 (obsidian)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27035</link>
    <description>An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page.</description>
    <dc:date>2023-05-01T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27090">
    <title>CVE-2023-27090 (teacms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27090</link>
    <description>Cross Site Scripting vulnerability found in TeaCMS storage allows attacker to cause a leak of sensitive information via the article title parameter.</description>
    <dc:date>2023-04-20T20:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27105">
    <title>CVE-2023-27105 (eddict_player, mtouch_os)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27105</link>
    <description>A vulnerability in the Wi-Fi file transfer module of Shanling M5S Portable Music Player with Shanling MTouch OS v4.3 and Shanling M2X Portable Music Player with Shanling MTouch OS v3.3 allows attackers to arbitrarily read, delete, or modify any critical system files via directory traversal.</description>
    <dc:date>2023-04-25T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27108">
    <title>CVE-2023-27108 (kaios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27108</link>
    <description>An issue was discovered in KaiOS 3.0. The pre-installed Communications application exposes a Web Activity that returns the user's call log without origin or permission checks. An attacker can inject a JavaScript payload that runs in a browser or app without user interaction or consent. This allows an attacker to send the user's call logs to a remote server via XMLHttpRequest or Fetch.</description>
    <dc:date>2023-05-01T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27350">
    <title>CVE-2023-27350 (papercut_mf, papercut_ng)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27350</link>
    <description>This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.</description>
    <dc:date>2023-04-20T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27351">
    <title>CVE-2023-27351 (papercut_mf, papercut_ng)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27351</link>
    <description>This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226.</description>
    <dc:date>2023-04-20T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27352">
    <title>CVE-2023-27352 (one_firmware, s1, s2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27352</link>
    <description>This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the SMB directory query command. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19845.</description>
    <dc:date>2023-04-20T22:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27353">
    <title>CVE-2023-27353 (one_firmware, s1, s2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27353</link>
    <description>This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the msprox endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-19846.</description>
    <dc:date>2023-04-20T22:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27354">
    <title>CVE-2023-27354 (one_firmware, s1, s2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27354</link>
    <description>This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the SMB directory query command. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-19727.</description>
    <dc:date>2023-04-20T22:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27355">
    <title>CVE-2023-27355 (one_firmware, s1, s2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27355</link>
    <description>This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MPEG-TS parser. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19773.</description>
    <dc:date>2023-04-20T22:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27495">
    <title>CVE-2023-27495 (csrf-protection)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27495</link>
    <description>@fastify/csrf-protection is a plugin which helps protect Fastify servers against CSRF attacks. The CSRF protection enforced by the @fastify/csrf-protection library in combination with @fastify/cookie can be bypassed from network and same-site attackers under certain conditions. @fastify/csrf-protection supports an optional userInfo parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf cookie in the victim's browser, and 2. forge CSRF tokens that are valid for the victim's session. This allows attackers to bypass the CSRF protection mechanism. As a fix, @fastify/csrf-protection starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey that cryptographically binds the CSRF token to the value of the _csrf cookie and the userInfo parameter, making tokens non-spoofable by attackers. This protection is effective as long as the userInfo parameter is unique for each user. This is patched in versions 6.3.0 and v4.1.0. Users are advised to upgrade. Users unable to upgrade may use a random, non-predictable userInfo parameter for each user as a mitigation.</description>
    <dc:date>2023-04-20T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27524">
    <title>CVE-2023-27524 (superset)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27524</link>
    <description>Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.</description>
    <dc:date>2023-04-24T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27556">
    <title>CVE-2023-27556 (safer_payments)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27556</link>
    <description>IBM Counter Fraud Management for Safer Payments 6.1.0.00, 6.2.0.00, 6.3.0.00 through 6.3.1.03, 6.4.0.00 through 6.4.2.02 and 6.5.0.00 does not properly allocate resources without limits or throttling which could allow a remote attacker to cause a denial of service.  IBM X-Force ID:  249190.</description>
    <dc:date>2023-04-28T01:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27557">
    <title>CVE-2023-27557 (safer_payments)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27557</link>
    <description>IBM Counter Fraud Management for Safer Payments 6.1.0.00 through 6.1.1.02, 6.2.0.00 through 6.2.2.02, 6.3.0.00 through 6.3.1.02, 6.4.0.00 through 6.4.2.01, and 6.5.0.00 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.  IBM X-Force ID:  249192.</description>
    <dc:date>2023-04-28T02:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27559">
    <title>CVE-2023-27559 (db2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27559</link>
    <description>IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted subquery.  IBM X-Force ID:  249196.</description>
    <dc:date>2023-04-26T20:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27843">
    <title>CVE-2023-27843 (ask_for_a_quote)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27843</link>
    <description>SQL injection vulnerability found in PrestaShop askforaquote v.5.4.2 and before allow a remote attacker to gain privileges via the QuotesProduct::deleteProduct component.</description>
    <dc:date>2023-04-26T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27848">
    <title>CVE-2023-27848 (broccoli-compass)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27848</link>
    <description>broccoli-compass v0.2.4 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27849">
    <title>CVE-2023-27849 (rails-routes-to-json)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27849</link>
    <description>rails-routes-to-json v1.0.0 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27860">
    <title>CVE-2023-27860 (maximo_asset_management)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27860</link>
    <description>IBM Maximo Asset Management 7.6.1.2 and 7.6.1.3 could disclose sensitive information in an error message.  This information could be used in further attacks against the system.  IBM X-Force ID:  249207.</description>
    <dc:date>2023-04-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27990">
    <title>CVE-2023-27990 (atp100_firmware, atp100w_firmware, atp200_firmware, atp500_firmware, atp700_firmware, atp800_firmware, usg_20w-vpn_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, usg20-vpn_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27990</link>
    <description>The XSS vulnerability in Zyxel ATP series firmware versions 4.32 through 5.35, USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.16 through 5.35, USG20(W)-VPN firmware versions 4.16 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow an authenticated attacker with administrator privileges to store malicious scripts in a vulnerable device. A successful XSS attack could then result in the stored malicious scripts being executed when the user visits the Logs page of the GUI on the device.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27991">
    <title>CVE-2023-27991 (atp100_firmware, atp100w_firmware, atp200_firmware, atp500_firmware, atp700_firmware, atp800_firmware, usg_20w-vpn_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, usg20-vpn_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-27991</link>
    <description>The post-authentication command injection vulnerability in the CLI command of Zyxel ATP series firmware versions 4.32 through 5.35, USG FLEX series firmware versions 4.50 through 5.35, USG FLEX 50(W) firmware versions 4.16 through 5.35, USG20(W)-VPN firmware versions 4.16 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow an authenticated attacker to execute some OS commands remotely.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28003">
    <title>CVE-2023-28003 (ecostruxure_power_monitoring_expert)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28003</link>
    <description>A CWE-613: Insufficient Session Expiration vulnerability exists that could allow an attacker to
maintain unauthorized access over a hijacked session in PME after the legitimate user has
signed out of their account.</description>
    <dc:date>2023-04-18T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28008">
    <title>CVE-2023-28008 (workload_automation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28008</link>
    <description>HCL Workload Automation 9.4, 9.5, and 10.1 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.</description>
    <dc:date>2023-04-26T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28009">
    <title>CVE-2023-28009 (workload_automation)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28009</link>
    <description>HCL Workload Automation is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.</description>
    <dc:date>2023-04-26T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28084">
    <title>CVE-2023-28084 (oneview, oneview_global_dashboard)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28084</link>
    <description>HPE OneView and HPE OneView Global Dashboard appliance dumps may expose authentication tokens</description>
    <dc:date>2023-04-25T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28086">
    <title>CVE-2023-28086 (oneview)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28086</link>
    <description>An HPE OneView appliance dump may expose proxy credential settings</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28087">
    <title>CVE-2023-28087 (oneview)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28087</link>
    <description>An HPE OneView appliance dump may expose OneView user accounts</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28088">
    <title>CVE-2023-28088 (oneview)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28088</link>
    <description>An HPE OneView appliance dump may expose SAN switch administrative credentials</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28089">
