CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-41377 | null | null | 2023-08-29T00:00:00 | null | 2023-11-01T14:01:55.734057 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-41727 | An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution. | https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt | 2023-08-31T01:00:11.771Z | 2023-12-19T15:43:26.326Z | 2023-12-19T15:43:26.326Z | {'Vendor': 'Ivanti', 'Product': 'Wavelink', 'Versions': '6.4.1'} |
CVE-2023-41232 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.7, iOS 17 and iPadOS 17, macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. An app may be able to disclose kernel memory. | https://support.apple.com/en-us/HT213938 | 2023-09-14T19:03:36.068Z | 2023-09-26T20:14:58.142Z | 2023-09-26T20:14:58.142Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41662 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions. | https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T13:02:41.615Z | 2023-09-29T13:39:29.119Z | 2023-09-29T13:39:29.119Z | {'Vendor': 'Ulf Benjaminsson', 'Product': 'WP-dTree', 'Versions': 'n/a'} |
CVE-2023-41770 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41770 | 2023-08-31T23:34:18.566Z | 2023-10-10T17:07:28.094Z | 2023-12-14T01:15:01.814Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41320 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. | https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476 | 2023-08-28T16:56:43.365Z | 2023-09-26T21:15:39.479Z | 2023-09-26T21:15:39.479Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 10.0.0, < 10.0.10'} |
CVE-2023-41635 | A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file. | https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md | 2023-08-30T00:00:00 | 2023-08-31T00:00:00 | 2023-09-11T21:17:16.140994 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41265 | An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. | https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes | 2023-08-25T00:00:00 | 2023-08-29T00:00:00 | 2023-08-29T22:34:49.015293 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41009 | File Upload vulnerability in adlered bolo-solo v.2.6 allows a remote attacker to execute arbitrary code via a crafted script to the authorization field in the header. | http://adlered.com | 2023-08-22T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T19:47:53.947634 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41771 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41771 | 2023-08-31T23:36:28.964Z | 2023-10-10T17:07:28.615Z | 2023-12-14T01:15:02.360Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41321 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. | https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836 | 2023-08-28T16:56:43.365Z | 2023-09-26T21:16:31.589Z | 2023-09-26T21:16:31.589Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.1.1, < 10.0.10'} |
CVE-2023-41264 | Netwrix Usercube before 6.0.215, in certain misconfigured on-premises installations, allows authentication bypass on deployment endpoints, leading to privilege escalation. This only occurs if the configuration omits the required restSettings.AuthorizedClientId and restSettings.AuthorizedSecret fields (for the POST /api/Deployment/ExportConfiguration and POST /api/Deployment endpoints). | https://www.netwrix.com/identity_governance_and_administration_solution.html | 2023-08-25T00:00:00 | 2023-11-28T00:00:00 | 2023-11-28T17:07:19.717247 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41376 | Nokia Service Router Operating System (SR OS) 22.10 and SR Linux, when error-handling update-fault-tolerance is not enabled, mishandle BGP path attributes. | https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling | 2023-08-29T00:00:00 | 2023-08-29T00:00:00 | 2023-08-29T15:55:07.855280 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41726 | Ivanti Avalanche Incorrect Default Permissions allows Local Privilege Escalation Vulnerability | https://download.wavelink.com/Files/avalanche_v6.4.1.236_release_notes.txt | 2023-08-31T01:00:11.771Z | 2023-11-03T18:13:19.997Z | 2023-11-03T18:13:19.997Z | {'Vendor': 'Ivanti', 'Product': 'Avalanche', 'Versions': '6.4.1.236'} |
