CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-41333
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to create or modify CiliumNetworkPolicy objects in a particular namespace is able to affect traffic on an entire Cilium cluster, potentially bypassing policy enforcement in other namespaces. By using a crafted `endpointSelector` that uses the `DoesNotExist` operator on the `reserved:init` label, the attacker can create policies that bypass namespace restrictions and affect the entire Cilium cluster. This includes potentially allowing or denying all traffic. This attack requires API server access, as described in the Kubernetes API Server Attacker section of the Cilium Threat Model. This issue has been resolved in Cilium versions 1.14.2, 1.13.7, and 1.12.14. As a workaround an admission webhook can be used to prevent the use of `endpointSelectors` that use the `DoesNotExist` operator on the `reserved:init` label in CiliumNetworkPolicies.
https://github.com/cilium/cilium/security/advisories/GHSA-4xp2-w642-7mcx
2023-08-28T16:56:43.367Z
2023-09-26T20:19:34.512Z
2023-09-26T20:19:34.512Z
{'Vendor': 'cilium', 'Product': 'cilium', 'Versions': '>= 1.14.0, < 1.14.2, >= 1.13.0, < 1.13.7, < 1.12.14'}
CVE-2023-41763
Skype for Business Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763
2023-08-31T23:08:32.064Z
2023-10-10T17:07:24.950Z
2023-12-14T01:14:58.507Z
{'Vendor': 'Microsoft', 'Product': 'Skype for Business Server 2015 CU13', 'Versions': '9319.0'}
CVE-2023-41299
DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:07.354Z
2023-09-25T11:41:44.258Z
2023-09-25T11:41:44.258Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0'}
CVE-2023-41734
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nigauri Insert Estimated Reading Time plugin <= 1.2 versions.
https://patchstack.com/database/vulnerability/insert-estimated-reading-time/wordpress-insert-estimated-reading-time-plugin-1-2-cross-site-scripting-xss?_s_id=cve
2023-08-31T06:58:39.904Z
2023-10-02T07:54:22.794Z
2023-10-02T07:54:22.794Z
{'Vendor': 'nigauri', 'Product': 'Insert Estimated Reading Time', 'Versions': 'n/a'}
CVE-2023-41364
In tine through 2023.01.14.325, the sort parameter of the /index.php endpoint allows SQL Injection.
https://herolab.usd.de/security-advisories/
2023-08-29T00:00:00
2023-09-01T00:00:00
2023-09-01T09:36:22.621869
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41108
TEF portal 2023-07-17 is vulnerable to authenticated remote code execution.
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt
2023-08-23T00:00:00
2023-09-05T00:00:00
2023-09-05T15:40:25.726792
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41558
Tenda AC7 V1.0 V15.03.06.44 was discovered to contain a stack overflow via parameter timeZone at url /goform/SetSysTimeCfg.
https://github.com/peris-navince/founded-0-days/blob/main/fromSetSysTime/1.md
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T12:21:30.792655
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41237
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest Themes Arya Multipurpose Pro theme <= 1.0.8 versions.
https://patchstack.com/database/vulnerability/arya-multipurpose-pro/wordpress-arya-multipurpose-pro-theme-1-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-25T10:02:32.133Z
2023-09-27T11:53:38.732Z
2023-09-27T11:53:38.732Z
{'Vendor': 'Everest Themes', 'Product': 'Arya Multipurpose Pro', 'Versions': 'n/a'}
CVE-2023-41667
Cross-Site Request Forgery (CSRF) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions.
https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:02:41.616Z
2023-10-09T17:38:02.705Z
2023-10-09T17:38:02.705Z
{'Vendor': 'Ulf Benjaminsson', 'Product': 'WP-dTree', 'Versions': 'n/a'}
CVE-2023-41372
The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcoded RSA key pair
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
2023-10-18T09:35:22.507Z
2023-10-25T14:13:34.827Z
2023-10-25T14:13:34.827Z
{'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'}
CVE-2023-41630
eSST Monitoring v2.147.1 was discovered to contain a remote code execution (RCE) vulnerability via the Gii code generator component.
https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41630-eSST-Preauth-RCE.pdf
2023-08-30T00:00:00
2023-10-17T00:00:00
2023-10-17T21:58:58.528861
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41260
Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Exposure in responses to mail-gateway REST API calls.
https://docs.bestpractical.com/release-notes/rt/index.html
2023-08-25T00:00:00
2023-11-03T00:00:00
2023-11-03T04:17:29.880900
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41775
Improper access control vulnerability in 'direct' Desktop App for macOS ver 2.6.0 and earlier allows a local attacker to bypass access restriction and to use camrea, microphone, etc. of the device where the product is installed without the user's consent.
