CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-41377
null
null
2023-08-29T00:00:00
null
2023-11-01T14:01:55.734057
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-41727
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.
https://download.wavelink.com/Files/avalanche_v6.4.2_release_notes.txt
2023-08-31T01:00:11.771Z
2023-12-19T15:43:26.326Z
2023-12-19T15:43:26.326Z
{'Vendor': 'Ivanti', 'Product': 'Wavelink', 'Versions': '6.4.1'}
CVE-2023-41232
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.7, iOS 17 and iPadOS 17, macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7. An app may be able to disclose kernel memory.
https://support.apple.com/en-us/HT213938
2023-09-14T19:03:36.068Z
2023-09-26T20:14:58.142Z
2023-09-26T20:14:58.142Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41662
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions.
https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T13:02:41.615Z
2023-09-29T13:39:29.119Z
2023-09-29T13:39:29.119Z
{'Vendor': 'Ulf Benjaminsson', 'Product': 'WP-dTree', 'Versions': 'n/a'}
CVE-2023-41770
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41770
2023-08-31T23:34:18.566Z
2023-10-10T17:07:28.094Z
2023-12-14T01:15:01.814Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41320
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. UI layout preferences management can be hijacked to lead to SQL injection. This injection can be use to takeover an administrator account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476
2023-08-28T16:56:43.365Z
2023-09-26T21:15:39.479Z
2023-09-26T21:15:39.479Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 10.0.0, < 10.0.10'}
CVE-2023-41635
A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file.
https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md
2023-08-30T00:00:00
2023-08-31T00:00:00
2023-09-11T21:17:16.140994
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41265
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes
2023-08-25T00:00:00
2023-08-29T00:00:00
2023-08-29T22:34:49.015293
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41009
File Upload vulnerability in adlered bolo-solo v.2.6 allows a remote attacker to execute arbitrary code via a crafted script to the authorization field in the header.
http://adlered.com
2023-08-22T00:00:00
2023-09-05T00:00:00
2023-09-05T19:47:53.947634
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41771
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41771
2023-08-31T23:36:28.964Z
2023-10-10T17:07:28.615Z
2023-12-14T01:15:02.360Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41321
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836
2023-08-28T16:56:43.365Z
2023-09-26T21:16:31.589Z
2023-09-26T21:16:31.589Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.1.1, < 10.0.10'}
CVE-2023-41264
Netwrix Usercube before 6.0.215, in certain misconfigured on-premises installations, allows authentication bypass on deployment endpoints, leading to privilege escalation. This only occurs if the configuration omits the required restSettings.AuthorizedClientId and restSettings.AuthorizedSecret fields (for the POST /api/Deployment/ExportConfiguration and POST /api/Deployment endpoints).
https://www.netwrix.com/identity_governance_and_administration_solution.html
2023-08-25T00:00:00
2023-11-28T00:00:00
2023-11-28T17:07:19.717247
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41376
Nokia Service Router Operating System (SR OS) 22.10 and SR Linux, when error-handling update-fault-tolerance is not enabled, mishandle BGP path attributes.
https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
2023-08-29T00:00:00
2023-08-29T00:00:00
2023-08-29T15:55:07.855280
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41726
Ivanti Avalanche Incorrect Default Permissions allows Local Privilege Escalation Vulnerability
https://download.wavelink.com/Files/avalanche_v6.4.1.236_release_notes.txt
2023-08-31T01:00:11.771Z
2023-11-03T18:13:19.997Z
2023-11-03T18:13:19.997Z
{'Vendor': 'Ivanti', 'Product': 'Avalanche', 'Versions': '6.4.1.236'}
CVE-2023-41233
Cross-site scripting vulnerability in Item List page registration process of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script.
https://www.welcart.com/archives/20106.html
2023-09-20T04:37:54.930Z
2023-09-26T08:15:39.579Z
2023-09-26T08:15:39.579Z
{'Vendor': 'Collne Inc.', 'Product': 'Welcart e-Commerce', 'Versions': 'versions 2.7 to 2.8.21'}
CVE-2023-41663
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Giovambattista Fazioli WP Bannerize Pro plugin <= 1.6.9 versions.
https://patchstack.com/database/vulnerability/wp-bannerize-pro/wordpress-wp-bannerize-pro-plugin-1-6-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T13:02:41.615Z
2023-09-29T13:43:35.721Z
2023-09-29T13:43:35.721Z
{'Vendor': 'Giovambattista Fazioli', 'Product': 'WP Bannerize Pro', 'Versions': 'n/a'}
CVE-2023-41049
@dcl/single-sign-on-client is an open source npm library which deals with single sign on authentication flows. Improper input validation in the `init` function allows arbitrary javascript to be executed using the `javascript:` prefix. This vulnerability has been patched on version `0.1.0`. Users are advised to upgrade. Users unable to upgrade should limit untrusted user input to the `init` function.