CVE-2023-41233 | Cross-site scripting vulnerability in Item List page registration process of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script. | https://www.welcart.com/archives/20106.html | 2023-09-20T04:37:54.930Z | 2023-09-26T08:15:39.579Z | 2023-09-26T08:15:39.579Z | {'Vendor': 'Collne Inc.', 'Product': 'Welcart e-Commerce', 'Versions': 'versions 2.7 to 2.8.21'} |
CVE-2023-41663 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Giovambattista Fazioli WP Bannerize Pro plugin <= 1.6.9 versions. | https://patchstack.com/database/vulnerability/wp-bannerize-pro/wordpress-wp-bannerize-pro-plugin-1-6-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T13:02:41.615Z | 2023-09-29T13:43:35.721Z | 2023-09-29T13:43:35.721Z | {'Vendor': 'Giovambattista Fazioli', 'Product': 'WP Bannerize Pro', 'Versions': 'n/a'} |
CVE-2023-41049 | @dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function. | https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x | 2023-08-22T16:57:23.933Z | 2023-09-01T19:35:09.224Z | 2023-09-01T19:35:09.224Z | {'Vendor': 'decentraland', 'Product': 'single-sign-on-client', 'Versions': '< 0.1.0'} |
CVE-2023-41419 | An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component. | https://github.com/gevent/gevent/issues/1989 | 2023-08-30T00:00:00 | 2023-09-25T00:00:00 | 2023-10-16T23:28:19.734233 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41730 | Cross-Site Request Forgery (CSRF) vulnerability in SendPress Newsletters plugin <= 1.22.3.31 versions. | https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-cross-site-request-forgery-csrf?_s_id=cve | 2023-08-31T06:58:39.903Z | 2023-10-10T07:47:10.885Z | 2023-10-10T07:47:10.885Z | {'Vendor': 'SendPress', 'Product': 'SendPress Newsletters', 'Versions': 'n/a'} |
CVE-2023-41360 | An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation. | https://github.com/FRRouting/frr/pull/14245 | 2023-08-29T00:00:00 | 2023-08-29T00:00:00 | 2023-11-15T05:07:03.956892 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41675 | A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection. | https://fortiguard.com/psirt/FG-IR-23-184 | 2023-08-30T13:42:39.547Z | 2023-10-10T16:49:55.789Z | 2023-10-10T16:49:55.789Z | {'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.2.0, 7.0.0'} |
CVE-2023-41858 | Cross-Site Request Forgery (CSRF) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin <= 1.2 versions. | https://patchstack.com/database/vulnerability/order-delivery-date/wordpress-order-delivery-date-for-wp-e-commerce-plugin-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-04T10:33:46.291Z | 2023-10-10T08:50:47.217Z | 2023-10-10T08:50:47.217Z | {'Vendor': 'Ashok Rane', 'Product': 'Order Delivery Date for WP e-Commerce', 'Versions': 'n/a'} |
CVE-2023-41337 | h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. In version 2.3.0-beta2 and prior, when h2o is configured to listen to multiple addresses or ports with each of them using different backend servers managed by multiple entities, a malicious backend entity that also has the opportunity to observe or inject packets exchanged between the client and h2o may misdirect HTTPS requests going to other backends and observe the contents of that HTTPS request being sent.
The attack involves a victim client trying to resume a TLS connection and an attacker redirecting the packets to a different address or port than that intended by the client. The attacker must already have been configured by the administrator of h2o to act as a backend to one of the addresses or ports that the h2o instance listens to. Session IDs and tickets generated by h2o are not bound to information specific to the server address, port, or the X.509 certificate, and therefore it is possible for an attacker to force the victim connection to wrongfully resume against a different server address or port on which the same h2o instance is listening.
Once a TLS session is misdirected to resume to a server address / port that is configured to use an attacker-controlled server as the backend, depending on the configuration, HTTPS requests from the victim client may be forwarded to the attacker's server.
An H2O instance is vulnerable to this attack only if the instance is configured to listen to different addresses or ports using the listen directive at the host level and the instance is configured to connect to backend servers managed by multiple entities.
