CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-41333 | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An attacker with the ability to create or modify CiliumNetworkPolicy objects in a particular namespace is able to affect traffic on an entire Cilium cluster, potentially bypassing policy enforcement in other namespaces. By using a crafted `endpointSelector` that uses the `DoesNotExist` operator on the `reserved:init` label, the attacker can create policies that bypass namespace restrictions and affect the entire Cilium cluster. This includes potentially allowing or denying all traffic. This attack requires API server access, as described in the Kubernetes API Server Attacker section of the Cilium Threat Model. This issue has been resolved in Cilium versions 1.14.2, 1.13.7, and 1.12.14. As a workaround an admission webhook can be used to prevent the use of `endpointSelectors` that use the `DoesNotExist` operator on the `reserved:init` label in CiliumNetworkPolicies.
| https://github.com/cilium/cilium/security/advisories/GHSA-4xp2-w642-7mcx | 2023-08-28T16:56:43.367Z | 2023-09-26T20:19:34.512Z | 2023-09-26T20:19:34.512Z | {'Vendor': 'cilium', 'Product': 'cilium', 'Versions': '>= 1.14.0, < 1.14.2, >= 1.13.0, < 1.13.7, < 1.12.14'} |
CVE-2023-41763 | Skype for Business Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763 | 2023-08-31T23:08:32.064Z | 2023-10-10T17:07:24.950Z | 2023-12-14T01:14:58.507Z | {'Vendor': 'Microsoft', 'Product': 'Skype for Business Server 2015 CU13', 'Versions': '9319.0'} |
CVE-2023-41299 | DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:07.354Z | 2023-09-25T11:41:44.258Z | 2023-09-25T11:41:44.258Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0'} |
CVE-2023-41734 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in nigauri Insert Estimated Reading Time plugin <= 1.2 versions. | https://patchstack.com/database/vulnerability/insert-estimated-reading-time/wordpress-insert-estimated-reading-time-plugin-1-2-cross-site-scripting-xss?_s_id=cve | 2023-08-31T06:58:39.904Z | 2023-10-02T07:54:22.794Z | 2023-10-02T07:54:22.794Z | {'Vendor': 'nigauri', 'Product': 'Insert Estimated Reading Time', 'Versions': 'n/a'} |
CVE-2023-41364 | In tine through 2023.01.14.325, the sort parameter of the /index.php endpoint allows SQL Injection. | https://herolab.usd.de/security-advisories/ | 2023-08-29T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T09:36:22.621869 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41108 | TEF portal 2023-07-17 is vulnerable to authenticated remote code execution. | https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt | 2023-08-23T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T15:40:25.726792 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41558 | Tenda AC7 V1.0 V15.03.06.44 was discovered to contain a stack overflow via parameter timeZone at url /goform/SetSysTimeCfg. | https://github.com/peris-navince/founded-0-days/blob/main/fromSetSysTime/1.md | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T12:21:30.792655 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41237 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest Themes Arya Multipurpose Pro theme <= 1.0.8 versions. | https://patchstack.com/database/vulnerability/arya-multipurpose-pro/wordpress-arya-multipurpose-pro-theme-1-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-25T10:02:32.133Z | 2023-09-27T11:53:38.732Z | 2023-09-27T11:53:38.732Z | {'Vendor': 'Everest Themes', 'Product': 'Arya Multipurpose Pro', 'Versions': 'n/a'} |
CVE-2023-41667 | Cross-Site Request Forgery (CSRF) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions. | https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:02:41.616Z | 2023-10-09T17:38:02.705Z | 2023-10-09T17:38:02.705Z | {'Vendor': 'Ulf Benjaminsson', 'Product': 'WP-dTree', 'Versions': 'n/a'} |
CVE-2023-41372 | The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcoded RSA key pair | https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | 2023-10-18T09:35:22.507Z | 2023-10-25T14:13:34.827Z | 2023-10-25T14:13:34.827Z | {'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'} |
CVE-2023-41630 | eSST Monitoring v2.147.1 was discovered to contain a remote code execution (RCE) vulnerability via the Gii code generator component. | https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41630-eSST-Preauth-RCE.pdf | 2023-08-30T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T21:58:58.528861 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41260 | Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Exposure in responses to mail-gateway REST API calls. | https://docs.bestpractical.com/release-notes/rt/index.html | 2023-08-25T00:00:00 | 2023-11-03T00:00:00 | 2023-11-03T04:17:29.880900 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41775 | Improper access control vulnerability in 'direct' Desktop App for macOS ver 2.6.0 and earlier allows a local attacker to bypass access restriction and to use camrea, microphone, etc. of the device where the product is installed without the user's consent. | https://status.direct4b.com/2023/08/31/2023083101/ | 2023-09-01T03:16:59.975Z | 2023-09-08T07:09:03.450Z | 2023-09-08T07:09:03.450Z | {'Vendor': 'L is B Corp.', 'Product': "'direct' Desktop App for macOS", 'Versions': 'ver 2.6.0 and earlier'} |