https://github.com/decentraland/single-sign-on-client/security/advisories/GHSA-vp4f-wxgw-7x8x
2023-08-22T16:57:23.933Z
2023-09-01T19:35:09.224Z
2023-09-01T19:35:09.224Z
{'Vendor': 'decentraland', 'Product': 'single-sign-on-client', 'Versions': '< 0.1.0'}
CVE-2023-41419
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.
https://github.com/gevent/gevent/issues/1989
2023-08-30T00:00:00
2023-09-25T00:00:00
2023-10-16T23:28:19.734233
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41730
Cross-Site Request Forgery (CSRF) vulnerability in SendPress Newsletters plugin <= 1.22.3.31 versions.
https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-cross-site-request-forgery-csrf?_s_id=cve
2023-08-31T06:58:39.903Z
2023-10-10T07:47:10.885Z
2023-10-10T07:47:10.885Z
{'Vendor': 'SendPress', 'Product': 'SendPress Newsletters', 'Versions': 'n/a'}
CVE-2023-41360
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.
https://github.com/FRRouting/frr/pull/14245
2023-08-29T00:00:00
2023-08-29T00:00:00
2023-11-15T05:07:03.956892
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41675
A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
https://fortiguard.com/psirt/FG-IR-23-184
2023-08-30T13:42:39.547Z
2023-10-10T16:49:55.789Z
2023-10-10T16:49:55.789Z
{'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.2.0, 7.0.0'}
CVE-2023-41858
Cross-Site Request Forgery (CSRF) vulnerability in Ashok Rane Order Delivery Date for WP e-Commerce plugin <= 1.2 versions.
https://patchstack.com/database/vulnerability/order-delivery-date/wordpress-order-delivery-date-for-wp-e-commerce-plugin-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-04T10:33:46.291Z
2023-10-10T08:50:47.217Z
2023-10-10T08:50:47.217Z
{'Vendor': 'Ashok Rane', 'Product': 'Order Delivery Date for WP e-Commerce', 'Versions': 'n/a'}
CVE-2023-41337
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. In version 2.3.0-beta2 and prior, when h2o is configured to listen to multiple addresses or ports with each of them using different backend servers managed by multiple entities, a malicious backend entity that also has the opportunity to observe or inject packets exchanged between the client and h2o may misdirect HTTPS requests going to other backends and observe the contents of that HTTPS request being sent. The attack involves a victim client trying to resume a TLS connection and an attacker redirecting the packets to a different address or port than that intended by the client. The attacker must already have been configured by the administrator of h2o to act as a backend to one of the addresses or ports that the h2o instance listens to. Session IDs and tickets generated by h2o are not bound to information specific to the server address, port, or the X.509 certificate, and therefore it is possible for an attacker to force the victim connection to wrongfully resume against a different server address or port on which the same h2o instance is listening. Once a TLS session is misdirected to resume to a server address / port that is configured to use an attacker-controlled server as the backend, depending on the configuration, HTTPS requests from the victim client may be forwarded to the attacker's server. An H2O instance is vulnerable to this attack only if the instance is configured to listen to different addresses or ports using the listen directive at the host level and the instance is configured to connect to backend servers managed by multiple entities. A patch is available at commit 35760540337a47e5150da0f4a66a609fad2ef0ab. As a workaround, one may stop using using host-level listen directives in favor of global-level ones.
https://github.com/h2o/h2o/security/advisories/GHSA-5v5r-rghf-rm6q
2023-08-28T16:56:43.367Z
2023-12-12T19:42:35.210Z
2023-12-12T19:42:35.210Z
{'Vendor': 'h2o', 'Product': 'h2o', 'Versions': '<= 2.3.0-beta2'}
CVE-2023-41767
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41767
2023-08-31T23:30:45.393Z
2023-10-10T17:07:26.508Z
2023-12-14T01:15:00.194Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41788
Unrestricted Upload of File with Dangerous Type vulnerability in Pandora FMS on all allows Accessing Functionality Not Properly Constrained by ACLs. This vulnerability allows attackers to execute code via PHP file uploads. This issue affects Pandora FMS: from 700 through 773.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T11:54:47.538Z
2023-11-23T14:33:44.933Z
2023-11-23T14:33:44.933Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41065
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may be able to read sensitive location information.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.330Z
2023-09-26T20:14:59.637Z
2023-09-26T20:14:59.637Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41966
The application suffers from a privilege escalation vulnerability. A user with read permissions can elevate privileges by sending a HTTP POST to set a parameter.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
2023-10-25T15:23:55.519Z
2023-10-26T16:21:56.412Z
2023-10-26T16:21:56.412Z
{'Vendor': 'Sielco', 'Product': 'Analog FM transmitter', 'Versions': '2.12 (EXC5000GX), 2.12 (EXC120GX), 2.11 (EXC300GX), 2.10 (EXC1600GX), 2.10 (EXC2000GX), 2.08 (EXC1600GX), 2.08 (EXC1000GX), 2.07 (EXC3000GX), 2.06 (EXC5000GX), 1.7.7 (EXC30GT), 1.7.4 (EXC300GT), 1.7.4 (EXC100GT), 1.7.4 (EXC5000GT), 1.6.3 (EXC1000GT), 1.5.4 (EXC120GT)'}
CVE-2023-41989
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1. An attacker may be able to execute arbitrary code as root from the Lock Screen.
