CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-41080 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.
The vulnerability is limited to the ROOT (default) web application. | https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f | 2023-08-22T18:21:35.140Z | 2023-08-25T20:39:36.584Z | 2023-08-25T20:39:36.584Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M1, 10.1.0-M1, 9.0.0-M1, 8.5.0'} |
CVE-2023-41254 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Ventura 13.6.1, macOS Sonoma 14.1. An app may be able to access sensitive user data. | https://support.apple.com/en-us/HT213981 | 2023-09-14T19:03:36.110Z | 2023-10-25T18:32:03.673Z | 2023-10-25T18:32:03.673Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41311 | Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:09.167Z | 2023-09-26T01:22:20.306Z | 2023-09-26T01:22:20.306Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1'} |
CVE-2023-41741 | Exposure of sensitive information to an unauthorized actor vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to obtain sensitive information via unspecified vectors. | https://www.synology.com/en-global/security/advisory/Synology_SA_23_10 | 2023-08-31T07:54:07.974Z | 2023-08-31T09:08:59.017Z | 2023-08-31T09:08:59.017Z | {'Vendor': 'Synology', 'Product': 'Synology Router Manager (SRM)', 'Versions': '1.3, 0'} |
CVE-2023-41891 | FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. Prior to version 1.1.124, list endpoints on FlyteAdmin have a SQL vulnerability where a malicious user can send a REST request with custom SQL statements as list filters. The attacker needs to have access to the FlyteAdmin installation, typically either behind a VPN or authentication. Version 1.1.124 contains a patch for this issue. | https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-r847-6w6h-r8g4 | 2023-09-04T16:31:48.225Z | 2023-10-30T18:01:17.453Z | 2023-10-30T18:01:17.453Z | {'Vendor': 'flyteorg', 'Product': 'flyteadmin', 'Versions': '< 1.1.124'} |
CVE-2023-41242 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Hassan Ali Snap Pixel plugin <= 1.5.7 versions. | https://patchstack.com/database/vulnerability/snap-pixel/wordpress-snap-pixel-plugin-1-5-7-cross-site-scripting-xss?_s_id=cve | 2023-08-25T10:02:32.134Z | 2023-09-27T12:36:08.247Z | 2023-09-27T12:36:08.247Z | {'Vendor': 'Hassan Ali', 'Product': 'Snap Pixel', 'Versions': 'n/a'} |
CVE-2023-41307 | Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:09.166Z | 2023-09-26T01:16:21.629Z | 2023-09-26T01:16:21.629Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-41887 | OpenRefine is a powerful free, open source tool for working with messy data. Prior to version 3.7.5, a remote code execution vulnerability allows any unauthenticated user to execute code on the server. Version 3.7.5 has a patch for this issue. | https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5 | 2023-09-04T16:31:48.224Z | 2023-09-15T20:06:55.728Z | 2023-09-15T20:06:55.728Z | {'Vendor': 'OpenRefine', 'Product': 'OpenRefine', 'Versions': '<= 3.7.4'} |
CVE-2023-41868 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ram Ratan Maurya, Codestag StagTools plugin <= 2.3.7 versions. | https://patchstack.com/database/vulnerability/stagtools/wordpress-stagtools-plugin-2-3-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T11:35:57.268Z | 2023-09-25T18:37:31.048Z | 2023-09-25T18:37:31.048Z | {'Vendor': 'Ram Ratan Maurya, Codestag', 'Product': 'StagTools', 'Versions': 'n/a'} |
CVE-2023-41350 | Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of insufficient measures to prevent multiple failed authentication attempts. An unauthenticated remote attacker can execute a crafted Javascript to expose captcha in page, making it very easy for bots to bypass the captcha check and more susceptible to brute force attacks. | https://www.twcert.org.tw/tw/cp-132-7500-0c544-1.html | 2023-08-29T00:11:47.812Z | 2023-11-03T04:44:04.122Z | 2023-11-03T04:44:04.122Z | {'Vendor': 'Chunghwa Telecom', 'Product': 'NOKIA G-040W-Q', 'Versions': 'G040WQR201207'} |
CVE-2023-41079 | The issue was addressed with improved permissions logic. This issue is fixed in macOS Sonoma 14. An app may be able to bypass Privacy preferences. | https://support.apple.com/en-us/HT213940 | 2023-08-22T18:10:00.332Z | 2023-09-26T20:14:49.103Z | 2023-09-26T20:14:49.103Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41096 | Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)
allows potential modification or extraction of network credentials stored in flash.
This issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.
| https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000ZkKh7QAF?operationContext=S1 | 2023-08-23T04:17:16.169Z | 2023-10-26T13:10:34.406Z | 2023-10-26T13:10:42.224Z | {'Vendor': 'silabs.com', 'Product': 'Ember ZNet SDK', 'Versions': '7.3.2'} |
CVE-2023-41995 | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-09-06T17:40:06.142Z | 2023-09-26T20:14:49.645Z | 2023-09-26T20:14:49.645Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41327 | WireMock is a tool for mocking HTTP services. WireMock can be configured to only permit proxying (and therefore recording) to certain addresses. This is achieved via a list of allowed address rules and a list of denied address rules, where the allowed list is evaluated first.
