CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3110
Description: A vulnerability in SiLabs Unify Gateway 1.3.1 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1
2023-06-05T17:28:13.462Z
2023-06-21T19:44:00.543Z
2023-06-21T19:44:00.543Z
{'Vendor': 'Silicon Labs', 'Product': 'Unify Gateway', 'Versions': '1.3.2'}
CVE-2023-3540
A vulnerability, which was classified as problematic, was found in SimplePHPscripts NewsLetter Script PHP 2.4. Affected is an unknown function of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-233292.
https://vuldb.com/?id.233292
2023-07-07T12:01:34.755Z
2023-07-07T15:00:04.918Z
2023-10-23T14:17:08.682Z
{'Vendor': 'SimplePHPscripts', 'Product': 'NewsLetter Script PHP', 'Versions': '2.4'}
CVE-2023-3669
A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import dialog.
https://cert.vde.com/en/advisories/VDE-2023-023
2023-07-14T07:42:23.825Z
2023-08-03T11:11:05.068Z
2023-08-03T11:11:05.068Z
{'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.0.0.0'}
CVE-2023-3393
Code Injection in GitHub repository fossbilling/fossbilling prior to 0.5.1.
https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914
2023-06-23T18:11:34.819Z
2023-06-23T18:11:49.879Z
2023-06-23T18:11:49.879Z
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3239
A vulnerability, which was classified as problematic, was found in OTCMS up to 6.62. Affected is an unknown function of the file admin/readDeal.php?mudi=readQrCode. The manipulation of the argument img leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-231510 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231510
2023-06-14T06:12:39.708Z
2023-06-14T08:31:03.407Z
2023-10-23T13:18:33.522Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'}
CVE-2023-3686
A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It has been declared as critical. This vulnerability affects unknown code of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-234232. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234232
2023-07-15T16:19:04.638Z
2023-07-16T13:00:05.529Z
2023-10-23T15:23:29.456Z
{'Vendor': 'Bylancer', 'Product': 'QuickAI OpenAI', 'Versions': '3.8.1'}
CVE-2023-3413
An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to read the source code of a project through a fork created before changing visibility to only project members.
https://gitlab.com/gitlab-org/gitlab/-/issues/416284
2023-06-26T15:18:03.657Z
2023-09-29T08:30:56.742Z
2023-09-29T08:30:56.742Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.3, 16.4'}
CVE-2023-3043
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack-based buffer overflow via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023010.pdf
2023-06-01T20:50:12.099Z
2024-01-09T22:15:43.375Z
2024-01-09T22:15:43.375Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12, 13'}
CVE-2023-3556
A vulnerability was found in GZ Scripts Car Listing Script PHP 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file /preview.php. The manipulation of the argument page/sort_by leads to cross site scripting. The attack can be initiated remotely. VDB-233350 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233350
2023-07-08T11:50:55.057Z
2023-07-08T13:00:05.071Z
2023-10-23T14:25:42.022Z
{'Vendor': 'GZ Scripts', 'Product': 'Car Listing Script PHP', 'Versions': '1.8'}
CVE-2023-3106
A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.
https://access.redhat.com/security/cve/CVE-2023-3106
2023-06-05T13:55:28.745Z
2023-07-12T08:27:58.635Z
2024-01-23T02:25:03.036Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '4.8-rc7'}
CVE-2023-3805
A vulnerability, which was classified as critical, has been found in Xiamen Four Letter Video Surveillance Management System up to 20230712. This issue affects some unknown processing in the library UserInfoAction.class of the component Login. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235073 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235073
2023-07-20T08:31:33.982Z
2023-07-21T01:31:03.740Z
2023-10-24T06:03:49.773Z
{'Vendor': 'Xiamen Four Letter', 'Product': 'Video Surveillance Management System', 'Versions': '20230712'}
CVE-2023-3385
An issue has been discovered in GitLab affecting all versions starting from 8.10 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Under specific circumstances, a user importing a project 'from export' could access and read unrelated files via uploading a specially crafted file. This was due to a bug in `tar`, fixed in [`tar-1.35`](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html).