https://support.apple.com/en-us/HT213984
2023-09-06T17:40:06.141Z
2023-10-25T18:32:17.820Z
2023-10-25T18:32:17.820Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41570
MikroTik RouterOS v7.1 to 7.11 was discovered to contain incorrect access control mechanisms in place for the Rest API.
https://www.enricobassetti.it/2023/11/cve-2023-41570-access-control-vulnerability-in-mikrotik-rest-api/
2023-08-30T00:00:00
2023-11-14T00:00:00
2023-11-14T22:16:21.940637
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41120
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It permits an authenticated user to use DBMS_PROFILER to remove all accumulated profiling data on a system-wide basis, regardless of that user's permissions.
https://www.enterprisedb.com/docs/security/advisories/cve202341120/
2023-08-23T00:00:00
2023-12-12T00:00:00
2023-12-12T07:05:17.636216
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41659
Cross-Site Request Forgery (CSRF) vulnerability in Jules Colle, BDWM Responsive Gallery Grid plugin <= 2.3.10 versions.
https://patchstack.com/database/vulnerability/responsive-gallery-grid/wordpress-responsive-gallery-grid-plugin-2-3-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:02:41.615Z
2023-10-06T14:40:58.218Z
2023-10-06T14:40:58.218Z
{'Vendor': 'Jules Colle, BDWM', 'Product': 'Responsive Gallery Grid', 'Versions': 'n/a'}
CVE-2023-41931
Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not property sanitize or escape the timestamp value from history entries when rendering a history entry on the history view, resulting in a stored cross-site scripting (XSS) vulnerability.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3233
2023-09-05T16:39:57.391Z
2023-09-06T12:08:53.040Z
2023-10-24T12:51:40.143Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Job Configuration History Plugin', 'Versions': '0'}
CVE-2023-41032
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.253), Parasolid V35.1 (All versions < V35.1.184), Parasolid V36.0 (All versions < V36.0.142), Simcenter Femap V2301 (All versions < V2301.0003), Simcenter Femap V2306 (All versions < V2306.0001). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21263)
https://cert-portal.siemens.com/productcert/pdf/ssa-190839.pdf
2023-08-22T15:41:08.129Z
2023-09-12T09:32:33.893Z
2023-11-14T11:03:42.705Z
{'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'}
CVE-2023-41177
Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker. Please note, this vulnerability is similar to, but not identical to, CVE-2023-41178.
https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US
2023-08-24T14:36:57.668Z
2024-01-23T20:35:37.218Z
2024-01-23T20:35:37.218Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Mobile Security for Enterprise', 'Versions': '9.8 SP5'}
CVE-2023-41874
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Order Delivery Date for WooCommerce plugin <= 3.20.0 versions.
https://patchstack.com/database/vulnerability/order-delivery-date-for-woocommerce/wordpress-order-delivery-date-for-woocommerce-plugin-3-20-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T11:35:57.268Z
2023-09-25T00:42:59.942Z
2023-09-25T00:42:59.942Z
{'Vendor': 'Tyche Softwares', 'Product': 'Order Delivery Date for WooCommerce', 'Versions': 'n/a'}
CVE-2023-41474
Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component.
https://github.com/JBalanza/CVE-2023-41474
2023-08-30T00:00:00
2024-01-25T00:00:00
2024-01-25T19:47:06.531412
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41161
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the key comment to different pages such as public key details, Export key, sign key, send to key server page, and fetch from key server page tab.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-07T00:00:00
2023-09-07T21:09:40.326249
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41248
In JetBrains TeamCity before 2023.05.3 stored XSS was possible during Cloud Profiles configuration
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-08-25T12:52:15.968Z
2023-08-25T12:58:23.070Z
2023-08-25T12:58:23.070Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-41618
Emlog Pro v2.1.14 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /admin/article.php?active_savedraft.