A patch is available at commit 35760540337a47e5150da0f4a66a609fad2ef0ab. As a workaround, one may stop using using host-level listen directives in favor of global-level ones. | https://github.com/h2o/h2o/security/advisories/GHSA-5v5r-rghf-rm6q | 2023-08-28T16:56:43.367Z | 2023-12-12T19:42:35.210Z | 2023-12-12T19:42:35.210Z | {'Vendor': 'h2o', 'Product': 'h2o', 'Versions': '<= 2.3.0-beta2'} |
CVE-2023-41767 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41767 | 2023-08-31T23:30:45.393Z | 2023-10-10T17:07:26.508Z | 2023-12-14T01:15:00.194Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41788 | Unrestricted Upload of File with Dangerous Type vulnerability in Pandora FMS on all allows Accessing Functionality Not Properly Constrained by ACLs. This vulnerability allows attackers to execute code via PHP file uploads. This issue affects Pandora FMS: from 700 through 773. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T11:54:47.538Z | 2023-11-23T14:33:44.933Z | 2023-11-23T14:33:44.933Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41065 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to read sensitive location information. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.330Z | 2023-09-26T20:14:59.637Z | 2023-09-26T20:14:59.637Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41966 |
The application suffers from a privilege escalation vulnerability. A
user with read permissions can elevate privileges by sending a HTTP POST
to set a parameter.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 | 2023-10-25T15:23:55.519Z | 2023-10-26T16:21:56.412Z | 2023-10-26T16:21:56.412Z | {'Vendor': 'Sielco', 'Product': 'Analog FM transmitter', 'Versions': '2.12 (EXC5000GX), 2.12 (EXC120GX), 2.11 (EXC300GX), 2.10 (EXC1600GX), 2.10 (EXC2000GX), 2.08 (EXC1600GX), 2.08 (EXC1000GX), 2.07 (EXC3000GX), 2.06 (EXC5000GX), 1.7.7 (EXC30GT), 1.7.4 (EXC300GT), 1.7.4 (EXC100GT), 1.7.4 (EXC5000GT), 1.6.3 (EXC1000GT), 1.5.4 (EXC120GT)'} |
CVE-2023-41989 | The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1. An attacker may be able to execute arbitrary code as root from the Lock Screen. | https://support.apple.com/en-us/HT213984 | 2023-09-06T17:40:06.141Z | 2023-10-25T18:32:17.820Z | 2023-10-25T18:32:17.820Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41570 | MikroTik RouterOS v7.1 to 7.11 was discovered to contain incorrect access control mechanisms in place for the Rest API. | https://www.enricobassetti.it/2023/11/cve-2023-41570-access-control-vulnerability-in-mikrotik-rest-api/ | 2023-08-30T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T22:16:21.940637 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41120 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It permits an authenticated user to use DBMS_PROFILER to remove all accumulated profiling data on a system-wide basis, regardless of that user's permissions. | https://www.enterprisedb.com/docs/security/advisories/cve202341120/ | 2023-08-23T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T07:05:17.636216 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41659 | Cross-Site Request Forgery (CSRF) vulnerability in Jules Colle, BDWM Responsive Gallery Grid plugin <= 2.3.10 versions. | https://patchstack.com/database/vulnerability/responsive-gallery-grid/wordpress-responsive-gallery-grid-plugin-2-3-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:02:41.615Z | 2023-10-06T14:40:58.218Z | 2023-10-06T14:40:58.218Z | {'Vendor': 'Jules Colle, BDWM', 'Product': 'Responsive Gallery Grid', 'Versions': 'n/a'} |
CVE-2023-41931 | Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not property sanitize or escape the timestamp value from history entries when rendering a history entry on the history view, resulting in a stored cross-site scripting (XSS) vulnerability. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233 | 2023-09-05T16:39:57.391Z | 2023-09-06T12:08:53.040Z | 2023-10-24T12:51:40.143Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Job Configuration History Plugin', 'Versions': '0'} |
CVE-2023-41032 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.253), Parasolid V35.1 (All versions < V35.1.184), Parasolid V36.0 (All versions < V36.0.142), Simcenter Femap V2301 (All versions < V2301.0003), Simcenter Femap V2306 (All versions < V2306.0001). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21263) | https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf | 2023-08-22T15:41:08.129Z | 2023-09-12T09:32:33.893Z | 2023-11-14T11:03:42.705Z | {'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'} |
CVE-2023-41177 | Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker.