https://gitlab.com/gitlab-org/gitlab/-/issues/416161
2023-06-23T10:15:05.337Z
2023-08-01T23:35:55.776Z
2023-08-01T23:35:55.776Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '8.10, 16.1.0, 16.2.0'}
CVE-2023-3690
A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234236
2023-07-15T16:27:32.856Z
2023-07-16T16:00:04.841Z
2023-10-23T15:28:22.291Z
{'Vendor': 'Bylancer', 'Product': 'QuickOrder', 'Versions': '6.3.7'}
CVE-2023-3014
A vulnerability, which was classified as problematic, was found in BeipyVideoResolution up to 2.6. Affected is an unknown function of the file admin/admincore.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230358 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230358
2023-05-31T13:00:43.511Z
2023-05-31T13:31:03.382Z
2023-10-23T07:36:33.654Z
{'Vendor': 'n/a', 'Product': 'BeipyVideoResolution', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6'}
CVE-2023-3444
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to merge arbitrary code into protected branches.
https://gitlab.com/gitlab-org/gitlab/-/issues/406803
2023-06-28T13:19:28.787Z
2023-07-13T02:08:20.930Z
2023-07-13T02:08:20.930Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.3, 16.0, 16.1'}
CVE-2023-3917
Denial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail.
https://gitlab.com/gitlab-org/gitlab/-/issues/417896
2023-07-25T10:30:32.198Z
2023-09-29T06:02:26.304Z
2023-09-29T06:02:26.304Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.3, 16.4'}
CVE-2023-3852
A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-235204.
https://vuldb.com/?id.235204
2023-07-23T10:07:16.654Z
2023-07-23T22:00:04.288Z
2023-10-24T06:44:04.966Z
{'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.0, 1.3.1'}
CVE-2023-3151
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file user\manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231020.
https://vuldb.com/?id.231020
2023-06-07T13:56:09.467Z
2023-06-07T17:31:04.160Z
2023-10-23T12:54:08.496Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3501
The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/d3fb4a2b-ed51-4654-b7c1-4b0f59cd1ecf
2023-07-04T10:24:36.537Z
2023-08-30T14:22:00.740Z
2023-08-30T14:22:00.740Z
{'Vendor': 'Unknown', 'Product': 'FormCraft', 'Versions': '0'}
CVE-2023-3628
A flaw was found in Infinispan's REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.
https://access.redhat.com/errata/RHSA-2023:5396
2023-07-11T20:37:22.734Z
2023-12-18T13:43:07.750Z
2023-12-18T13:43:07.750Z
{'Vendor': 'n/a', 'Product': 'infinispan', 'Versions': ''}
CVE-2023-3782
DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response
https://github.com/square/okhttp/issues/7738
2023-07-19T20:36:23.920Z
2023-07-19T20:57:16.170Z
2023-07-19T20:57:16.170Z
{'Vendor': '', 'Product': '', 'Versions': '0'}
CVE-2023-3297
In Ubuntu's accountsservice an unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process.
https://ubuntu.com/security/notices/USN-6190-1
2023-06-16T14:50:30.269Z
2023-09-01T20:49:43.576Z
2023-09-01T20:49:43.576Z
{'Vendor': 'Canonical Ltd.', 'Product': 'AccountService', 'Versions': '23.13.9-2ubuntu2'}
CVE-2023-50495
NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
2023-12-11T00:00:00
2023-12-12T00:00:00
2024-01-19T16:06:41.964523
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50246
jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc
2023-12-05T20:42:59.377Z
2023-12-13T20:43:50.862Z
2023-12-13T20:43:50.862Z
{'Vendor': 'jqlang', 'Product': 'jq', 'Versions': '= 1.7'}
CVE-2023-50753
Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the user/update_profile.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/perahia/
2023-12-12T15:12:54.427Z
2024-01-04T14:10:29.461Z
2024-01-04T14:10:29.461Z
{'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'}
CVE-2023-50092
APIIDA API Gateway Manager for Broadcom Layer7 v2023.2 is vulnerable to Cross Site Scripting (XSS).
https://apiida.com/product/apiida-api-gateway-manager/
2023-12-04T00:00:00
2024-01-03T00:00:00
2024-01-03T13:02:58.711580
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50991
Buffer Overflow vulnerability in Tenda i29 versions 1.0 V1.0.0.5 and 1.0 V1.0.0.2, allows remote attackers to cause a denial of service (DoS) via the pingIp parameter in the pingSet function.