CVE-2023-41325 | OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. Starting in version 3.20 and prior to version 3.22, `shdr_verify_signature` can make a double free. `shdr_verify_signature` used to verify a TA binary before it is loaded. To verify a signature of it, allocate a memory for RSA key. RSA key allocate function (`sw_crypto_acipher_alloc_rsa_public_key`) will try to allocate a memory (which is optee’s heap memory). RSA key is consist of exponent and modulus (represent as variable `e`, `n`) and it allocation is not atomic way, so it may succeed in `e` but fail in `n`. In this case sw_crypto_acipher_alloc_rsa_public_key` will free on `e` and return as it is failed but variable ‘e’ is remained as already freed memory address . `shdr_verify_signature` will free again that memory (which is `e`) even it is freed when it failed allocate RSA key. A patch is available in version 3.22. No known workarounds are available. | https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm | 2023-08-28T16:56:43.366Z | 2023-09-15T19:40:58.065Z | 2023-09-15T19:40:58.065Z | {'Vendor': 'OP-TEE', 'Product': 'optee_os', 'Versions': '>= 3.20, < 3.22'} |
CVE-2023-41149 | F-RevoCRM version7.3.7 and version7.3.8 contains an OS command injection vulnerability. If this vulnerability is exploited, an attacker who can access the product may execute an arbitrary OS command on the server where the product is running. | https://f-revocrm.jp/2023/08/9394/ | 2023-08-24T00:34:39.254Z | 2023-09-06T12:35:22.757Z | 2023-09-06T12:35:22.757Z | {'Vendor': 'Thinkingreed Inc. ', 'Product': 'F-RevoCRM ', 'Versions': 'version7.3.7 and version7.3.8 '} |
CVE-2023-41648 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Swapnil V. Patil Login and Logout Redirect.This issue affects Login and Logout Redirect: from n/a through 2.0.3.
| https://patchstack.com/database/vulnerability/login-and-logout-redirect/wordpress-login-and-logout-redirect-plugin-2-0-2-open-redirection-vulnerability?_s_id=cve | 2023-08-30T13:02:20.618Z | 2023-12-19T19:51:40.648Z | 2023-12-19T19:51:40.648Z | {'Vendor': 'Swapnil V. Patil', 'Product': 'Login and Logout Redirect', 'Versions': 'n/a'} |
CVE-2023-41074 | The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.331Z | 2023-09-26T20:14:43.087Z | 2023-09-26T20:14:43.087Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41977 | The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2. Visiting a malicious website may reveal browsing history. | https://support.apple.com/en-us/HT213981 | 2023-09-06T17:40:06.139Z | 2023-10-25T18:31:52.307Z | 2023-10-25T18:31:52.307Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41998 | Arcserve UDP prior to 9.2 contained a vulnerability in the com.ca.arcflash.rps.webservice.RPSService4CPMImpl interface. A routine exists that allows an attacker to upload and execute arbitrary files. | https://www.tenable.com/security/research/tra-2023-37 | 2023-09-06T18:06:47.116Z | 2023-11-27T16:50:48.279Z | 2023-11-27T16:50:48.279Z | {'Vendor': 'Arcserve', 'Product': 'Arcserve UDP', 'Versions': '0'} |
CVE-2023-41131 | Cross-Site Request Forgery (CSRF) vulnerability in Jonk @ Follow me Darling Sp*tify Play Button for WordPress plugin <= 2.10 versions. | https://patchstack.com/database/vulnerability/spotify-play-button-for-wordpress/wordpress-sp-tify-play-button-for-wordpress-plugin-2-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-23T14:29:48.066Z | 2023-10-12T14:26:20.652Z | 2023-10-12T14:26:20.652Z | {'Vendor': 'Jonk @ Follow me Darling', 'Product': 'Sp*tify Play Button for WordPress', 'Versions': 'n/a'} |
CVE-2023-41561 | Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter startIp and endIp at url /goform/SetPptpServerCfg. | https://github.com/peris-navince/founded-0-days/blob/main/formSetPPTPServer/1.md | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T12:37:22.259883 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41166 | An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.39, 3.11.0 through 3.11.27, 4.3.0 through 4.3.22, 4.6.0 through 4.6.9, and 4.7.0 through 4.7.1. It's possible to know if a specific user account exists on the SNS firewall by using remote access commands. | https://advisories.stormshield.eu/2023-027 | 2023-08-24T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T23:09:03.052828 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41609 | An open redirect vulnerability in the sanitize_url() parameter of CouchCMS v2.3 allows attackers to redirect a victim user to an arbitrary web site via a crafted URL. | https://github.com/CouchCMS/CouchCMS/issues/190 | 2023-08-30T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T17:54:45.306226 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41259 | Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call. | https://docs.bestpractical.com/release-notes/rt/index.html | 2023-08-25T00:00:00 | 2023-11-03T00:00:00 | 2023-11-03T04:14:28.149924 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41936 | Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3228 | 2023-09-05T16:39:57.392Z | 2023-09-06T12:08:56.365Z | 2023-10-24T12:51:45.992Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Google Login Plugin', 'Versions': '0'} |
CVE-2023-41170 | NetScout nGeniusONE 6.3.4 build 2298 allows a Reflected Cross-Site scripting vulnerability. | https://www.netscout.com/securityadvisories | 2023-08-24T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T17:33:04.110009 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41127 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Evergreen Content Poster Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media allows Stored XSS.This issue affects Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media: from n/a through 1.3.6.1.