Please note, this vulnerability is similar to, but not identical to, CVE-2023-41178. | https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US | 2023-08-24T14:36:57.668Z | 2024-01-23T20:35:37.218Z | 2024-01-23T20:35:37.218Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Mobile Security for Enterprise', 'Versions': '9.8 SP5'} |
CVE-2023-41874 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Order Delivery Date for WooCommerce plugin <= 3.20.0 versions. | https://patchstack.com/database/vulnerability/order-delivery-date-for-woocommerce/wordpress-order-delivery-date-for-woocommerce-plugin-3-20-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T11:35:57.268Z | 2023-09-25T00:42:59.942Z | 2023-09-25T00:42:59.942Z | {'Vendor': 'Tyche Softwares', 'Product': 'Order Delivery Date for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-41474 | Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component. | https://github.com/JBalanza/CVE-2023-41474 | 2023-08-30T00:00:00 | 2024-01-25T00:00:00 | 2024-01-25T19:47:06.531412 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41161 | Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-07T00:00:00 | 2023-09-07T21:09:40.326249 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41248 | In JetBrains TeamCity before 2023.05.3 stored XSS was possible during Cloud Profiles configuration | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-08-25T12:52:15.968Z | 2023-08-25T12:58:23.070Z | 2023-08-25T12:58:23.070Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-41618 | Emlog Pro v2.1.14 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /admin/article.php?active_savedraft. | https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41618 | 2023-08-30T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T23:14:23.897796 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41073 | An authorization issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access protected user data. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.331Z | 2023-09-26T20:15:01.181Z | 2023-09-26T20:15:01.181Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41423 | Cross Site Scripting vulnerability in WP Githuber MD plugin v.1.16.2 allows a remote attacker to execute arbitrary code via a crafted payload to the new article function. | https://github.com/terrylinooo/githuber-md/issues/316 | 2023-08-30T00:00:00 | 2023-09-12T00:00:00 | 2023-09-12T21:21:46.369269 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41136 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Laurence/OhMyBox.Info Simple Long Form allows Stored XSS.This issue affects Simple Long Form: from n/a through 2.2.2.
| https://patchstack.com/database/vulnerability/simple-long-form/wordpress-simple-long-form-plugin-2-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-23T14:29:48.067Z | 2023-11-30T12:13:02.773Z | 2023-11-30T12:13:02.773Z | {'Vendor': 'Laurence/OhMyBox.info', 'Product': 'Simple Long Form', 'Versions': 'n/a'} |
CVE-2023-41835 | When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied.
Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue. | https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft | 2023-09-04T07:53:19.551Z | 2023-12-05T08:37:31.602Z | 2023-12-12T08:42:20.578Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Struts', 'Versions': '2.0.0, 6.1.2.1'} |
CVE-2023-41287 | A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to inject malicious code via a network.
We have already fixed the vulnerability in the following version:
Video Station 5.7.2 ( 2023/11/23 ) and later
| https://www.qnap.com/en/security-advisory/qsa-23-55 | 2023-08-28T09:45:52.367Z | 2024-01-05T16:19:15.421Z | 2024-01-05T16:19:15.421Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'} |
CVE-2023-41268 | Improper input validation vulnerability in Samsung Open Source Escargot allows stack overflow and segmentation fault. This issue affects Escargot: from 3.0.0 through 4.0.0.
| https://github.com/Samsung/escargot/pull/1260 | 2023-08-28T08:40:10.107Z | 2023-12-06T03:46:16.110Z | 2023-12-14T09:24:10.303Z | {'Vendor': 'Samsung Open Source', 'Product': 'Escargot', 'Versions': '3.0.0'} |
CVE-2023-41792 | Cross-Site Request Forgery (CSRF) vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed Javascript code to be executed in the SNMP Trap Editor. This issue affects Pandora FMS: from 700 through 773. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T11:54:47.539Z | 2023-11-23T14:45:33.842Z | 2023-11-23T14:45:33.842Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41638 | An arbitrary file upload vulnerability in the Gestione Documentale module of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted file. | https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md | 2023-08-30T00:00:00 | 2023-08-31T00:00:00 | 2023-09-06T22:29:39.952300 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41680 | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | https://fortiguard.com/psirt/FG-IR-23-311 | 2023-08-30T13:42:39.547Z | 2023-10-13T14:51:12.174Z | 2023-10-13T14:51:12.174Z | {'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.0, 2.5.0, 2.4.1'} |