https://github.com/ef4tless/vuln/blob/master/iot/i29/pingSet.md
2023-12-18T00:00:00
2024-01-05T00:00:00
2024-01-05T09:38:51.778089
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50704
An attacker could construct a URL within the application that causes a redirection to an arbitrary external domain and could be leveraged to facilitate phishing attacks against application users.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03
2023-12-11T16:37:13.794Z
2023-12-19T23:43:11.595Z
2023-12-19T23:43:11.595Z
{'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'}
CVE-2023-50968
Arbitrary file properties reading vulnerability in Apache Software Foundation Apache OFBiz when user operates an uri call without authorizations. The same uri can be operated to realize a SSRF attack also without authorizations. Users are recommended to upgrade to version 18.12.11, which fixes this issue.
https://ofbiz.apache.org/download.html
2023-12-17T12:58:11.842Z
2023-12-26T11:45:55.393Z
2023-12-26T11:45:55.393Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OFBiz', 'Versions': '0'}
CVE-2023-50987
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysTimeInfoSet function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:44.938734
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50342
HCL DRYiCE MyXalytics is impacted by an Insecure Direct Object Reference (IDOR) vulnerability.  A user can obtain certain details about another user as a result of improper access control.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.604Z
2024-01-03T02:39:45.432Z
2024-01-03T02:39:45.432Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50712
Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations in versions prior to v2.3.7. The vulnerability may allow an attacker to inject malicious scripts into the application, which could then be executed when a user visits the affected locations. This could lead to unauthorized access, data theft, or other related malicious activities. An attacker need to be authenticated on the application to exploit this vulnerability. The issue is fixed in version v2.3.7 of iris-web. No known workarounds are available.
https://github.com/dfir-iris/iris-web/security/advisories/GHSA-593r-747g-p92p
2023-12-11T17:53:36.028Z
2023-12-22T19:19:31.379Z
2023-12-22T19:19:31.379Z
{'Vendor': 'dfir-iris', 'Product': 'iris-web', 'Versions': '< 2.3.7'}
CVE-2023-50250
Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.
https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
2023-12-05T20:42:59.377Z
2023-12-22T16:39:47.736Z
2023-12-22T16:39:47.736Z
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'}
CVE-2023-50102
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS).
https://github.com/Jarvis-616/cms/blob/master/Content%20data%20exists%20in%20storage%20XSS%20for%20editing.md
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T16:00:31.404821
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50944
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don't have access. This vulnerability is considered low since it requires an authenticated user to exploit it. Users are recommended to upgrade to version 2.8.1, which fixes this issue.
https://github.com/apache/airflow/pull/36257
2023-12-16T16:08:20.951Z
2024-01-24T12:58:18.873Z
2024-01-24T12:58:18.873Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-50694
An issue in dom96 HTTPbeast v.0.4.1 and before allows a remote attacker to execute arbitrary code via a crafted request to the parser.nim component.
https://github.com/dom96/httpbeast/pull/96
2023-12-11T00:00:00
2024-01-19T00:00:00
2024-01-19T19:15:42.023012
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50856
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits.This issue affects Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits: from n/a through 2.14.3.
https://patchstack.com/database/vulnerability/funnel-builder/wordpress-funnel-builder-for-wordpress-by-funnelkit-plugin-2-14-3-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:16.269Z
2023-12-28T11:01:03.703Z
2023-12-28T11:01:03.703Z
{'Vendor': 'FunnelKit', 'Product': 'Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits', 'Versions': 'n/a'}
CVE-2023-50440
ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; ZED! for Windows, Mac, Linux before 2023.5; ZEDFREE for Windows, Mac, Linux before 2023.5; or ZEDPRO for Windows, Mac, Linux before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger network access to an attacker-controlled computer when opened by the victim.
https://www.primx.eu/fr/blog/
2023-12-10T00:00:00
2023-12-13T00:00:00
2023-12-13T20:28:25.568584
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50339
Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:54.055Z
2023-12-26T07:20:31.556Z
2023-12-26T07:20:31.556Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'v6.1.11'}
CVE-2023-50769
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3203
2023-12-13T13:06:36.477Z
2023-12-13T17:30:16.867Z
2023-12-13T17:30:16.867Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'}
CVE-2023-50840
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdevelop, oplugins Booking Manager.This issue affects Booking Manager: from n/a through 2.1.5.
https://patchstack.com/database/vulnerability/booking-manager/wordpress-booking-manager-plugin-2-1-5-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:18:45.975Z
2023-12-28T18:54:50.117Z
2023-12-28T18:54:50.117Z
{'Vendor': 'wpdevelop, oplugins', 'Product': 'Booking Manager', 'Versions': 'n/a'}
CVE-2023-50456
An issue was discovered in Zammad before 6.2.0. An attacker can trigger phishing links in generated notification emails via a crafted first or last name.
