CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-41080
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. The vulnerability is limited to the ROOT (default) web application.
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
2023-08-22T18:21:35.140Z
2023-08-25T20:39:36.584Z
2023-08-25T20:39:36.584Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M1, 10.1.0-M1, 9.0.0-M1, 8.5.0'}
CVE-2023-41254
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to access sensitive user data.
https://support.apple.com/en-us/HT213981
2023-09-14T19:03:36.110Z
2023-10-25T18:32:03.673Z
2023-10-25T18:32:03.673Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41311
Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:09.167Z
2023-09-26T01:22:20.306Z
2023-09-26T01:22:20.306Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1'}
CVE-2023-41741
Exposure of sensitive information to an unauthorized actor vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to obtain sensitive information via unspecified vectors.
https://www.synology.com/en-global/security/advisory/Synology_SA_23_10
2023-08-31T07:54:07.974Z
2023-08-31T09:08:59.017Z
2023-08-31T09:08:59.017Z
{'Vendor': 'Synology', 'Product': 'Synology Router Manager (SRM)', 'Versions': '1.3, 0'}
CVE-2023-41891
FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue.
https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4
2023-09-04T16:31:48.225Z
2023-10-30T18:01:17.453Z
2023-10-30T18:01:17.453Z
{'Vendor': 'flyteorg', 'Product': 'flyteadmin', 'Versions': '< 1.1.124'}
CVE-2023-41242
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hassan Ali Snap Pixel plugin <= 1.5.7 versions.
https://patchstack.com/database/vulnerability/snap-pixel/wordpress-snap-pixel-plugin-1-5-7-cross-site-scripting-xss?_s_id=cve
2023-08-25T10:02:32.134Z
2023-09-27T12:36:08.247Z
2023-09-27T12:36:08.247Z
{'Vendor': 'Hassan Ali', 'Product': 'Snap Pixel', 'Versions': 'n/a'}
CVE-2023-41307
Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:09.166Z
2023-09-26T01:16:21.629Z
2023-09-26T01:16:21.629Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 2.1.0, 2.0.0'}
CVE-2023-41887
OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, a remote code execution vulnerability allows any unauthenticated user to execute code on the server. Version 3.7.5 has a patch for this issue.
https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5
2023-09-04T16:31:48.224Z
2023-09-15T20:06:55.728Z
2023-09-15T20:06:55.728Z
{'Vendor': 'OpenRefine', 'Product': 'OpenRefine', 'Versions': '<= 3.7.4'}
CVE-2023-41868
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ram Ratan Maurya, Codestag StagTools plugin <= 2.3.7 versions.
https://patchstack.com/database/vulnerability/stagtools/wordpress-stagtools-plugin-2-3-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T11:35:57.268Z
2023-09-25T18:37:31.048Z
2023-09-25T18:37:31.048Z
{'Vendor': 'Ram Ratan Maurya, Codestag', 'Product': 'StagTools', 'Versions': 'n/a'}
CVE-2023-41350
Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of insufficient measures to prevent multiple failed authentication attempts. An unauthenticated remote attacker can execute a crafted Javascript to expose captcha in page, making it very easy for bots to bypass the captcha check and more susceptible to brute force attacks.
https://www.twcert.org.tw/tw/cp-132-7500-0c544-1.html
2023-08-29T00:11:47.812Z
2023-11-03T04:44:04.122Z
2023-11-03T04:44:04.122Z
{'Vendor': 'Chunghwa Telecom', 'Product': 'NOKIA G-040W-Q', 'Versions': 'G040WQR201207'}
CVE-2023-41079
The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14. An app may be able to bypass Privacy preferences.
https://support.apple.com/en-us/HT213940
2023-08-22T18:10:00.332Z
2023-09-26T20:14:49.103Z
2023-09-26T20:14:49.103Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41096
Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash. This issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ZkKh7QAF?operationContext=S1
2023-08-23T04:17:16.169Z
2023-10-26T13:10:34.406Z
2023-10-26T13:10:42.224Z
{'Vendor': 'silabs.com', 'Product': 'Ember ZNet SDK', 'Versions': '7.3.2'}
CVE-2023-41995
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213938
2023-09-06T17:40:06.142Z
2023-09-26T20:14:49.645Z
2023-09-26T20:14:49.645Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41327
WireMock is a tool for mocking HTTP services. WireMock can be configured to only permit proxying (and therefore recording) to certain addresses. This is achieved via a list of allowed address rules and a list of denied address rules, where the allowed list is evaluated first. Until WireMock Webhooks Extension 3.0.0-beta-15, the filtering of target addresses from the proxy mode DID NOT work for Webhooks, so the users were potentially vulnerable regardless of the `limitProxyTargets` settings. Via the WireMock webhooks configuration, POST requests from a webhook might be forwarded to an arbitrary service reachable from WireMock’s instance. For example, If someone is running the WireMock docker Container inside a private cluster, they can trigger internal POST requests against unsecured APIs or even against secure ones by passing a token, discovered using another exploit, via authentication headers. This issue has been addressed in versions 2.35.1 and 3.0.3 of wiremock. Wiremock studio has been discontinued and will not see a fix. Users unable to upgrade should use external firewall rules to define the list of permitted destinations.
