CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3110 | Description: A vulnerability in SiLabs Unify Gateway 1.3.1 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution. | https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1 | 2023-06-05T17:28:13.462Z | 2023-06-21T19:44:00.543Z | 2023-06-21T19:44:00.543Z | {'Vendor': 'Silicon Labs', 'Product': 'Unify Gateway', 'Versions': '1.3.2'} |
CVE-2023-3540 | A vulnerability, which was classified as problematic, was found in SimplePHPscripts NewsLetter Script PHP 2.4. Affected is an unknown function of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-233292. | https://vuldb.com/?id.233292 | 2023-07-07T12:01:34.755Z | 2023-07-07T15:00:04.918Z | 2023-10-23T14:17:08.682Z | {'Vendor': 'SimplePHPscripts', 'Product': 'NewsLetter Script PHP', 'Versions': '2.4'} |
CVE-2023-3669 | A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import dialog. | https://cert.vde.com/en/advisories/VDE-2023-023 | 2023-07-14T07:42:23.825Z | 2023-08-03T11:11:05.068Z | 2023-08-03T11:11:05.068Z | {'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.0.0.0'} |
CVE-2023-3393 | Code Injection in GitHub repository fossbilling/fossbilling prior to 0.5.1. | https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914 | 2023-06-23T18:11:34.819Z | 2023-06-23T18:11:49.879Z | 2023-06-23T18:11:49.879Z | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3239 | A vulnerability, which was classified as problematic, was found in OTCMS up to 6.62. Affected is an unknown function of the file admin/readDeal.php?mudi=readQrCode. The manipulation of the argument img leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-231510 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231510 | 2023-06-14T06:12:39.708Z | 2023-06-14T08:31:03.407Z | 2023-10-23T13:18:33.522Z | {'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'} |
CVE-2023-3686 | A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It has been declared as critical. This vulnerability affects unknown code of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-234232. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234232 | 2023-07-15T16:19:04.638Z | 2023-07-16T13:00:05.529Z | 2023-10-23T15:23:29.456Z | {'Vendor': 'Bylancer', 'Product': 'QuickAI OpenAI', 'Versions': '3.8.1'} |
CVE-2023-3413 | An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to read the source code of a project through a fork created before changing visibility to only project members. | https://gitlab.com/gitlab-org/gitlab/-/issues/416284 | 2023-06-26T15:18:03.657Z | 2023-09-29T08:30:56.742Z | 2023-09-29T08:30:56.742Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.3, 16.4'} |
CVE-2023-3043 |
AMI’s SPx contains
a vulnerability in the BMC where an Attacker may
cause a stack-based buffer overflow via an adjacent network. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023010.pdf | 2023-06-01T20:50:12.099Z | 2024-01-09T22:15:43.375Z | 2024-01-09T22:15:43.375Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12, 13'} |
CVE-2023-3556 | A vulnerability was found in GZ Scripts Car Listing Script PHP 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file /preview.php. The manipulation of the argument page/sort_by leads to cross site scripting. The attack can be initiated remotely. VDB-233350 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233350 | 2023-07-08T11:50:55.057Z | 2023-07-08T13:00:05.071Z | 2023-10-23T14:25:42.022Z | {'Vendor': 'GZ Scripts', 'Product': 'Car Listing Script PHP', 'Versions': '1.8'} |
CVE-2023-3106 | A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely. | https://access.redhat.com/security/cve/CVE-2023-3106 | 2023-06-05T13:55:28.745Z | 2023-07-12T08:27:58.635Z | 2024-01-23T02:25:03.036Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '4.8-rc7'} |
CVE-2023-3805 | A vulnerability, which was classified as critical, has been found in Xiamen Four Letter Video Surveillance Management System up to 20230712. This issue affects some unknown processing in the library UserInfoAction.class of the component Login. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235073 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235073 | 2023-07-20T08:31:33.982Z | 2023-07-21T01:31:03.740Z | 2023-10-24T06:03:49.773Z | {'Vendor': 'Xiamen Four Letter', 'Product': 'Video Surveillance Management System', 'Versions': '20230712'} |