Until WireMock Webhooks Extension 3.0.0-beta-15, the filtering of target addresses from the proxy mode DID NOT work for Webhooks, so the users were potentially vulnerable regardless of the `limitProxyTargets` settings. Via the WireMock webhooks configuration, POST requests from a webhook might be forwarded to an arbitrary service reachable from WireMock’s instance. For example, If someone is running the WireMock docker Container inside a private cluster, they can trigger internal POST requests against unsecured APIs or even against secure ones by passing a token, discovered using another exploit, via authentication headers. This issue has been addressed in versions 2.35.1 and 3.0.3 of wiremock. Wiremock studio has been discontinued and will not see a fix. Users unable to upgrade should use external firewall rules to define the list of permitted destinations. | https://github.com/wiremock/wiremock/security/advisories/GHSA-hq8w-9w8w-pmx7 | 2023-08-28T16:56:43.366Z | 2023-09-06T20:38:45.161Z | 2023-09-06T20:38:45.161Z | {'Vendor': 'wiremock', 'Product': 'wiremock', 'Versions': ' org.wiremock:wiremock-webhooks-extension: >= 2.0.0, < 2.35.1, org.wiremock:wiremock-webhooks-extension: >= 3.0.0, < 3.0.3, wiremock-studio: All versions'} |
CVE-2023-41262 | An issue was discovered in /fcgi/scrut_fcgi.fcgi in Plixer Scrutinizer before 19.3.1. The csvExportReport endpoint action generateCSV is vulnerable to SQL injection through the sorting parameter, allowing an unauthenticated user to execute arbitrary SQL statements in the context of the application's backend database server. | https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0001.md | 2023-08-25T00:00:00 | 2023-10-12T00:00:00 | 2023-10-12T22:07:35.638720 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41798 | Improper Neutralization of Formula Elements in a CSV File vulnerability in wpWax Directorist – WordPress Business Directory Plugin with Classified Ads Listing.This issue affects Directorist – WordPress Business Directory Plugin with Classified Ads Listings: from n/a through 7.7.1.
| https://patchstack.com/database/vulnerability/directorist/wordpress-directorist-plugin-7-7-0-csv-injection?_s_id=cve | 2023-09-01T11:55:20.628Z | 2023-11-07T17:19:25.795Z | 2023-11-07T17:19:25.795Z | {'Vendor': 'wpWax', 'Product': 'Directorist – WordPress Business Directory Plugin with Classified Ads Listings', 'Versions': 'n/a'} |
CVE-2023-41720 | A vulnerability exists on all versions of Ivanti Connect Secure below 22.6R2 where an attacker with a foothold on an Ivanti Connect Secure (ICS) appliance can escalate their privileges by exploiting a vulnerable installed application. This vulnerability allows the attacker to gain elevated execution privileges on the affected system. | https://forums.ivanti.com/s/article/Security-patch-release-Ivanti-Connect-Secure-22-6R2-and-22-6R2-1?language=en_US | 2023-08-31T01:00:11.771Z | 2023-12-14T01:56:44.839Z | 2023-12-14T01:56:44.839Z | {'Vendor': 'Ivanti', 'Product': 'Connect Secure', 'Versions': '22.6.1'} |
CVE-2023-41235 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Everest Themes Everest News Pro theme <= 1.1.7 versions. | https://patchstack.com/database/vulnerability/everest-news-pro/wordpress-everest-news-pro-theme-1-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-25T10:02:32.132Z | 2023-09-27T11:29:59.998Z | 2023-09-27T11:29:59.998Z | {'Vendor': 'Everest Themes', 'Product': 'Everest News Pro', 'Versions': 'n/a'} |
CVE-2023-41736 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Email posts to subscribers plugin <= 6.2 versions. | https://patchstack.com/database/vulnerability/email-posts-to-subscribers/wordpress-email-posts-to-subscribers-plugin-6-2-cross-site-scripting-xss?_s_id=cve | 2023-08-31T06:58:39.904Z | 2023-10-02T08:00:06.889Z | 2023-10-02T08:00:06.889Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'Email posts to subscribers', 'Versions': 'n/a'} |
CVE-2023-41366 | Under certain condition SAP NetWeaver Application Server ABAP - versions KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT, allows an unauthenticated attacker to access the unintended data due to the lack of restrictions applied which may lead to low impact in confidentiality and no impact on the integrity and availability of the application.