https://github.com/wiremock/wiremock/security/advisories/GHSA-hq8w-9w8w-pmx7
2023-08-28T16:56:43.366Z
2023-09-06T20:38:45.161Z
2023-09-06T20:38:45.161Z
{'Vendor': 'wiremock', 'Product': 'wiremock', 'Versions': ' org.wiremock:wiremock-webhooks-extension: >= 2.0.0, < 2.35.1, org.wiremock:wiremock-webhooks-extension: >= 3.0.0, < 3.0.3, wiremock-studio: All versions'}
CVE-2023-41262
An issue was discovered in /fcgi/scrut_fcgi.fcgi in Plixer Scrutinizer before 19.3.1. The csvExportReport endpoint action generateCSV is vulnerable to SQL injection through the sorting parameter, allowing an unauthenticated user to execute arbitrary SQL statements in the context of the application's backend database server.
https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md
2023-08-25T00:00:00
2023-10-12T00:00:00
2023-10-12T22:07:35.638720
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41798
Improper Neutralization of Formula Elements in a CSV File vulnerability in wpWax Directorist – WordPress Business Directory Plugin with Classified Ads Listing.This issue affects Directorist – WordPress Business Directory Plugin with Classified Ads Listings: from n/a through 7.7.1.
https://patchstack.com/database/vulnerability/directorist/wordpress-directorist-plugin-7-7-0-csv-injection?_s_id=cve
2023-09-01T11:55:20.628Z
2023-11-07T17:19:25.795Z
2023-11-07T17:19:25.795Z
{'Vendor': 'wpWax', 'Product': 'Directorist – WordPress Business Directory Plugin with Classified Ads Listings', 'Versions': 'n/a'}
CVE-2023-41720
A vulnerability exists on all versions of Ivanti Connect Secure below 22.6R2 where an attacker with a foothold on an Ivanti Connect Secure (ICS) appliance can escalate their privileges by exploiting a vulnerable installed application. This vulnerability allows the attacker to gain elevated execution privileges on the affected system.
https://forums.ivanti.com/s/article/Security-patch-release-Ivanti-Connect-Secure-22-6R2-and-22-6R2-1?language=en_US
2023-08-31T01:00:11.771Z
2023-12-14T01:56:44.839Z
2023-12-14T01:56:44.839Z
{'Vendor': 'Ivanti', 'Product': 'Connect Secure', 'Versions': '22.6.1'}
CVE-2023-41235
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest Themes Everest News Pro theme <= 1.1.7 versions.
https://patchstack.com/database/vulnerability/everest-news-pro/wordpress-everest-news-pro-theme-1-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-25T10:02:32.132Z
2023-09-27T11:29:59.998Z
2023-09-27T11:29:59.998Z
{'Vendor': 'Everest Themes', 'Product': 'Everest News Pro', 'Versions': 'n/a'}
CVE-2023-41736
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Email posts to subscribers plugin <= 6.2 versions.
https://patchstack.com/database/vulnerability/email-posts-to-subscribers/wordpress-email-posts-to-subscribers-plugin-6-2-cross-site-scripting-xss?_s_id=cve
2023-08-31T06:58:39.904Z
2023-10-02T08:00:06.889Z
2023-10-02T08:00:06.889Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'Email posts to subscribers', 'Versions': 'n/a'}
CVE-2023-41366
Under certain condition SAP NetWeaver Application Server ABAP - versions KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT, allows an unauthenticated attacker to access the unintended data due to the lack of restrictions applied which may lead to low impact in confidentiality and no impact on the integrity and availability of the application.
https://me.sap.com/notes/3362849
2023-08-29T05:27:56.300Z
2023-11-14T01:01:07.759Z
2023-11-14T01:01:07.759Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Application Server ABAP and ABAP Platform', 'Versions': 'KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT'}
CVE-2023-41673
An improper authorization vulnerability [CWE-285] in Fortinet FortiADC version 7.4.0 and before 7.2.2 may allow a low privileged user to read or backup the full system configuration via HTTP or HTTPS requests.