CVE-2023-3385 | An issue has been discovered in GitLab affecting all versions starting from 8.10 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Under specific circumstances, a user importing a project 'from export' could access and read unrelated files via uploading a specially crafted file. This was due to a bug in `tar`, fixed in [`tar-1.35`](https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html). | https://gitlab.com/gitlab-org/gitlab/-/issues/416161 | 2023-06-23T10:15:05.337Z | 2023-08-01T23:35:55.776Z | 2023-08-01T23:35:55.776Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '8.10, 16.1.0, 16.2.0'} |
CVE-2023-3690 | A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234236 | 2023-07-15T16:27:32.856Z | 2023-07-16T16:00:04.841Z | 2023-10-23T15:28:22.291Z | {'Vendor': 'Bylancer', 'Product': 'QuickOrder', 'Versions': '6.3.7'} |
CVE-2023-3014 | A vulnerability, which was classified as problematic, was found in BeipyVideoResolution up to 2.6. Affected is an unknown function of the file admin/admincore.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230358 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230358 | 2023-05-31T13:00:43.511Z | 2023-05-31T13:31:03.382Z | 2023-10-23T07:36:33.654Z | {'Vendor': 'n/a', 'Product': 'BeipyVideoResolution', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6'} |
CVE-2023-3444 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to merge arbitrary code into protected branches. | https://gitlab.com/gitlab-org/gitlab/-/issues/406803 | 2023-06-28T13:19:28.787Z | 2023-07-13T02:08:20.930Z | 2023-07-13T02:08:20.930Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.3, 16.0, 16.1'} |
CVE-2023-3917 | Denial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail. | https://gitlab.com/gitlab-org/gitlab/-/issues/417896 | 2023-07-25T10:30:32.198Z | 2023-09-29T06:02:26.304Z | 2023-09-29T06:02:26.304Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.3, 16.4'} |
CVE-2023-3852 | A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-235204. | https://vuldb.com/?id.235204 | 2023-07-23T10:07:16.654Z | 2023-07-23T22:00:04.288Z | 2023-10-24T06:44:04.966Z | {'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.0, 1.3.1'} |
CVE-2023-3151 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file user\manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231020. | https://vuldb.com/?id.231020 | 2023-06-07T13:56:09.467Z | 2023-06-07T17:31:04.160Z | 2023-10-23T12:54:08.496Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3501 | The FormCraft WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/d3fb4a2b-ed51-4654-b7c1-4b0f59cd1ecf | 2023-07-04T10:24:36.537Z | 2023-08-30T14:22:00.740Z | 2023-08-30T14:22:00.740Z | {'Vendor': 'Unknown', 'Product': 'FormCraft', 'Versions': '0'} |
CVE-2023-3628 | A flaw was found in Infinispan's REST. Bulk read endpoints do not properly evaluate user permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions. | https://access.redhat.com/errata/RHSA-2023:5396 | 2023-07-11T20:37:22.734Z | 2023-12-18T13:43:07.750Z | 2023-12-18T13:43:07.750Z | {'Vendor': 'n/a', 'Product': 'infinispan', 'Versions': ''} |
CVE-2023-3782 | DoS of the OkHttp client when using a BrotliInterceptor and surfing to a malicious web server, or when an attacker can perform MitM to inject a Brotli zip-bomb into an HTTP response
| https://github.com/square/okhttp/issues/7738 | 2023-07-19T20:36:23.920Z | 2023-07-19T20:57:16.170Z | 2023-07-19T20:57:16.170Z | {'Vendor': '', 'Product': '', 'Versions': '0'} |
CVE-2023-3297 | In Ubuntu's accountsservice an unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process. | https://ubuntu.com/security/notices/USN-6190-1 | 2023-06-16T14:50:30.269Z | 2023-09-01T20:49:43.576Z | 2023-09-01T20:49:43.576Z | {'Vendor': 'Canonical Ltd.', 'Product': 'AccountService', 'Versions': '23.13.9-2ubuntu2'} |
CVE-2023-50495 | NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry(). | https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html | 2023-12-11T00:00:00 | 2023-12-12T00:00:00 | 2024-01-19T16:06:41.964523 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50246 | jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue. | https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc | 2023-12-05T20:42:59.377Z | 2023-12-13T20:43:50.862Z | 2023-12-13T20:43:50.862Z | {'Vendor': 'jqlang', 'Product': 'jq', 'Versions': '= 1.7'} |