https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41618
2023-08-30T00:00:00
2023-12-13T00:00:00
2023-12-13T23:14:23.897796
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41073
An authorization issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access protected user data.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.331Z
2023-09-26T20:15:01.181Z
2023-09-26T20:15:01.181Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41423
Cross Site Scripting vulnerability in WP Githuber MD plugin v.1.16.2 allows a remote attacker to execute arbitrary code via a crafted payload to the new article function.
https://github.com/terrylinooo/githuber-md/issues/316
2023-08-30T00:00:00
2023-09-12T00:00:00
2023-09-12T21:21:46.369269
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41136
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Laurence/OhMyBox.Info Simple Long Form allows Stored XSS.This issue affects Simple Long Form: from n/a through 2.2.2.
https://patchstack.com/database/vulnerability/simple-long-form/wordpress-simple-long-form-plugin-2-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-23T14:29:48.067Z
2023-11-30T12:13:02.773Z
2023-11-30T12:13:02.773Z
{'Vendor': 'Laurence/OhMyBox.info', 'Product': 'Simple Long Form', 'Versions': 'n/a'}
CVE-2023-41835
When a Multipart request is performed but some of the fields exceed the maxStringLength  limit, the upload files will remain in struts.multipart.saveDir  even if the request has been denied. Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue.
https://lists.apache.org/thread/6wj530kh3ono8phr642y9sqkl67ys2ft
2023-09-04T07:53:19.551Z
2023-12-05T08:37:31.602Z
2023-12-12T08:42:20.578Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Struts', 'Versions': '2.0.0, 6.1.2.1'}
CVE-2023-41287
A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later
https://www.qnap.com/en/security-advisory/qsa-23-55
2023-08-28T09:45:52.367Z
2024-01-05T16:19:15.421Z
2024-01-05T16:19:15.421Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'}
CVE-2023-41268
Improper input validation vulnerability in Samsung Open Source Escargot allows stack overflow and segmentation fault. This issue affects Escargot: from 3.0.0 through 4.0.0.
https://github.com/Samsung/escargot/pull/1260
2023-08-28T08:40:10.107Z
2023-12-06T03:46:16.110Z
2023-12-14T09:24:10.303Z
{'Vendor': 'Samsung Open Source', 'Product': 'Escargot', 'Versions': '3.0.0'}
CVE-2023-41792
Cross-Site Request Forgery (CSRF) vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed Javascript code to be executed in the SNMP Trap Editor. This issue affects Pandora FMS: from 700 through 773.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T11:54:47.539Z
2023-11-23T14:45:33.842Z
2023-11-23T14:45:33.842Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41638
An arbitrary file upload vulnerability in the Gestione Documentale module of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted file.
https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md
2023-08-30T00:00:00
2023-08-31T00:00:00
2023-09-06T22:29:39.952300
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41680
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
https://fortiguard.com/psirt/FG-IR-23-311
2023-08-30T13:42:39.547Z
2023-10-13T14:51:12.174Z
2023-10-13T14:51:12.174Z
{'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.0, 2.5.0, 2.4.1'}
CVE-2023-41116
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It allows an authenticated user to refresh any materialized view, regardless of that user's permissions.
https://www.enterprisedb.com/docs/security/advisories/cve202341116/
2023-08-23T00:00:00
2023-12-12T00:00:00
2023-12-12T07:05:10.279546
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41815
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Malicious code could be executed in the File Manager section. This issue affects Pandora FMS: from 700 through 774.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T12:10:03.869Z
2023-12-29T11:46:46.235Z
2023-12-29T11:46:46.235Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41950
Cross-Site Request Forgery (CSRF) vulnerability in Laposta - Roel Bousardt Laposta Signup Basic plugin <= 1.4.1 versions.
https://patchstack.com/database/vulnerability/laposta-signup-basic/wordpress-laposta-signup-basic-plugin-1-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-06T08:46:20.963Z
2023-10-06T14:57:00.745Z
2023-10-06T14:57:00.745Z
{'Vendor': 'Laposta - Roel Bousardt', 'Product': 'Laposta Signup Basic', 'Versions': 'n/a'}
CVE-2023-41053
Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc
2023-08-22T16:57:23.933Z
2023-09-06T20:22:30.797Z
2023-09-06T20:22:30.797Z
{'Vendor': 'redis', 'Product': 'redis', 'Versions': '>= 7.0.0, < 7.0.13, >= 7.1.0, < 7.2.1'}
CVE-2023-41679
An improper access control vulnerability [CWE-284] in FortiManager management interface 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions may allow a remote and authenticated attacker with at least "device management" permission on his profile and belonging to a specific ADOM to add and delete CLI script on other ADOMs
https://fortiguard.com/psirt/FG-IR-23-062
2023-08-30T13:42:39.547Z
2023-10-10T16:51:44.600Z
2023-10-10T16:51:44.600Z
{'Vendor': 'Fortinet', 'Product': 'FortiManager', 'Versions': '7.2.0, 7.0.0, 6.4.0, 6.2.0'}
CVE-2023-41100
An issue was discovered in the hcaptcha (aka hCaptcha for EXT:form) extension before 2.1.2 for TYPO3. It fails to check that the required captcha field is submitted in the form data. allowing a remote user to bypass the CAPTCHA check.