| https://patchstack.com/database/vulnerability/evergreen-content-poster/wordpress-evergreen-content-poster-plugin-1-3-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-23T14:29:48.066Z | 2023-11-30T12:19:01.852Z | 2023-11-30T12:19:01.852Z | {'Vendor': 'Evergreen Content Poster', 'Product': 'Evergreen Content Poster – Auto Post and Schedule Your Best Content to Social Media', 'Versions': 'n/a'} |
CVE-2023-41330 | knplabs/knp-snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page.
## Issue
On March 17th the vulnerability CVE-2023-28115 was disclosed, allowing an attacker to gain remote code execution through PHAR deserialization. Version 1.4.2 added a check `if (\strpos($filename, 'phar://') === 0)` in the `prepareOutput` function to resolve this CVE, however if the user is able to control the second parameter of the `generateFromHtml()` function of Snappy, it will then be passed as the `$filename` parameter in the `prepareOutput()` function. In the original vulnerability, a file name with a `phar://` wrapper could be sent to the `fileExists()` function, equivalent to the `file_exists()` PHP function. This allowed users to trigger a deserialization on arbitrary PHAR files. To fix this issue, the string is now passed to the `strpos()` function and if it starts with `phar://`, an exception is raised. However, PHP wrappers being case insensitive, this patch can be bypassed using `PHAR://` instead of `phar://`. A successful exploitation of this vulnerability allows executing arbitrary code and accessing the underlying filesystem. The attacker must be able to upload a file and the server must be running a PHP version prior to 8. This issue has been addressed in commit `d3b742d61a` which has been included in version 1.4.3. Users are advised to upgrade. Users unable to upgrade should ensure that only trusted users may submit data to the `AbstractGenerator->generate(...)` function.
| https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj | 2023-08-28T16:56:43.366Z | 2023-09-06T17:33:21.098Z | 2023-09-06T17:33:21.098Z | {'Vendor': 'KnpLabs', 'Product': 'snappy', 'Versions': '< 1.4.3'} |
CVE-2023-41449 | An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the reque parameter. | http://ajaxnewsticker.com | 2023-08-30T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T22:20:05.864337 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41737 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPGens Swifty Bar, sticky bar by WPGens plugin <= 1.2.10 versions. | https://patchstack.com/database/vulnerability/swifty-bar/wordpress-swifty-bar-sticky-bar-by-wpgens-plugin-1-2-10-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-31T06:58:39.904Z | 2023-10-02T08:04:00.793Z | 2023-10-02T08:04:00.793Z | {'Vendor': 'WPGens', 'Product': 'Swifty Bar, sticky bar by WPGens', 'Versions': 'n/a'} |
CVE-2023-41367 | Due to missing authentication check in webdynpro application, an unauthorized user in SAP NetWeaver (Guided Procedures) - version 7.50, can gain access to admin view of specific function anonymously. On successful exploitation of vulnerability under specific circumstances, attacker can view user’s email address. There is no integrity/availability impact.
| https://me.sap.com/notes/3348142 | 2023-08-29T05:27:56.301Z | 2023-09-12T01:59:55.915Z | 2023-09-12T01:59:55.915Z | {'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver (Guided Procedures)', 'Versions': '7.50'} |
CVE-2023-41672 | Cross-Site Request Forgery (CSRF) vulnerability in Rémi Leclercq Hide admin notices – Admin Notification Center plugin <= 2.3.2 versions. | https://patchstack.com/database/vulnerability/wp-admin-notification-center/wordpress-hide-admin-notices-admin-notification-center-plugin-2-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:03:16.713Z | 2023-10-09T18:38:15.078Z | 2023-10-09T18:38:15.078Z | {'Vendor': 'Rémi Leclercq', 'Product': 'Hide admin notices – Admin Notification Center', 'Versions': 'n/a'} |
CVE-2023-41808 | Improper Privilege Management vulnerability in Pandora FMS on all allows Privilege Escalation. This vulnerability allows an unauthorised user to escalate and read sensitive files as if they were root. This issue affects Pandora FMS: from 700 through 773. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T12:10:03.868Z | 2023-11-23T14:51:17.223Z | 2023-11-23T14:51:17.223Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41721 | Instances of UniFi Network Application that (i) are run on a UniFi Gateway Console, and (ii) are versions 7.5.176. and earlier, implement device adoption with improper access control logic, creating a risk of access to device configuration information by a malicious actor with preexisting access to the network.