| https://me.sap.com/notes/3362849 | 2023-08-29T05:27:56.300Z | 2023-11-14T01:01:07.759Z | 2023-11-14T01:01:07.759Z | {'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Application Server ABAP and ABAP Platform', 'Versions': 'KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT'} |
CVE-2023-41673 | An improper authorization vulnerability [CWE-285] in Fortinet FortiADC version 7.4.0 and before 7.2.2 may allow a low privileged user to read or backup the full system configuration via HTTP or HTTPS requests. | https://fortiguard.com/psirt/FG-IR-23-270 | 2023-08-30T13:42:39.546Z | 2023-12-13T06:43:21.604Z | 2023-12-13T06:43:21.604Z | {'Vendor': 'Fortinet', 'Product': 'FortiADC', 'Versions': '7.4.0, 7.2.0, 7.1.0, 7.0.0, 6.2.0, 6.1.0, 6.0.0'} |
CVE-2023-41448 | Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the ID parameter in the index.php component. | http://ajaxnewsticker.com | 2023-08-30T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T22:50:02.751304 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41331 | SOFARPC is a Java RPC framework. Versions prior to 5.11.0 are vulnerable to remote command execution. Through a carefully
crafted payload, an attacker can achieve JNDI injection or system command execution. In the default configuration of the SOFARPC framework, a blacklist is used to filter out dangerous classes encountered during the deserialization process. However, the blacklist is not comprehensive, and an actor can exploit certain native JDK classes and common third-party packages to construct gadget chains capable of achieving JNDI injection or system command execution attacks. Version 5.11.0 contains a fix for this issue. As a workaround, users can add `-Drpc_serialize_blacklist_override=javax.sound.sampled.AudioFileFormat` to the blacklist. | https://github.com/sofastack/sofa-rpc/security/advisories/GHSA-chv2-7hxj-2j86 | 2023-08-28T16:56:43.367Z | 2023-09-12T19:57:57.437Z | 2023-09-12T19:57:57.437Z | {'Vendor': 'sofastack', 'Product': 'sofa-rpc', 'Versions': '< 5.11.0'} |
CVE-2023-41960 | The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself. | https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | 2023-10-18T09:35:22.502Z | 2023-10-25T14:12:08.722Z | 2023-10-25T14:12:08.722Z | {'Vendor': 'Rexroth', 'Product': 'ctrlX HMI Web Panel - WR21 (WR2107)', 'Versions': 'all'} |
CVE-2023-41063 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.329Z | 2023-09-26T20:14:52.612Z | 2023-09-26T20:14:52.612Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41599 | An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal. | http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/ | 2023-08-30T00:00:00 | 2023-09-19T00:00:00 | 2023-09-19T01:15:50.246782 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41126 | null | null | 2023-08-23T09:39:18.584Z | null | 2023-08-23T14:57:06.938138Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-41034 | Eclipse Leshan is a device management server and client Java implementation. In affected versions DDFFileParser` and `DefaultDDFFileValidator` (and so `ObjectLoader`) are vulnerable to `XXE Attacks`. A DDF file is a LWM2M format used to store LWM2M object description. Leshan users are impacted only if they parse untrusted DDF files (e.g. if they let external users provide their own model), in that case they MUST upgrade to fixed version. If you parse only trusted DDF file and validate only with trusted xml schema, upgrading is not mandatory. This issue has been fixed in versions 1.5.0 and 2.0.0-M13. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/eclipse-leshan/leshan/security/advisories/GHSA-wc9j-gc65-3cm7 | 2023-08-22T16:57:23.931Z | 2023-08-31T17:01:38.082Z | 2023-08-31T17:01:38.082Z | {'Vendor': 'eclipse-leshan', 'Product': 'leshan', 'Versions': '< 1.5.0, >= 2.0.0-M1, < 2.0.0-M13'} |
CVE-2023-41937 | Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165 | 2023-09-05T16:39:57.392Z | 2023-09-06T12:08:57.044Z | 2023-10-24T12:51:47.164Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Bitbucket Push and Pull Request Plugin', 'Versions': '2.4.0'} |
CVE-2023-41872 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Xtemos WoodMart plugin <= 7.2.4 versions. | https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T11:35:57.268Z | 2023-09-25T01:05:25.048Z | 2023-09-25T01:05:25.048Z | {'Vendor': 'Xtemos', 'Product': 'WoodMart', 'Versions': 'n/a'} |
CVE-2023-41171 | NetScout nGeniusONE 6.3.4 build 2298 allows a Stored Cross-Site scripting vulnerability (issue 3 of 4). | https://www.netscout.com/securityadvisories | 2023-08-24T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T17:33:19.378475 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41537 | phpjabbers Business Directory Script 3.2 is vulnerable to Cross Site Scripting (XSS) via the keyword parameter. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Business-Directory-Script-Version%3A3.2 | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T13:14:56.947438 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41167 | @webiny/react-rich-text-renderer before 5.37.2 allows XSS attacks by content managers. This is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. Webiny is an open-source serverless enterprise CMS. The @webiny/react-rich-text-renderer package depends on the editor.js rich text editor to handle rich text content. The CMS stores rich text content from the editor.js into the database. When the @webiny/react-rich-text-renderer is used to render such content, it uses the dangerouslySetInnerHTML prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads. | https://webiny.com | 2023-08-24T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T13:43:24.851992 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41075 | A type confusion issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.7.5, macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213670 | 2023-08-22T18:10:00.332Z | 