    <title>CVE-2023-28089 (oneview)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28089</link>
    <description>An HPE OneView appliance dump may expose FTP credentials for c7000 Interconnect Modules</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28090">
    <title>CVE-2023-28090 (oneview)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28090</link>
    <description>An HPE OneView appliance dump may expose SNMPv3 read credentials</description>
    <dc:date>2023-04-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28122">
    <title>CVE-2023-28122 (desktop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28122</link>
    <description>A local privilege escalation (LPE) vulnerability in UI Desktop for Windows (Version 0.59.1.71 and earlier) allows a malicious actor with local access to a Windows device running said application to submit arbitrary commands as SYSTEM.This vulnerability is fixed in Version 0.62.3 and later.</description>
    <dc:date>2023-04-19T20:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28123">
    <title>CVE-2023-28123 (desktop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28123</link>
    <description>A permission misconfiguration in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow an user to hijack VPN credentials while UID VPN is starting.This vulnerability is fixed in Version 0.62.3 and later.</description>
    <dc:date>2023-04-19T20:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28124">
    <title>CVE-2023-28124 (desktop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28124</link>
    <description>Improper usage of symmetric encryption in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow users with access to UI Desktop configuration files to decrypt their content.This vulnerability is fixed in Version 0.62.3 and later.</description>
    <dc:date>2023-04-19T20:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28131">
    <title>CVE-2023-28131 (expo_software_development_kit)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28131</link>
    <description>A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the &amp;quot;Expo AuthSession Redirect Proxy&amp;quot; for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc).</description>
    <dc:date>2023-04-24T05:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28384">
    <title>CVE-2023-28384 (mypro)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28384</link>
    <description>mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.</description>
    <dc:date>2023-04-27T23:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28400">
    <title>CVE-2023-28400 (mypro)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28400</link>
    <description>mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.</description>
    <dc:date>2023-04-27T23:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28458">
    <title>CVE-2023-28458 (pretalx)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28458</link>
    <description>pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Organizers can trigger the overwriting (with the standard pretalx 404 page content) of an arbitrary file.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28459">
    <title>CVE-2023-28459 (pretalx)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28459</link>
    <description>pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files.</description>
    <dc:date>2023-04-20T21:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28471">
    <title>CVE-2023-28471 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28471</link>
    <description>Concrete CMS (previously concrete5) before 9.2 is vulnerable to Stored XSS via a container name.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28472">
    <title>CVE-2023-28472 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28472</link>
    <description>Concrete CMS (previously concrete5) before 9.2 does not have Secure and HTTP only attributes set for ccmPoll cookies.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28473">
    <title>CVE-2023-28473 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28473</link>
    <description>Concrete CMS (previously concrete5) before 9.2 is vulnerable to possible Auth bypass in the jobs section.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28474">
    <title>CVE-2023-28474 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28474</link>
    <description>Concrete CMS (previously concrete5) before 9.2 is vulnerable to Stored XSS on Saved Presets on search.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28475">
    <title>CVE-2023-28475 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28475</link>
    <description>Concrete CMS (previously concrete5) before 9.2 is vulnerable to Reflected XSS on the Reply form because msgID was not sanitized.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28476">
    <title>CVE-2023-28476 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28476</link>
    <description>Concrete CMS (previously concrete5) before 9.2 is vulnerable to Stored XSS on Tags on uploaded files.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28477">
    <title>CVE-2023-28477 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28477</link>
    <description>Concrete CMS (previously concrete5) before 9.2 is vulnerable to stored XSS on API Integrations via the name parameter.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28484">
    <title>CVE-2023-28484 (debian_linux, libxml2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28484</link>
    <description>In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28528">
    <title>CVE-2023-28528 (aix, vios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28528</link>
    <description>IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command to execute arbitrary commands.  IBM X-Force ID:  251207.</description>
    <dc:date>2023-04-28T03:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28697">
    <title>CVE-2023-28697 (miineport_e1_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28697</link>
    <description>Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service.</description>
    <dc:date>2023-04-27T02:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28716">
    <title>CVE-2023-28716 (mypro)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28716</link>
    <description>mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.</description>
    <dc:date>2023-04-27T23:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28771">
    <title>CVE-2023-28771 (atp100_firmware, atp100w_firmware, atp200_firmware, atp500_firmware, atp700_firmware, atp800_firmware, usg_flex_100_firmware, usg_flex_100w_firmware, usg_flex_200_firmware, usg_flex_50_firmware, usg_flex_500_firmware, usg_flex_50w_firmware, usg_flex_700_firmware, vpn100_firmware, vpn1000_firmware, vpn300_firmware, vpn50_firmware, zywall_usg_100_firmware, zywall_usg_310_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28771</link>
    <description>Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.</description>
    <dc:date>2023-04-25T02:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28819">
    <title>CVE-2023-28819 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28819</link>
    <description>Concrete CMS (previously concrete5) before 9.1 is vulnerable to Stored XSS in uploaded file and folder names.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28820">
    <title>CVE-2023-28820 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28820</link>
    <description>Concrete CMS (previously concrete5) before 9.1 is vulnerable to stored XSS in RSS Displayer via the href attribute because the link element input was not sanitized.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28821">
    <title>CVE-2023-28821 (concrete_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28821</link>
    <description>Concrete CMS (previously concrete5) before 9.1 did not have a rate limit for password resets.</description>
    <dc:date>2023-04-28T14:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28847">
    <title>CVE-2023-28847 (nextcloud_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28847</link>
    <description>Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server 24.0.0 prior to 24.0.11 and 25.0.0 prior to 25.0.5; as well as Nextcloud Server Enterprise 23.0.0 prior to 23.0.12.6, 24.0.0 prior to 24.0.11, and 25.0.0 prior to 25.0.5; an attacker is not restricted in verifying passwords of share links so they can just start brute forcing the password. Nextcloud Server 24.0.11 and 25.0.5 and Nextcloud Enterprise Server 23.0.12.6, 24.0.11, and 25.0.5 contain a fix for this issue. No known workarounds are available.</description>
    <dc:date>2023-04-25T17:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28882">
    <title>CVE-2023-28882 (modsecurity)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28882</link>
    <description>Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations.</description>
    <dc:date>2023-04-28T04:15:38Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28976">
    <title>CVE-2023-28976 (junos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28976</link>
    <description>An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If specific traffic is received on MX Series and its rate exceeds the respective DDoS protection limit the ingress PFE will crash and restart. Continued receipt of this traffic will create a sustained DoS condition. This issue affects Juniper Networks Junos OS on MX Series: All versions prior to 19.1R3-S10; 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S5; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28978">
    <title>CVE-2023-28978 (junos_os_evolved)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28978</link>
    <description>An Insecure Default Initialization of Resource vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to read certain confidential information. In the default configuration it is possible to read confidential information about locally configured (administrative) users of the affected system. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S7-EVO on pending commit???; 21.1-EVO versions prior to 21.1R3-S4-EVO on awaiting build; 21.4-EVO versions prior to 21.4R3-S1-EVO; 22.2-EVO versions prior to 22.2R3-EVO; 21.2-EVO versions prior to 21.2R3-S5-EVO on pending commit???; 21.3-EVO version 21.3R1-EVO and later versions; 22.1-EVO version 22.1R1-EVO and later versions; 22.2-EVO versions prior to 22.2R2-S1-EVO.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28979">
    <title>CVE-2023-28979 (junos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28979</link>
    <description>An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Networks Junos OS allows an adjacent unauthenticated attacker to bypass an integrity check. In a 6PE scenario and if an additional integrity check is configured, it will fail to drop specific malformed IPv6 packets, and then these packets will be forwarded to other connected networks. This issue affects Juniper Networks Junos OS: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S9; 20.2 versions prior to 20.2R3-S7; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S2; 21.3 versions prior to 21.3R3-S1; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2; 22.2 versions prior to 22.2R2.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28980">
    <title>CVE-2023-28980 (junos, junos_os_evolved)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28980</link>