https://fortiguard.com/psirt/FG-IR-23-270
2023-08-30T13:42:39.546Z
2023-12-13T06:43:21.604Z
2023-12-13T06:43:21.604Z
{'Vendor': 'Fortinet', 'Product': 'FortiADC', 'Versions': '7.4.0, 7.2.0, 7.1.0, 7.0.0, 6.2.0, 6.1.0, 6.0.0'}
CVE-2023-41448
Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the ID parameter in the index.php component.
http://ajaxnewsticker.com
2023-08-30T00:00:00
2023-09-27T00:00:00
2023-09-27T22:50:02.751304
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41331
SOFARPC is a Java RPC framework. Versions prior to 5.11.0 are vulnerable to remote command execution. Through a carefully crafted payload, an attacker can achieve JNDI injection or system command execution. In the default configuration of the SOFARPC framework, a blacklist is used to filter out dangerous classes encountered during the deserialization process. However, the blacklist is not comprehensive, and an actor can exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks. Version 5.11.0 contains a fix for this issue. As a workaround, users can add `-Drpc_serialize_blacklist_override=javax.sound.sampled.AudioFileFormat` to the blacklist.
https://github.com/sofastack/sofa-rpc/security/advisories/GHSA-chv2-7hxj-2j86
2023-08-28T16:56:43.367Z
2023-09-12T19:57:57.437Z
2023-09-12T19:57:57.437Z
{'Vendor': 'sofastack', 'Product': 'sofa-rpc', 'Versions': '< 5.11.0'}
CVE-2023-41960
The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself.
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html
2023-10-18T09:35:22.502Z
2023-10-25T14:12:08.722Z
2023-10-25T14:12:08.722Z
{'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'}
CVE-2023-41063
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.329Z
2023-09-26T20:14:52.612Z
2023-09-26T20:14:52.612Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41599
An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.
http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/
2023-08-30T00:00:00
2023-09-19T00:00:00
2023-09-19T01:15:50.246782
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41126
null
null
2023-08-23T09:39:18.584Z
null
2023-08-23T14:57:06.938138Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-41034
Eclipse Leshan is a device management server and client Java implementation. In affected versions DDFFileParser` and `DefaultDDFFileValidator` (and so `ObjectLoader`) are vulnerable to `XXE Attacks`. A DDF file is a LWM2M format used to store LWM2M object description. Leshan users are impacted only if they parse untrusted DDF files (e.g. if they let external users provide their own model), in that case they MUST upgrade to fixed version. If you parse only trusted DDF file and validate only with trusted xml schema, upgrading is not mandatory. This issue has been fixed in versions 1.5.0 and 2.0.0-M13. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7
2023-08-22T16:57:23.931Z
2023-08-31T17:01:38.082Z
2023-08-31T17:01:38.082Z
{'Vendor': 'eclipse-leshan', 'Product': 'leshan', 'Versions': '< 1.5.0, >= 2.0.0-M1, < 2.0.0-M13'}
CVE-2023-41937
Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165
2023-09-05T16:39:57.392Z
2023-09-06T12:08:57.044Z
2023-10-24T12:51:47.164Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Bitbucket Push and Pull Request Plugin', 'Versions': '2.4.0'}
CVE-2023-41872
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Xtemos WoodMart plugin <= 7.2.4 versions.
https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T11:35:57.268Z
2023-09-25T01:05:25.048Z
2023-09-25T01:05:25.048Z
{'Vendor': 'Xtemos', 'Product': 'WoodMart', 'Versions': 'n/a'}
CVE-2023-41171
NetScout nGeniusONE 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability (issue 3 of 4).
https://www.netscout.com/securityadvisories
2023-08-24T00:00:00
2023-12-07T00:00:00
2023-12-07T17:33:19.378475
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41537
phpjabbers Business Directory Script 3.2 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Business-Directory-Script-Version%3A3.2
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T13:14:56.947438
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41167
@webiny/react-rich-text-renderer before 5.37.2 allows XSS attacks by content managers. This is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. Webiny is an open-source serverless enterprise CMS. The @webiny/react-rich-text-renderer package depends on the editor.js rich text editor to handle rich text content. The CMS stores rich text content from the editor.js into the database. When the @webiny/react-rich-text-renderer is used to render such content, it uses the dangerouslySetInnerHTML prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads.
https://webiny.com
2023-08-24T00:00:00
2023-08-25T00:00:00
2023-08-25T13:43:24.851992
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41075
A type confusion issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7.5, macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213670
2023-08-22T18:10:00.332Z
2024-01-10T22:03:36.440Z
2024-01-10T22:03:36.440Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41425
Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component.