2024-01-10T22:03:36.440Z | 2024-01-10T22:03:36.440Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41425 | Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component. | http://wondercms.com | 2023-08-30T00:00:00 | 2023-11-07T00:00:00 | 2023-11-07T15:25:17.212597 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41976 | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213981 | 2023-09-06T17:40:06.139Z | 2023-10-25T18:32:08.499Z | 2023-10-25T18:32:08.499Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41999 | An authentication bypass exists in Arcserve UDP prior to version 9.2. An unauthenticated, remote attacker can obtain a valid authentication identifier that allows them to authenticate to the management console and perform tasks that require authentication. | https://www.tenable.com/security/research/tra-2023-37 | 2023-09-06T18:06:47.116Z | 2023-11-27T16:54:15.422Z | 2024-01-10T22:50:23.922Z | {'Vendor': 'Arcserve', 'Product': 'Arcserve UDP', 'Versions': '0'} |
CVE-2023-41560 | Tenda AC9 V3.0 V15.03.06.42_multi was discovered to contain a stack overflow via parameter firewallEn at url /goform/SetFirewallCfg. | https://github.com/peris-navince/founded-0-days/blob/main/formSetFirewallCfg/1.md | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T12:34:58.440964 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41992 | The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, macOS Ventura 13.6. A local attacker may be able to elevate their privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. | https://support.apple.com/en-us/HT213932 | 2023-09-06T17:40:06.142Z | 2023-09-21T18:23:49.779Z | 2024-01-10T22:03:38.115Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41838 | An improper neutralization of special elements used in an os command ('os command injection') in FortiManager 7.4.0 and 7.2.0 through 7.2.3 may allow attacker to execute unauthorized code or commands via FortiManager cli. | https://fortiguard.com/psirt/FG-IR-23-169 | 2023-09-04T08:12:52.814Z | 2023-10-10T16:49:27.173Z | 2023-10-10T16:49:27.173Z | {'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.4.0, 7.2.0, 7.0.0, 6.4.0, 6.2.0'} |
CVE-2023-41642 | Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter. | https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md | 2023-08-30T00:00:00 | 2023-08-31T00:00:00 | 2023-09-06T21:52:38.306856 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41357 | Galaxy Software Services Corporation Vitals ESP is an online knowledge base management portal, it has insufficient filtering and validation during file upload. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload and execute scripts onto arbitrary directories to perform arbitrary system operations or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7508-6d1ef-1.html | 2023-08-29T00:14:47.636Z | 2023-11-03T06:09:18.072Z | 2023-11-03T06:09:18.072Z | {'Vendor': 'Galaxy Software Services', 'Product': 'Vitals ESP ', 'Versions': '6.1 and prior'} |
CVE-2023-41880 | Wasmtime is a standalone runtime for WebAssembly. Wasmtime versions from 10.0.0 to versions 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the WebAssembly `i64x2.shr_s` instruction on x86_64 platforms when the shift amount is a constant value that is larger than 32. Only x86_64 is affected so all other targets are not affected by this. The miscompilation results in the instruction producing an incorrect result, namely the low 32-bits of the second lane of the vector are derived from the low 32-bits of the second lane of the input vector instead of the high 32-bits. The primary impact of this issue is that any WebAssembly program using the `i64x2.shr_s` with a constant shift amount larger than 32 may produce an incorrect result.
This issue is not an escape from the WebAssembly sandbox. Execution of WebAssembly guest programs will still behave correctly with respect to memory sandboxing and isolation from the host. Wasmtime considers non-spec-compliant behavior as a security issue nonetheless.
This issue was discovered through fuzzing of Wasmtime's code generator Cranelift.
Wasmtime versions 10.0.2, 11.0.2, and 12.0.2 are all patched to no longer have this miscompilation. This issue only affects x86_64 hosts and the only workaround is to either scan for this pattern in wasm modules which is nontrivial or to disable the SIMD proposal for WebAssembly. Users prior to 10.0.0 are unaffected by this vulnerability. | https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-gw5p-q8mj-p7gh | 2023-09-04T16:31:48.223Z | 2023-09-15T19:43:41.850Z | 2023-09-15T19:43:41.850Z | {'Vendor': 'bytecodealliance', 'Product': 'wasmtime', 'Versions': '>= 10.0.0, < 10.0.2, >= 11.0.0, < 11.0.2, >= 12.0.0, < 12.0.2'} |
CVE-2023-41029 | Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint. | https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-command-injection-vulnerability/ | 2023-08-22T14:09:29.146Z | 2023-09-22T16:07:12.826Z | 2023-09-22T16:07:12.826Z | {'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.2'} |
CVE-2023-41615 | Zoo Management System v1.0 was discovered to contain multiple SQL injection vulnerabilities in the Admin sign-in page via the username and password fields. | https://portswigger.net/web-security/sql-injection | 2023-08-30T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T02:37:24.506626 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41750 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047. | https://security-advisory.acronis.com/advisories/SEC-5382 | 2023-08-31T14:10:27.638Z | 2023-08-31T20:18:09.205Z | 2023-08-31T20:18:09.205Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-41300 | Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:07.354Z | 2023-09-25T12:03:58.711Z | 2023-09-25T12:03:58.711Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1, 2.0.0'} |