https://status.direct4b.com/2023/08/31/2023083101/
2023-09-01T03:16:59.975Z
2023-09-08T07:09:03.450Z
2023-09-08T07:09:03.450Z
{'Vendor': 'L is B Corp.', 'Product': "'direct' Desktop App for macOS", 'Versions': 'ver 2.6.0 and earlier'}
CVE-2023-41325
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. Starting in version 3.20 and prior to version 3.22, `shdr_verify_signature` can make a double free. `shdr_verify_signature` used to verify a TA binary before it is loaded. To verify a signature of it, allocate a memory for RSA key. RSA key allocate function (`sw_crypto_acipher_alloc_rsa_public_key`) will try to allocate a memory (which is optee’s heap memory). RSA key is consist of exponent and modulus (represent as variable `e`, `n`) and it allocation is not atomic way, so it may succeed in `e` but fail in `n`. In this case sw_crypto_acipher_alloc_rsa_public_key` will free on `e` and return as it is failed but variable ‘e’ is remained as already freed memory address . `shdr_verify_signature` will free again that memory (which is `e`) even it is freed when it failed allocate RSA key. A patch is available in version 3.22. No known workarounds are available.
https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm
2023-08-28T16:56:43.366Z
2023-09-15T19:40:58.065Z
2023-09-15T19:40:58.065Z
{'Vendor': 'OP-TEE', 'Product': 'optee_os', 'Versions': '>= 3.20, < 3.22'}
CVE-2023-41149
F-RevoCRM version7.3.7 and version7.3.8 contains an OS command injection vulnerability. If this vulnerability is exploited, an attacker who can access the product may execute an arbitrary OS command on the server where the product is running.
https://f-revocrm.jp/2023/08/9394/
2023-08-24T00:34:39.254Z
2023-09-06T12:35:22.757Z
2023-09-06T12:35:22.757Z
{'Vendor': 'Thinkingreed Inc. ', 'Product': 'F-RevoCRM ', 'Versions': 'version7.3.7 and version7.3.8 '}
CVE-2023-41648
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Swapnil V. Patil Login and Logout Redirect.This issue affects Login and Logout Redirect: from n/a through 2.0.3.
https://patchstack.com/database/vulnerability/login-and-logout-redirect/wordpress-login-and-logout-redirect-plugin-2-0-2-open-redirection-vulnerability?_s_id=cve
2023-08-30T13:02:20.618Z
2023-12-19T19:51:40.648Z
2023-12-19T19:51:40.648Z
{'Vendor': 'Swapnil V. Patil', 'Product': 'Login and Logout Redirect', 'Versions': 'n/a'}
CVE-2023-41074
The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.331Z
2023-09-26T20:14:43.087Z
2023-09-26T20:14:43.087Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41977
The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2. Visiting a malicious website may reveal browsing history.
https://support.apple.com/en-us/HT213981
2023-09-06T17:40:06.139Z
2023-10-25T18:31:52.307Z
2023-10-25T18:31:52.307Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41998
Arcserve UDP prior to 9.2 contained a vulnerability in the com.ca.arcflash.rps.webservice.RPSService4CPMImpl interface. A routine exists that allows an attacker to upload and execute arbitrary files.
https://www.tenable.com/security/research/tra-2023-37
2023-09-06T18:06:47.116Z
2023-11-27T16:50:48.279Z
2023-11-27T16:50:48.279Z
{'Vendor': 'Arcserve', 'Product': 'Arcserve UDP', 'Versions': '0'}
CVE-2023-41131
Cross-Site Request Forgery (CSRF) vulnerability in Jonk @ Follow me Darling Sp*tify Play Button for WordPress plugin <= 2.10 versions.
https://patchstack.com/database/vulnerability/spotify-play-button-for-wordpress/wordpress-sp-tify-play-button-for-wordpress-plugin-2-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-23T14:29:48.066Z
2023-10-12T14:26:20.652Z
2023-10-12T14:26:20.652Z
{'Vendor': 'Jonk @ Follow me Darling', 'Product': 'Sp*tify Play Button for WordPress', 'Versions': 'n/a'}
CVE-2023-41561
Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter startIp and endIp at url /goform/SetPptpServerCfg.
https://github.com/peris-navince/founded-0-days/blob/main/formSetPPTPServer/1.md
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T12:37:22.259883
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41166
An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.39, 3.11.0 through 3.11.27, 4.3.0 through 4.3.22, 4.6.0 through 4.6.9, and 4.7.0 through 4.7.1. It's possible to know if a specific user account exists on the SNS firewall by using remote access commands.
https://advisories.stormshield.eu/2023-027
2023-08-24T00:00:00
2023-12-20T00:00:00
2023-12-20T23:09:03.052828
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41609
An open redirect vulnerability in the sanitize_url() parameter of CouchCMS v2.3 allows attackers to redirect a victim user to an arbitrary web site via a crafted URL.