CVE-2023-41116 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It allows an authenticated user to refresh any materialized view, regardless of that user's permissions. | https://www.enterprisedb.com/docs/security/advisories/cve202341116/ | 2023-08-23T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T07:05:10.279546 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41815 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Malicious code could be executed in the File Manager section. This issue affects Pandora FMS: from 700 through 774. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T12:10:03.869Z | 2023-12-29T11:46:46.235Z | 2023-12-29T11:46:46.235Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41950 | Cross-Site Request Forgery (CSRF) vulnerability in Laposta - Roel Bousardt Laposta Signup Basic plugin <= 1.4.1 versions. | https://patchstack.com/database/vulnerability/laposta-signup-basic/wordpress-laposta-signup-basic-plugin-1-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-06T08:46:20.963Z | 2023-10-06T14:57:00.745Z | 2023-10-06T14:57:00.745Z | {'Vendor': 'Laposta - Roel Bousardt', 'Product': 'Laposta Signup Basic', 'Versions': 'n/a'} |
CVE-2023-41053 | Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc | 2023-08-22T16:57:23.933Z | 2023-09-06T20:22:30.797Z | 2023-09-06T20:22:30.797Z | {'Vendor': 'redis', 'Product': 'redis', 'Versions': '>= 7.0.0, < 7.0.13, >= 7.1.0, < 7.2.1'} |
CVE-2023-41679 | An improper access control vulnerability [CWE-284] in FortiManager management interface 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions may allow a remote and authenticated attacker with at least "device management" permission on his profile and belonging to a specific ADOM to add and delete CLI script on other ADOMs | https://fortiguard.com/psirt/FG-IR-23-062 | 2023-08-30T13:42:39.547Z | 2023-10-10T16:51:44.600Z | 2023-10-10T16:51:44.600Z | {'Vendor': 'Fortinet', 'Product': 'FortiManager', 'Versions': '7.2.0, 7.0.0, 6.4.0, 6.2.0'} |
CVE-2023-41100 | An issue was discovered in the hcaptcha (aka hCaptcha for EXT:form) extension before 2.1.2 for TYPO3. It fails to check that the required captcha field is submitted in the form data. allowing a remote user to bypass the CAPTCHA check. | https://typo3.org/security/advisory/typo3-ext-sa-2023-007 | 2023-08-23T00:00:00 | 2023-08-23T00:00:00 | 2023-08-23T05:26:38.766488 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41045 | Graylog is a free and open log management platform. Graylog makes use of only one single source port for DNS queries. Graylog binds a single socket for outgoing DNS queries and while that socket is bound to a random port number it is never changed again. This goes against recommended practice since 2008, when Dan Kaminsky discovered how easy is to carry out DNS cache poisoning attacks. In order to prevent cache poisoning with spoofed DNS responses, it is necessary to maximise the uncertainty in the choice of a source port for a DNS query. Although unlikely in many setups, an external attacker could inject forged DNS responses into a Graylog's lookup table cache. In order to prevent this, it is at least recommendable to distribute the DNS queries through a pool of distinct sockets, each of them with a random source port and renew them periodically. This issue has been addressed in versions 5.0.9 and 5.1.3. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3 | 2023-08-22T16:57:23.932Z | 2023-08-31T17:59:41.147Z | 2023-08-31T17:59:41.147Z | {'Vendor': 'Graylog2', 'Product': 'graylog2-server', 'Versions': '< 5.0.9, >= 5.1.0, < 5.1.3'} |
CVE-2023-41946 | A cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082 | 2023-09-05T16:39:57.394Z | 2023-09-06T12:09:02.919Z | 2023-10-24T12:51:57.627Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Frugal Testing Plugin', 'Versions': '0'} |
CVE-2023-41784 |
Permissions and Access Control Vulnerability in ZTE Red Magic 8 Pro
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034444 | 2023-09-01T09:02:00.657Z | 2024-01-04T08:05:11.915Z | 2024-01-04T08:05:11.915Z | {'Vendor': 'ZTE', 'Product': 'Red Magic 8 Pro', 'Versions': 'GEN_CN_NX729JV1.0.0B21MR'} |
CVE-2023-41157 | Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-16T00:00:00 | 2023-09-16T05:10:09.828159 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41507 | Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters. | https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/ | 2023-08-30T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T21:18:21.697053 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41854 | Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Ltd. WpCentral plugin <= 1.5.7 versions. | https://patchstack.com/database/vulnerability/wp-central/wordpress-wpcentral-plugin-1-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-04T09:47:21.582Z | 2023-10-10T08:46:38.712Z | 2023-10-10T08:46:38.712Z | {'Vendor': 'Softaculous Ltd.', 'Product': 'wpCentral', 'Versions': 'n/a'} |