http://wondercms.com
2023-08-30T00:00:00
2023-11-07T00:00:00
2023-11-07T15:25:17.212597
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41976
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213981
2023-09-06T17:40:06.139Z
2023-10-25T18:32:08.499Z
2023-10-25T18:32:08.499Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41999
An authentication bypass exists in Arcserve UDP prior to version 9.2. An unauthenticated, remote attacker can obtain a valid authentication identifier that allows them to authenticate to the management console and perform tasks that require authentication.
https://www.tenable.com/security/research/tra-2023-37
2023-09-06T18:06:47.116Z
2023-11-27T16:54:15.422Z
2024-01-10T22:50:23.922Z
{'Vendor': 'Arcserve', 'Product': 'Arcserve UDP', 'Versions': '0'}
CVE-2023-41560
Tenda AC9 V3.0 V15.03.06.42_multi was discovered to contain a stack overflow via parameter firewallEn at url /goform/SetFirewallCfg.
https://github.com/peris-navince/founded-0-days/blob/main/formSetFirewallCfg/1.md
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T12:34:58.440964
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41992
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
https://support.apple.com/en-us/HT213932
2023-09-06T17:40:06.142Z
2023-09-21T18:23:49.779Z
2024-01-10T22:03:38.115Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41838
An improper neutralization of special elements used in an os command ('os command injection') in FortiManager 7.4.0 and 7.2.0 through 7.2.3 may allow attacker to execute unauthorized code or commands via FortiManager cli.
https://fortiguard.com/psirt/FG-IR-23-169
2023-09-04T08:12:52.814Z
2023-10-10T16:49:27.173Z
2023-10-10T16:49:27.173Z
{'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.4.0, 7.2.0, 7.0.0, 6.4.0, 6.2.0'}
CVE-2023-41642
Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.
https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
2023-08-30T00:00:00
2023-08-31T00:00:00
2023-09-06T21:52:38.306856
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41357
Galaxy Software Services Corporation Vitals ESP is an online knowledge base management portal, it has insufficient filtering and validation during file upload. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload and execute scripts onto arbitrary directories to perform arbitrary system operations or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7508-6d1ef-1.html
2023-08-29T00:14:47.636Z
2023-11-03T06:09:18.072Z
2023-11-03T06:09:18.072Z
{'Vendor': 'Galaxy Software Services', 'Product': 'Vitals ESP ', 'Versions': '6.1 and prior'}
CVE-2023-41880
Wasmtime is a standalone runtime for WebAssembly. Wasmtime versions from 10.0.0 to versions 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the WebAssembly `i64x2.shr_s` instruction on x86_64 platforms when the shift amount is a constant value that is larger than 32. Only x86_64 is affected so all other targets are not affected by this. The miscompilation results in the instruction producing an incorrect result, namely the low 32-bits of the second lane of the vector are derived from the low 32-bits of the second lane of the input vector instead of the high 32-bits. The primary impact of this issue is that any WebAssembly program using the `i64x2.shr_s` with a constant shift amount larger than 32 may produce an incorrect result. This issue is not an escape from the WebAssembly sandbox. Execution of WebAssembly guest programs will still behave correctly with respect to memory sandboxing and isolation from the host. Wasmtime considers non-spec-compliant behavior as a security issue nonetheless. This issue was discovered through fuzzing of Wasmtime's code generator Cranelift. Wasmtime versions 10.0.2, 11.0.2, and 12.0.2 are all patched to no longer have this miscompilation. This issue only affects x86_64 hosts and the only workaround is to either scan for this pattern in wasm modules which is nontrivial or to disable the SIMD proposal for WebAssembly. Users prior to 10.0.0 are unaffected by this vulnerability.
https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-gw5p-q8mj-p7gh
2023-09-04T16:31:48.223Z
2023-09-15T19:43:41.850Z
2023-09-15T19:43:41.850Z
{'Vendor': 'bytecodealliance', 'Product': 'wasmtime', 'Versions': '>= 10.0.0, < 10.0.2, >= 11.0.0, < 11.0.2, >= 12.0.0, < 12.0.2'}
CVE-2023-41029
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint.
https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-command-injection-vulnerability/
2023-08-22T14:09:29.146Z
2023-09-22T16:07:12.826Z
2023-09-22T16:07:12.826Z
{'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.2'}
CVE-2023-41615
Zoo Management System v1.0 was discovered to contain multiple SQL injection vulnerabilities in the Admin sign-in page via the username and password fields.
https://portswigger.net/web-security/sql-injection
2023-08-30T00:00:00
2023-09-08T00:00:00
2023-09-08T02:37:24.506626
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41750
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047.