https://github.com/CouchCMS/CouchCMS/issues/190
2023-08-30T00:00:00
2023-09-11T00:00:00
2023-09-11T17:54:45.306226
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41259
Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call.
https://docs.bestpractical.com/release-notes/rt/index.html
2023-08-25T00:00:00
2023-11-03T00:00:00
2023-11-03T04:14:28.149924
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41936
Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3228
2023-09-05T16:39:57.392Z
2023-09-06T12:08:56.365Z
2023-10-24T12:51:45.992Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Google Login Plugin', 'Versions': '0'}
CVE-2023-41170
NetScout nGeniusONE 6.3.4 build 2298 allows a Reflected Cross-Site scripting vulnerability.
https://www.netscout.com/securityadvisories
2023-08-24T00:00:00
2023-12-07T00:00:00
2023-12-07T17:33:04.110009
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41127
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Evergreen Content Poster Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media allows Stored XSS.This issue affects Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media: from n/a through 1.3.6.1.
https://patchstack.com/database/vulnerability/evergreen-content-poster/wordpress-evergreen-content-poster-plugin-1-3-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-23T14:29:48.066Z
2023-11-30T12:19:01.852Z
2023-11-30T12:19:01.852Z
{'Vendor': 'Evergreen Content Poster', 'Product': 'Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media', 'Versions': 'n/a'}
CVE-2023-41330
knplabs/knp-snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. ## Issue On March 17th the vulnerability CVE-2023-28115 was disclosed, allowing an attacker to gain remote code execution through PHAR deserialization. Version 1.4.2 added a check `if (\strpos($filename, 'phar://') === 0)` in the `prepareOutput` function to resolve this CVE, however if the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files. To fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`. A successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8. This issue has been addressed in commit `d3b742d61a` which has been included in version 1.4.3. Users are advised to upgrade. Users unable to upgrade should ensure that only trusted users may submit data to the `AbstractGenerator->generate(...)` function.
https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj
2023-08-28T16:56:43.366Z
2023-09-06T17:33:21.098Z
2023-09-06T17:33:21.098Z
{'Vendor': 'KnpLabs', 'Product': 'snappy', 'Versions': '< 1.4.3'}
CVE-2023-41449
An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter.
http://ajaxnewsticker.com
2023-08-30T00:00:00
2023-09-27T00:00:00
2023-09-27T22:20:05.864337
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41737
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPGens Swifty Bar, sticky bar by WPGens plugin <= 1.2.10 versions.
https://patchstack.com/database/vulnerability/swifty-bar/wordpress-swifty-bar-sticky-bar-by-wpgens-plugin-1-2-10-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-31T06:58:39.904Z
2023-10-02T08:04:00.793Z
2023-10-02T08:04:00.793Z
{'Vendor': 'WPGens', 'Product': 'Swifty Bar, sticky bar by WPGens', 'Versions': 'n/a'}
CVE-2023-41367
Due to missing authentication check in webdynpro application, an unauthorized user in SAP NetWeaver (Guided Procedures) - version 7.50, can gain access to admin view of specific function anonymously. On successful exploitation of vulnerability under specific circumstances, attacker can view user’s email address. There is no integrity/availability impact.
https://me.sap.com/notes/3348142
2023-08-29T05:27:56.301Z
2023-09-12T01:59:55.915Z
2023-09-12T01:59:55.915Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver (Guided Procedures)', 'Versions': '7.50'}
CVE-2023-41672
Cross-Site Request Forgery (CSRF) vulnerability in Rémi Leclercq Hide admin notices – Admin Notification Center plugin <= 2.3.2 versions.
https://patchstack.com/database/vulnerability/wp-admin-notification-center/wordpress-hide-admin-notices-admin-notification-center-plugin-2-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:03:16.713Z
2023-10-09T18:38:15.078Z
2023-10-09T18:38:15.078Z
{'Vendor': 'Rémi Leclercq', 'Product': 'Hide admin notices – Admin Notification Center', 'Versions': 'n/a'}
CVE-2023-41808
Improper Privilege Management vulnerability in Pandora FMS on all allows Privilege Escalation. This vulnerability allows an unauthorised user to escalate and read sensitive files as if they were root. This issue affects Pandora FMS: from 700 through 773.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T12:10:03.868Z
2023-11-23T14:51:17.223Z
2023-11-23T14:51:17.223Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41721
Instances of UniFi Network Application that (i) are run on a UniFi Gateway Console, and (ii) are versions 7.5.176. and earlier, implement device adoption with improper access control logic, creating a risk of access to device configuration information by a malicious actor with preexisting access to the network. Affected Products: UDM UDM-PRO UDM-SE UDR UDW Mitigation: Update UniFi Network to Version 7.5.187 or later.