CVE-2023-41911 | Samsung Mobile Processor Exynos 2200 allows a GPU Double Free (issue 1 of 2). | https://semiconductor.samsung.com/support/quality-support/product-security-updates/ | 2023-09-05T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T20:08:18.133259 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41012 | An issue in China Mobile Communications China Mobile Intelligent Home Gateway v.HG6543C4 allows a remote attacker to execute arbitrary code via the authentication mechanism. | https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws | 2023-08-22T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T15:45:00.313134 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41442 | An issue in Kloudq Technologies Limited Tor Equip 1.0, Tor Loco Mini 1.0 through 3.1 allows a remote attacker to execute arbitrary code via a crafted request to the MQTT component. | https://writeups.ayyappan.me/v/tor-iot-mqtt/ | 2023-08-30T00:00:00 | 2023-11-15T00:00:00 | 2023-11-15T21:49:57.557732 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41655 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Andreas Heigl authLdap plugin <= 2.5.9 versions. | https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-30T13:02:20.619Z | 2023-09-29T13:24:57.407Z | 2023-09-29T13:24:57.407Z | {'Vendor': 'Andreas Heigl', 'Product': 'authLdap', 'Versions': 'n/a'} |
CVE-2023-41710 | User-defined script code could be stored for a upsell related shop URL. This code was not correctly sanitized when adding it to DOM. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known. | https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6251_7.10.6_2023-09-25.pdf | 2023-08-30T16:21:49.912Z | 2024-01-08T09:04:38.608Z | 2024-01-22T12:16:31.472Z | {'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0'} |
CVE-2023-41069 | This issue was addressed by improving Face ID anti-spoofing models. This issue is fixed in iOS 17 and iPadOS 17. A 3D model constructed to look like the enrolled user may authenticate via Face ID. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.331Z | 2024-01-10T22:03:51.989Z | 2024-01-10T22:03:51.989Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41593 | Multiple cross-site scripting (XSS) vulnerabilities in Dairy Farm Shop Management System Using PHP and MySQL v1.1 allow attackers to execute arbitrary web scripts and HTML via a crafted payload injected into the Category and Category Field parameters. | https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet | 2023-08-30T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T17:24:14.057400 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41086 | Cross-site request forgery (CSRF) vulnerability exists in FURUNO SYSTEMS wireless LAN access point devices. If a user views a malicious page while logged in, unintended operations may be performed. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode. | https://www.furunosystems.co.jp/news/info/vulner20231002.html | 2023-09-22T04:36:30.685Z | 2023-10-03T00:15:47.652Z | 2023-10-03T00:15:47.652Z | {'Vendor': 'FURUNO SYSTEMS Co.,Ltd.', 'Product': 'ACERA 1210', 'Versions': 'firmware ver.02.36 and earlier'} |
CVE-2023-41317 | The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when GraphQL Subscriptions are enabled. It can be triggered when **all of the following conditions are met**: 1. Running Apollo Router v1.28.0, v1.28.1 or v1.29.0 ("impacted versions"); **and** 2. The Supergraph schema provided to the Router (either via Apollo Uplink or explicitly via other configuration) **has a `subscription` type** with root-fields defined; **and** 3. The YAML configuration provided to the Router **has subscriptions enabled** (they are _disabled_ by default), either by setting `enabled: true` _or_ by setting a valid `mode` within the `subscriptions` object (as seen in [subscriptions' documentation](https://www.apollographql.com/docs/router/executing-operations/subscription-support/#router-setup)); **and** 4. An [anonymous](https://spec.graphql.org/draft/#sec-Anonymous-Operation-Definitions) (i.e., un-named) `subscription` operation (e.g., `subscription { ... }`) is received by the Router If **all four** of these criteria are met, the impacted versions will panic and terminate. There is no data-privacy risk or sensitive-information exposure aspect to this vulnerability. This is fixed in Apollo Router v1.29.1. Users are advised to upgrade. Updating to v1.29.1 should be a clear and simple upgrade path for those running impacted versions. However, if Subscriptions are **not** necessary for your Graph – but are enabled via configuration — then disabling subscriptions is another option to mitigate the risk. | https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx | 2023-08-28T16:56:43.365Z | 2023-09-05T18:31:43.185Z | 2023-09-05T18:31:43.185Z | {'Vendor': 'apollographql', 'Product': 'router', 'Versions': '>= 1.28.0, < 1.29.1'} |