https://zammad.com/en/advisories/zaa-2023-07
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T18:48:59.799976
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50728
octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3.
https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv
2023-12-11T17:53:36.032Z
2023-12-15T21:59:00.312Z
2023-12-15T21:59:00.312Z
{'Vendor': 'octokit', 'Product': 'webhooks.js', 'Versions': '>= 9.26.0, < 9.26.3, >= 10.9.0, < 10.9.2, >= 11.1.0, < 11.1.2, >= 12.0.0, < 12.0.4'}
CVE-2023-50860
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TMS Booking for Appointments and Events Calendar – Amelia allows Stored XSS.This issue affects Booking for Appointments and Events Calendar – Amelia: from n/a through 1.0.85.
https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-85-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:19:16.270Z
2023-12-28T10:14:11.022Z
2023-12-28T10:14:11.022Z
{'Vendor': 'TMS', 'Product': 'Booking for Appointments and Events Calendar – Amelia', 'Versions': 'n/a'}
CVE-2023-50708
yii2-authclient is an extension that adds OpenID, OAuth, OAuth2 and OpenId Connect consumers for the Yii framework 2.0. In yii2-authclient prior to version 2.2.15, the Oauth1/2 `state` and OpenID Connect `nonce` is vulnerable for a `timing attack` since it is compared via regular string comparison (instead of `Yii::$app->getSecurity()->compareString()`). Version 2.2.15 contains a patch for the issue. No known workarounds are available.
https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-w8vh-p74j-x9xp
2023-12-11T17:53:36.027Z
2023-12-22T18:25:01.925Z
2023-12-22T18:25:01.925Z
{'Vendor': 'yiisoft', 'Product': 'yii2-authclient', 'Versions': '< 2.2.15'}
CVE-2023-50071
Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name.
https://github.com/geraldoalcantara/CVE-2023-50071
2023-12-04T00:00:00
2023-12-29T00:00:00
2023-12-29T21:21:49.597482
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50837
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebFactory Ltd Login Lockdown – Protect Login Form.This issue affects Login Lockdown – Protect Login Form: from n/a through 2.06.
https://patchstack.com/database/vulnerability/login-lockdown/wordpress-login-lockdown-protect-login-form-plugin-2-06-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:18:45.975Z
2023-12-29T11:43:49.093Z
2023-12-29T11:43:49.093Z
{'Vendor': 'WebFactory Ltd', 'Product': 'Login Lockdown – Protect Login Form', 'Versions': 'n/a'}
CVE-2023-50564
An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
https://github.com/SecBridge/Cms_Vuls_test/blob/main/Pluckcms/Pluck_v4.7.18_Any_File_Upload_Getshell.md
2023-12-11T00:00:00
2023-12-14T00:00:00
2023-12-14T14:32:33.065977
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50572
An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error.
https://github.com/jline/jline3/issues/909
2023-12-11T00:00:00
2023-12-29T00:00:00
2023-12-29T14:37:59.751097
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50030
In the module "Jms Setting" (jmssetting) from Joommasters for PrestaShop, a guest can perform SQL injection in versions <= 1.1.0. The method `JmsSetting::getSecondImgs()` has a sensitive SQL call that can be executed with a trivial http call and exploited to forge a blind SQL injection.
https://www.joommasters.com/
2023-12-04T00:00:00
2024-01-19T00:00:00
2024-01-19T13:28:50.208831
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50175
Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:52.053Z
2023-12-26T07:21:15.728Z
2023-12-26T07:21:15.728Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'}
CVE-2023-50732
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute a Velocity script without script right through the document tree. This has been patched in XWiki 14.10.7 and 15.2RC1.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p5f8-qf24-24cj
2023-12-11T17:53:36.032Z
2023-12-21T19:42:01.215Z
2023-12-21T19:42:01.215Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 8.3-rc-1, < 14.10.7, >= 15.0-rc-1, < 15.2-rc-1'}
CVE-2023-50948
IBM Storage Fusion HCI 2.1.0 through 2.6.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 275671.