https://community.ui.com/releases/Security-Advisory-Bulletin-036-036/81367bc9-2a64-4435-95dc-bbe482457615
2023-08-31T01:00:11.771Z
2023-10-25T00:24:34.072Z
2023-10-25T00:24:34.072Z
{'Vendor': 'Ubiquiti', 'Product': 'UniFi Network Application', 'Versions': '7.5.176'}
CVE-2023-41058
Parse Server is an open source backend server. In affected versions the Parse Cloud trigger `beforeFind` is not invoked in certain conditions of `Parse.Query`. This can pose a vulnerability for deployments where the `beforeFind` trigger is used as a security layer to modify the incoming query. The vulnerability has been fixed by refactoring the internal query pipeline for a more concise code structure and implementing a patch to ensure the `beforeFind` trigger is invoked. This fix was introduced in commit `be4c7e23c6` and has been included in releases 6.2.2 and 5.5.5. Users are advised to upgrade. Users unable to upgrade should make use of parse server's security layers to manage access levels with Class-Level Permissions and Object-Level Access Control that should be used instead of custom security layers in Cloud Code triggers.
https://github.com/parse-community/parse-server/security/advisories/GHSA-fcv6-fg5r-jm9q
2023-08-22T16:57:23.934Z
2023-09-04T22:39:55.276Z
2023-09-04T22:39:55.276Z
{'Vendor': 'parse-community', 'Product': 'parse-server', 'Versions': '>= 1.0.0, < 5.5.5, >= 6.0.0, < 6.2.2'}
CVE-2023-41776
There is a local privilege escalation vulnerability of ZTE's ZXCLOUD iRAI.Attackers with regular user privileges can create a fake process, and to escalate local privileges.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034404
2023-09-01T09:02:00.656Z
2024-01-03T01:56:48.148Z
2024-01-03T01:56:48.148Z
{'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to 7.23.31'}
CVE-2023-41326
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9
2023-08-28T16:56:43.366Z
2023-09-26T22:40:49.778Z
2023-09-26T22:40:49.778Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.5.0, < 10.0.10'}
CVE-2023-41633
Catdoc v0.95 was discovered to contain a NULL pointer dereference via the component xls2csv at src/fileutil.c.
https://rycbar77.github.io/2023/08/29/catdoc-0-95-nullptr-dereference/
2023-08-30T00:00:00
2023-09-01T00:00:00
2023-09-01T18:27:28.233900
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41263
An issue was discovered in Plixer Scrutinizer before 19.3.1. It exposes debug logs to unauthenticated users at the /debug/ URL path. With knowledge of valid IP addresses and source types, an unauthenticated attacker can download debug logs containing application-related information.
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md
2023-08-25T00:00:00
2023-10-12T00:00:00
2023-10-12T22:12:41.803407
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41078
An authorization issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences.
https://support.apple.com/en-us/HT213940
2023-08-22T18:10:00.332Z
2023-09-26T20:14:44.069Z
2023-09-26T20:14:44.069Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41097
An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000007rArIAI?operationContext=S1
2023-08-23T04:17:16.169Z
2023-12-21T20:33:04.967Z
2023-12-21T20:33:04.967Z
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '0'}
CVE-2023-41994
A logic issue was addressed with improved checks This issue is fixed in macOS Sonoma 14. A camera extension may be able to access the camera view from apps other than the app for which it was granted permission.
https://support.apple.com/en-us/HT213940
2023-09-06T17:40:06.142Z
2024-01-10T22:03:31.108Z
2024-01-10T22:03:31.108Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41351
Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7501-6155a-1.html
2023-08-29T00:11:47.812Z
2023-11-03T05:41:26.852Z
2023-11-03T05:41:26.852Z
{'Vendor': 'Chunghwa Telecom', 'Product': 'NOKIA G-040W-Q', 'Versions': 'G040WQR201207'}
CVE-2023-41886
OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, an arbitrary file read vulnerability allows any unauthenticated user to read a file on a server. Version 3.7.5 fixes this issue.
https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m
2023-09-04T16:31:48.224Z
2023-09-15T20:05:20.651Z
2023-09-15T20:05:20.651Z
{'Vendor': 'OpenRefine', 'Product': 'OpenRefine', 'Versions': '<= 3.7.4'}
CVE-2023-41613
EzViz Studio v2.2.0 is vulnerable to DLL hijacking.