CVE-2023-50753 | Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the user/update_profile.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/perahia/ | 2023-12-12T15:12:54.427Z | 2024-01-04T14:10:29.461Z | 2024-01-04T14:10:29.461Z | {'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'} |
CVE-2023-50092 | APIIDA API Gateway Manager for Broadcom Layer7 v2023.2 is vulnerable to Cross Site Scripting (XSS). | https://apiida.com/product/apiida-api-gateway-manager/ | 2023-12-04T00:00:00 | 2024-01-03T00:00:00 | 2024-01-03T13:02:58.711580 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50991 | Buffer Overflow vulnerability in Tenda i29 versions 1.0 V1.0.0.5 and 1.0 V1.0.0.2, allows remote attackers to cause a denial of service (DoS) via the pingIp parameter in the pingSet function. | https://github.com/ef4tless/vuln/blob/master/iot/i29/pingSet.md | 2023-12-18T00:00:00 | 2024-01-05T00:00:00 | 2024-01-05T09:38:51.778089 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50704 |
An attacker could construct a URL within the application that causes a redirection to an arbitrary external domain and could be leveraged to facilitate phishing attacks against application users.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03 | 2023-12-11T16:37:13.794Z | 2023-12-19T23:43:11.595Z | 2023-12-19T23:43:11.595Z | {'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'} |
CVE-2023-50968 | Arbitrary file properties reading vulnerability in Apache Software Foundation Apache OFBiz when user operates an uri call without authorizations.
The same uri can be operated to realize a SSRF attack also without authorizations.
Users are recommended to upgrade to version 18.12.11, which fixes this issue. | https://ofbiz.apache.org/download.html | 2023-12-17T12:58:11.842Z | 2023-12-26T11:45:55.393Z | 2023-12-26T11:45:55.393Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache OFBiz', 'Versions': '0'} |
CVE-2023-50987 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysTimeInfoSet function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:44.938734 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50342 | HCL DRYiCE MyXalytics is impacted by an Insecure Direct Object Reference (IDOR) vulnerability. A user can obtain certain details about another user as a result of improper access control.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-12-07T03:55:55.604Z | 2024-01-03T02:39:45.432Z | 2024-01-03T02:39:45.432Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-50712 | Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations in versions prior to v2.3.7. The vulnerability may allow an attacker to inject malicious scripts into the application, which could then be executed when a user visits the affected locations. This could lead to unauthorized access, data theft, or other related malicious activities. An attacker need to be authenticated on the application to exploit this vulnerability. The issue is fixed in version v2.3.7 of iris-web. No known workarounds are available. | https://github.com/dfir-iris/iris-web/security/advisories/GHSA-593r-747g-p92p | 2023-12-11T17:53:36.028Z | 2023-12-22T19:19:31.379Z | 2023-12-22T19:19:31.379Z | {'Vendor': 'dfir-iris', 'Product': 'iris-web', 'Versions': '< 2.3.7'} |
CVE-2023-50250 | Cacti is an open source operational monitoring and fault management framework. A reflection cross-site scripting vulnerability was discovered in version 1.2.25. Attackers can exploit this vulnerability to perform actions on behalf of other users. The vulnerability is found in `templates_import.php.` When uploading an xml template file, if the XML file does not pass the check, the server will give a JavaScript pop-up prompt, which contains unfiltered xml template file name, resulting in XSS. An attacker exploiting this vulnerability could execute actions on behalf of other users. This ability to impersonate users could lead to unauthorized changes to settings. As of time of publication, no patched versions are available.