CVE-2023-41896 | Home assistant is an open source home automation. Whilst auditing the frontend code to identify hidden parameters, Cure53 detected `auth_callback=1`, which is leveraged by the WebSocket authentication logic in tandem with the `state` parameter. The state parameter contains the `hassUrl`, which is subsequently utilized to establish a WebSocket connection. This behavior permits an attacker to create a malicious Home Assistant link with a modified state parameter that forces the frontend to connect to an alternative WebSocket backend. Henceforth, the attacker can spoof any WebSocket responses and trigger cross site scripting (XSS). Since the XSS is executed on the actual Home Assistant frontend domain, it can connect to the real Home Assistant backend, which essentially represents a comprehensive takeover scenario. Permitting the site to be iframed by other origins, as discussed in GHSA-935v-rmg9-44mw, renders this exploit substantially covert since a malicious website can obfuscate the compromise strategy in the background. However, even without this, the attacker can still send the `auth_callback` link directly to the victim user. To mitigate this issue, Cure53 advises modifying the WebSocket code’s authentication flow. An optimal implementation in this regard would not trust the `hassUrl` passed in by a GET parameter. Cure53 must stipulate the significant time required of the Cure53 consultants to identify an XSS vector, despite holding full control over the WebSocket responses. In many areas, data from the WebSocket was properly sanitized, which hinders post-exploitation. The audit team eventually detected the `js_url` for custom panels, though generally, the frontend exhibited reasonable security hardening. This issue has been addressed in Home Assistant Core version 2023.8.0 and in the npm package home-assistant-js-websocket in version 8.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/home-assistant/core/security/advisories/GHSA-cr83-q7r2-7f5q | 2023-09-04T16:31:48.225Z | 2023-10-19T22:30:49.623Z | 2023-10-19T22:30:49.623Z | {'Vendor': 'home-assistant', 'Product': 'core', 'Versions': 'Home Assistant Core : < 2023.8.0, home-assistant-js-websocket: < 8.2.0'} |
CVE-2023-41879 | Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1. | https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp | 2023-09-04T16:31:48.223Z | 2023-09-11T21:14:28.597Z | 2023-09-11T21:14:28.597Z | {'Vendor': 'OpenMage', 'Product': 'magento-lts', 'Versions': '<= 19.5.0, >= 20.0.0, <= 20.1.0'} |
CVE-2023-41253 |
When on BIG-IP DNS or BIG-IP LTM enabled with DNS Services License, and a TSIG key is created, it is logged in plaintext in the audit log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | https://my.f5.com/manage/s/article/K98334513 | 2023-10-05T19:17:25.749Z | 2023-10-10T12:33:22.712Z | 2023-10-10T12:33:22.712Z | {'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'} |
CVE-2023-41603 | D-Link R15 before v1.08.02 was discovered to contain no firewall restrictions for IPv6 traffic. This allows attackers to arbitrarily access any services running on the device that may be inadvertently listening via IPv6. | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10347 | 2023-08-30T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T08:08:08.117947 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41316 | Tolgee is an open-source localization platform. Due to lack of validation field - Org Name, bad actor can send emails with HTML injected code to the victims. Registered users can inject HTML into unsanitized emails from the Tolgee instance to other users. This unsanitized HTML ends up in invitation emails which appear as legitimate org invitations. Bad actors may direct users to malicious website or execute javascript in the context of the users browser. This vulnerability has been addressed in version 3.29.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg | 2023-08-28T16:56:43.365Z | 2023-09-07T19:39:07.916Z | 2023-09-07T19:39:07.916Z | {'Vendor': 'tolgee', 'Product': 'tolgee-platform', 'Versions': '< 3.29.2'} |
CVE-2023-41746 | Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. | https://security-advisory.acronis.com/advisories/SEC-5810 | 2023-08-31T14:10:27.638Z | 2023-08-31T17:53:48.838Z | 2023-08-31T17:53:48.838Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cloud Manager', 'Versions': 'unspecified'} |
CVE-2023-41068 | An access issue was addressed with improved access restrictions. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7. A user may be able to elevate privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.330Z | 2023-09-26T20:14:55.664Z | 2023-09-26T20:14:55.664Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41592 | Froala Editor v4.0.1 to v4.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability. | https://owasp.org/Top10/A03_2021-Injection/ | 2023-08-30T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T22:02:04.846404 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41984 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-09-06T17:40:06.141Z | 2023-09-26T20:14:56.129Z | 2023-09-26T20:14:56.129Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41654 | Cross-Site Request Forgery (CSRF) vulnerability in Andreas Heigl authLdap plugin <= 2.5.8 versions. | https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:02:20.619Z | 2023-10-06T14:36:19.318Z | 2023-10-06T14:36:19.318Z | {'Vendor': 'Andreas Heigl', 'Product': 'authLdap', 'Versions': 'n/a'} |
CVE-2023-41711 | SonicOS post-authentication Stack-Based Buffer Overflow Vulnerability in the sonicwall.exp, prefs.exp URL endpoints lead to a firewall crash. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 | 2023-08-30T17:07:28.451Z | 2023-10-17T22:20:36.619Z | 2023-10-17T22:20:36.619Z | {'Vendor': 'SonicWall', 'Product': 'SonicOS', 'Versions': '7.0.1-5119 and earlier versions, 7.0.1-5129 and earlier versions, 6.5.4.4-44v-21-2079 and earlier versions, 6.5.4.12-101n and earlier versions'} |