https://www.ibm.com/support/pages/node/7105509
2023-12-16T19:35:35.358Z
2024-01-08T01:43:08.302Z
2024-01-08T01:43:08.302Z
{'Vendor': 'IBM', 'Product': 'Storage Fusion HCI', 'Versions': '2.1.0'}
CVE-2023-50765
A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3206
2023-12-13T13:06:36.476Z
2023-12-13T17:30:14.297Z
2023-12-13T17:30:14.297Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Scriptler Plugin', 'Versions': '0'}
CVE-2023-50159
In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.
https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-18T18:39:43.659265
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50773
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184
2023-12-13T13:06:36.477Z
2023-12-13T17:30:19.459Z
2023-12-13T17:30:19.459Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Dingding JSON Pusher Plugin', 'Versions': '0'}
CVE-2023-50266
Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols.
https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
2023-12-05T20:42:59.380Z
2023-12-15T20:42:29.685Z
2023-12-15T20:42:29.685Z
{'Vendor': 'morpheus65535', 'Product': 'bazarr', 'Versions': '1.2.4'}
CVE-2023-50724
Resque (pronounced like "rescue") is a Redis-backed library for creating background jobs, placing those jobs on multiple queues, and processing them later. resque-web in resque versions before 2.1.0 are vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint. This issue has been patched in version 2.1.0.
https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj
2023-12-11T17:53:36.031Z
2023-12-21T14:50:29.294Z
2023-12-21T14:50:29.294Z
{'Vendor': 'resque', 'Product': 'resque', 'Versions': '< 2.1.0'}
CVE-2023-50119
null
null
2023-12-04T00:00:00
null
2023-12-21T14:26:53.232644
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-50725
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8
2023-12-11T17:53:36.031Z
2023-12-22T20:02:15.568Z
2023-12-22T20:02:15.568Z
{'Vendor': 'resque', 'Product': 'resque', 'Versions': '< 2.2.1'}
CVE-2023-50772
Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184
2023-12-13T13:06:36.477Z
2023-12-13T17:30:18.818Z
2023-12-13T17:30:18.818Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Dingding JSON Pusher Plugin', 'Versions': '0'}
CVE-2023-50267
MeterSphere is a one-stop open source continuous testing platform. Prior to 2.10.10-lts, the authenticated attackers can update resources which don't belong to him if the resource ID is known. This issue if fixed in 2.10.10-lts. There are no known workarounds.
https://github.com/metersphere/metersphere/security/advisories/GHSA-rcp4-c5p2-58v9
2023-12-05T20:42:59.380Z
2023-12-28T15:13:34.769Z
2023-12-28T15:13:34.769Z
{'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.10-lts'}
CVE-2023-50764
Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3205
2023-12-13T13:06:36.476Z
2023-12-13T17:30:13.658Z
2023-12-13T17:30:13.658Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Scriptler Plugin', 'Versions': '0'}
CVE-2023-50271
A potential security vulnerability has been identified with HP-UX System Management Homepage (SMH). This vulnerability could be exploited locally or remotely to disclose information.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbux04551en_us
2023-12-06T14:22:26.839Z
2023-12-17T14:49:53.516Z
2023-12-17T14:49:53.516Z
{'Vendor': 'HPE', 'Product': 'HPE System Management Homepage (SMH)', 'Versions': 'Prior to HPE SMH ver.A.3.2.23.09'}
CVE-2023-50932
An issue was discovered in savignano S/Notify before 4.0.2 for Confluence. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Confluence, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28
2023-12-15T00:00:00
2024-01-09T00:00:00
2024-01-09T06:16:22.638857
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50965
In MicroHttpServer (aka Micro HTTP Server) through 4398570, _ReadStaticFiles in lib/middleware.c allows a stack-based buffer overflow and potentially remote code execution via a long URI.
https://github.com/starnight/MicroHttpServer/issues/5
2023-12-17T00:00:00
2023-12-17T00:00:00
2023-12-17T01:47:53.939991
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50123
The number of attempts to bring the Hozard Alarm system (alarmsystemen) v1.0 to a disarmed state is not limited. This could allow an attacker to perform a brute force on the SMS authentication, to bring the alarm system to a disarmed state.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:20:58.607277
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50089
A Command Injection vulnerability exists in NETGEAR WNR2000v4 version 1.0.0.70. When using HTTP for SOAP authentication, command execution occurs during the process after successful authentication.
https://www.netgear.com/about/security/
2023-12-04T00:00:00
2023-12-15T00:00:00
2023-12-15T16:48:40.975174
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50070
Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_ticket via department_id, customer_id, and subject.