Affected Products:
UDM
UDM-PRO
UDM-SE
UDR
UDW
Mitigation:
Update UniFi Network to Version 7.5.187 or later.
| https://community.ui.com/releases/Security-Advisory-Bulletin-036-036/81367bc9-2a64-4435-95dc-bbe482457615 | 2023-08-31T01:00:11.771Z | 2023-10-25T00:24:34.072Z | 2023-10-25T00:24:34.072Z | {'Vendor': 'Ubiquiti', 'Product': 'UniFi Network Application', 'Versions': '7.5.176'} |
CVE-2023-41058 | Parse Server is an open source backend server. In affected versions the Parse Cloud trigger `beforeFind` is not invoked in certain conditions of `Parse.Query`. This can pose a vulnerability for deployments where the `beforeFind` trigger is used as a security layer to modify the incoming query. The vulnerability has been fixed by refactoring the internal query pipeline for a more concise code structure and implementing a patch to ensure the `beforeFind` trigger is invoked. This fix was introduced in commit `be4c7e23c6` and has been included in releases 6.2.2 and 5.5.5. Users are advised to upgrade. Users unable to upgrade should make use of parse server's security layers to manage access levels with Class-Level Permissions and Object-Level Access Control that should be used instead of custom security layers in Cloud Code triggers. | https://github.com/parse-community/parse-server/security/advisories/GHSA-fcv6-fg5r-jm9q | 2023-08-22T16:57:23.934Z | 2023-09-04T22:39:55.276Z | 2023-09-04T22:39:55.276Z | {'Vendor': 'parse-community', 'Product': 'parse-server', 'Versions': '>= 1.0.0, < 5.5.5, >= 6.0.0, < 6.2.2'} |
CVE-2023-41776 | There is a local privilege escalation vulnerability of ZTE's ZXCLOUD iRAI.Attackers with regular user privileges can create a fake process, and to escalate local privileges.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034404 | 2023-09-01T09:02:00.656Z | 2024-01-03T01:56:48.148Z | 2024-01-03T01:56:48.148Z | {'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to 7.23.31'} |
CVE-2023-41326 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. | https://github.com/glpi-project/glpi/security/advisories/GHSA-5wj6-hp4c-j5q9 | 2023-08-28T16:56:43.366Z | 2023-09-26T22:40:49.778Z | 2023-09-26T22:40:49.778Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.5.0, < 10.0.10'} |
CVE-2023-41633 | Catdoc v0.95 was discovered to contain a NULL pointer dereference via the component xls2csv at src/fileutil.c. | https://rycbar77.github.io/2023/08/29/catdoc-0-95-nullptr-dereference/ | 2023-08-30T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T18:27:28.233900 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41263 | An issue was discovered in Plixer Scrutinizer before 19.3.1. It exposes debug logs to unauthenticated users at the /debug/ URL path. With knowledge of valid IP addresses and source types, an unauthenticated attacker can download debug logs containing application-related information. | https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md | 2023-08-25T00:00:00 | 2023-10-12T00:00:00 | 2023-10-12T22:12:41.803407 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41078 | An authorization issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to bypass certain Privacy preferences. | https://support.apple.com/en-us/HT213940 | 2023-08-22T18:10:00.332Z | 2023-09-26T20:14:44.069Z | 2023-09-26T20:14:44.069Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41097 | An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.
| https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/069Vm0000007rArIAI?operationContext=S1 | 2023-08-23T04:17:16.169Z | 2023-12-21T20:33:04.967Z | 2023-12-21T20:33:04.967Z | {'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '0'} |
CVE-2023-41994 | A logic issue was addressed with improved checks This issue is fixed in macOS Sonoma 14. A camera extension may be able to access the camera view from apps other than the app for which it was granted permission. | https://support.apple.com/en-us/HT213940 | 2023-09-06T17:40:06.142Z | 2024-01-10T22:03:31.108Z | 2024-01-10T22:03:31.108Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41351 | Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7501-6155a-1.html | 2023-08-29T00:11:47.812Z | 2023-11-03T05:41:26.852Z | 2023-11-03T05:41:26.852Z | {'Vendor': 'Chunghwa Telecom', 'Product': 'NOKIA G-040W-Q', 'Versions': 'G040WQR201207'} |
CVE-2023-41886 | OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, an arbitrary file read vulnerability allows any unauthenticated user to read a file on a server. Version 3.7.5 fixes this issue. | https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m | 2023-09-04T16:31:48.224Z | 2023-09-15T20:05:20.651Z | 2023-09-15T20:05:20.651Z | {'Vendor': 'OpenRefine', 'Product': 'OpenRefine', 'Versions': '<= 3.7.4'} |
CVE-2023-41613 | EzViz Studio v2.2.0 is vulnerable to DLL hijacking. | https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html | 2023-08-30T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T13:31:25.276032 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41306 | Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:09.166Z | 2023-09-26T01:14:26.222Z | 2023-09-26T01:14:26.222Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.0.1, 2.0.0'} |
CVE-2023-41890 | Sustainsys.Saml2 library adds SAML2P support to ASP.NET web sites, allowing the web site to act as a SAML2 Service Provider.