https://security-advisory.acronis.com/advisories/SEC-5382
2023-08-31T14:10:27.638Z
2023-08-31T20:18:09.205Z
2023-08-31T20:18:09.205Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-41300
Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:07.354Z
2023-09-25T12:03:58.711Z
2023-09-25T12:03:58.711Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1, 2.0.0'}
CVE-2023-41896
Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code’s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q
2023-09-04T16:31:48.225Z
2023-10-19T22:30:49.623Z
2023-10-19T22:30:49.623Z
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': 'Home Assistant Core : < 2023.8.0, home-assistant-js-websocket: < 8.2.0'}
CVE-2023-41879
Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1.
https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp
2023-09-04T16:31:48.223Z
2023-09-11T21:14:28.597Z
2023-09-11T21:14:28.597Z
{'Vendor': 'OpenMage', 'Product': 'magento-lts', 'Versions': '<= 19.5.0, >= 20.0.0, <= 20.1.0'}
CVE-2023-41253
When on BIG-IP DNS or BIG-IP LTM enabled with DNS Services License, and a TSIG key is created, it is logged in plaintext in the audit log.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K98334513
2023-10-05T19:17:25.749Z
2023-10-10T12:33:22.712Z
2023-10-10T12:33:22.712Z
{'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'}
CVE-2023-41603
D-Link R15 before v1.08.02 was discovered to contain no firewall restrictions for IPv6 traffic. This allows attackers to arbitrarily access any services running on the device that may be inadvertently listening via IPv6.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10347
2023-08-30T00:00:00
2024-01-10T00:00:00
2024-01-10T08:08:08.117947
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41316
Tolgee is an open-source localization platform. Due to lack of validation field - Org Name, bad actor can send emails with HTML injected code to the victims. Registered users can inject HTML into unsanitized emails from the Tolgee instance to other users. This unsanitized HTML ends up in invitation emails which appear as legitimate org invitations. Bad actors may direct users to malicious website or execute javascript in the context of the users browser. This vulnerability has been addressed in version 3.29.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg
2023-08-28T16:56:43.365Z
2023-09-07T19:39:07.916Z
2023-09-07T19:39:07.916Z
{'Vendor': 'tolgee', 'Product': 'tolgee-platform', 'Versions': '< 3.29.2'}
CVE-2023-41746
Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
https://security-advisory.acronis.com/advisories/SEC-5810
2023-08-31T14:10:27.638Z
2023-08-31T17:53:48.838Z
2023-08-31T17:53:48.838Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cloud Manager', 'Versions': 'unspecified'}
CVE-2023-41068
An access issue was addressed with improved access restrictions. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7. A user may be able to elevate privileges.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.330Z
2023-09-26T20:14:55.664Z
2023-09-26T20:14:55.664Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41592
Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability.
https://owasp.org/Top10/A03_2021-Injection/
2023-08-30T00:00:00
2023-09-14T00:00:00
2023-09-14T22:02:04.846404
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41984
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213938
2023-09-06T17:40:06.141Z
2023-09-26T20:14:56.129Z
2023-09-26T20:14:56.129Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41654
Cross-Site Request Forgery (CSRF) vulnerability in Andreas Heigl authLdap plugin <= 2.5.8 versions.
https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:02:20.619Z
2023-10-06T14:36:19.318Z
2023-10-06T14:36:19.318Z
{'Vendor': 'Andreas Heigl', 'Product': 'authLdap', 'Versions': 'n/a'}
CVE-2023-41711
SonicOS post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicwall.exp, prefs.exp URL endpoints lead to a firewall crash.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012
2023-08-30T17:07:28.451Z
2023-10-17T22:20:36.619Z
2023-10-17T22:20:36.619Z
{'Vendor': 'SonicWall', 'Product': 'SonicOS', 'Versions': '7.0.1-5119 and earlier versions, 7.0.1-5129 and earlier versions, 6.5.4.4-44v-21-2079 and earlier versions, 6.5.4.12-101n and earlier versions'}
CVE-2023-41156
A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-14T00:00:00
2023-09-14T20:46:17.664013
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41855
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Regpacks Regpack plugin <= 0.1 versions.
https://patchstack.com/database/vulnerability/regpack/wordpress-regpack-plugin-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T09:47:21.583Z
2023-10-02T08:39:20.621Z
2023-10-02T08:39:20.621Z
{'Vendor': 'Regpacks', 'Product': 'Regpack', 'Versions': 'n/a'}
CVE-2023-41910
An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.
https://github.com/lldpd/lldpd/releases/tag/1.0.17
2023-09-05T00:00:00
2023-09-05T00:00:00
2023-09-26T11:06:15.466504
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41013
Cross Site Scripting (XSS) in Webmail Calendar in IceWarp 10.3.1 allows remote attackers to inject arbitrary web script or HTML via the "p4" field.