https://github.com/geraldoalcantara/CVE-2023-50070
2023-12-04T00:00:00
2023-12-29T00:00:00
2023-12-29T21:22:53.245907
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50836
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ibericode HTML Forms allows Stored XSS.This issue affects HTML Forms: from n/a through 1.3.28.
https://patchstack.com/database/vulnerability/html-forms/wordpress-html-forms-plugin-1-3-28-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:45.974Z
2023-12-28T10:19:57.333Z
2023-12-28T10:19:57.333Z
{'Vendor': 'ibericode', 'Product': 'HTML Forms', 'Versions': 'n/a'}
CVE-2023-50565
A cross-site scripting (XSS) vulnerability in the component /logs/dopost.html in RPCMS v3.5.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
https://github.com/ralap-z/rpcms/issues/7
2023-12-11T00:00:00
2023-12-14T00:00:00
2023-12-14T14:32:33.696490
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50709
Cube is a semantic layer for building data applications. Prior to version 0.34.34, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. The issue has been patched in `v0.34.34` and it's recommended that all users exposing Cube APIs to the public internet upgrade to the latest version to prevent service disruption. There are currently no workaround for older versions, and the recommendation is to upgrade.
https://github.com/cube-js/cube/security/advisories/GHSA-9759-3276-g2pm
2023-12-11T17:53:36.028Z
2023-12-13T22:00:04.603Z
2023-12-13T22:00:04.603Z
{'Vendor': 'cube-js', 'Product': 'cube', 'Versions': '< 0.34.34'}
CVE-2023-50924
Englesystem is a shift planning system for chaos events. Engelsystem prior to v3.4.1 performed insufficient validation of user supplied data for the DECT number, mobile number, and work-log comment fields. The values of those fields would be displayed in corresponding log overviews, allowing the injection and execution of Javascript code in another user's context. This vulnerability enables an authenticated user to inject Javascript into other user's sessions. The injected JS will be executed during normal usage of the system when viewing, e.g., overview pages. This issue has been fixed in version 3.4.1.
https://github.com/engelsystem/engelsystem/security/advisories/GHSA-p5ch-rrpm-wvhm
2023-12-15T20:57:23.174Z
2023-12-22T20:37:47.224Z
2023-12-22T20:37:47.224Z
{'Vendor': 'engelsystem', 'Product': 'engelsystem', 'Versions': '< 3.4.1'}
CVE-2023-50027
SQL Injection vulnerability in Buy Addons baproductzoommagnifier module for PrestaShop versions 1.0.16 and before, allows remote attackers to escalate privileges and gain sensitive information via BaproductzoommagnifierZoomModuleFrontController::run() method.
https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html
2023-12-04T00:00:00
2024-01-05T00:00:00
2024-01-05T09:09:23.702900
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50477
An issue was discovered in nos client version 0.6.6, allows remote attackers to escalate privileges via getRPCEndpoint.js.
https://github.com/nos/client/issues/1485
2023-12-11T00:00:00
2023-12-21T00:00:00
2023-12-21T10:26:03.407019
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50162
SQL injection vulnerability in EmpireCMS v7.5, allows remote attackers to execute arbitrary code and obtain sensitive information via the DoExecSql function.
https://github.com/Teresazdy/CVE
2023-12-04T00:00:00
2024-01-08T00:00:00
2024-01-08T23:09:56.709787
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50729
Traccar is an open source GPS tracking system. Prior to 5.11, Traccar is affected by an unrestricted file upload vulnerability in File feature allows attackers to execute arbitrary code on the server. This vulnerability is more prevalent because Traccar is recommended to run web servers as root user. It is also more dangerous because it can write or overwrite files in arbitrary locations. Version 5.11 was published to fix this vulnerability.
https://github.com/traccar/traccar/security/advisories/GHSA-pqf7-8g85-vx2q
2023-12-11T17:53:36.032Z
2024-01-15T15:57:27.575Z
2024-01-15T15:57:27.575Z
{'Vendor': 'traccar', 'Product': 'traccar', 'Versions': '< 5.11'}
CVE-2023-50841
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Repute Infosystems BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin.This issue affects BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin: from n/a through 1.0.72.