Prior to versions 1.0.3 and 2.9.2, when a response is processed, the issuer of the Identity Provider is not sufficiently validated. This could allow a malicious identity provider to craft a Saml2 response that is processed as if issued by another identity provider. It is also possible for a malicious end user to cause stored state intended for one identity provider to be used when processing the response from another provider. An application is impacted if they rely on any of these features in their authentication/authorization logic: the issuer of the generated identity and claims; or items in the stored request state (AuthenticationProperties). This issue is patched in versions 2.9.2 and 1.0.3. The `AcsCommandResultCreated` notification can be used to add the validation required if an upgrade to patched packages is not possible. | https://github.com/Sustainsys/Saml2/security/advisories/GHSA-fv2h-753j-9g39 | 2023-09-04T16:31:48.225Z | 2023-09-19T14:38:55.861Z | 2023-09-19T14:38:55.861Z | {'Vendor': 'Sustainsys', 'Product': 'Saml2', 'Versions': '< 1.0.3, >= 2.0.0, < 2.9.2'} |
CVE-2023-41039 | RestrictedPython is a restricted execution environment for Python to run untrusted code. Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its instances) and via `string.Formatter`. All known versions of `RestrictedPython` are vulnerable. This issue has been addressed in commit `4134aedcff1` which has been included in the 5.4 and 6.2 releases. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67 | 2023-08-22T16:57:23.932Z | 2023-08-30T17:18:56.168Z | 2023-08-30T17:18:56.168Z | {'Vendor': 'zopefoundation', 'Product': 'RestrictedPython', 'Versions': '< 5.4, >= 6.0, < 6.1'} |
CVE-2023-41255 | The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication
of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on the network. | https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | 2023-10-18T09:35:22.497Z | 2023-10-25T14:10:50.626Z | 2023-10-25T14:10:50.626Z | {'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'} |
CVE-2023-41605 | null | null | 2023-08-30T00:00:00 | null | 2023-10-30T13:33:11.439882 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-41310 | Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:09.167Z | 2023-09-26T01:20:44.416Z | 2023-09-26T01:20:44.416Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-41740 | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to read specific files via unspecified vectors. | https://www.synology.com/en-global/security/advisory/Synology_SA_23_10 | 2023-08-31T07:54:07.974Z | 2023-08-31T09:08:58.115Z | 2023-08-31T09:08:58.115Z | {'Vendor': 'Synology', 'Product': 'Synology Router Manager (SRM)', 'Versions': '1.3, 0'} |
CVE-2023-41594 | Dairy Farm Shop Management System Using PHP and MySQL v1.1 was discovered to contain multiple SQL injection vulnerabilities in the Login function via the Username and Password parameters. | https://portswigger.net/web-security/sql-injection | 2023-08-30T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T02:33:51.954962 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41982 | This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data. | https://support.apple.com/en-us/HT213981 | 2023-09-06T17:40:06.140Z | 2023-10-25T18:31:58.422Z | 2023-10-25T18:31:58.422Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41081 | Important: Authentication Bypass CVE-2023-41081
The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected.
This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48.
Users are recommended to upgrade to version 1.2.49, which fixes the issue.
History
2023-09-13 Original advisory
2023-09-28 Updated summary
| https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b | 2023-08-22T18:35:12.615Z | 2023-09-13T09:30:05.584Z | 2023-09-28T21:30:57.072Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat Connectors', 'Versions': '1.2.0'} |
CVE-2023-41652 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 10.6.6.
| https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-10-6-6-sql-injection-vulnerability?_s_id=cve | 2023-08-30T13:02:20.619Z | 2023-11-03T11:06:26.432Z | 2023-11-03T11:06:26.432Z | {'Vendor': 'David F. Carr', 'Product': 'RSVPMaker', 'Versions': 'n/a'} |
CVE-2023-41717 | Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions. | https://github.com/federella/CVE-2023-41717 | 2023-08-30T00:00:00 | 2023-08-31T00:00:00 | 2023-08-31T15:41:31.129509 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41347 | ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its check token module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services. | https://www.twcert.org.tw/tw/cp-132-7498-18012-1.html | 2023-08-29T00:11:47.812Z | 2023-11-03T04:29:39.109Z | 2023-11-03T07:15:54.767Z | {'Vendor': 'ASUS', 'Product': 'RT-AX55', 'Versions': '3.0.0.4.386.51598'} |
CVE-2023-41853 | Cross-Site Request Forgery (CSRF) vulnerability in WP iCal Availability plugin <= 1.0.3 versions. | https://patchstack.com/database/vulnerability/wp-ical-availability/wordpress-wp-ical-availability-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-04T09:47:21.582Z | 2023-10-10T08:43:39.531Z | 2023-10-10T08:43:39.531Z | {'Vendor': 'WP iCal Availability', 'Product': 'WP iCal Availability', 'Versions': 'n/a'} |