CVE-2023-41747 | Sensitive information disclosure due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. | https://security-advisory.acronis.com/advisories/SEC-5811 | 2023-08-31T14:10:27.638Z | 2023-08-31T17:54:15.729Z | 2023-08-31T17:54:15.729Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cloud Manager', 'Versions': 'unspecified'} |
CVE-2023-41897 | Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw | 2023-09-04T16:31:48.226Z | 2023-10-19T22:23:32.278Z | 2023-10-19T22:23:32.278Z | {'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.9.0'} |
CVE-2023-41878 | MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9 | 2023-09-04T16:31:48.223Z | 2023-09-26T22:53:27.060Z | 2023-09-26T22:53:27.060Z | {'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.7 LTS'} |
CVE-2023-41614 | A stored cross-site scripting (XSS) vulnerability in the Add Animal Details function of Zoo Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description of Animal parameter. | https://medium.com/%40guravtushar231/stored-xss-in-admin-panel-a38d1feb9ec4 | 2023-08-30T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T22:28:14.342196 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41244 | Cross-Site Request Forgery (CSRF) vulnerability in Buildfail Localize Remote Images plugin <= 1.0.9 versions. | https://patchstack.com/database/vulnerability/localize-remote-images/wordpress-localize-remote-images-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-25T10:02:32.134Z | 2023-10-03T13:17:19.136Z | 2023-10-03T13:17:19.136Z | {'Vendor': 'Buildfail', 'Product': 'Localize Remote Images', 'Versions': 'n/a'} |
CVE-2023-41751 | Sensitive information disclosure due to improper token expiration validation. The following products are affected: Acronis Agent (Windows) before build 32047. | https://security-advisory.acronis.com/advisories/SEC-5615 | 2023-08-31T14:10:27.639Z | 2023-08-31T20:18:30.546Z | 2023-08-31T20:18:30.546Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-41301 | Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:07.354Z | 2023-09-25T12:08:30.160Z | 2023-09-25T12:08:30.160Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-41881 | vantage6 is privacy preserving federated learning infrastructure. When a collaboration is deleted, the linked resources (such as tasks from that collaboration) should be deleted. This is partly to manage data properly, but also to prevent a potential (but unlikely) side-effect that affects versions prior to 4.0.0, where if a collaboration with id=10 is deleted, and subsequently a new collaboration is created with id=10, the authenticated users in that collaboration could potentially see results of the deleted collaboration in some cases. Version 4.0.0 contains a patch for this issue. There are no known workarounds. | https://github.com/vantage6/vantage6/security/advisories/GHSA-rf54-7qrr-96j6 | 2023-09-04T16:31:48.224Z | 2023-10-11T19:30:43.808Z | 2023-10-11T19:30:43.808Z | {'Vendor': 'vantage6', 'Product': 'vantage6', 'Versions': '< 4.0.0'} |
CVE-2023-41028 | A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root.
| https://blog.exodusintel.com/2023/08/23/juplink-rx4-1500-stack-based-buffer-overflow-vulnerability/ | 2023-08-22T14:09:29.146Z | 2023-08-23T21:47:26.833Z | 2023-08-23T21:47:26.833Z | {'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.2'} |
CVE-2023-41356 | NCSIST ManageEngine Mobile Device Manager(MDM) APP's special function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and read arbitrary system files. | https://www.twcert.org.tw/tw/cp-132-7506-b4e29-1.html | 2023-08-29T00:14:47.636Z | 2023-11-03T06:18:37.853Z | 2023-11-03T06:18:37.853Z | {'Vendor': 'WisdomGarden', 'Product': 'Tronclass ilearn', 'Versions': 'V1.4 2021/09/14'} |
CVE-2023-41993 | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. | https://support.apple.com/en-us/HT213940 | 2023-09-06T17:40:06.142Z | 2023-09-21T18:23:52.197Z | 2024-01-23T00:25:39.867Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-33154 | Windows Partition Management Driver Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33154 | 2023-05-17T21:16:44.898Z | 2023-07-11T17:03:06.885Z | 2023-12-14T19:53:04.947Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-33857 | IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain system information using a specially crafted query that could aid in further attacks against the system. IBM X-Force ID: 257695. | https://www.ibm.com/support/pages/node/7007059 | 2023-05-23T00:32:05.085Z | 2023-07-16T23:38:08.778Z | 2023-07-16T23:38:08.778Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-33912 | In Contacts service, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1687281677639942145 | 2023-05-23T06:51:01.537Z | 2023-08-07T01:54:45.355Z | 2023-08-07T01:54:45.355Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'} |