CVE-2023-41156 | A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T20:46:17.664013 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41855 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Regpacks Regpack plugin <= 0.1 versions. | https://patchstack.com/database/vulnerability/regpack/wordpress-regpack-plugin-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T09:47:21.583Z | 2023-10-02T08:39:20.621Z | 2023-10-02T08:39:20.621Z | {'Vendor': 'Regpacks', 'Product': 'Regpack', 'Versions': 'n/a'} |
CVE-2023-41910 | An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c. | https://github.com/lldpd/lldpd/releases/tag/1.0.17 | 2023-09-05T00:00:00 | 2023-09-05T00:00:00 | 2023-09-26T11:06:15.466504 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41013 | Cross Site Scripting (XSS) in Webmail Calendar in IceWarp 10.3.1 allows remote attackers to inject arbitrary web script or HTML via the "p4" field. | http://icewrap.com | 2023-08-22T00:00:00 | 2023-09-12T00:00:00 | 2023-09-12T11:57:45.388377 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41443 | SQL injection vulnerability in Novel-Plus v.4.1.0 allows a remote attacker to execute arbitrary code via a crafted script to the sort parameter in /sys/menu/list. | https://github.com/Deng-JunFeng/cve-lists/tree/main/novel-plus/vuln | 2023-08-30T00:00:00 | 2023-09-18T00:00:00 | 2023-09-18T21:28:08.304646 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41101 | An issue was discovered in the captive portal in OpenNDS before version 10.1.3. get_query in http_microhttpd.c does not validate the length of the query string of GET requests. This leads to a stack-based buffer overflow in versions 9.x and earlier, and to a heap-based buffer overflow in versions 10.x and later. Attackers may exploit the issue to crash OpenNDS (Denial-of-Service condition) or to inject and execute arbitrary bytecode (Remote Code Execution). | https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | 2023-08-23T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T05:31:27.183695 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41044 | Graylog is a free and open log management platform. A partial path traversal vulnerability exists in Graylog's `Support Bundle` feature. The vulnerability is caused by incorrect user input validation in an HTTP API resource. Graylog's Support Bundle feature allows an attacker with valid Admin role credentials to download or delete files in sibling directories of the support bundle directory. The default `data_dir` in operating system packages (DEB, RPM) is set to `/var/lib/graylog-server`. The data directory for the Support Bundle feature is always `<data_dir>/support-bundle`. Due to the partial path traversal vulnerability, an attacker with valid Admin role credentials can read or delete files in directories that start with a `/var/lib/graylog-server/support-bundle` directory name. The vulnerability would allow the download or deletion of files in the following example directories: `/var/lib/graylog-server/support-bundle-test` and `/var/lib/graylog-server/support-bundlesdirectory`. For the Graylog Docker images, the `data_dir` is set to `/usr/share/graylog/data` by default. This vulnerability is fixed in Graylog version 5.1.3 and later. Users are advised to upgrade. Users unable to upgrade should block all HTTP requests to the following HTTP API endpoints by using a reverse proxy server in front of Graylog. `GET /api/system/debug/support/bundle/download/{filename}` and `DELETE /api/system/debug/support/bundle/{filename}`.
| https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-2q4p-f6gf-mqr5 | 2023-08-22T16:57:23.932Z | 2023-08-31T17:10:08.323Z | 2023-08-31T17:10:08.323Z | {'Vendor': 'Graylog2', 'Product': 'graylog2-server', 'Versions': '>= 5.1.0, < 5.1.3'} |
CVE-2023-41947 | A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082 | 2023-09-05T16:39:57.395Z | 2023-09-06T12:09:03.587Z | 2023-10-24T12:51:58.793Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Frugal Testing Plugin', 'Versions': '0'} |
CVE-2023-41697 | Cross-Site Request Forgery (CSRF) vulnerability in Nikunj Soni Easy WP Cleaner plugin <= 1.9 versions. | https://patchstack.com/database/vulnerability/easy-wp-cleaner/wordpress-easy-wp-cleaner-plugin-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T15:05:59.971Z | 2023-10-10T07:39:29.394Z | 2023-10-10T07:39:29.394Z | {'Vendor': 'Nikunj Soni', 'Product': 'Easy WP Cleaner', 'Versions': 'n/a'} |
CVE-2023-41678 | A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3, 1.1.0 through 1.1.1 allows attacker to execute unauthorized code or commands via specifically crafted request. | https://fortiguard.com/psirt/FG-IR-23-196 | 2023-08-30T13:42:39.547Z | 2023-12-13T06:44:44.233Z | 2023-12-13T06:44:44.233Z | {'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.0.0'} |
CVE-2023-41117 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contain packages, standalone packages, and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks. | https://www.enterprisedb.com/docs/security/advisories/cve202341117/ | 2023-08-23T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T07:05:12.231483 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41814 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Through an HTML payload (iframe tag) it is possible to carry out XSS attacks when the user receiving the messages opens their notifications. This issue affects Pandora FMS: from 700 through 774. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T12:10:03.869Z | 2023-12-29T11:45:23.493Z | 2023-12-29T11:45:23.493Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41052 | Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation of the arguments of the builtin functions `uint256_addmod`, `uint256_mulmod`, `ecadd` and `ecmul` does not follow source order. This behaviour is problematic when the evaluation of one of the arguments produces side effects that other arguments depend on. A patch is currently being developed on pull request #3583. When using builtins from the list above, users should make sure that the arguments of the expression do not produce side effects or, if one does, that no other argument is dependent on those side effects. | https://github.com/vyperlang/vyper/security/advisories/GHSA-4hg4-9mf5-wxxq | 2023-08-22T16:57:23.933Z | 2023-09-04T17:36:23.480Z | 2023-09-04T17:36:23.480Z | {'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '<= 0.3.9'} |