CVE-2023-41150 | F-RevoCRM 7.3 series prior to version7.3.8 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product. | https://f-revocrm.jp/2023/08/9394/ | 2023-08-24T00:34:39.254Z | 2023-09-06T12:35:41.294Z | 2023-09-06T12:35:41.294Z | {'Vendor': 'Thinkingreed Inc.', 'Product': 'F-RevoCRM', 'Versions': '7.3 series prior to version7.3.8'} |
CVE-2023-41445 | Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the index.php component. | http://ajaxnewsticker.com | 2023-08-30T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T22:10:57.881475 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41296 | Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:07.354Z | 2023-09-25T11:37:37.692Z | 2023-09-25T11:37:37.692Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1, 2.0.0'} |
CVE-2023-41629 | A lack of input sanitizing in the file download feature of eSST Monitoring v2.147.1 allows attackers to execute a path traversal. | https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2023-41629-eSST-Path-Traversal.pdf | 2023-08-30T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T21:57:09.412009 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41783 | There is a command injection vulnerability of ZTE's ZXCLOUD iRAI. Due to the program failed to adequately validate the user's input, an attacker could exploit this vulnerability to escalate local privileges.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034404 | 2023-09-01T09:02:00.657Z | 2024-01-03T02:02:51.482Z | 2024-01-03T02:02:51.482Z | {'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to 7.22.11P2'} |
CVE-2023-41557 | Tenda AC7 V1.0 V15.03.06.44 and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter entrys and mitInterface at url /goform/addressNat. | https://github.com/peris-navince/founded-0-days/blob/main/fromAddressNat/1.md | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T12:23:38.395267 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41107 | TEF portal 2023-07-17 is vulnerable to a persistent cross site scripting (XSS)attack. | https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt | 2023-08-23T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T15:40:33.168067 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41804 | Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Starter Templates — Elementor, WordPress & Beaver Builder Templates.This issue affects Starter Templates — Elementor, WordPress & Beaver Builder Templates: from n/a through 3.2.4.
| https://patchstack.com/database/vulnerability/astra-sites/wordpress-starter-templates-plugin-3-2-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | 2023-09-01T11:55:20.628Z | 2023-12-07T10:58:43.110Z | 2023-12-07T10:58:43.110Z | {'Vendor': 'Brainstorm Force', 'Product': 'Starter Templates — Elementor, WordPress & Beaver Builder Templates', 'Versions': 'n/a'} |
CVE-2023-41941 | A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(1) | 2023-09-05T16:39:57.394Z | 2023-09-06T12:08:59.655Z | 2023-10-24T12:51:51.814Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins AWS CodeCommit Trigger Plugin', 'Versions': '0'} |
CVE-2023-41042 | Discourse is an open-source discussion platform. Prior to version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches, importing a remote theme loads their assets into memory without enforcing limits for file size or number of files. The issue is patched in version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches. There are no known workarounds. | https://github.com/discourse/discourse/security/advisories/GHSA-2fq5-x3mm-v254 | 2023-08-22T16:57:23.932Z | 2023-09-15T19:26:43.088Z | 2023-09-15T19:26:43.088Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.1.1, beta < 3.2.0.beta1, tests-passed < 3.2.0.beta1'} |
CVE-2023-41691 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pensopay WooCommerce PensoPay plugin <= 6.3.1 versions. | https://patchstack.com/database/vulnerability/woo-pensopay/wordpress-woocommerce-pensopay-plugin-6-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T15:05:59.970Z | 2023-09-29T13:56:01.397Z | 2023-09-29T13:56:01.397Z | {'Vendor': 'Pensopay', 'Product': 'WooCommerce PensoPay', 'Versions': 'n/a'} |