| https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73 | 2023-12-05T20:42:59.377Z | 2023-12-22T16:39:47.736Z | 2023-12-22T16:39:47.736Z | {'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'} |
CVE-2023-50102 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS). | https://github.com/Jarvis-616/cms/blob/master/Content%20data%20exists%20in%20storage%20XSS%20for%20editing.md | 2023-12-04T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T16:00:31.404821 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50944 | Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated user to access the source code of a DAG to which they don't have access. This vulnerability is considered low since it requires an authenticated user to exploit it. Users are recommended to upgrade to version 2.8.1, which fixes this issue.
| https://github.com/apache/airflow/pull/36257 | 2023-12-16T16:08:20.951Z | 2024-01-24T12:58:18.873Z | 2024-01-24T12:58:18.873Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'} |
CVE-2023-50694 | An issue in dom96 HTTPbeast v.0.4.1 and before allows a remote attacker to execute arbitrary code via a crafted request to the parser.nim component. | https://github.com/dom96/httpbeast/pull/96 | 2023-12-11T00:00:00 | 2024-01-19T00:00:00 | 2024-01-19T19:15:42.023012 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50856 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits.This issue affects Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits: from n/a through 2.14.3.
| https://patchstack.com/database/vulnerability/funnel-builder/wordpress-funnel-builder-for-wordpress-by-funnelkit-plugin-2-14-3-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:16.269Z | 2023-12-28T11:01:03.703Z | 2023-12-28T11:01:03.703Z | {'Vendor': 'FunnelKit', 'Product': 'Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits', 'Versions': 'n/a'} |
CVE-2023-50440 | ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; ZED! for Windows, Mac, Linux before 2023.5; ZEDFREE for Windows, Mac, Linux before 2023.5; or ZEDPRO for Windows, Mac, Linux before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger network access to an attacker-controlled computer when opened by the victim. | https://www.primx.eu/fr/blog/ | 2023-12-10T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T20:28:25.568584 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50339 | Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:54.055Z | 2023-12-26T07:20:31.556Z | 2023-12-26T07:20:31.556Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'v6.1.11'} |
CVE-2023-50769 | Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3203 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:16.867Z | 2023-12-13T17:30:16.867Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'} |
CVE-2023-50840 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdevelop, oplugins Booking Manager.This issue affects Booking Manager: from n/a through 2.1.5.
| https://patchstack.com/database/vulnerability/booking-manager/wordpress-booking-manager-plugin-2-1-5-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:18:45.975Z | 2023-12-28T18:54:50.117Z | 2023-12-28T18:54:50.117Z | {'Vendor': 'wpdevelop, oplugins', 'Product': 'Booking Manager', 'Versions': 'n/a'} |
CVE-2023-50456 | An issue was discovered in Zammad before 6.2.0. An attacker can trigger phishing links in generated notification emails via a crafted first or last name. | https://zammad.com/en/advisories/zaa-2023-07 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T18:48:59.799976 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50728 | octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3. | https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv | 2023-12-11T17:53:36.032Z | 2023-12-15T21:59:00.312Z | 2023-12-15T21:59:00.312Z | {'Vendor': 'octokit', 'Product': 'webhooks.js', 'Versions': '>= 9.26.0, < 9.26.3, >= 10.9.0, < 10.9.2, >= 11.1.0, < 11.1.2, >= 12.0.0, < 12.0.4'} |
CVE-2023-50860 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TMS Booking for Appointments and Events Calendar – Amelia allows Stored XSS.This issue affects Booking for Appointments and Events Calendar – Amelia: from n/a through 1.0.85.