CVE-2023-41681 | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | https://fortiguard.com/psirt/FG-IR-23-311 | 2023-08-30T13:42:39.547Z | 2023-10-13T14:51:08.259Z | 2023-10-13T14:51:08.259Z | {'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.0, 2.5.0, 2.4.1'} |
CVE-2023-41843 | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | https://fortiguard.com/psirt/FG-IR-23-273 | 2023-09-04T08:12:52.815Z | 2023-10-13T14:51:17.295Z | 2023-10-13T14:51:17.295Z | {'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.0, 2.5.0, 2.4.1'} |
CVE-2023-41140 | A maliciously crafted PRT file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause a Heap-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018 | 2023-08-23T17:55:48.800Z | 2023-11-23T03:56:11.372Z | 2023-11-23T03:56:11.372Z | {'Vendor': 'Autodesk', 'Product': 'AutoCAD, Advance Steel and Civil 3D', 'Versions': '2024, 2023'} |
CVE-2023-41005 | An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php | https://github.com/pagekit/pagekit/issues/977 | 2023-08-22T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T21:09:40.218719 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41269 | null | null | 2023-08-28T08:40:10.108Z | null | 2023-08-30T01:14:24.416809Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-41072 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data. | https://support.apple.com/en-us/HT213984 | 2023-08-22T18:10:00.331Z | 2023-10-25T18:32:13.127Z | 2023-10-25T18:32:13.127Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41588 | A cross-site scripting (XSS) vulnerability in Time to SLA plugin v10.13.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the durationFormat parameter. | https://github.com/xsn1210/poc2/blob/main/xss%5BTime%20to%20SLA%5D.md | 2023-08-30T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T19:33:44.753441 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41137 | Symmetric encryption used to protect messages between the AppsAnywhere server and client can be broken by reverse engineering the client and used to impersonate the AppsAnywhere server. | https://docs.appsanywhere.com/appsanywhere/3.1/2023-11-security-advisory | 2023-08-23T16:10:33.947Z | 2023-11-09T15:07:51.211Z | 2023-11-09T15:07:51.211Z | {'Vendor': 'AppsAnywhere', 'Product': 'AppsAnywhere Client', 'Versions': '1.4.0, 1.4.1, 1.5.1, 1.5.2, 1.6.0, 2.0.0, 1.6.1, 2.0.1, 2.2.0'} |
CVE-2023-41834 | Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Flink Stateful Functions 3.1.0, 3.1.1 and 3.2.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted HTTP requests. Attackers could potentially inject malicious content into the HTTP response that is sent to the user's browser.
Users should upgrade to Apache Flink Stateful Functions version 3.3.0. | https://lists.apache.org/thread/cvxcsdyjqc3lysj1tz7s06zwm36zvwrm | 2023-09-01T20:38:56.287Z | 2023-09-19T12:34:16.970Z | 2023-09-19T12:34:16.970Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Flink Stateful Functions', 'Versions': '3.1.0'} |
CVE-2023-41249 | In JetBrains TeamCity before 2023.05.3 reflected XSS was possible during copying Build Step | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-08-25T12:52:16.244Z | 2023-08-25T12:58:23.451Z | 2023-08-25T12:58:23.451Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-41619 | Emlog Pro v2.1.14 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /admin/article.php?action=write. | https://github.com/emlog/emlog | 2023-08-30T00:00:00 | 2024-01-16T00:00:00 | 2024-01-16T01:05:45.159892 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41863 | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Pepro Dev. Group PeproDev CF7 Database plugin <= 1.7.0 versions. | https://patchstack.com/database/vulnerability/pepro-cf7-database/wordpress-peprodev-cf7-database-plugin-1-7-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T10:33:46.291Z | 2023-09-25T18:46:18.509Z | 2023-09-25T18:46:18.509Z | {'Vendor': 'Pepro Dev. Group', 'Product': 'PeproDev CF7 Database', 'Versions': 'n/a'} |
CVE-2023-41160 | A Stored Cross-Site Scripting (XSS) vulnerability in the SSH configuration tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the key name field while adding an authorized key. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T20:40:46.472788 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41930 | Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict the 'name' query parameter when rendering a history entry, allowing attackers to have Jenkins render a manipulated configuration history that was not created by the plugin. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233 | 2023-09-05T16:39:57.391Z | 2023-09-06T12:08:52.399Z | 2023-10-24T12:51:38.989Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Job Configuration History Plugin', 'Versions': '0'} |
CVE-2023-41033 | A vulnerability has been identified in Parasolid V35.0 (All versions < V35.0.260), Parasolid V35.1 (All versions < V35.1.246), Parasolid V36.0 (All versions < V36.0.156), Simcenter Femap V2301 (All versions < V2301.0003), Simcenter Femap V2306 (All versions < V2306.0001). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21266) | https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf | 2023-08-22T15:41:08.130Z | 2023-09-12T09:32:34.938Z | 2023-11-14T11:03:43.928Z | {'Vendor': 'Siemens', 'Product': 'Parasolid V35.0', 'Versions': 'All versions < V35.0.260'} |
CVE-2023-41176 | Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker.