https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html
2023-08-30T00:00:00
2023-12-04T00:00:00
2023-12-04T13:31:25.276032
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41306
Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:09.166Z
2023-09-26T01:14:26.222Z
2023-09-26T01:14:26.222Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.0.1, 2.0.0'}
CVE-2023-41890
Sustainsys.Saml2 library adds SAML2P support to ASP.NET web sites, allowing the web site to act as a SAML2 Service Provider. Prior to versions 1.0.3 and 2.9.2, when a response is processed, the issuer of the Identity Provider is not sufficiently validated. This could allow a malicious identity provider to craft a Saml2 response that is processed as if issued by another identity provider. It is also possible for a malicious end user to cause stored state intended for one identity provider to be used when processing the response from another provider. An application is impacted if they rely on any of these features in their authentication/authorization logic: the issuer of the generated identity and claims; or items in the stored request state (AuthenticationProperties). This issue is patched in versions 2.9.2 and 1.0.3. The `AcsCommandResultCreated` notification can be used to add the validation required if an upgrade to patched packages is not possible.
https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39
2023-09-04T16:31:48.225Z
2023-09-19T14:38:55.861Z
2023-09-19T14:38:55.861Z
{'Vendor': 'Sustainsys', 'Product': 'Saml2', 'Versions': '< 1.0.3, >= 2.0.0, < 2.9.2'}
CVE-2023-41039
RestrictedPython is a restricted execution environment for Python to run untrusted code. Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its instances) and via `string.Formatter`. All known versions of `RestrictedPython` are vulnerable. This issue has been addressed in commit `4134aedcff1` which has been included in the 5.4 and 6.2 releases. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67
2023-08-22T16:57:23.932Z
2023-08-30T17:18:56.168Z
2023-08-30T17:18:56.168Z
{'Vendor': 'zopefoundation', 'Product': 'RestrictedPython', 'Versions': '< 5.4, >= 6.0, < 6.1'}
CVE-2023-41255
The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network.
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
2023-10-18T09:35:22.497Z
2023-10-25T14:10:50.626Z
2023-10-25T14:10:50.626Z
{'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'}
CVE-2023-41605
null
null
2023-08-30T00:00:00
null
2023-10-30T13:33:11.439882
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-41310
Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:09.167Z
2023-09-26T01:20:44.416Z
2023-09-26T01:20:44.416Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-41740
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to read specific files via unspecified vectors.
https://www.synology.com/en-global/security/advisory/Synology_SA_23_10
2023-08-31T07:54:07.974Z
2023-08-31T09:08:58.115Z
2023-08-31T09:08:58.115Z
{'Vendor': 'Synology', 'Product': 'Synology Router Manager (SRM)', 'Versions': '1.3, 0'}
CVE-2023-41594
Dairy Farm Shop Management System Using PHP and MySQL v1.1 was discovered to contain multiple SQL injection vulnerabilities in the Login function via the Username and Password parameters.
https://portswigger.net/web-security/sql-injection
2023-08-30T00:00:00
2023-09-08T00:00:00
2023-09-08T02:33:51.954962
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41982
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.
https://support.apple.com/en-us/HT213981
2023-09-06T17:40:06.140Z
2023-10-25T18:31:58.422Z
2023-10-25T18:31:58.422Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41081
Important: Authentication Bypass CVE-2023-41081 The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected. This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48. Users are recommended to upgrade to version 1.2.49, which fixes the issue. History 2023-09-13 Original advisory 2023-09-28 Updated summary
https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b
2023-08-22T18:35:12.615Z
2023-09-13T09:30:05.584Z
2023-09-28T21:30:57.072Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat Connectors', 'Versions': '1.2.0'}
CVE-2023-41652
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 10.6.6.
https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-10-6-6-sql-injection-vulnerability?_s_id=cve
2023-08-30T13:02:20.619Z
2023-11-03T11:06:26.432Z
2023-11-03T11:06:26.432Z
{'Vendor': 'David F. Carr', 'Product': 'RSVPMaker', 'Versions': 'n/a'}
CVE-2023-41717
Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.
https://github.com/federella/CVE-2023-41717
2023-08-30T00:00:00
2023-08-31T00:00:00
2023-08-31T15:41:31.129509
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41347
ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.
https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html
2023-08-29T00:11:47.812Z
2023-11-03T04:29:39.109Z
2023-11-03T07:15:54.767Z
{'Vendor': 'ASUS', 'Product': 'RT-AX55', 'Versions': '3.0.0.4.386.51598'}
CVE-2023-41853
Cross-Site Request Forgery (CSRF) vulnerability in WP iCal Availability plugin <= 1.0.3 versions.
https://patchstack.com/database/vulnerability/wp-ical-availability/wordpress-wp-ical-availability-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-04T09:47:21.582Z
2023-10-10T08:43:39.531Z
2023-10-10T08:43:39.531Z
{'Vendor': 'WP iCal Availability', 'Product': 'WP iCal Availability', 'Versions': 'n/a'}
CVE-2023-41150
F-RevoCRM 7.3 series prior to version7.3.8 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product.
https://f-revocrm.jp/2023/08/9394/
2023-08-24T00:34:39.254Z
2023-09-06T12:35:41.294Z
2023-09-06T12:35:41.294Z
{'Vendor': 'Thinkingreed Inc.', 'Product': 'F-RevoCRM', 'Versions': '7.3 series prior to version7.3.8'}
CVE-2023-41445
Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the index.php component.