CVE-2023-41812 | Unrestricted Upload of File with Dangerous Type vulnerability in Pandora FMS on all allows Accessing Functionality Not Properly Constrained by ACLs. This vulnerability allowed PHP executable files to be uploaded through the file manager. This issue affects Pandora FMS: from 700 through 773. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T12:10:03.869Z | 2023-11-23T14:58:44.103Z | 2023-11-23T14:58:44.103Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41111 | An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem (Exynos 9810, 9610, 9820, 980, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Modem 5123, Modem 5300, and Auto T5123). Improper handling of a length parameter inconsistency can cause abnormal termination of a mobile phone. This occurs in the RLC task and RLC module. | https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | 2023-08-23T00:00:00 | 2023-11-08T00:00:00 | 2023-11-08T07:50:56.369036 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41054 | LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the `image_proxy.php` file of LibreY before commit 8f9b9803f231e2954e5b49987a532d28fe50a627. This vulnerability allows remote attackers to use the server as a proxy to send HTTP GET requests to arbitrary targets and retrieve information in the internal network or conduct Denial-of-Service (DoS) attacks via the `url` parameter. Remote attackers can use the server as a proxy to send HTTP GET requests and retrieve information in the internal network. Remote attackers can also request the server to download large files or chain requests among multiple instances to reduce the performance of the server or even deny access from legitimate users. This issue has been addressed in https://github.com/Ahwxorg/LibreY/pull/31. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability. | https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf | 2023-08-22T16:57:23.934Z | 2023-09-04T17:32:07.504Z | 2023-09-04T17:32:07.504Z | {'Vendor': 'Ahwxorg', 'Product': 'LibreY', 'Versions': '< 8f9b9803f231e2954e5b49987a532d28fe50a627'} |
CVE-2023-41687 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Irina Sokolovskaya Goods Catalog plugin <= 2.4.1 versions. | https://patchstack.com/database/vulnerability/goods-catalog/wordpress-goods-catalog-plugin-2-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T13:45:32.809Z | 2023-09-29T13:51:51.899Z | 2023-09-29T13:51:51.899Z | {'Vendor': 'Irina Sokolovskaya', 'Product': 'Goods Catalog', 'Versions': 'n/a'} |
CVE-2023-41668 | Cross-Site Request Forgery (CSRF) vulnerability in Leadster plugin <= 1.1.2 versions. | https://patchstack.com/database/vulnerability/leadster-marketing-conversacional/wordpress-leadster-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:03:16.713Z | 2023-10-09T17:47:11.116Z | 2023-10-09T17:47:11.116Z | {'Vendor': 'Leadster', 'Product': 'Leadster', 'Versions': 'n/a'} |
CVE-2023-41238 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in UltimatelySocial Social Media Share Buttons & Social Sharing Icons plugin <= 2.8.3 versions. | https://patchstack.com/database/vulnerability/ultimate-social-media-icons/wordpress-social-media-share-icons-plugin-2-8-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-25T10:02:32.133Z | 2023-09-27T11:58:55.274Z | 2023-09-27T11:58:55.274Z | {'Vendor': 'UltimatelySocial', 'Product': 'Social Media Share Buttons & Social Sharing Icons', 'Versions': 'n/a'} |
CVE-2023-41146 | Autodesk Customer Support Portal allows cases created by users under an account to see cases created by other users on the same account.
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0020 | 2023-08-23T17:55:48.801Z | 2023-11-22T06:53:36.211Z | 2023-11-22T06:56:50.391Z | {'Vendor': 'Autodesk', 'Product': 'Customer Portal', 'Versions': '0'} |
CVE-2023-41900 | Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue. | https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48 | 2023-09-04T16:31:48.226Z | 2023-09-15T20:17:42.201Z | 2023-09-15T20:17:42.201Z | {'Vendor': 'eclipse', 'Product': 'jetty.project', 'Versions': '>= 9.4.21, <= 9.4.51, >= 10.0.0, <= 10.0.15, >= 11.0.0, <= 11.0.15'} |
CVE-2023-41453 | Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the cmd parameter in the index.php component. | http://ajaxnewsticker.com | 2023-08-30T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T22:24:18.463051 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41844 | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests in capture traffic endpoint. | https://fortiguard.com/psirt/FG-IR-23-214 | 2023-09-04T08:12:52.815Z | 2023-12-13T06:42:02.427Z | 2023-12-13T06:42:02.427Z | {'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.4'} |
CVE-2023-41901 | null | null | 2023-09-04T16:31:48.226Z | null | 2023-09-15T20:19:46.670Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-41452 | Cross Site Request Forgery vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the txt parameter in the index.php component. | http://ajaxnewsticker.com | 2023-08-30T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T22:16:41.311481 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41669 | Cross-Site Request Forgery (CSRF) vulnerability in DAEXT Live News plugin <= 1.06 versions. | https://patchstack.com/database/vulnerability/live-news-lite/wordpress-live-news-plugin-1-06-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:03:16.713Z | 2023-10-09T18:10:33.583Z | 2023-10-09T18:10:33.583Z | {'Vendor': 'DAEXT', 'Product': 'Live News', 'Versions': 'n/a'} |
CVE-2023-41239 | Server-Side Request Forgery (SSRF) vulnerability in Blubrry PowerPress Podcasting plugin by Blubrry.This issue affects PowerPress Podcasting plugin by Blubrry: from n/a through 11.0.6.