http://icewrap.com
2023-08-22T00:00:00
2023-09-12T00:00:00
2023-09-12T11:57:45.388377
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41443
SQL injection vulnerability in Novel-Plus v.4.1.0 allows a remote attacker to execute arbitrary code via a crafted script to the sort parameter in /sys/menu/list.
https://github.com/Deng-JunFeng/cve-lists/tree/main/novel-plus/vuln
2023-08-30T00:00:00
2023-09-18T00:00:00
2023-09-18T21:28:08.304646
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41101
An issue was discovered in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in versions 9.x and earlier, and to a heap-based buffer overflow in versions 10.x and later. Attackers may exploit the issue to crash OpenNDS (Denial-of-Service condition) or to inject and execute arbitrary bytecode (Remote Code Execution).
https://github.com/openNDS/openNDS/releases/tag/v10.1.3
2023-08-23T00:00:00
2023-11-17T00:00:00
2023-11-17T05:31:27.183695
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41044
Graylog is a free and open log management platform. A partial path traversal vulnerability exists in Graylog's `Support Bundle` feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource. Graylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory. The default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `<data_dir>/support-bundle`. Due to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name. The vulnerability would allow the download or deletion of files in the following example directories: `/var/lib/graylog-server/support-bundle-test` and `/var/lib/graylog-server/support-bundlesdirectory`. For the Graylog Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default. This vulnerability is fixed in Graylog version 5.1.3 and later. Users are advised to upgrade. Users unable to upgrade should block all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog. `GET /api/system/debug/support/bundle/download/{filename}` and `DELETE /api/system/debug/support/bundle/{filename}`.
https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5
2023-08-22T16:57:23.932Z
2023-08-31T17:10:08.323Z
2023-08-31T17:10:08.323Z
{'Vendor': 'Graylog2', 'Product': 'graylog2-server', 'Versions': '>= 5.1.0, < 5.1.3'}
CVE-2023-41947
A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082
2023-09-05T16:39:57.395Z
2023-09-06T12:09:03.587Z
2023-10-24T12:51:58.793Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Frugal Testing Plugin', 'Versions': '0'}
CVE-2023-41697
Cross-Site Request Forgery (CSRF) vulnerability in Nikunj Soni Easy WP Cleaner plugin <= 1.9 versions.
https://patchstack.com/database/vulnerability/easy-wp-cleaner/wordpress-easy-wp-cleaner-plugin-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T15:05:59.971Z
2023-10-10T07:39:29.394Z
2023-10-10T07:39:29.394Z
{'Vendor': 'Nikunj Soni', 'Product': 'Easy WP Cleaner', 'Versions': 'n/a'}
CVE-2023-41678
A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3, 1.1.0 through 1.1.1 allows attacker to execute unauthorized code or commands via specifically crafted request.
https://fortiguard.com/psirt/FG-IR-23-196
2023-08-30T13:42:39.547Z
2023-12-13T06:44:44.233Z
2023-12-13T06:44:44.233Z
{'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.0.0'}
CVE-2023-41117
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contain packages, standalone packages, and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks.
https://www.enterprisedb.com/docs/security/advisories/cve202341117/
2023-08-23T00:00:00
2023-12-12T00:00:00
2023-12-12T07:05:12.231483
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41814
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Through an HTML payload (iframe tag) it is possible to carry out XSS attacks when the user receiving the messages opens their notifications. This issue affects Pandora FMS: from 700 through 774.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T12:10:03.869Z
2023-12-29T11:45:23.493Z
2023-12-29T11:45:23.493Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41052
Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order. This behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on. A patch is currently being developed on pull request #3583. When using builtins from the list above, users should make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects.
https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq
2023-08-22T16:57:23.933Z
2023-09-04T17:36:23.480Z
2023-09-04T17:36:23.480Z
{'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '<= 0.3.9'}
CVE-2023-41681
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
https://fortiguard.com/psirt/FG-IR-23-311
2023-08-30T13:42:39.547Z
2023-10-13T14:51:08.259Z
2023-10-13T14:51:08.259Z
{'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.0, 2.5.0, 2.4.1'}
CVE-2023-41843
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
https://fortiguard.com/psirt/FG-IR-23-273
2023-09-04T08:12:52.815Z
2023-10-13T14:51:17.295Z
2023-10-13T14:51:17.295Z
{'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.0, 2.5.0, 2.4.1'}
CVE-2023-41140
A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause a Heap-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018
2023-08-23T17:55:48.800Z
2023-11-23T03:56:11.372Z
2023-11-23T03:56:11.372Z
{'Vendor': 'Autodesk', 'Product': 'AutoCAD, Advance Steel and Civil 3D', 'Versions': '2024, 2023'}
CVE-2023-41005
An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php
https://github.com/pagekit/pagekit/issues/977
2023-08-22T00:00:00
2023-08-28T00:00:00
2023-08-28T21:09:40.218719
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41269
null
null
2023-08-28T08:40:10.108Z
null
2023-08-30T01:14:24.416809Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-41072
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data.