http://ajaxnewsticker.com
2023-08-30T00:00:00
2023-09-27T00:00:00
2023-09-27T22:10:57.881475
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41296
Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:07.354Z
2023-09-25T11:37:37.692Z
2023-09-25T11:37:37.692Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1, 2.0.0'}
CVE-2023-41629
A lack of input sanitizing in the file download feature of eSST Monitoring v2.147.1 allows attackers to execute a path traversal.
https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41629-eSST-Path-Traversal.pdf
2023-08-30T00:00:00
2023-10-17T00:00:00
2023-10-17T21:57:09.412009
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41783
There is a command injection vulnerability of ZTE's ZXCLOUD iRAI. Due to the  program  failed to adequately validate the user's input, an attacker could exploit this vulnerability  to escalate local privileges.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034404
2023-09-01T09:02:00.657Z
2024-01-03T02:02:51.482Z
2024-01-03T02:02:51.482Z
{'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to 7.22.11P2'}
CVE-2023-41557
Tenda AC7 V1.0 V15.03.06.44 and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter entrys and mitInterface at url /goform/addressNat.
https://github.com/peris-navince/founded-0-days/blob/main/fromAddressNat/1.md
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T12:23:38.395267
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41107
TEF portal 2023-07-17 is vulnerable to a persistent cross site scripting (XSS)attack.
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt
2023-08-23T00:00:00
2023-09-05T00:00:00
2023-09-05T15:40:33.168067
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41804
Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Starter Templates — Elementor, WordPress & Beaver Builder Templates.This issue affects Starter Templates — Elementor, WordPress & Beaver Builder Templates: from n/a through 3.2.4.
https://patchstack.com/database/vulnerability/astra-sites/wordpress-starter-templates-plugin-3-2-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
2023-09-01T11:55:20.628Z
2023-12-07T10:58:43.110Z
2023-12-07T10:58:43.110Z
{'Vendor': 'Brainstorm Force', 'Product': 'Starter Templates — Elementor, WordPress & Beaver Builder Templates', 'Versions': 'n/a'}
CVE-2023-41941
A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(1)
2023-09-05T16:39:57.394Z
2023-09-06T12:08:59.655Z
2023-10-24T12:51:51.814Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins AWS CodeCommit Trigger Plugin', 'Versions': '0'}
CVE-2023-41042
Discourse is an open-source discussion platform. Prior to version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches, importing a remote theme loads their assets into memory without enforcing limits for file size or number of files. The issue is patched in version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches. There are no known workarounds.
https://github.com/discourse/discourse/security/advisories/GHSA-2fq5-x3mm-v254
2023-08-22T16:57:23.932Z
2023-09-15T19:26:43.088Z
2023-09-15T19:26:43.088Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.1.1, beta < 3.2.0.beta1, tests-passed < 3.2.0.beta1'}
CVE-2023-41691
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pensopay WooCommerce PensoPay plugin <= 6.3.1 versions.
https://patchstack.com/database/vulnerability/woo-pensopay/wordpress-woocommerce-pensopay-plugin-6-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T15:05:59.970Z
2023-09-29T13:56:01.397Z
2023-09-29T13:56:01.397Z
{'Vendor': 'Pensopay', 'Product': 'WooCommerce PensoPay', 'Versions': 'n/a'}
CVE-2023-41812
Unrestricted Upload of File with Dangerous Type vulnerability in Pandora FMS on all allows Accessing Functionality Not Properly Constrained by ACLs. This vulnerability allowed PHP executable files to be uploaded through the file manager. This issue affects Pandora FMS: from 700 through 773.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T12:10:03.869Z
2023-11-23T14:58:44.103Z
2023-11-23T14:58:44.103Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41111
An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem (Exynos 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Modem 5123, Modem 5300, and Auto T5123). Improper handling of a length parameter inconsistency can cause abnormal termination of a mobile phone. This occurs in the RLC task and RLC module.
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-08-23T00:00:00
2023-11-08T00:00:00
2023-11-08T07:50:56.369036
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41054
LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the `image_proxy.php` file of LibreY before commit 8f9b9803f231e2954e5b49987a532d28fe50a627. This vulnerability allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks via the `url` parameter. Remote attackers can use the server as a proxy to send HTTP GET requests and retrieve information in the internal network. Remote attackers can also request the server to download large files or chain requests among multiple instances to reduce the performance of the server or even deny access from legitimate users. This issue has been addressed in https://github.com/Ahwxorg/LibreY/pull/31. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability.