| https://patchstack.com/database/vulnerability/powerpress/wordpress-powerpress-podcasting-plugin-by-blubrry-plugin-11-0-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | 2023-08-25T10:02:32.133Z | 2023-11-13T02:42:42.716Z | 2023-11-13T02:42:42.716Z | {'Vendor': 'Blubrry', 'Product': 'PowerPress Podcasting plugin by Blubrry', 'Versions': 'n/a'} |
CVE-2023-41813 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Allows you to edit the Web Console user notification options. This issue affects Pandora FMS: from 700 through 774. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T12:10:03.869Z | 2023-12-29T11:42:59.506Z | 2023-12-29T11:42:59.506Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41055 | LibreY is a fork of LibreX, a framework-less and javascript-free privacy respecting meta search engine. LibreY is subject to a Server-Side Request Forgery (SSRF) vulnerability in the `engines/google/text.php` and `engines/duckduckgo/text.php` files in versions before commit be59098abd119cda70b15bf3faac596dfd39a744. This vulnerability allows remote attackers to request the server to send HTTP GET requests to arbitrary targets and conduct Denial-of-Service (DoS) attacks via the `wikipedia_language` cookie. Remote attackers can request the server to download large files to reduce the performance of the server or even deny access from legitimate users. This issue has been patched in https://github.com/Ahwxorg/LibreY/pull/9. LibreY hosters are advised to use the latest commit. There are no known workarounds for this vulnerability. | https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc | 2023-08-22T16:57:23.934Z | 2023-09-04T17:32:09.310Z | 2023-09-04T17:32:09.310Z | {'Vendor': 'Ahwxorg', 'Product': 'LibreY', 'Versions': '< be59098abd119cda70b15bf3faac596dfd39a744'} |
CVE-2023-41556 | Tenda AC7 V1.0 V15.03.06.44, Tenda AC9 V3.0 V15.03.06.42_multi, and Tenda AC5 V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetIpMacBind. | https://github.com/peris-navince/founded-0-days/blob/main/fromSetIpMacBind/1.md | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T12:25:24.881206 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41106 | An issue was discovered in Zimbra Collaboration (ZCS) before 10.0.3. An attacker can gain access to a Zimbra account. This is also fixed in 9.0.0 Patch 35 and 8.8.15 Patch 42. | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | 2023-08-23T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T05:00:18.542539 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41940 | Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3190 | 2023-09-05T16:39:57.394Z | 2023-09-06T12:08:59.019Z | 2023-10-24T12:51:50.639Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins TAP Plugin', 'Versions': '0'} |
CVE-2023-41043 | Discourse is an open-source discussion platform. Prior to version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches, a malicious admin could create extremely large icons sprites, which would then be cached in each server process. This may cause server processes to be killed and lead to downtime. The issue is patched in version 3.1.1 of the `stable` branch and version 3.2.0.beta1 of the `beta` and `tests-passed` branches. This is only a concern for multisite installations. No action is required when the admins are trusted. | https://github.com/discourse/discourse/security/advisories/GHSA-28hh-h5xw-xgvx | 2023-08-22T16:57:23.932Z | 2023-09-15T19:27:59.432Z | 2023-09-15T19:27:59.432Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.1.1, beta < 3.2.0.beta1, tests-passed < 3.2.0.beta1'} |
CVE-2023-41297 | Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:07.354Z | 2023-09-25T11:39:06.939Z | 2023-09-25T11:39:06.939Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.0.0'} |
CVE-2023-41628 | An issue in O-RAN Software Community E2 G-Release allows attackers to cause a Denial of Service (DoS) by incorrectly initiating the messaging procedure between the E2Node and E2Term components. | https://jira.o-ran-sc.org/browse/RIC-1002 | 2023-08-30T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T16:45:56.479099 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41782 |
There is a DLL hijacking vulnerability in ZTE ZXCLOUD iRAI, an attacker could place a fake DLL file in a specific directory and successfully exploit this vulnerability to execute malicious code.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032984 | 2023-09-01T09:02:00.657Z | 2024-01-05T01:41:36.564Z | 2024-01-05T01:41:36.564Z | {'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to V7.01.04P1_1104'} |
CVE-2023-41852 | Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailMunch – Grow your Email List plugin <= 3.1.2 versions. | https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-04T09:47:21.582Z | 2023-10-10T08:40:10.279Z | 2023-10-10T08:40:10.279Z | {'Vendor': 'MailMunch', 'Product': 'MailMunch – Grow your Email List', 'Versions': 'n/a'} |
CVE-2023-41151 | An uncaught exception issue discovered in Softing OPC UA C++ SDK before 6.30 for Windows operating system may cause the application to crash when the server wants to send an error packet, while socket is blocked on writing. | https://industrial.softing.com/fileadmin/psirt/downloads/2023/syt-2023-3.html | 2023-08-24T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T18:51:07.048755 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41444 | An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attacker to execute arbitrary code and escalate privileges via the fun_1400084d0 function in IREC.sys driver. | https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945 | 2023-08-30T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T02:46:53.923527 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41653 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Beplus Sermon'e – Sermons Online plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/sermone-online-sermons-management/wordpress-sermon-e-sermons-online-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T13:02:20.619Z | 2023-09-27T12:38:59.268Z | 2023-09-27T12:38:59.268Z | {'Vendor': 'Beplus', 'Product': "Sermon'e – Sermons Online", 'Versions': 'n/a'} |
CVE-2023-41346 | ASUS RT-AX55’s authentication-related function has a vulnerability of insufficient filtering of special characters within its token-refresh module. An authenticated remote attacker can exploit this vulnerability to perform a Command Injection attack to execute arbitrary commands, disrupt the system or terminate services. | https://www.twcert.org.tw/tw/cp-132-7497-f92ac-1.html | 2023-08-29T00:11:47.812Z | 2023-11-03T04:21:26.406Z | 2023-11-03T07:15:22.787Z | {'Vendor': 'ASUS', 'Product': 'RT-AX55', 'Versions': '3.0.0.4.386.51598'} |
CVE-2023-41595 | An issue in xui-xray v1.8.3 allows attackers to obtain sensitive information via default password. | https://github.com/vaxilu/x-ui | 2023-08-30T00:00:00 | 2023-09-18T00:00:00 | 2023-09-18T15:17:00.289492 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41983 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service. | https://support.apple.com/en-us/HT213981 | 2023-09-06T17:40:06.140Z | 2023-10-25T18:32:02.613Z | 2023-10-25T18:32:02.613Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.