| https://patchstack.com/database/vulnerability/ameliabooking/wordpress-amelia-plugin-1-0-85-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:19:16.270Z | 2023-12-28T10:14:11.022Z | 2023-12-28T10:14:11.022Z | {'Vendor': 'TMS', 'Product': 'Booking for Appointments and Events Calendar – Amelia', 'Versions': 'n/a'} |
CVE-2023-50708 | yii2-authclient is an extension that adds OpenID, OAuth, OAuth2 and OpenId Connect consumers for the Yii framework 2.0. In yii2-authclient prior to version 2.2.15, the Oauth1/2 `state` and OpenID Connect `nonce` is vulnerable for a `timing attack` since it is compared via regular string comparison (instead of `Yii::$app->getSecurity()->compareString()`). Version 2.2.15 contains a patch for the issue. No known workarounds are available. | https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-w8vh-p74j-x9xp | 2023-12-11T17:53:36.027Z | 2023-12-22T18:25:01.925Z | 2023-12-22T18:25:01.925Z | {'Vendor': 'yiisoft', 'Product': 'yii2-authclient', 'Versions': '< 2.2.15'} |
CVE-2023-50071 | Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_department via id or name. | https://github.com/geraldoalcantara/CVE-2023-50071 | 2023-12-04T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T21:21:49.597482 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50837 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebFactory Ltd Login Lockdown – Protect Login Form.This issue affects Login Lockdown – Protect Login Form: from n/a through 2.06.
| https://patchstack.com/database/vulnerability/login-lockdown/wordpress-login-lockdown-protect-login-form-plugin-2-06-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:18:45.975Z | 2023-12-29T11:43:49.093Z | 2023-12-29T11:43:49.093Z | {'Vendor': 'WebFactory Ltd', 'Product': 'Login Lockdown – Protect Login Form', 'Versions': 'n/a'} |
CVE-2023-50564 | An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file. | https://github.com/SecBridge/Cms_Vuls_test/blob/main/Pluckcms/Pluck_v4.7.18_Any_File_Upload_Getshell.md | 2023-12-11T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T14:32:33.065977 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50572 | An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 allows attackers to cause an OOM (OutofMemory) error. | https://github.com/jline/jline3/issues/909 | 2023-12-11T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T14:37:59.751097 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50030 | In the module "Jms Setting" (jmssetting) from Joommasters for PrestaShop, a guest can perform SQL injection in versions <= 1.1.0. The method `JmsSetting::getSecondImgs()` has a sensitive SQL call that can be executed with a trivial http call and exploited to forge a blind SQL injection. | https://www.joommasters.com/ | 2023-12-04T00:00:00 | 2024-01-19T00:00:00 | 2024-01-19T13:28:50.208831 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50175 | Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:52.053Z | 2023-12-26T07:21:15.728Z | 2023-12-26T07:21:15.728Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'} |
CVE-2023-50732 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute a Velocity script without script right through the document tree. This has been patched in XWiki 14.10.7 and 15.2RC1. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p5f8-qf24-24cj | 2023-12-11T17:53:36.032Z | 2023-12-21T19:42:01.215Z | 2023-12-21T19:42:01.215Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 8.3-rc-1, < 14.10.7, >= 15.0-rc-1, < 15.2-rc-1'} |
CVE-2023-50948 | IBM Storage Fusion HCI 2.1.0 through 2.6.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 275671. | https://www.ibm.com/support/pages/node/7105509 | 2023-12-16T19:35:35.358Z | 2024-01-08T01:43:08.302Z | 2024-01-08T01:43:08.302Z | {'Vendor': 'IBM', 'Product': 'Storage Fusion HCI', 'Versions': '2.1.0'} |
CVE-2023-50765 | A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3206 | 2023-12-13T13:06:36.476Z | 2023-12-13T17:30:14.297Z | 2023-12-13T17:30:14.297Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Scriptler Plugin', 'Versions': '0'} |
CVE-2023-50159 | In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode. | https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59 | 2023-12-04T00:00:00 | 2024-01-11T00:00:00 | 2024-01-18T18:39:43.659265 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50773 | Jenkins Dingding JSON Pusher Plugin 2.0 and earlier does not mask access tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:19.459Z | 2023-12-13T17:30:19.459Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Dingding JSON Pusher Plugin', 'Versions': '0'} |
CVE-2023-50266 | Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols. | https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ | 2023-12-05T20:42:59.380Z | 2023-12-15T20:42:29.685Z | 2023-12-15T20:42:29.685Z | {'Vendor': 'morpheus65535', 'Product': 'bazarr', 'Versions': '1.2.4'} |
CVE-2023-50724 | Resque (pronounced like "rescue") is a Redis-backed library for creating background jobs, placing those jobs on multiple queues, and processing them later. resque-web in resque versions before 2.1.0 are vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint. This issue has been patched in version 2.1.0.