https://typo3.org/security/advisory/typo3-ext-sa-2023-007
2023-08-23T00:00:00
2023-08-23T00:00:00
2023-08-23T05:26:38.766488
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41045
Graylog is a free and open log management platform. Graylog makes use of only one single source port for DNS queries. Graylog binds a single socket for outgoing DNS queries and while that socket is bound to a random port number it is never changed again. This goes against recommended practice since 2008, when Dan Kaminsky discovered how easy is to carry out DNS cache poisoning attacks. In order to prevent cache poisoning with spoofed DNS responses, it is necessary to maximise the uncertainty in the choice of a source port for a DNS query. Although unlikely in many setups, an external attacker could inject forged DNS responses into a Graylog's lookup table cache. In order to prevent this, it is at least recommendable to distribute the DNS queries through a pool of distinct sockets, each of them with a random source port and renew them periodically. This issue has been addressed in versions 5.0.9 and 5.1.3. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3
2023-08-22T16:57:23.932Z
2023-08-31T17:59:41.147Z
2023-08-31T17:59:41.147Z
{'Vendor': 'Graylog2', 'Product': 'graylog2-server', 'Versions': '< 5.0.9, >= 5.1.0, < 5.1.3'}
CVE-2023-41946
A cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3082
2023-09-05T16:39:57.394Z
2023-09-06T12:09:02.919Z
2023-10-24T12:51:57.627Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Frugal Testing Plugin', 'Versions': '0'}
CVE-2023-41784
Permissions and Access Control Vulnerability in ZTE Red Magic 8 Pro
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1034444
2023-09-01T09:02:00.657Z
2024-01-04T08:05:11.915Z
2024-01-04T08:05:11.915Z
{'Vendor': 'ZTE', 'Product': 'Red Magic 8 Pro', 'Versions': 'GEN_CN_NX729JV1.0.0B21MR'}
CVE-2023-41157
Multiple stored cross-site scripting (XSS) vulnerabilities in Usermin 2.000 allow remote attackers to inject arbitrary web script or HTML via the folder name parameter while creating the folder to manage the folder tab, filter tab, and forward mail tab.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-16T00:00:00
2023-09-16T05:10:09.828159
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41507
Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/
2023-08-30T00:00:00
2023-09-05T00:00:00
2023-09-05T21:18:21.697053
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41854
Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Ltd. WpCentral plugin <= 1.5.7 versions.
https://patchstack.com/database/vulnerability/wp-central/wordpress-wpcentral-plugin-1-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-04T09:47:21.582Z
2023-10-10T08:46:38.712Z
2023-10-10T08:46:38.712Z
{'Vendor': 'Softaculous Ltd.', 'Product': 'wpCentral', 'Versions': 'n/a'}
CVE-2023-41911
Samsung Mobile Processor Exynos 2200 allows a GPU Double Free (issue 1 of 2).
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-09-05T00:00:00
2023-09-28T00:00:00
2023-09-28T20:08:18.133259
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41012
An issue in China Mobile Communications China Mobile Intelligent Home Gateway v.HG6543C4 allows a remote attacker to execute arbitrary code via the authentication mechanism.
https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws
2023-08-22T00:00:00
2023-09-05T00:00:00
2023-09-05T15:45:00.313134
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41442
An issue in Kloudq Technologies Limited Tor Equip 1.0, Tor Loco Mini 1.0 through 3.1 allows a remote attacker to execute arbitrary code via a crafted request to the MQTT component.
https://writeups.ayyappan.me/v/tor-iot-mqtt/
2023-08-30T00:00:00
2023-11-15T00:00:00
2023-11-15T21:49:57.557732
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41655
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Andreas Heigl authLdap plugin <= 2.5.9 versions.
https://patchstack.com/database/vulnerability/authldap/wordpress-authldap-plugin-2-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-30T13:02:20.619Z
2023-09-29T13:24:57.407Z
2023-09-29T13:24:57.407Z
{'Vendor': 'Andreas Heigl', 'Product': 'authLdap', 'Versions': 'n/a'}
CVE-2023-41710
User-defined script code could be stored for a upsell related shop URL. This code was not correctly sanitized when adding it to DOM. Attackers could lure victims to user accounts with malicious script code and make them execute it in the context of a trusted domain. We added sanitization for this content. No publicly available exploits are known.