https://patchstack.com/database/vulnerability/bookingpress-appointment-booking/wordpress-bookingpress-plugin-1-0-72-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:18:45.975Z
2023-12-28T18:37:40.943Z
2023-12-28T18:37:40.943Z
{'Vendor': 'Repute Infosystems', 'Product': 'BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin', 'Versions': 'n/a'}
CVE-2023-50457
An issue was discovered in Zammad before 6.2.0. When listing tickets linked to a knowledge base answer, or knowledge base answers of a ticket, a user could see entries for which they lack permissions.
https://zammad.com/en/advisories/zaa-2023-05
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T18:48:50.863927
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50768
A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3203
2023-12-13T13:06:36.477Z
2023-12-13T17:30:16.219Z
2023-12-13T17:30:16.219Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'}
CVE-2023-50857
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit.This issue affects Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit: from n/a through 2.6.1.
https://patchstack.com/database/vulnerability/wp-marketing-automations/wordpress-automation-by-funnelkit-plugin-2-6-1-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:16.269Z
2023-12-28T10:57:46.626Z
2023-12-28T10:57:46.626Z
{'Vendor': 'FunnelKit', 'Product': 'Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit', 'Versions': 'n/a'}
CVE-2023-50441
Encrypted folders created by PRIMX ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission) or ZONECENTRAL for Windows before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger outbound network traffic from computers on which folders are opened.
https://www.primx.eu/fr/blog/
2023-12-10T00:00:00
2023-12-13T00:00:00
2023-12-13T19:44:29.151334
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50011
PopojiCMS version 2.0.1 is vulnerable to remote command execution in the Meta Social field.
https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T14:43:22.770650
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50251
php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when parsing the attributes passed to a `use` tag inside an svg document, an attacker can cause the system to go to an infinite recursion. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself. An attacker sending multiple request to a system to render the above payload can potentially cause resource exhaustion to the point that the system is unable to handle incoming request. Version 0.5.1 contains a patch for this issue.
https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2
2023-12-05T20:42:59.377Z
2023-12-12T20:37:23.035Z
2023-12-12T20:37:23.035Z
{'Vendor': 'dompdf', 'Product': 'php-svg-lib', 'Versions': '< 0.5.1'}
CVE-2023-50343
HCL DRYiCE MyXalytics is impacted by an Improper Access Control (Controller APIs) vulnerability. Certain API endpoints are accessible to Customer Admin Users that can allow access to sensitive information about other users.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.604Z
2024-01-03T02:37:22.668Z
2024-01-03T02:37:22.668Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50713
Speckle Server provides server, frontend, 3D viewer, and other JavaScript utilities for the Speckle 3D data platform. A vulnerability in versions prior to 2.17.6 affects users who: authorized an application which requested a 'token write' scope or, using frontend-2, created a Personal Access Token (PAT) with `token write` scope. When creating a new token an agent needs to authorise the request with an existing token (the 'requesting token'). The requesting token is required to have token write scope in order to generate new tokens. However, Speckle server was not verifying that other privileges granted to the new token were not in excess of the privileges of the requesting token. A malicious actor could use a token with only token write scope to subsequently generate further tokens with additional privileges. These privileges would only grant privileges up to the existing privileges of the user. This vulnerability cannot be used to escalate a user's privileges or grant privileges on behalf of other users. This has been patched as of version 2.17.6. All operators of Speckle servers should upgrade their server to version 2.17.6 or higher. Any users who authorized an application with 'token write' scope, or created a token in frontend-2 with `token write` scope should review existing tokens and permanently revoke any they do not recognize, revoke existing tokens and create new tokens, and review usage of their account for suspicious activity. No known workarounds for this issue exist.
https://github.com/specklesystems/speckle-server/security/advisories/GHSA-xpf3-5q5x-3qwh
2023-12-11T17:53:36.029Z
2023-12-14T18:08:57.974Z
2023-12-14T18:08:57.974Z
{'Vendor': 'specklesystems', 'Product': 'speckle-server', 'Versions': '< 2.17.6'}
CVE-2023-50986
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysLogin function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:43.689972
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50705
An attacker could create malicious requests to obtain sensitive information about the web server.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03
2023-12-11T16:37:13.794Z
2023-12-19T23:45:17.101Z
2023-12-19T23:45:17.101Z
{'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'}
CVE-2023-50093
APIIDA API Gateway Manager for Broadcom Layer7 v2023.2.2 is vulnerable to Host Header Injection.