https://support.apple.com/en-us/HT213984
2023-08-22T18:10:00.331Z
2023-10-25T18:32:13.127Z
2023-10-25T18:32:13.127Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41588
A cross-site scripting (XSS) vulnerability in Time to SLA plugin v10.13.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the durationFormat parameter.
https://github.com/xsn1210/poc2/blob/main/xss%5BTime%20to%20SLA%5D.md
2023-08-30T00:00:00
2023-09-14T00:00:00
2023-09-14T19:33:44.753441
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41137
Symmetric encryption used to protect messages between the AppsAnywhere server and client can be broken by reverse engineering the client and used to impersonate the AppsAnywhere server.
https://docs.appsanywhere.com/appsanywhere/3.1/2023-11-security-advisory
2023-08-23T16:10:33.947Z
2023-11-09T15:07:51.211Z
2023-11-09T15:07:51.211Z
{'Vendor': 'AppsAnywhere', 'Product': 'AppsAnywhere Client', 'Versions': '1.4.0, 1.4.1, 1.5.1, 1.5.2, 1.6.0, 2.0.0, 1.6.1, 2.0.1, 2.2.0'}
CVE-2023-41834
Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests. Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser. Users should upgrade to Apache Flink Stateful Functions version 3.3.0.
https://lists.apache.org/thread/cvxcsdyjqc3lysj1tz7s06zwm36zvwrm
2023-09-01T20:38:56.287Z
2023-09-19T12:34:16.970Z
2023-09-19T12:34:16.970Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Flink Stateful Functions', 'Versions': '3.1.0'}
CVE-2023-41249
In JetBrains TeamCity before 2023.05.3 reflected XSS was possible during copying Build Step
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-08-25T12:52:16.244Z
2023-08-25T12:58:23.451Z
2023-08-25T12:58:23.451Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-41619
Emlog Pro v2.1.14 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/article.php?action=write.
https://github.com/emlog/emlog
2023-08-30T00:00:00
2024-01-16T00:00:00
2024-01-16T01:05:45.159892
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41863
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Pepro Dev. Group PeproDev CF7 Database plugin <= 1.7.0 versions.
https://patchstack.com/database/vulnerability/pepro-cf7-database/wordpress-peprodev-cf7-database-plugin-1-7-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T10:33:46.291Z
2023-09-25T18:46:18.509Z
2023-09-25T18:46:18.509Z
{'Vendor': 'Pepro Dev. Group', 'Product': 'PeproDev CF7 Database', 'Versions': 'n/a'}
CVE-2023-41160
A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-14T00:00:00
2023-09-14T20:40:46.472788
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41930
Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict the 'name' query parameter when rendering a history entry, allowing attackers to have Jenkins render a manipulated configuration history that was not created by the plugin.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233
2023-09-05T16:39:57.391Z
2023-09-06T12:08:52.399Z
2023-10-24T12:51:38.989Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Job Configuration History Plugin', 'Versions': '0'}
CVE-2023-41033
A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.260), Parasolid V35.1 (All versions < V35.1.246), Parasolid V36.0 (All versions < V36.0.156), Simcenter Femap V2301 (All versions < V2301.0003), Simcenter Femap V2306 (All versions < V2306.0001). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21266)
https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf
2023-08-22T15:41:08.130Z
2023-09-12T09:32:34.938Z
2023-11-14T11:03:43.928Z
{'Vendor': 'Siemens', 'Product': 'Parasolid V35.0', 'Versions': 'All versions < V35.0.260'}
CVE-2023-41176
Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker. Please note, this vulnerability is similar to, but not identical to, CVE-2023-41177.
https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US
2023-08-24T14:36:57.667Z
2024-01-23T20:35:25.291Z
2024-01-23T20:35:25.291Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Mobile Security for Enterprise', 'Versions': '9.8 SP5'}
CVE-2023-41658
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Photo Gallery Slideshow & Masonry Tiled Gallery plugin <= 1.0.13 versions.
https://patchstack.com/database/vulnerability/wp-responsive-photo-gallery/wordpress-photo-gallery-slideshow-masonry-tiled-gallery-plugin-1-0-13-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T13:02:41.614Z
2023-09-29T13:33:01.861Z
2023-09-29T13:33:01.861Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'Photo Gallery Slideshow & Masonry Tiled Gallery', 'Versions': 'n/a'}
CVE-2023-41064
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
https://support.apple.com/en-us/HT213914
2023-08-22T18:10:00.330Z
2023-09-07T17:30:10.904Z
2023-09-21T18:23:51.392Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41967
Sensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller's default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages. This issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.