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6251_7.10.6_2023-09-25.pdf
2023-08-30T16:21:49.912Z
2024-01-08T09:04:38.608Z
2024-01-22T12:16:31.472Z
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
CVE-2023-41069
This issue was addressed by improving Face ID anti-spoofing models. This issue is fixed in iOS 17 and iPadOS 17. A 3D model constructed to look like the enrolled user may authenticate via Face ID.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.331Z
2024-01-10T22:03:51.989Z
2024-01-10T22:03:51.989Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41593
Multiple cross-site scripting (XSS) vulnerabilities in Dairy Farm Shop Management System Using PHP and MySQL v1.1 allow attackers to execute arbitrary web scripts and HTML via a crafted payload injected into the Category and Category Field parameters.
https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet
2023-08-30T00:00:00
2023-09-11T00:00:00
2023-09-11T17:24:14.057400
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41086
Cross-site request forgery (CSRF) vulnerability exists in FURUNO SYSTEMS wireless LAN access point devices. If a user views a malicious page while logged in, unintended operations may be performed. Affected products and versions are as follows: ACERA 1210 firmware ver.02.36 and earlier, ACERA 1150i firmware ver.01.35 and earlier, ACERA 1150w firmware ver.01.35 and earlier, ACERA 1110 firmware ver.01.76 and earlier, ACERA 1020 firmware ver.01.86 and earlier, ACERA 1010 firmware ver.01.86 and earlier, ACERA 950 firmware ver.01.60 and earlier, ACERA 850F firmware ver.01.60 and earlier, ACERA 900 firmware ver.02.54 and earlier, ACERA 850M firmware ver.02.06 and earlier, ACERA 810 firmware ver.03.74 and earlier, and ACERA 800ST firmware ver.07.35 and earlier. They are affected when running in ST(Standalone) mode.
https://www.furunosystems.co.jp/news/info/vulner20231002.html
2023-09-22T04:36:30.685Z
2023-10-03T00:15:47.652Z
2023-10-03T00:15:47.652Z
{'Vendor': 'FURUNO SYSTEMS Co.,Ltd.', 'Product': 'ACERA 1210', 'Versions': 'firmware ver.02.36 and earlier'}
CVE-2023-41317
The Apollo Router is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Affected versions are subject to a Denial-of-Service (DoS) type vulnerability which causes the Router to panic and terminate when GraphQL Subscriptions are enabled. It can be triggered when **all of the following conditions are met**: 1. Running Apollo Router v1.28.0, v1.28.1 or v1.29.0 ("impacted versions"); **and** 2. The Supergraph schema provided to the Router (either via Apollo Uplink or explicitly via other configuration) **has a `subscription` type** with root-fields defined; **and** 3. The YAML configuration provided to the Router **has subscriptions enabled** (they are _disabled_ by default), either by setting `enabled: true` _or_ by setting a valid `mode` within the `subscriptions` object (as seen in [subscriptions' documentation](https://www.apollographql.com/docs/router/executing-operations/subscription-support/#router-setup)); **and** 4. An [anonymous](https://spec.graphql.org/draft/#sec-Anonymous-Operation-Definitions) (i.e., un-named) `subscription` operation (e.g., `subscription { ... }`) is received by the Router If **all four** of these criteria are met, the impacted versions will panic and terminate. There is no data-privacy risk or sensitive-information exposure aspect to this vulnerability. This is fixed in Apollo Router v1.29.1. Users are advised to upgrade. Updating to v1.29.1 should be a clear and simple upgrade path for those running impacted versions. However, if Subscriptions are **not** necessary for your Graph – but are enabled via configuration — then disabling subscriptions is another option to mitigate the risk.