    <description>A Use After Free vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows a locally authenticated attacker with low privileges to cause Denial of Service (DoS). In a rib sharding scenario the rpd process will crash shortly after specific CLI command is issued. This issue is more likely to occur in a scenario with high route scale (&amp;gt;1M routes). This issue affects: Juniper Networks Junos OS 20.2 version 20.2R3-S5 and later versions prior to 20.2R3-S6; 20.3 version 20.3R3-S2 and later versions prior to 20.3R3-S5; 20.4 version 20.4R3-S1 and later versions prior to 20.4R3-S4 21.1 version 21.1R3 and later versions prior to 21.1R3-S3; 21.2 version 21.2R1-S2, 21.2R2-S1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R2 and later versions prior to 21.3R3; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.4-EVO version 20.4R3-S1-EVO and later versions prior to 20.4R3-S6-EVO; 21.2-EVO version 21.2R1-S2-EVO and later versions prior to 21.2R3-S4-EVO; 21.3-EVO version 21.3R2-EVO and later versions prior to 21.3R3-S1-EVO; 21.4-EVO versions prior to 21.4R2-S1-EVO, 21.4R3-EVO; 22.1-EVO versions prior to 22.1R2-EVO.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28981">
    <title>CVE-2023-28981 (junos, junos_os_evolved)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28981</link>
    <description>An Improper Input Validation vulnerability in the kernel of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If the receipt of router advertisements is enabled on an interface and a specifically malformed RA packet is received, memory corruption will happen which leads to an rpd crash. This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2; 22.1 versions prior to 22.1R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.3-EVO versions prior to 21.3R3-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28982">
    <title>CVE-2023-28982 (junos, junos_os_evolved)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28982</link>
    <description>A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a BGP rib sharding scenario, when an attribute of an active BGP route is updated memory will leak. As rpd memory usage increases over time the rpd process will eventually run out of memory, crash, and restart. The memory utilization can be monitored with the following CLI commands: show task memory show system processes extensive | match rpd This issue affects: Juniper Networks Junos OS 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3-S6; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2. Juniper Networks Junos OS Evolved 20.3-EVO version 20.3R1-EVO and later versions; 20.4-EVO versions prior to 20.4R3-S6-EVO; 21.2-EVO versions prior to 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28983">
    <title>CVE-2023-28983 (junos_os_evolved)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28983</link>
    <description>An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28984">
    <title>CVE-2023-28984 (junos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28984</link>
    <description>A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS). The PFE may crash when a lot of MAC learning and aging happens, but due to a Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) that is outside the attackers direct control. This issue affects: Juniper Networks Junos OS versions prior to 19.4R3-S10 on QFX Series; 20.2 versions prior to 20.2R3-S7 on QFX Series; 20.3 versions prior to 20.3R3-S6 on QFX Series; 20.4 versions prior to 20.4R3-S5 on QFX Series; 21.1 versions prior to 21.1R3-S4 on QFX Series; 21.2 versions prior to 21.2R3-S3 on QFX Series; 21.3 versions prior to 21.3R3-S3 on QFX Series; 21.4 versions prior to 21.4R3 on QFX Series; 22.1 versions prior to 22.1R3 on QFX Series; 22.2 versions prior to 22.2R2 on QFX Series.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29002">
    <title>CVE-2023-29002 (cilium)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29002</link>
    <description>Cilium is a networking, observability, and security solution with an eBPF-based dataplane. When run in debug mode, Cilium will log the contents of the `cilium-secrets` namespace. This could include data such as TLS private keys for Ingress and GatewayAPI resources. An attacker with access to debug output from the Cilium containers could use the resulting output to intercept and modify traffic to and from the affected cluster. Output of the sensitive information would occur at Cilium agent restart, when secrets in the namespace are modified, and on creation of Ingress or GatewayAPI resources. This vulnerability is fixed in Cilium releases 1.11.16, 1.12.9, and 1.13.2. Users unable to upgrade should disable debug mode.</description>
    <dc:date>2023-04-18T22:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29007">
    <title>CVE-2023-29007 (fedora, git)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29007</link>
    <description>Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29011">
    <title>CVE-2023-29011 (git_for_windows)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29011</link>
    <description>Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\etc\connectrc`. Since `C:\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `&amp;lt;drive&amp;gt;:\etc\connectrc` files on multi-user machines.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29012">
    <title>CVE-2023-29012 (git_for_windows)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29012</link>
    <description>Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29019">
    <title>CVE-2023-29019 (passport)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29019</link>
    <description>@fastify/passport is a port of passport authentication library for the Fastify ecosystem. Applications using `@fastify/passport` in affected versions for user authentication, in combination with `@fastify/session` as the underlying session management mechanism, are vulnerable to session fixation attacks from network and same-site attackers. fastify applications rely on the `@fastify/passport` library for user authentication. The login and user validation are performed by the `authenticate` function. When executing this function, the `sessionId` is preserved between the pre-login and the authenticated session. Network and same-site attackers can hijack the victim's session by tossing a valid `sessionId` cookie in the victim's browser and waiting for the victim to log in on the website. As a solution, newer versions of `@fastify/passport` regenerate `sessionId` upon login, preventing the attacker-controlled pre-session cookie from being upgraded to an authenticated session. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
    <dc:date>2023-04-21T23:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29020">
    <title>CVE-2023-29020 (passport)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29020</link>
    <description>@fastify/passport is a port of passport authentication library for the Fastify ecosystem. The CSRF (Cross-Site Request Forger) protection enforced by the `@fastify/csrf-protection` library, when combined with `@fastify/passport` in affected versions, can be bypassed by network and same-site attackers. `fastify/csrf-protection` implements the synchronizer token pattern (using plugins `@fastify/session` and `@fastify/secure-session`) by storing a random value used for CSRF token generation in the `_csrf` attribute of a user's session. The `@fastify/passport` library does not clear the session object upon authentication, preserving the `_csrf` attribute between pre-login and authenticated sessions. Consequently, CSRF tokens generated before authentication are still valid. Network and same-site attackers can thus obtain a CSRF token for their pre-session, fixate that pre-session in the victim's browser via cookie tossing, and then perform a CSRF attack after the victim authenticates. As a solution, newer versions of `@fastify/passport` include the configuration options: `clearSessionOnLogin (default: true)` and `clearSessionIgnoreFields (default: ['passport', 'session'])` to clear all the session attributes by default, preserving those explicitly defined in `clearSessionIgnoreFields`.</description>
    <dc:date>2023-04-21T23:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29150">
    <title>CVE-2023-29150 (mypro)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29150</link>
    <description>mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.</description>
    <dc:date>2023-04-27T23:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29169">
    <title>CVE-2023-29169 (mypro)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29169</link>
    <description>mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.</description>
    <dc:date>2023-04-27T23:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29197">
    <title>CVE-2023-29197 (fedora, psr-7)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29197</link>
    <description>guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.</description>
    <dc:date>2023-04-17T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29200">
    <title>CVE-2023-29200 (contao)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29200</link>
    <description>Contao is an open source content management system. Prior to versions 4.9.40, 4.13.21, and 5.1.4, logged in users can list arbitrary system files in the file manager by manipulating the Ajax request. However, it is not possible to read the contents of these files. Users should update to Contao 4.9.40, 4.13.21 or 5.1.4 to receive a patch. There are no known workarounds.</description>
    <dc:date>2023-04-25T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29213">
    <title>CVE-2023-29213 (xwiki)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29213</link>
    <description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of `org.xwiki.platform:xwiki-platform-logging-ui` it is possible to trick a user with programming rights into visiting a constructed url where e.g., by embedding an image with this URL in a document that is viewed by a user with programming rights which will evaluate an expression in the constructed url and execute it. This issue has been addressed in versions 13.10.11, 14.4.7, and 14.10. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
    <dc:date>2023-04-17T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29255">
    <title>CVE-2023-29255 (db2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29255</link>
    <description>IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as it may trap when compiling a variation of an anonymous block.  IBM X-Force ID:  251991.</description>
    <dc:date>2023-04-27T13:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29257">
    <title>CVE-2023-29257 (db2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29257</link>
    <description>IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to remote code execution as a database administrator of one database may execute code or read/write files from another database within the same instance.  IBM X-Force ID:  252011.</description>
    <dc:date>2023-04-26T13:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29469">
    <title>CVE-2023-29469 (debian_linux, libxml2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29469</link>
    <description>An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29471">
    <title>CVE-2023-29471 (alpakka_kafka)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29471</link>
    <description>Lightbend Alpakka Kafka before 5.0.0 logs its configuration as debug information, and thus log files may contain credentials (if plain cleartext login is configured). This occurs in akka.kafka.internal.KafkaConsumerActor.</description>
    <dc:date>2023-04-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29479">