https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf
2023-08-22T16:57:23.934Z
2023-09-04T17:32:07.504Z
2023-09-04T17:32:07.504Z
{'Vendor': 'Ahwxorg', 'Product': 'LibreY', 'Versions': '< 8f9b9803f231e2954e5b49987a532d28fe50a627'}
CVE-2023-41687
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Irina Sokolovskaya Goods Catalog plugin <= 2.4.1 versions.
https://patchstack.com/database/vulnerability/goods-catalog/wordpress-goods-catalog-plugin-2-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T13:45:32.809Z
2023-09-29T13:51:51.899Z
2023-09-29T13:51:51.899Z
{'Vendor': 'Irina Sokolovskaya', 'Product': 'Goods Catalog', 'Versions': 'n/a'}
CVE-2023-41668
Cross-Site Request Forgery (CSRF) vulnerability in Leadster plugin <= 1.1.2 versions.
https://patchstack.com/database/vulnerability/leadster-marketing-conversacional/wordpress-leadster-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:03:16.713Z
2023-10-09T17:47:11.116Z
2023-10-09T17:47:11.116Z
{'Vendor': 'Leadster', 'Product': 'Leadster', 'Versions': 'n/a'}
CVE-2023-41238
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in UltimatelySocial Social Media Share Buttons & Social Sharing Icons plugin <= 2.8.3 versions.
https://patchstack.com/database/vulnerability/ultimate-social-media-icons/wordpress-social-media-share-icons-plugin-2-8-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-25T10:02:32.133Z
2023-09-27T11:58:55.274Z
2023-09-27T11:58:55.274Z
{'Vendor': 'UltimatelySocial', 'Product': 'Social Media Share Buttons & Social Sharing Icons', 'Versions': 'n/a'}
CVE-2023-41146
Autodesk Customer Support Portal allows cases created by users under an account to see cases created by other users on the same account.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0020
2023-08-23T17:55:48.801Z
2023-11-22T06:53:36.211Z
2023-11-22T06:56:50.391Z
{'Vendor': 'Autodesk', 'Product': 'Customer Portal', 'Versions': '0'}
CVE-2023-41900
Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.
https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
2023-09-04T16:31:48.226Z
2023-09-15T20:17:42.201Z
2023-09-15T20:17:42.201Z
{'Vendor': 'eclipse', 'Product': 'jetty.project', 'Versions': '>= 9.4.21, <= 9.4.51, >= 10.0.0, <= 10.0.15, >= 11.0.0, <= 11.0.15'}
CVE-2023-41453
Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the cmd parameter in the index.php component.
http://ajaxnewsticker.com
2023-08-30T00:00:00
2023-09-27T00:00:00
2023-09-27T22:24:18.463051
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41844
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests in capture traffic endpoint.
https://fortiguard.com/psirt/FG-IR-23-214
2023-09-04T08:12:52.815Z
2023-12-13T06:42:02.427Z
2023-12-13T06:42:02.427Z
{'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.4'}
CVE-2023-41901
null
null
2023-09-04T16:31:48.226Z
null
2023-09-15T20:19:46.670Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-41452
Cross Site Request Forgery vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the txt parameter in the index.php component.
http://ajaxnewsticker.com
2023-08-30T00:00:00
2023-09-27T00:00:00
2023-09-27T22:16:41.311481
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41669
Cross-Site Request Forgery (CSRF) vulnerability in DAEXT Live News plugin <= 1.06 versions.
https://patchstack.com/database/vulnerability/live-news-lite/wordpress-live-news-plugin-1-06-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:03:16.713Z
2023-10-09T18:10:33.583Z
2023-10-09T18:10:33.583Z
{'Vendor': 'DAEXT', 'Product': 'Live News', 'Versions': 'n/a'}
CVE-2023-41239
Server-Side Request Forgery (SSRF) vulnerability in Blubrry PowerPress Podcasting plugin by Blubrry.This issue affects PowerPress Podcasting plugin by Blubrry: from n/a through 11.0.6.
https://patchstack.com/database/vulnerability/powerpress/wordpress-powerpress-podcasting-plugin-by-blubrry-plugin-11-0-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
2023-08-25T10:02:32.133Z
2023-11-13T02:42:42.716Z
2023-11-13T02:42:42.716Z
{'Vendor': 'Blubrry', 'Product': 'PowerPress Podcasting plugin by Blubrry', 'Versions': 'n/a'}
CVE-2023-41813
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Allows you to edit the Web Console user notification options. This issue affects Pandora FMS: from 700 through 774.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T12:10:03.869Z
2023-12-29T11:42:59.506Z
2023-12-29T11:42:59.506Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41055
LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the `engines/google/text.php` and `engines/duckduckgo/text.php` files in versions before commit be59098abd119cda70b15bf3faac596dfd39a744. This vulnerability allows remote attackers to request the server to send HTTP GET requests to arbitrary targets and conduct Denial-of-Service (DoS) attacks via the `wikipedia_language` cookie. Remote attackers can request the server to download large files to reduce the performance of the server or even deny access from legitimate users. This issue has been patched in https://github.com/Ahwxorg/LibreY/pull/9. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability.