https://github.com/apollographql/router/security/advisories/GHSA-w8vq-3hf9-xppx
2023-08-28T16:56:43.365Z
2023-09-05T18:31:43.185Z
2023-09-05T18:31:43.185Z
{'Vendor': 'apollographql', 'Product': 'router', 'Versions': '>= 1.28.0, < 1.29.1'}
CVE-2023-41747
Sensitive information disclosure due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
https://security-advisory.acronis.com/advisories/SEC-5811
2023-08-31T14:10:27.638Z
2023-08-31T17:54:15.729Z
2023-08-31T17:54:15.729Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cloud Manager', 'Versions': 'unspecified'}
CVE-2023-41897
Home assistant is an open source home automation. Home Assistant server does not set any HTTP security headers, including the X-Frame-Options header, which specifies whether the web page is allowed to be framed. The omission of this and correlating headers facilitates covert clickjacking attacks and alternative exploit opportunities, such as the vector described in this security advisory. This fault incurs major risk, considering the ability to trick users into installing an external and malicious add-on with minimal user interaction, which would enable Remote Code Execution (RCE) within the Home Assistant application. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/home-assistant/core/security/advisories/GHSA-935v-rmg9-44mw
2023-09-04T16:31:48.226Z
2023-10-19T22:23:32.278Z
2023-10-19T22:23:32.278Z
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.9.0'}
CVE-2023-41878
MeterSphere is a one-stop open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing and performance testing. The Selenium VNC config used in Metersphere is using a weak password by default, attackers can login to vnc and obtain high permissions. This issue has been addressed in version 2.10.7 LTS. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9
2023-09-04T16:31:48.223Z
2023-09-26T22:53:27.060Z
2023-09-26T22:53:27.060Z
{'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.7 LTS'}
CVE-2023-41614
A stored cross-site scripting (XSS) vulnerability in the Add Animal Details function of Zoo Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description of Animal parameter.
https://medium.com/%40guravtushar231/stored-xss-in-admin-panel-a38d1feb9ec4
2023-08-30T00:00:00
2023-09-21T00:00:00
2023-09-21T22:28:14.342196
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41244
Cross-Site Request Forgery (CSRF) vulnerability in Buildfail Localize Remote Images plugin <= 1.0.9 versions.
https://patchstack.com/database/vulnerability/localize-remote-images/wordpress-localize-remote-images-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-25T10:02:32.134Z
2023-10-03T13:17:19.136Z
2023-10-03T13:17:19.136Z
{'Vendor': 'Buildfail', 'Product': 'Localize Remote Images', 'Versions': 'n/a'}
CVE-2023-41751
Sensitive information disclosure due to improper token expiration validation. The following products are affected: Acronis Agent (Windows) before build 32047.
https://security-advisory.acronis.com/advisories/SEC-5615
2023-08-31T14:10:27.639Z
2023-08-31T20:18:30.546Z
2023-08-31T20:18:30.546Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-41301
Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:07.354Z
2023-09-25T12:08:30.160Z
2023-09-25T12:08:30.160Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-41881
vantage6 is privacy preserving federated learning infrastructure. When a collaboration is deleted, the linked resources (such as tasks from that collaboration) should be deleted. This is partly to manage data properly, but also to prevent a potential (but unlikely) side-effect that affects versions prior to 4.0.0, where if a collaboration with id=10 is deleted, and subsequently a new collaboration is created with id=10, the authenticated users in that collaboration could potentially see results of the deleted collaboration in some cases. Version 4.0.0 contains a patch for this issue. There are no known workarounds.
https://github.com/vantage6/vantage6/security/advisories/GHSA-rf54-7qrr-96j6
2023-09-04T16:31:48.224Z
2023-10-11T19:30:43.808Z
2023-10-11T19:30:43.808Z
{'Vendor': 'vantage6', 'Product': 'vantage6', 'Versions': '< 4.0.0'}
CVE-2023-41028
A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root.
https://blog.exodusintel.com/2023/08/23/juplink-rx4-1500-stack-based-buffer-overflow-vulnerability/
2023-08-22T14:09:29.146Z
2023-08-23T21:47:26.833Z
2023-08-23T21:47:26.833Z
{'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.2'}
CVE-2023-41356
NCSIST ManageEngine Mobile Device Manager(MDM) APP's special function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and read arbitrary system files.
https://www.twcert.org.tw/tw/cp-132-7506-b4e29-1.html
2023-08-29T00:14:47.636Z
2023-11-03T06:18:37.853Z
2023-11-03T06:18:37.853Z
{'Vendor': 'WisdomGarden', 'Product': 'Tronclass ilearn', 'Versions': 'V1.4 2021/09/14'}
CVE-2023-41993
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
https://support.apple.com/en-us/HT213940
2023-09-06T17:40:06.142Z
2023-09-21T18:23:52.197Z
2024-01-23T00:25:39.867Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-33154
Windows Partition Management Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33154
2023-05-17T21:16:44.898Z
2023-07-11T17:03:06.885Z
2023-12-14T19:53:04.947Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-33857
IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain system information using a specially crafted query that could aid in further attacks against the system. IBM X-Force ID: 257695.