    <title>CVE-2023-29479 (rnp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29479</link>
    <description>Ribose RNP before 0.16.3 may hang when the input is malformed.</description>
    <dc:date>2023-04-24T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29480">
    <title>CVE-2023-29480 (rnp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29480</link>
    <description>Ribose RNP before 0.16.3 sometimes lets secret keys remain unlocked after use.</description>
    <dc:date>2023-04-24T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29489">
    <title>CVE-2023-29489 (cpanel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29489</link>
    <description>An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.</description>
    <dc:date>2023-04-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29523">
    <title>CVE-2023-29523 (xwiki)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29523</link>
    <description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading.</description>
    <dc:date>2023-04-19T00:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29524">
    <title>CVE-2023-29524 (xwiki)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29524</link>
    <description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute anything with the right of the Scheduler Application sheet page. A user without script or programming rights, edit your user profile with the object editor and add a new object of type XWiki.SchedulerJobClass, In &amp;quot;Job Script&amp;quot;, groovy code can be added and will be executed in the server context on viewing. This has been patched in XWiki 14.10.3 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this issue.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29525">
    <title>CVE-2023-29525 (xwiki)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29525</link>
    <description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Affected versions of xwiki are subject to code injection in the `since` parameter of the `/xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration` endpoint. This provides an XWiki syntax injection attack via the since-parameter, allowing privilege escalation from view to programming rights and subsequent code execution privilege. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8 and 14.10.3. Users are advised to upgrade. Users unable to upgrade may modify the page `XWiki.Notifications.Code.LegacyNotificationAdministration` to add the missing escaping. For versions &amp;lt; 14.6-rc-1 a workaround is to modify the file `&amp;lt;xwikiwebapp&amp;gt;/templates/distribution/eventmigration.wiki` to add the missing escaping.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29527">
    <title>CVE-2023-29527 (xwiki)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29527</link>
    <description>XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions a user without script or programming right may edit a user profile (or any other document) with the wiki editor and add groovy script content. Viewing the document after saving it will execute the groovy script in the server context which provides code execution. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3. Users are advised to upgrade. There are no known workarounds for this issue.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29528">
    <title>CVE-2023-29528 (commons)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29528</link>
    <description>XWiki Commons are technical libraries common to several other top level XWiki projects. The &amp;quot;restricted&amp;quot; mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this &amp;quot;restricted&amp;quot; mode for security is vulnerable to JavaScript injection (&amp;quot;cross-site scripting&amp;quot;/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.10, HTML comments are now removed in restricted mode and a check has been introduced that ensures that comments don't start with `&amp;gt;`. There are no known workarounds apart from upgrading to a version including the fix.</description>
    <dc:date>2023-04-20T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29530">
    <title>CVE-2023-29530 (fedora, laminas-diactoros, psr-7)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29530</link>
    <description>Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`.</description>
    <dc:date>2023-04-24T20:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29552">
    <title>CVE-2023-29552 (esxi, linux_enterprise_server, manager_server, service_location_protocol, smi-s_provider)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29552</link>
    <description>The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.</description>
    <dc:date>2023-04-25T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29566">
    <title>CVE-2023-29566 (dawnsparks-node-tesseract, huedawn-tesseract)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29566</link>
    <description>huedawn-tesseract 0.3.3 and dawnsparks-node-tesseract 0.4.0 to 0.4.1 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.</description>
    <dc:date>2023-04-24T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29575">
    <title>CVE-2023-29575 (bento4)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29575</link>
    <description>Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component.</description>
    <dc:date>2023-04-21T14:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29578">
    <title>CVE-2023-29578 (mp4v2)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29578</link>
    <description>mp4v2 v2.0.0 was discovered to contain a heap buffer overflow via the mp4v2::impl::MP4StringProperty::~MP4StringProperty() function at src/mp4property.cpp.</description>
    <dc:date>2023-04-24T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29579">
    <title>CVE-2023-29579 (yasm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29579</link>
    <description>yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf.</description>
    <dc:date>2023-04-24T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29582">
    <title>CVE-2023-29582 (yasm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29582</link>
    <description>yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c.</description>
    <dc:date>2023-04-24T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29583">
    <title>CVE-2023-29583 (yasm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29583</link>
    <description>yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr5 at /nasm/nasm-parse.c.</description>
    <dc:date>2023-04-24T13:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29596">
    <title>CVE-2023-29596 (cmix)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29596</link>
    <description>Buffer Overflow vulnerability found in ByronKnoll Cmix v.19 allows an attacker to execute arbitrary code and cause a denial of service via the paq8 function.</description>
    <dc:date>2023-04-26T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29635">
    <title>CVE-2023-29635 (antabot_white-jotter)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29635</link>
    <description>File upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload.</description>
    <dc:date>2023-05-01T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29636">
    <title>CVE-2023-29636 (zhenfeng13_my-blog)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29636</link>
    <description>Cross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via the &amp;quot;title&amp;quot; field in the &amp;quot;blog management&amp;quot; page due to the the default configuration not using MyBlogUtils.cleanString.</description>
    <dc:date>2023-05-01T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29637">
    <title>CVE-2023-29637 (qbian61_forum-java)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29637</link>
    <description>Cross Site Scripting (XSS) vulnerability in Qbian61 forum-java, allows attackers to inject arbitrary web script or HTML via editing the article content in the &amp;quot;article editor&amp;quot; page.</description>
    <dc:date>2023-05-01T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29639">
    <title>CVE-2023-29639 (zhenfeng13_my-blog)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29639</link>
    <description>Cross site scripting (XSS) vulnerability in ZHENFENG13 My-Blog, allows attackers to inject arbitrary web script or HTML via editing an article in the &amp;quot;blog article&amp;quot; page due to the default configuration not utilizing MyBlogUtils.cleanString.</description>
    <dc:date>2023-05-01T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29641">
    <title>CVE-2023-29641 (editor.md)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29641</link>
    <description>Cross Site Scripting (XSS) vulnerability in pandao editor.md thru 1.5.0 allows attackers to inject arbitrary web script or HTML via crafted markdown text.</description>
    <dc:date>2023-05-01T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29643">
    <title>CVE-2023-29643 (perfreeblog)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29643</link>
    <description>Cross Site Scripting (XSS) vulnerability in PerfreeBlog 3.1.2 allows attackers to execute arbitrary code via the Post function.</description>
    <dc:date>2023-05-01T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29779">
    <title>CVE-2023-29779 (e1e-g7f_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29779</link>
    <description>Sengled Dimmer Switch V0.0.9 contains a denial of service (DOS) vulnerability, which allows a remote attacker to send malicious Zigbee messages to a vulnerable device and cause crashes. After receiving the malicious command, the device will keep reporting its status and finally drain its battery after receiving the 'Set_short_poll_interval' command.</description>
    <dc:date>2023-04-25T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29780">
    <title>CVE-2023-29780 (3rsb015bz_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29780</link>
    <description>Third Reality Smart Blind 1.00.54 contains a denial-of-service vulnerability, which allows a remote attacker to send malicious Zigbee messages to a vulnerable device and cause crashes.</description>
    <dc:date>2023-04-24T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29848">
    <title>CVE-2023-29848 (bang_resto)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29848</link>
    <description>Bang Resto 1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the itemName parameter in the admin/menu.php Add New Menu function.</description>
    <dc:date>2023-04-24T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29849">
    <title>CVE-2023-29849 (bang_resto)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29849</link>
    <description>Bang Resto 1.0 was discovered to contain multiple SQL injection vulnerabilities via the btnMenuItemID, itemID, itemPrice, menuID, staffID, or itemqty parameter.</description>
    <dc:date>2023-04-24T15:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29905">
    <title>CVE-2023-29905 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29905</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the UpdateSnat interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29906">
    <title>CVE-2023-29906 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29906</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the Edit_BasicSSID interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29907">