Please note, this vulnerability is similar to, but not identical to, CVE-2023-41177. | https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US | 2023-08-24T14:36:57.667Z | 2024-01-23T20:35:25.291Z | 2024-01-23T20:35:25.291Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Mobile Security for Enterprise', 'Versions': '9.8 SP5'} |
CVE-2023-41658 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Photo Gallery Slideshow & Masonry Tiled Gallery plugin <= 1.0.13 versions. | https://patchstack.com/database/vulnerability/wp-responsive-photo-gallery/wordpress-photo-gallery-slideshow-masonry-tiled-gallery-plugin-1-0-13-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T13:02:41.614Z | 2023-09-29T13:33:01.861Z | 2023-09-29T13:33:01.861Z | {'Vendor': 'I Thirteen Web Solution', 'Product': 'Photo Gallery Slideshow & Masonry Tiled Gallery', 'Versions': 'n/a'} |
CVE-2023-41064 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. | https://support.apple.com/en-us/HT213914 | 2023-08-22T18:10:00.330Z | 2023-09-07T17:30:10.904Z | 2023-09-21T18:23:51.392Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41967 |
Sensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller's default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages.
This issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.
| https://security.gallagher.com/Security-Advisories/CVE-2023-41967 | 2023-11-01T22:24:52.305Z | 2023-12-18T22:00:38.751Z | 2023-12-18T22:00:38.751Z | {'Vendor': 'Gallagher', 'Product': 'Controller 6000', 'Versions': '0, 8.70'} |
CVE-2023-41988 | This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data. | https://support.apple.com/en-us/HT213984 | 2023-09-06T17:40:06.141Z | 2023-10-25T18:32:14.376Z | 2023-10-25T18:32:14.376Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41121 | Array AG OS before 9.4.0.499 allows denial of service: remote attackers can cause system service processes to crash through abnormal HTTP operations. | https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Denial_of_Service_ID-144162.pdf | 2023-08-23T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T21:07:33.198684 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41336 | ux-autocomplete is a JavaScript Autocomplete functionality for Symfony. Under certain circumstances, an attacker could successfully submit an entity id for an `EntityType` that is *not* part of the valid choices. The problem has been fixed in `symfony/ux-autocomplete` version 2.11.2. | https://github.com/symfony/ux-autocomplete/security/advisories/GHSA-4cpv-669c-r79x | 2023-08-28T16:56:43.367Z | 2023-09-11T19:21:48.938Z | 2023-09-11T19:21:48.938Z | {'Vendor': 'symfony', 'Product': 'ux-autocomplete', 'Versions': '< 2.11.2'} |
CVE-2023-41766 | Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41766 | 2023-08-31T23:20:34.579Z | 2023-10-10T17:07:26.004Z | 2023-12-14T01:14:59.563Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41789 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allows an attacker to perform cookie hijacking and log in as that user without the need for credentials. This issue affects Pandora FMS: from 700 through 773. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T11:54:47.539Z | 2023-11-23T14:36:55.047Z | 2023-11-23T14:36:55.047Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41623 | Emlog version pro2.1.14 was discovered to contain a SQL injection vulnerability via the uid parameter at /admin/media.php. | https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41623 | 2023-08-30T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T08:56:38.527471 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41859 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin <= 1.2 versions. | https://patchstack.com/database/vulnerability/order-delivery-date/wordpress-order-delivery-date-for-wp-e-commerce-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T10:33:46.291Z | 2023-10-02T08:49:27.338Z | 2023-10-02T08:49:27.338Z | {'Vendor': 'Ashok Rane', 'Product': 'Order Delivery Date for WP e-Commerce', 'Versions': 'n/a'} |
CVE-2023-41731 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WordPress publish post email notification plugin <= 1.0.2.2 versions. | https://patchstack.com/database/vulnerability/publish-post-email-notification/wordpress-wordpress-publish-post-email-notification-plugin-1-0-2-2-cross-site-scripting-xss?_s_id=cve | 2023-08-31T06:58:39.903Z | 2023-10-02T07:43:41.950Z | 2023-10-02T07:43:41.950Z | {'Vendor': 'I Thirteen Web Solution', 'Product': 'WordPress publish post email notification', 'Versions': 'n/a'} |
CVE-2023-41361 | An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version. | https://github.com/FRRouting/frr/pull/14241 | 2023-08-29T00:00:00 | 2023-08-29T00:00:00 | 2023-09-19T21:06:35.409649 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41048 | plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depending on, Plone Dexterity content. Prior to versions 5.6.1, 6.0.3, 6.1.3, and 6.2.1, there is a stored cross site scripting vulnerability for SVG images. A security hotfix from 2021 already partially fixed this by making sure SVG images are always downloaded instead of shown inline. But the same problem still exists for scales of SVG images. Note that an image tag with an SVG image as source is not vulnerable, even when the SVG image contains malicious code. To exploit the vulnerability, an attacker would first need to upload an image, and then trick a user into following a specially crafted link. Patches are available in versions 5.6.1 (for Plone 5.2), 6.0.3 (for Plone 6.0.0-6.0.4), 6.1.3 (for Plone 6.0.5-6.0.6), and 6.2.1 (for Plone 6.0.7). There are no known workarounds. | https://github.com/plone/plone.namedfile/security/advisories/GHSA-jj7c-jrv4-c65x | 2023-08-22T16:57:23.933Z | 2023-09-21T14:31:07.171Z | 2023-09-21T14:31:07.171Z | {'Vendor': 'plone', 'Product': 'plone.namedfile', 'Versions': '< 5.6.1, >= 6.0.0, < 6.0.3, >= 6.1.0, < 6.1.3, >= 6.2.0, < 6.2.1'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.