https://www.ibm.com/support/pages/node/7007059
2023-05-23T00:32:05.085Z
2023-07-16T23:38:08.778Z
2023-07-16T23:38:08.778Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-33912
In Contacts service, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1687281677639942145
2023-05-23T06:51:01.537Z
2023-08-07T01:54:45.355Z
2023-08-07T01:54:45.355Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
CVE-2023-33011
A format string vulnerability in the Zyxel ATP series firmware versions 5.10 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.10 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.10 through 5.36 Patch 2, and VPN series firmware versions 5.00 through 5.36 Patch 2, could allow an unauthenticated, LAN-based attacker to execute some OS commands by using a crafted PPPoE configuration on an affected device when the cloud management mode is enabled.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers
2023-05-17T02:56:16.623Z
2023-07-17T17:15:45.876Z
2023-07-17T17:15:45.876Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '5.10 through 5.36 Patch 2'}
CVE-2023-33768
Incorrect signature verification of the firmware during the Device Firmware Update process of Belkin Wemo Smart Plug WSP080 v1.2 allows attackers to cause a Denial of Service (DoS) via a crafted firmware file.
https://play.google.com/store/apps/details?id=com.belkin.wemoandroid&hl=en_US&gl=US
2023-05-22T00:00:00
2023-07-13T00:00:00
2023-07-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33338
Old Age Home Management 1.0 is vulnerable to SQL Injection via the username parameter.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/ANUJ-KUMAR/Old-Age-Home-Management-2022-2023-1.0
2023-05-22T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33787
A stored cross-site scripting (XSS) vulnerability in the Create Tenant Groups (/tenancy/tenant-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
https://github.com/anhdq201/netbox/issues/6
2023-05-22T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33800
A stored cross-site scripting (XSS) vulnerability in the Create Regions (/dcim/regions/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
https://github.com/anhdq201/netbox/issues/11
2023-05-22T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33553
An issue in Planet Technologies WDRT-1800AX v1.01-CP21 allows attackers to bypass authentication and escalate privileges to root via manipulation of the LoginStatus cookie.
https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md
2023-05-22T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33945
SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded.
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945
2023-05-24T02:36:00.164Z
2023-05-24T15:22:39.081Z
2023-05-24T15:22:39.081Z
{'Vendor': 'Liferay', 'Product': 'Portal', 'Versions': '7.3.1'}
CVE-2023-33695
Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the File.createTempFile() function at /core/io/FileUtil.java.
https://github.com/dromara/hutool/issues/3103
2023-05-22T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33953
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0’s can be added at the start of an integer. gRPC’s hpack parser needed to read all of them before concluding a parse. - gRPC’s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc…
https://cloud.google.com/support/bulletins#gcp-2023-022
2023-05-24T12:08:31.409Z
2023-08-09T12:54:47.415Z
2023-08-09T12:54:47.415Z
{'Vendor': 'Google', 'Product': 'gRPC', 'Versions': '0'}
CVE-2023-33379
Connected IO v2.1.0 and prior has a misconfiguration in their MQTT broker used for management and device communication, which allows devices to connect to the broker and issue commands to other device, impersonating Connected IO management platform and sending commands to all of Connected IO's devices.
https://www.connectedio.com/products/routers
2023-05-22T00:00:00
2023-08-04T00:00:00
2023-08-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33142
Microsoft SharePoint Server Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33142
2023-05-17T21:16:44.897Z
2023-06-13T23:26:28.027Z
2024-01-09T17:39:43.820Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Server 2019', 'Versions': '16.0.0'}
CVE-2023-33457
In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , may cause buffer-overflow and crash.
https://github.com/sogou/workflow/issues/1272
2023-05-22T00:00:00
2023-06-06T00:00:00
2023-06-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33007
Jenkins LoadComplete support Plugin 1.0 and earlier does not escape the LoadComplete test name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2903
2023-05-16T10:55:43.523Z
2023-05-16T16:00:22.256Z
2023-10-24T12:50:31.812Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins LoadComplete support Plugin', 'Versions': '0'}
CVE-2023-33904
In hci_server, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-05-23T06:51:01.535Z
2023-07-12T08:32:42.431Z
2023-07-12T08:32:42.431Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12'}
CVE-2023-33284
Marval MSM through 14.19.0.12476 and 15.0 has a Remote Code Execution vulnerability. A remote attacker authenticated as any user is able to execute code in context of the web server.
https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html
2023-05-22T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33791
A stored cross-site scripting (XSS) vulnerability in the Create Provider Accounts (/circuits/provider-accounts/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
https://github.com/anhdq201/netbox/issues/4
2023-05-22T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-33990
SAP SQL Anywhere - version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted.
https://me.sap.com/notes/3331029
2023-05-24T20:41:32.834Z
2023-07-11T02:29:57.811Z
2023-07-11T02:29:57.811Z
{'Vendor': 'SAP_SE', 'Product': 'SAP SQL Anywhere', 'Versions': '17.0'}