    <title>CVE-2023-29907 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29907</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the Edit_BasicSSID_5G interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29908">
    <title>CVE-2023-29908 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29908</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the SetMobileAPInfoById interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29909">
    <title>CVE-2023-29909 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29909</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the AddWlanMacList interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29910">
    <title>CVE-2023-29910 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29910</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the UpdateMacClone interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29911">
    <title>CVE-2023-29911 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29911</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the AddMacList interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29912">
    <title>CVE-2023-29912 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29912</link>
    <description>H3C Magic R200 R200V100R004 was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29913">
    <title>CVE-2023-29913 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29913</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the SetAPWifiorLedInfoById interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29914">
    <title>CVE-2023-29914 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29914</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29915">
    <title>CVE-2023-29915 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29915</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via CMD parameter at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29916">
    <title>CVE-2023-29916 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29916</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the UpdateWanParams interface at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29917">
    <title>CVE-2023-29917 (magic_r200_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29917</link>
    <description>H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via go parameter at /goform/aspForm.</description>
    <dc:date>2023-04-21T15:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29921">
    <title>CVE-2023-29921 (powerjob)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29921</link>
    <description>PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface.</description>
    <dc:date>2023-04-19T12:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30061">
    <title>CVE-2023-30061 (dir-879_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30061</link>
    <description>D-Link DIR-879 v105A1 is vulnerable to Authentication Bypass via phpcgi.</description>
    <dc:date>2023-05-01T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30063">
    <title>CVE-2023-30063 (dir-890l_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30063</link>
    <description>D-Link DIR-890L FW1.10 A1 is vulnerable to Authentication bypass.</description>
    <dc:date>2023-05-01T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30076">
    <title>CVE-2023-30076 (judging_management_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30076</link>
    <description>Sourcecodester Judging Management System v1.0 is vulnerable to SQL Injection via /php-jms/print_judges.php?print_judges.php=&amp;amp;se_name=&amp;amp;sub_event_id=.</description>
    <dc:date>2023-04-20T19:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30106">
    <title>CVE-2023-30106 (medicine_tracker_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30106</link>
    <description>Sourcecodester Medicine Tracker System in PHP 1.0.0 is vulnerable to Cross Site Scripting (XSS) via page=about.</description>
    <dc:date>2023-04-26T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30111">
    <title>CVE-2023-30111 (medicine_tracker_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30111</link>
    <description>Medicine Tracker System in PHP 1.0.0 is vulnerable to Cross Site Scripting (XSS).</description>
    <dc:date>2023-04-26T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30112">
    <title>CVE-2023-30112 (medicine_tracker_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30112</link>
    <description>Medicine Tracker System in PHP 1.0.0 is vulnerable to SQL Injection.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30123">
    <title>CVE-2023-30123 (wuzhicms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30123</link>
    <description>wuzhicms v4.1.0 is vulnerable to Cross Site Scripting (XSS) in the Member Center, Account Settings.</description>
    <dc:date>2023-04-28T14:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30177">
    <title>CVE-2023-30177 (craft_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30177</link>
    <description>CraftCMS 3.7.59 is vulnerable Cross Site Scripting (XSS). An attacker can inject javascript code into Volume Name.</description>
    <dc:date>2023-04-25T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30210">
    <title>CVE-2023-30210 (ourphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30210</link>
    <description>OURPHP &amp;lt;= 7.2.0 is vulnerable to Cross Site Scripting (XSS) via ourphp_tz.php.</description>
    <dc:date>2023-04-26T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30211">
    <title>CVE-2023-30211 (ourphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30211</link>
    <description>OURPHP &amp;lt;= 7.2.0 is vulnerable to SQL Injection.</description>
    <dc:date>2023-04-26T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30212">
    <title>CVE-2023-30212 (ourphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30212</link>
    <description>OURPHP &amp;lt;= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage/ourphp_out.php.</description>
    <dc:date>2023-04-26T17:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30265">
    <title>CVE-2023-30265 (cltphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30265</link>
    <description>CLTPHP &amp;lt;=6.0 is vulnerable to Directory Traversal.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30266">
    <title>CVE-2023-30266 (cltphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30266</link>
    <description>CLTPHP &amp;lt;=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30267">
    <title>CVE-2023-30267 (cltphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30267</link>
    <description>CLTPHP &amp;lt;=6.0 is vulnerable to Cross Site Scripting (XSS) via application/home/controller/Changyan.php.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30269">
    <title>CVE-2023-30269 (cltphp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30269</link>
    <description>CLTPHP &amp;lt;=6.0 is vulnerable to Improper Input Validation via application/admin/controller/Template.php.</description>
    <dc:date>2023-04-26T14:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30338">
    <title>CVE-2023-30338 (emlog)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30338</link>
    <description>Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters.</description>
    <dc:date>2023-04-27T15:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30363">
    <title>CVE-2023-30363 (vconsole)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30363</link>
    <description>vConsole v3.15.0 was discovered to contain a prototype pollution due to incorrect key and value resolution in setOptions in core.ts.</description>
    <dc:date>2023-04-26T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30380">
    <title>CVE-2023-30380 (dedecms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30380</link>
    <description>An issue in the component /dialog/select_media.php of DedeCMS v5.7.107 allows attackers to execute a directory traversal.</description>
    <dc:date>2023-04-27T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30402">
    <title>CVE-2023-30402 (yasm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30402</link>
    <description>YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re.</description>
    <dc:date>2023-04-25T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30406">
    <title>CVE-2023-30406 (jerryscript)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30406</link>
    <description>Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component ecma_find_named_property at /base/ecma-helpers.c.</description>
    <dc:date>2023-04-24T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30408">
    <title>CVE-2023-30408 (jerryscript)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30408</link>
    <description>Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component build/bin/jerry.</description>
    <dc:date>2023-04-24T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30410">
    <title>CVE-2023-30410 (jerryscript)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30410</link>
    <description>Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c.</description>
    <dc:date>2023-04-24T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30414">
    <title>CVE-2023-30414 (jerryscript)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30414</link>
    <description>Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c.</description>
    <dc:date>2023-04-24T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30417">
    <title>CVE-2023-30417 (pear_admin_boot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30417</link>
    <description>A cross-site scripting (XSS) vulnerability in Pear-Admin-Boot up to v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title of a private message.</description>
    <dc:date>2023-04-25T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30444">
    <title>CVE-2023-30444 (watson_machine_learning_on_cloud_pak_for_data)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30444</link>
    <description>IBM Watson Machine Learning on Cloud Pak for Data 4.0 and 4.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.  IBM X-Force ID:  253350.</description>
    <dc:date>2023-04-27T13:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30456">
    <title>CVE-2023-30456 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30456</link>
    <description>An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.</description>
    <dc:date>2023-04-10T02:15:06Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30458">
    <title>CVE-2023-30458 (medicine_tracker_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30458</link>
    <description>A username enumeration issue was discovered in Medicine Tracker System 1.0. The login functionality allows a malicious user to guess a valid username due to a different response time from invalid usernames. When one enters a valid username, the response time increases depending on the length of the supplied password.</description>
    <dc:date>2023-04-24T08:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30466">
    <title>CVE-2023-30466 (ms-n1004-uc_firmware, ms-n1004-upc_firmware, ms-n1008-uc_firmware, ms-n1008-unc_firmware, ms-n1008-unpc_firmware, ms-n1008-upc_firmware, ms-n5008-e_firmware, ms-n5008-pe_firmware, ms-n5008-uc_firmware, ms-n5008-upc_firmware, ms-n5016-e_firmware, ms-n5016-pe_firmware, ms-n7016-uh_firmware, ms-n7016-uph_firmware, ms-n7032-uh_firmware, ms-n7032-uph_firmware, ms-n7048-uph_firmware, ms-n8032-uh_firmware, ms-n8064-uh_firmware, ms-nxxxx-xxg_firmware, ms-nxxxx-xxt_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30466</link>
    <description>This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.

Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.</description>
    <dc:date>2023-04-28T11:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30467">
    <title>CVE-2023-30467 (ms-n1004-uc_firmware, ms-n1004-upc_firmware, ms-n1008-uc_firmware, ms-n1008-unc_firmware, ms-n1008-unpc_firmware, ms-n1008-upc_firmware, ms-n5008-e_firmware, ms-n5008-pe_firmware, ms-n5008-uc_firmware, ms-n5008-upc_firmware, ms-n5016-e_firmware, ms-n5016-pe_firmware, ms-n7016-uh_firmware, ms-n7016-uph_firmware, ms-n7032-uh_firmware, ms-n7032-uph_firmware, ms-n7048-uph_firmware, ms-n8032-uh_firmware, ms-n8064-uh_firmware, ms-nxxxx-xxg_firmware, ms-nxxxx-xxt_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30467</link>
    <description>This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to improper authorization at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.

Successful exploitation of this vulnerability could allow remote attacker to perform unauthorized activities on the targeted device.</description>
    <dc:date>2023-04-28T11:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30533">
    <title>CVE-2023-30533 (sheetjs)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30533</link>
    <description>SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file.</description>
    <dc:date>2023-04-24T08:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30536">
    <title>CVE-2023-30536 (slim_psr-7)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30536</link>
    <description>slim/psr7 is a PSR-7 implementation for use with Slim 4. In versions prior to 1.6.1 an attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. An attacker that is able to control the header names that are passed to Slilm-Psr7 would be able to intentionally craft invalid messages, possibly causing application errors or invalid HTTP requests being sent out with an PSR-18 HTTP client. The latter might present a denial of service vector if a remote service&amp;acirc;&amp;euro;&amp;trade;s web application firewall bans the application due to the receipt of malformed requests. The issue has been patched in version 1.6.1. There are no known workarounds to this issue. Users are advised to upgrade.</description>
    <dc:date>2023-04-17T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30543">
    <title>CVE-2023-30543 (web3-react_coinbase-wallet, web3-react_eip1193, web3-react_metamask, web3-react_walletconnect)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30543</link>
    <description>@web3-react is a framework for building Ethereum Apps . In affected versions the `chainId` may be outdated if the user changes chains as part of the connection flow. This means that the value of `chainId` returned by `useWeb3React()` may be incorrect. In an application, this means that any data derived from `chainId` could be incorrect. For example, if a swapping application derives a wrapped token contract address from the `chainId` *and* a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping. This issue has been addressed in PR #749 and is available in updated npm artifacts. There are no known workarounds for this issue. Users are advised to upgrade.</description>
    <dc:date>2023-04-17T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30544">
    <title>CVE-2023-30544 (kiwi_tcms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30544</link>
    <description>Kiwi TCMS is an open source test management system. In versions of Kiwi TCMS prior to 12.2, users were able to update their email addresses via the `My profile` admin page. This page allowed them to change the email address registered with their account without the ownership verification performed during account registration. Operators of Kiwi TCMS should upgrade to v12.2 or later to receive a patch. No known workarounds exist.</description>
    <dc:date>2023-04-24T17:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30545">
    <title>CVE-2023-30545 (prestashop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30545</link>
    <description>PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -&amp;gt; Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9</description>
    <dc:date>2023-04-25T18:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30549">
    <title>CVE-2023-30549 (apptainer, enterprise_linux, singularity)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30549</link>
    <description>Apptainer is an open source container platform for Linux. There is an ext4 use-after-free flaw that is exploitable through versions of Apptainer &amp;lt; 1.1.0, installations that include apptainer-suid &amp;lt; 1.1.8, and all versions of Singularity in their default configurations on older operating systems where that CVE has not been patched. That includes Red Hat Enterprise Linux 7, Debian 10 buster (unless the linux-5.10 package is installed), Ubuntu 18.04 bionic and Ubuntu 20.04 focal. Use-after-free flaws in the kernel can be used to attack the kernel for denial of service and potentially for privilege escalation.

Apptainer 1.1.8 includes a patch that by default disables mounting of extfs filesystem types in setuid-root mode, while continuing to allow mounting of extfs filesystems in non-setuid &amp;quot;rootless&amp;quot; mode using fuse2fs.

Some workarounds are possible. Either do not install apptainer-suid (for versions 1.1.0 through 1.1.7) or set `allow setuid = no` in apptainer.conf (or singularity.conf for singularity versions).  This requires having unprivileged user namespaces enabled and except for apptainer 1.1.x versions will disallow mounting of sif files, extfs files, and squashfs files in addition to other, less significant impacts.  (Encrypted sif files are also not supported unprivileged in apptainer 1.1.x.). Alternatively, use the `limit containers` options in apptainer.conf/singularity.conf to limit sif files to trusted users, groups, and/or paths, and set `allow container extfs = no` to disallow mounting of extfs overlay files.  The latter option by itself does not disallow mounting of extfs overlay partitions inside SIF files, so that's why the former options are also needed.</description>
    <dc:date>2023-04-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30552">
    <title>CVE-2023-30552 (archery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30552</link>
    <description>Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `sql/instance.py` endpoint's `describe` method. In several cases, user input coming from the `tb_name` parameter value,  the `db_name` parameter value or the `schema_name` value in the `sql/instance.py` `describe` endpoint is passed to the `describe_table` methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. Please take into account that in some cases all three parameter values are concatenated, in other only one or two of them. The affected methods are: `describe_table` in `sql/engines/clickhouse.py`which concatenates input which is passed to execution on the database in the  `query` method in `sql/engines/clickhouse.py`, `describe_table` in `sql/engines/mssql.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/mssql.py`, `describe_table` in `sql/engines/mysql.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/mysql.py`, `describe_table` in `sql/engines/oracle.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/oracle.py`, `describe_table` in `sql/engines/pgsql.py`which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/pgsql.py`, `describe_table` in `sql/engines/phoenix.py` which concatenates input which is passed to execution on the database in the  `query` method in `sql/engines/phoenix.py`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-101`.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30553">
    <title>CVE-2023-30553 (archery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30553</link>
    <description>Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to multiple SQL injections in the `sql_api/api_workflow.py` endpoint `ExecuteCheck`. User input coming from the `db_name` parameter value and the `full_sql` parameter value in the `api_workflow.py` `ExecuteCheck` endpoint is passed to the methods that follow in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. The affected methods are `execute_check` in `sql/engines/clickhouse.py` which concatenates input which is passed to execution on the database in the `sql/engines/clickhouse.py` `query` method, `execute_check` in `sql/engines/goinception.py`which concatenates input which is passed to execution on the database in the `sql/engines/goinception.py` `query` method, `execute_check` in `sql/engines/oracle.py`which passes unsafe user input into the `object_name_check` method in `sql/engines/oracle.py` which in turn is passed to execution on the database in the `sql/engines/oracle.py` `query` method. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-102`.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30554">
    <title>CVE-2023-30554 (archery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30554</link>
    <description>Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `sql_api/api_workflow.py` endpoint `ExecuteCheck` which passes unfiltered input to the `explain_check` method in `sql/engines/oracle.py`. User input coming from the `db_name` parameter value in the `api_workflow.py` `ExecuteCheck` endpoint is passed through the `oracle.py` `execute_check` method and to the `explain_check` method for execution. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-103`.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30555">
    <title>CVE-2023-30555 (archery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30555</link>
    <description>Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases.Affected versions are subject to SQL injection in the `explain` method in `sql_optimize.py`. User input coming from the `db_name` parameter value in the `explain` endpoint is passed to the following `query` methods of each database engine for execution. `query` in `sql/engines/mssql.py`, and `query` in `sql/engines/oracle.py`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-108`.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30556">
    <title>CVE-2023-30556 (archery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30556</link>