https://apiida.com/product/apiida-api-gateway-manager/
2023-12-04T00:00:00
2024-01-03T00:00:00
2024-01-03T13:51:50.832051
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50569
Reflected Cross Site Scripting (XSS) vulnerability in Cacti v1.2.25, allows remote attackers to escalate privileges when uploading an xml template file via templates_import.php.
https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf
2023-12-11T00:00:00
2023-12-22T00:00:00
2023-12-24T15:40:28.654152
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50990
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the rebootTime parameter in the sysScheduleRebootSet function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:48.581990
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50247
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The QUIC stack (quicly), as used by H2O up to commit 43f86e5 (in version 2.3.0-beta and prior), is susceptible to a state exhaustion attack. When H2O is serving HTTP/3, a remote attacker can exploit this vulnerability to progressively increase the memory retained by the QUIC stack. This can eventually cause H2O to abort due to memory exhaustion. The vulnerability has been resolved in commit d67e81d03be12a9d53dc8271af6530f40164cd35. HTTP/1 and HTTP/2 are not affected by this vulnerability as they do not use QUIC. Administrators looking to mitigate this issue without upgrading can disable HTTP/3 support.
https://github.com/h2o/h2o/security/advisories/GHSA-2ch5-p59c-7mv6
2023-12-05T20:42:59.377Z
2023-12-12T19:56:20.726Z
2023-12-12T19:56:20.726Z
{'Vendor': 'h2o', 'Product': 'h2o', 'Versions': '<= 2.3.0-beta2'}
CVE-2023-50752
Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'e' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/perahia/
2023-12-12T15:12:54.427Z
2024-01-04T14:09:22.028Z
2024-01-04T14:09:22.028Z
{'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'}
CVE-2023-50928
"Sandbox Accounts for Events" provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially claim and access empty AWS accounts by sending request payloads to the account API containing non-existent event ids and self-defined budget & duration. This issue only affects cleaned AWS accounts, it is not possible to access AWS accounts in use or existing data/infrastructure. This issue has been patched in version 1.1.0.
https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-cg8w-7q5v-g32r
2023-12-15T20:57:23.174Z
2023-12-22T21:00:49.814Z
2023-12-22T21:00:49.814Z
{'Vendor': 'awslabs', 'Product': 'sandbox-accounts-for-events', 'Versions': '< 1.1.0'}
CVE-2023-50020
An issue was discovered in open5gs v2.6.6. SIGPIPE can be used to crash AMF.
https://github.com/open5gs/open5gs/issues/2734
2023-12-04T00:00:00
2024-01-02T00:00:00
2024-01-02T21:47:13.868846
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50470
A cross-site scripting (XSS) vulnerability in the component admin_ Video.php of SeaCMS v12.8 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
http://seacms.com
2023-12-11T00:00:00
2023-12-28T00:00:00
2023-12-28T14:53:15.148541
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50889
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder – WordPress Page Builder allows Stored XSS.This issue affects Beaver Builder – WordPress Page Builder: from n/a through 2.7.2.
https://patchstack.com/database/vulnerability/beaver-builder-lite-version/wordpress-beaver-builder-plugin-2-7-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T15:08:48.865Z
2023-12-29T11:21:56.258Z
2023-12-29T11:21:56.258Z
{'Vendor': 'The Beaver Builder Team', 'Product': 'Beaver Builder – WordPress Page Builder', 'Versions': 'n/a'}
CVE-2023-50866
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginAction.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/evans/
2023-12-14T17:47:18.224Z
2024-01-04T14:32:53.660Z
2024-01-04T14:32:53.660Z
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
CVE-2023-50974
In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwrite user are stored in a ~/.appwrite/prefs.json file with 0644 as UNIX permissions. Any user of the local system can access those credentials.
https://gist.github.com/SkypLabs/72ee00ecfa7d1a3494e2d69a24279c1d
2023-12-17T00:00:00
2024-01-09T00:00:00
2024-01-09T08:36:25.462934
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50831
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme CURCY – Multi Currency for WooCommerce allows Stored XSS.This issue affects CURCY – Multi Currency for WooCommerce: from n/a through 2.2.0.
https://patchstack.com/database/vulnerability/woo-multi-currency/wordpress-curcy-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.554Z
2023-12-21T17:20:49.830Z
2023-12-21T17:20:49.830Z
{'Vendor': 'VillaTheme', 'Product': 'CURCY – Multi Currency for WooCommerce', 'Versions': 'n/a'}