| https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj | 2023-12-11T17:53:36.031Z | 2023-12-21T14:50:29.294Z | 2023-12-21T14:50:29.294Z | {'Vendor': 'resque', 'Product': 'resque', 'Versions': '< 2.1.0'} |
CVE-2023-50119 | null | null | 2023-12-04T00:00:00 | null | 2023-12-21T14:26:53.232644 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-50725 | Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1. | https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8 | 2023-12-11T17:53:36.031Z | 2023-12-22T20:02:15.568Z | 2023-12-22T20:02:15.568Z | {'Vendor': 'resque', 'Product': 'resque', 'Versions': '< 2.2.1'} |
CVE-2023-50772 | Jenkins Dingding JSON Pusher Plugin 2.0 and earlier stores access tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3184 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:18.818Z | 2023-12-13T17:30:18.818Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Dingding JSON Pusher Plugin', 'Versions': '0'} |
CVE-2023-50267 | MeterSphere is a one-stop open source continuous testing platform. Prior to 2.10.10-lts, the authenticated attackers can update resources which don't belong to him if the resource ID is known. This issue if fixed in 2.10.10-lts. There are no known workarounds. | https://github.com/metersphere/metersphere/security/advisories/GHSA-rcp4-c5p2-58v9 | 2023-12-05T20:42:59.380Z | 2023-12-28T15:13:34.769Z | 2023-12-28T15:13:34.769Z | {'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.10-lts'} |
CVE-2023-50764 | Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing attackers with Scriptler/Configure permission to delete arbitrary files on the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3205 | 2023-12-13T13:06:36.476Z | 2023-12-13T17:30:13.658Z | 2023-12-13T17:30:13.658Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Scriptler Plugin', 'Versions': '0'} |
CVE-2023-50271 |
A potential security vulnerability has been identified with HP-UX System Management Homepage (SMH). This vulnerability could be exploited locally or remotely to disclose information.
| https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbux04551en_us | 2023-12-06T14:22:26.839Z | 2023-12-17T14:49:53.516Z | 2023-12-17T14:49:53.516Z | {'Vendor': 'HPE', 'Product': 'HPE System Management Homepage (SMH)', 'Versions': 'Prior to HPE SMH ver.A.3.2.23.09'} |
CVE-2023-50932 | An issue was discovered in savignano S/Notify before 4.0.2 for Confluence. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Confluence, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | 2023-12-15T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T06:16:22.638857 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50965 | In MicroHttpServer (aka Micro HTTP Server) through 4398570, _ReadStaticFiles in lib/middleware.c allows a stack-based buffer overflow and potentially remote code execution via a long URI. | https://github.com/starnight/MicroHttpServer/issues/5 | 2023-12-17T00:00:00 | 2023-12-17T00:00:00 | 2023-12-17T01:47:53.939991 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50123 | The number of attempts to bring the Hozard Alarm system (alarmsystemen) v1.0 to a disarmed state is not limited. This could allow an attacker to perform a brute force on the SMS authentication, to bring the alarm system to a disarmed state. | https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | 2023-12-04T00:00:00 | 2024-01-11T00:00:00 | 2024-01-11T20:20:58.607277 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50089 | A Command Injection vulnerability exists in NETGEAR WNR2000v4 version 1.0.0.70. When using HTTP for SOAP authentication, command execution occurs during the process after successful authentication. | https://www.netgear.com/about/security/ | 2023-12-04T00:00:00 | 2023-12-15T00:00:00 | 2023-12-15T16:48:40.975174 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50070 | Sourcecodester Customer Support System 1.0 has multiple SQL injection vulnerabilities in /customer_support/ajax.php?action=save_ticket via department_id, customer_id, and subject. | https://github.com/geraldoalcantara/CVE-2023-50070 | 2023-12-04T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T21:22:53.245907 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50836 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ibericode HTML Forms allows Stored XSS.This issue affects HTML Forms: from n/a through 1.3.28.