https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc
2023-08-22T16:57:23.934Z
2023-09-04T17:32:09.310Z
2023-09-04T17:32:09.310Z
{'Vendor': 'Ahwxorg', 'Product': 'LibreY', 'Versions': '< be59098abd119cda70b15bf3faac596dfd39a744'}
CVE-2023-41556
Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetIpMacBind.
https://github.com/peris-navince/founded-0-days/blob/main/fromSetIpMacBind/1.md
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T12:25:24.881206
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41106
An issue was discovered in Zimbra Collaboration (ZCS) before 10.0.3. An attacker can gain access to a Zimbra account. This is also fixed in 9.0.0 Patch 35 and 8.8.15 Patch 42.
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
2023-08-23T00:00:00
2023-12-07T00:00:00
2023-12-07T05:00:18.542539
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41940
Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3190
2023-09-05T16:39:57.394Z
2023-09-06T12:08:59.019Z
2023-10-24T12:51:50.639Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins TAP Plugin', 'Versions': '0'}
CVE-2023-41043
Discourse is an open-source discussion platform. Prior to version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches, a malicious admin could create extremely large icons sprites, which would then be cached in each server process. This may cause server processes to be killed and lead to downtime. The issue is patched in version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches. This is only a concern for multisite installations. No action is required when the admins are trusted.
https://github.com/discourse/discourse/security/advisories/GHSA-28hh-h5xw-xgvx
2023-08-22T16:57:23.932Z
2023-09-15T19:27:59.432Z
2023-09-15T19:27:59.432Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.1.1, beta < 3.2.0.beta1, tests-passed < 3.2.0.beta1'}
CVE-2023-41297
Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:07.354Z
2023-09-25T11:39:06.939Z
2023-09-25T11:39:06.939Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.0.0'}
CVE-2023-41628
An issue in O-RAN Software Community E2 G-Release allows attackers to cause a Denial of Service (DoS) by incorrectly initiating the messaging procedure between the E2Node and E2Term components.
https://jira.o-ran-sc.org/browse/RIC-1002
2023-08-30T00:00:00
2023-09-01T00:00:00
2023-09-01T16:45:56.479099
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41782
There is a DLL hijacking vulnerability in ZTE ZXCLOUD iRAI, an attacker could place a fake DLL file in a specific directory and successfully exploit this vulnerability to execute malicious code.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032984
2023-09-01T09:02:00.657Z
2024-01-05T01:41:36.564Z
2024-01-05T01:41:36.564Z
{'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to V7.01.04P1_1104'}
CVE-2023-41852
Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailMunch – Grow your Email List plugin <= 3.1.2 versions.
https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-04T09:47:21.582Z
2023-10-10T08:40:10.279Z
2023-10-10T08:40:10.279Z
{'Vendor': 'MailMunch', 'Product': 'MailMunch – Grow your Email List', 'Versions': 'n/a'}
CVE-2023-41151
An uncaught exception issue discovered in Softing OPC UA C++ SDK before 6.30 for Windows operating system may cause the application to crash when the server wants to send an error packet, while socket is blocked on writing.
https://industrial.softing.com/fileadmin/psirt/downloads/2023/syt-2023-3.html
2023-08-24T00:00:00
2023-12-14T00:00:00
2023-12-14T18:51:07.048755
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41444
An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the fun_1400084d0 function in IREC.sys driver.
https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945
2023-08-30T00:00:00
2023-09-28T00:00:00
2023-09-28T02:46:53.923527
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41653
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Beplus Sermon'e – Sermons Online plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/sermone-online-sermons-management/wordpress-sermon-e-sermons-online-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T13:02:20.619Z
2023-09-27T12:38:59.268Z
2023-09-27T12:38:59.268Z
{'Vendor': 'Beplus', 'Product': "Sermon'e – Sermons Online", 'Versions': 'n/a'}
CVE-2023-41346
ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services.
https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html
2023-08-29T00:11:47.812Z
2023-11-03T04:21:26.406Z
2023-11-03T07:15:22.787Z
{'Vendor': 'ASUS', 'Product': 'RT-AX55', 'Versions': '3.0.0.4.386.51598'}
CVE-2023-41595
An issue in xui-xray v1.8.3 allows attackers to obtain sensitive information via default password.
https://github.com/vaxilu/x-ui
2023-08-30T00:00:00
2023-09-18T00:00:00
2023-09-18T15:17:00.289492
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41983
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.
https://support.apple.com/en-us/HT213981
2023-09-06T17:40:06.140Z
2023-10-25T18:32:02.613Z
2023-10-25T18:32:02.613Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}