https://security.gallagher.com/Security-Advisories/CVE-2023-41967
2023-11-01T22:24:52.305Z
2023-12-18T22:00:38.751Z
2023-12-18T22:00:38.751Z
{'Vendor': 'Gallagher', 'Product': 'Controller 6000', 'Versions': '0, 8.70'}
CVE-2023-41988
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.
https://support.apple.com/en-us/HT213984
2023-09-06T17:40:06.141Z
2023-10-25T18:32:14.376Z
2023-10-25T18:32:14.376Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41121
Array AG OS before 9.4.0.499 allows denial of service: remote attackers can cause system service processes to crash through abnormal HTTP operations.
https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Denial_of_Service_ID-144162.pdf
2023-08-23T00:00:00
2023-08-25T00:00:00
2023-08-25T21:07:33.198684
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41336
ux-autocomplete is a JavaScript Autocomplete functionality for Symfony. Under certain circumstances, an attacker could successfully submit an entity id for an `EntityType` that is *not* part of the valid choices. The problem has been fixed in `symfony/ux-autocomplete` version 2.11.2.
https://github.com/symfony/ux-autocomplete/security/advisories/GHSA-4cpv-669c-r79x
2023-08-28T16:56:43.367Z
2023-09-11T19:21:48.938Z
2023-09-11T19:21:48.938Z
{'Vendor': 'symfony', 'Product': 'ux-autocomplete', 'Versions': '< 2.11.2'}
CVE-2023-41766
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41766
2023-08-31T23:20:34.579Z
2023-10-10T17:07:26.004Z
2023-12-14T01:14:59.563Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41789
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allows an attacker to perform cookie hijacking and log in as that user without the need for credentials. This issue affects Pandora FMS: from 700 through 773.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T11:54:47.539Z
2023-11-23T14:36:55.047Z
2023-11-23T14:36:55.047Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41623
Emlog version pro2.1.14 was discovered to contain a SQL injection vulnerability via the uid parameter at /admin/media.php.
https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41623
2023-08-30T00:00:00
2023-12-12T00:00:00
2023-12-12T08:56:38.527471
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41859
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin <= 1.2 versions.
https://patchstack.com/database/vulnerability/order-delivery-date/wordpress-order-delivery-date-for-wp-e-commerce-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T10:33:46.291Z
2023-10-02T08:49:27.338Z
2023-10-02T08:49:27.338Z
{'Vendor': 'Ashok Rane', 'Product': 'Order Delivery Date for WP e-Commerce', 'Versions': 'n/a'}
CVE-2023-41731
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WordPress publish post email notification plugin <= 1.0.2.2 versions.
https://patchstack.com/database/vulnerability/publish-post-email-notification/wordpress-wordpress-publish-post-email-notification-plugin-1-0-2-2-cross-site-scripting-xss?_s_id=cve
2023-08-31T06:58:39.903Z
2023-10-02T07:43:41.950Z
2023-10-02T07:43:41.950Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'WordPress publish post email notification', 'Versions': 'n/a'}
CVE-2023-41361
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.
https://github.com/FRRouting/frr/pull/14241
2023-08-29T00:00:00
2023-08-29T00:00:00
2023-09-19T21:06:35.409649
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41048
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depending on, Plone Dexterity content. Prior to versions 5.6.1, 6.0.3, 6.1.3, and 6.2.1, there is a stored cross site scripting vulnerability for SVG images. A security hotfix from 2021 already partially fixed this by making sure SVG images are always downloaded instead of shown inline. But the same problem still exists for scales of SVG images. Note that an image tag with an SVG image as source is not vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an image, and then trick a user into following a specially crafted link. Patches are available in versions 5.6.1 (for Plone 5.2), 6.0.3 (for Plone 6.0.0-6.0.4), 6.1.3 (for Plone 6.0.5-6.0.6), and 6.2.1 (for Plone 6.0.7). There are no known workarounds.
https://github.com/plone/plone.namedfile/security/advisories/GHSA-jj7c-jrv4-c65x
2023-08-22T16:57:23.933Z
2023-09-21T14:31:07.171Z
2023-09-21T14:31:07.171Z
{'Vendor': 'plone', 'Product': 'plone.namedfile', 'Versions': '< 5.6.1, >= 6.0.0, < 6.0.3, >= 6.1.0, < 6.1.3, >= 6.2.0, < 6.2.1'}