    <description>Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `optimize_sqltuningadvisor` method of `sql_optimize.py`. User input coming from the `db_name` parameter value in `sql_optimize.py` is passed to the `sqltuningadvisor` method in `oracle.py`for execution. To mitigate escape the variables accepted via user input when used in `sql_optimize.py`. Users may also use prepared statements when dealing with SQL as a mitigation for this issue. This issue is also indexed as `GHSL-2022-107`.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30557">
    <title>CVE-2023-30557 (archery)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30557</link>
    <description>Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `data_dictionary.py` `table_info`. User input coming from the `db_name` in and the `tb_name` parameter values in the `sql/data_dictionary.py` `table_info` endpoint is passed to the following methods in the given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution.The methods are `get_table_meta_data ` in `sql/engines/mssql.py` which passes unsafe user input to the `sql/engines/mssql.py` `query` method, `get_table_desc_data` in `sql/engines/mssql.py`which passes unsafe user input to the `sql/engines/mssql.py` `query`, `get_table_index_data` in `sql/engines/mssql.py`which passes unsafe user input to the `sql/engines/mssql.py` `query` method, `get_table_meta_data` in `sql/engines/oracle.py`which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method, `get_table_desc_data` in `sql/engines/oracle.py`which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method, and `get_table_index_data` in `sql/engines/oracle.py` which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-106`.</description>
    <dc:date>2023-04-19T00:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30610">
    <title>CVE-2023-30610 (aws-sigv4)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30610</link>
    <description>aws-sigv4 is a rust library for low level request signing in the aws cloud platform. The `aws_sigv4::SigningParams` struct had a derived `Debug` implementation. When debug-formatted, it would include a user's AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK, `SigningParams` is printed, thereby revealing those credentials to anyone with access to logs. All users of the AWS SDK for Rust who enabled TRACE-level logging, either globally (e.g. `RUST_LOG=trace`), or for the `aws-sigv4` crate specifically are affected. This issue has been addressed in a set of new releases. Users are advised to upgrade. Users unable to upgrade should disable TRACE-level logging for AWS Rust SDK crates.</description>
    <dc:date>2023-04-19T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30611">
    <title>CVE-2023-30611 (reactions)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30611</link>
    <description>Discourse-reactions is a plugin that allows user to add their reactions to the post in the Discourse messaging platform. In affected versions data about what reactions were performed on a post in a private topic could be leaked. This issue has been addressed in version 0.3. Users are advised to upgrade. Users unable to upgrade should disable the discourse-reactions plugin to fully mitigate the issue.</description>
    <dc:date>2023-04-19T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30612">
    <title>CVE-2023-30612 (cloud_hypervisor)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30612</link>
    <description>Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability.  Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only.</description>
    <dc:date>2023-04-19T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30613">
    <title>CVE-2023-30613 (kiwi_tcms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30613</link>
    <description>Kiwi TCMS, an open source test management system, allows users to upload attachments to test plans, test cases, etc. In versions of Kiwi TCMS prior to 12.2, there is no control over what kinds of files can be uploaded. Thus, a malicious actor may upload an `.exe` file or a file containing embedded JavaScript and trick others into clicking on these files, causing vulnerable browsers to execute malicious code on another computer.

Kiwi TCMS v12.2 comes with functionality that allows administrators to configure additional upload validator functions which give them more control over what file types are accepted for upload. By default `.exe` are denied. Other files containing the `&amp;lt;script&amp;gt;` tag, regardless of their type are also denied b/c they are a path to XSS attacks. There are no known workarounds aside from upgrading.</description>
    <dc:date>2023-04-24T17:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30614">
    <title>CVE-2023-30614 (pay)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30614</link>
    <description>Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions prior to 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. This has been patched in version 6.3.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
    <dc:date>2023-04-19T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30616">
    <title>CVE-2023-30616 (form_block)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30616</link>
    <description>Form block is a wordpress plugin designed to make form creation easier. Versions prior to 1.0.2 are subject to a Cross-Site Request Forgery due to a missing nonce check. There is potential for a Cross Site Request Forgery for all form blocks, since it allows to send requests to the forms from any website without a user noticing. Users are advised to upgrade to version 1.0.2. There are no known workarounds for this vulnerability.</description>
    <dc:date>2023-04-20T18:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30618">
    <title>CVE-2023-30618 (kitchen-terraform)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30618</link>
    <description>Kitchen-Terraform provides a set of Test Kitchen plugins which enable the use of Test Kitchen to converge a Terraform configuration and verify the resulting infrastructure systems with InSpec controls. Kitchen-Terraform v7.0.0 introduced a regression which caused all Terraform output values, including sensitive values, to be printed at the `info` logging level during the `kitchen converge` action. Prior to v7.0.0, the output values were printed at the `debug` level to avoid writing sensitive values to the terminal by default. An attacker would need access to the local machine in order to gain access to these logs during an operation. Users are advised to upgrade. There are no known workarounds for this vulnerability.</description>
    <dc:date>2023-04-21T20:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30622">
    <title>CVE-2023-30622 (clusternet)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30622</link>
    <description>Clusternet is a general-purpose system for controlling Kubernetes clusters across different environments. An issue in clusternet prior to version 0.15.2 can be leveraged to lead to a cluster-level privilege escalation. The clusternet has a deployment called `cluster-hub` inside the `clusternet-system` Kubernetes namespace, which runs on worker nodes randomly. The deployment has a service account called `clusternet-hub`, which has a cluster role called `clusternet:hub` via cluster role binding. The `clusternet:hub` cluster role has `&amp;quot;*&amp;quot; verbs of &amp;quot;*.*&amp;quot;` resources. Thus, if a malicious user can access the worker node which runs the clusternet, they can leverage the service account to do malicious actions to critical system resources. For example, the malicious user can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation. Version 0.15.2 contains a fix for this issue.</description>
    <dc:date>2023-04-24T16:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30623">
    <title>CVE-2023-30623 (wip)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30623</link>
    <description>`embano1/wip` is a GitHub Action written in Bash. Prior to version 2, the  `embano1/wip` action uses the `github.event.pull_request.title` parameter in an insecure way. The title parameter is used in a run statement - resulting in a command injection vulnerability due to string interpolation. This vulnerability can be triggered by any user on GitHub. They just need to create a pull request with a commit message containing an exploit. (Note that first-time PR requests will not be run - but the attacker can submit a valid PR before submitting an invalid PR). The commit can be genuine, but the commit message can be malicious. This can be used to execute code on the GitHub runners and can be used to exfiltrate any secrets used in the CI pipeline, including repository tokens. Version 2 has a fix for this issue.</description>
    <dc:date>2023-04-24T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30626">
    <title>CVE-2023-30626 (jellyfin)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30626</link>
    <description>Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30627">
    <title>CVE-2023-30627 (jellyfin)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30627</link>
    <description>jellyfin-web is the web client for Jellyfin, a free-software media system. Starting in version 10.1.0 and prior to version 10.8.10, a stored cross-site scripting vulnerability in device.js can be used to make arbitrary calls to the `REST` endpoints with admin privileges. When combined with CVE-2023-30626, this results in remote code execution on the Jellyfin instance in the context of the user who's running it. This issue is patched in version 10.8.10. There are no known workarounds.</description>
    <dc:date>2023-04-24T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30628">
    <title>CVE-2023-30628 (kiwi_tcms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30628</link>
    <description>Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and kiwitcms/enterprise v12.2 and prior,
the `changelog.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz&amp;quot;;echo${IFS}&amp;quot;hello&amp;quot;;#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. Commit 834c86dfd1b2492ccad7ebbfd6304bfec895fed2 of the kiwitcms/Kiwi repository and commit e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751 of the kiwitcms/enterprise repository contain a fix for this issue.</description>