CVE-2023-33011 | A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers | 2023-05-17T02:56:16.623Z | 2023-07-17T17:15:45.876Z | 2023-07-17T17:15:45.876Z | {'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '5.10 through 5.36 Patch 2'} |
CVE-2023-33768 | Incorrect signature verification of the firmware during the Device Firmware Update process of Belkin Wemo Smart Plug WSP080 v1.2 allows attackers to cause a Denial of Service (DoS) via a crafted firmware file. | https://play.google.com/store/apps/details?id=com.belkin.wemoandroid&hl=en_US&gl=US | 2023-05-22T00:00:00 | 2023-07-13T00:00:00 | 2023-07-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33338 | Old Age Home Management 1.0 is vulnerable to SQL Injection via the username parameter. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/ANUJ-KUMAR/Old-Age-Home-Management-2022-2023-1.0 | 2023-05-22T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33787 | A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | https://github.com/anhdq201/netbox/issues/6 | 2023-05-22T00:00:00 | 2023-05-24T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33800 | A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | https://github.com/anhdq201/netbox/issues/11 | 2023-05-22T00:00:00 | 2023-05-24T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33553 | An issue in Planet Technologies WDRT-1800AX v1.01-CP21 allows attackers to bypass authentication and escalate privileges to root via manipulation of the LoginStatus cookie. | https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md | 2023-05-22T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33945 | SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded. | https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945 | 2023-05-24T02:36:00.164Z | 2023-05-24T15:22:39.081Z | 2023-05-24T15:22:39.081Z | {'Vendor': 'Liferay', 'Product': 'Portal', 'Versions': '7.3.1'} |
CVE-2023-33695 | Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the File.createTempFile() function at /core/io/FileUtil.java. | https://github.com/dromara/hutool/issues/3103 | 2023-05-22T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33953 | gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:
- Unbounded memory buffering in the HPACK parser
- Unbounded CPU consumption in the HPACK parser
The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.
The unbounded memory buffering bugs:
- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.
- HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse.
- gRPC’s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc… | https://cloud.google.com/support/bulletins#gcp-2023-022 | 2023-05-24T12:08:31.409Z | 2023-08-09T12:54:47.415Z | 2023-08-09T12:54:47.415Z | {'Vendor': 'Google', 'Product': 'gRPC', 'Versions': '0'} |
CVE-2023-33379 | Connected IO v2.1.0 and prior has a misconfiguration in their MQTT broker used for management and device communication, which allows devices to connect to the broker and issue commands to other device, impersonating Connected IO management platform and sending commands to all of Connected IO's devices. | https://www.connectedio.com/products/routers | 2023-05-22T00:00:00 | 2023-08-04T00:00:00 | 2023-08-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33142 | Microsoft SharePoint Server Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33142 | 2023-05-17T21:16:44.897Z | 2023-06-13T23:26:28.027Z | 2024-01-09T17:39:43.820Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Server 2019', 'Versions': '16.0.0'} |
CVE-2023-33457 | In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , may cause buffer-overflow and crash. | https://github.com/sogou/workflow/issues/1272 | 2023-05-22T00:00:00 | 2023-06-06T00:00:00 | 2023-06-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33007 | Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2903 | 2023-05-16T10:55:43.523Z | 2023-05-16T16:00:22.256Z | 2023-10-24T12:50:31.812Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins LoadComplete support Plugin', 'Versions': '0'} |
CVE-2023-33904 | In hci_server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-05-23T06:51:01.535Z | 2023-07-12T08:32:42.431Z | 2023-07-12T08:32:42.431Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12'} |
CVE-2023-33284 | Marval MSM through 14.19.0.12476 and 15.0 has a Remote Code Execution vulnerability. A remote attacker authenticated as any user is able to execute code in context of the web server. | https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html | 2023-05-22T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33791 | A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | https://github.com/anhdq201/netbox/issues/4 | 2023-05-22T00:00:00 | 2023-05-24T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-33990 | SAP SQL Anywhere - version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted.
| https://me.sap.com/notes/3331029 | 2023-05-24T20:41:32.834Z | 2023-07-11T02:29:57.811Z | 2023-07-11T02:29:57.811Z | {'Vendor': 'SAP_SE', 'Product': 'SAP SQL Anywhere', 'Versions': '17.0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.