    <dc:date>2023-04-24T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30629">
    <title>CVE-2023-30629 (vyper)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30629</link>
    <description>Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.1 through 0.3.7, the Vyper compiler generates the wrong bytecode. Any contract that uses the `raw_call` with `revert_on_failure=False` and `max_outsize=0` receives the wrong response from `raw_call`. Depending on the memory garbage, the result can be either `True` or `False`. A patch is available and, as of time of publication, anticipated to be part of Vyper 0.3.8. As a workaround, one may always put  `max_outsize&amp;gt;0`.</description>
    <dc:date>2023-04-24T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30776">
    <title>CVE-2023-30776 (superset)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30776</link>
    <description>An authenticated user with specific data permissions could access database connections stored passwords by requesting a specific REST API.&amp;Acirc;&amp;nbsp;This issue affects Apache Superset version 1.3.0 up to 2.0.1.</description>
    <dc:date>2023-04-24T16:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30797">
    <title>CVE-2023-30797 (lemur)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30797</link>
    <description>Netflix Lemur before version 1.3.2 used insufficiently random values when generating default credentials. The insufficiently random values may allow an attacker to guess the credentials and gain access to resources managed by Lemur.</description>
    <dc:date>2023-04-19T20:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30839">
    <title>CVE-2023-30839 (prestashop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30839</link>
    <description>PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.</description>
    <dc:date>2023-04-25T19:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30843">
    <title>CVE-2023-30843 (payload)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30843</link>
    <description>Payload is a free and open source headless content management system. In versions prior to 1.7.0, if a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force. Version 1.7.0 contains a patch. As a workaround, write a `beforeOperation` hook to remove `where` queries that attempt to access hidden field data.</description>
    <dc:date>2023-04-26T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30846">
    <title>CVE-2023-30846 (typed-rest-client)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30846</link>
    <description>typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler`. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the `Authorization` header. The expected behavior is that the next request will *NOT* set the `Authorization` header. The problem was fixed in version 1.8.0. There are no known workarounds.</description>
    <dc:date>2023-04-26T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30848">
    <title>CVE-2023-30848 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30848</link>
    <description>Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the admin search find API has a SQL injection vulnerability. Users should upgrade to version 10.5.21 to receive a patch or, as a workaround, apply the patch manually.</description>
    <dc:date>2023-04-27T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30849">
    <title>CVE-2023-30849 (pimcore)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-30849</link>
    <description>Pimcore is an open source data and experience management platform. Prior to version 10.5.21, A SQL injection vulnerability exists in the translation export API. Users should update to version 10.5.21 to receive a patch or, as a workaround, or apply the patch manually.</description>
    <dc:date>2023-04-27T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31043">
    <title>CVE-2023-31043 (postgres_advanced_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31043</link>
    <description>EnterpriseDB EDB Postgres Advanced Server (EPAS) before 14.6.0 logs unredacted passwords in situations where optional parameters are used with CREATE/ALTER USER/GROUP/ROLE, and redacting was configured with edb_filter_log.redact_password_commands. The fixed versions are 10.23.33, 11.18.29, 12.13.17, 13.9.13, and 14.6.0.</description>
    <dc:date>2023-04-23T20:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31045">
    <title>CVE-2023-31045 (backdrop)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31045</link>
    <description>** DISPUTED ** A stored Cross-site scripting (XSS) issue in Text Editors and Formats in Backdrop CMS before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via the name parameter. When a user is editing any content type (e.g., page, post, or card) as an admin, the stored XSS payload is executed upon selecting a malicious text formatting option. NOTE: the vendor disputes the security relevance of this finding because &amp;quot;any administrator that can configure a text format could easily allow Full HTML anywhere.&amp;quot;</description>
    <dc:date>2023-04-24T08:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31059">
    <title>CVE-2023-31059 (repetier-server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31059</link>
    <description>Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.</description>
    <dc:date>2023-04-24T03:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31060">
    <title>CVE-2023-31060 (repetier-server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31060</link>
    <description>Repetier Server through 1.4.10 executes as SYSTEM. This can be leveraged in conjunction with CVE-2023-31059 for full compromise.</description>
    <dc:date>2023-04-24T03:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31061">
    <title>CVE-2023-31061 (repetier-server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31061</link>
    <description>Repetier Server through 1.4.10 does not have CSRF protection.</description>
    <dc:date>2023-04-24T03:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31081">
    <title>CVE-2023-31081 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31081</link>
    <description>An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_bridge.c in the Linux kernel 6.2. There is a NULL pointer dereference in vidtv_mux_stop_thread. In vidtv_stop_streaming, after dvb-&amp;gt;mux=NULL occurs, it executes vidtv_mux_stop_thread(dvb-&amp;gt;mux).</description>
    <dc:date>2023-04-24T06:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31082">
    <title>CVE-2023-31082 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31082</link>
    <description>An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel.</description>
    <dc:date>2023-04-24T06:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31083">
    <title>CVE-2023-31083 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31083</link>
    <description>An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu-&amp;gt;proto is set. A NULL pointer dereference may occur.</description>
    <dc:date>2023-04-24T06:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31084">
    <title>CVE-2023-31084 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31084</link>
    <description>An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(&amp;amp;fepriv-&amp;gt;sem) is called. However, wait_event_interruptible would put the process to sleep, and down(&amp;amp;fepriv-&amp;gt;sem) may block the process.</description>
    <dc:date>2023-04-24T06:15:07Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31085">
    <title>CVE-2023-31085 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31085</link>
    <description>An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-&amp;gt;erasesize), used indirectly by ctrl_cdev_ioctl, when mtd-&amp;gt;erasesize is 0.</description>
    <dc:date>2023-04-24T06:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31223">
    <title>CVE-2023-31223 (dradis)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31223</link>
    <description>Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars.</description>
    <dc:date>2023-04-25T23:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31250">
    <title>CVE-2023-31250 (drupal)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31250</link>
    <description>The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating.</description>
    <dc:date>2023-04-26T19:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31285">
    <title>CVE-2023-31285 (serene, startsharp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31285</link>
    <description>An XSS issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When users upload temporary files, some specific file endings are not allowed, but it is possible to upload .html or .htm files containing an XSS payload. The resulting link can be sent to an administrator user.</description>
    <dc:date>2023-04-27T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31286">
    <title>CVE-2023-31286 (serene, startsharp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31286</link>
    <description>An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When a password reset request occurs, the server response leaks the existence of users. If one tries to reset a password of a non-existent user, an error message indicates that this user does not exist.</description>
    <dc:date>2023-04-27T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31287">
    <title>CVE-2023-31287 (serene, startsharp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31287</link>
    <description>An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.</description>
    <dc:date>2023-04-27T03:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31436">
    <title>CVE-2023-31436 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-31436</link>
    <description>qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.</description>
    <dc:date>2023-04-28T02:15:09Z</dc:date>
  </item>
</rdf:RDF>