| https://patchstack.com/database/vulnerability/html-forms/wordpress-html-forms-plugin-1-3-28-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:45.974Z | 2023-12-28T10:19:57.333Z | 2023-12-28T10:19:57.333Z | {'Vendor': 'ibericode', 'Product': 'HTML Forms', 'Versions': 'n/a'} |
CVE-2023-50565 | A cross-site scripting (XSS) vulnerability in the component /logs/dopost.html in RPCMS v3.5.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | https://github.com/ralap-z/rpcms/issues/7 | 2023-12-11T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T14:32:33.696490 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50709 | Cube is a semantic layer for building data applications. Prior to version 0.34.34, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. The issue has been patched in `v0.34.34` and it's recommended that all users exposing Cube APIs to the public internet upgrade to the latest version to prevent service disruption.
There are currently no workaround for older versions, and the recommendation is to upgrade. | https://github.com/cube-js/cube/security/advisories/GHSA-9759-3276-g2pm | 2023-12-11T17:53:36.028Z | 2023-12-13T22:00:04.603Z | 2023-12-13T22:00:04.603Z | {'Vendor': 'cube-js', 'Product': 'cube', 'Versions': '< 0.34.34'} |
CVE-2023-50924 | Englesystem is a shift planning system for chaos events. Engelsystem prior to v3.4.1 performed insufficient validation of user supplied data for the DECT number, mobile number, and work-log comment fields. The values of those fields would be displayed in corresponding log overviews, allowing the injection and execution of Javascript code in another user's context. This vulnerability enables an authenticated user to inject Javascript into other user's sessions. The injected JS will be executed during normal usage of the system when viewing, e.g., overview pages. This issue has been fixed in version 3.4.1. | https://github.com/engelsystem/engelsystem/security/advisories/GHSA-p5ch-rrpm-wvhm | 2023-12-15T20:57:23.174Z | 2023-12-22T20:37:47.224Z | 2023-12-22T20:37:47.224Z | {'Vendor': 'engelsystem', 'Product': 'engelsystem', 'Versions': '< 3.4.1'} |
CVE-2023-50027 | SQL Injection vulnerability in Buy Addons baproductzoommagnifier module for PrestaShop versions 1.0.16 and before, allows remote attackers to escalate privileges and gain sensitive information via BaproductzoommagnifierZoomModuleFrontController::run() method. | https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html | 2023-12-04T00:00:00 | 2024-01-05T00:00:00 | 2024-01-05T09:09:23.702900 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50477 | An issue was discovered in nos client version 0.6.6, allows remote attackers to escalate privileges via getRPCEndpoint.js. | https://github.com/nos/client/issues/1485 | 2023-12-11T00:00:00 | 2023-12-21T00:00:00 | 2023-12-21T10:26:03.407019 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50162 | SQL injection vulnerability in EmpireCMS v7.5, allows remote attackers to execute arbitrary code and obtain sensitive information via the DoExecSql function. | https://github.com/Teresazdy/CVE | 2023-12-04T00:00:00 | 2024-01-08T00:00:00 | 2024-01-08T23:09:56.709787 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50729 | Traccar is an open source GPS tracking system. Prior to 5.11, Traccar is affected by an unrestricted file upload vulnerability in File feature allows attackers to execute arbitrary code on the server. This vulnerability is more prevalent because Traccar is recommended to run web servers as root user. It is also more dangerous because it can write or overwrite files in arbitrary locations. Version 5.11 was published to fix this vulnerability. | https://github.com/traccar/traccar/security/advisories/GHSA-pqf7-8g85-vx2q | 2023-12-11T17:53:36.032Z | 2024-01-15T15:57:27.575Z | 2024-01-15T15:57:27.575Z | {'Vendor': 'traccar', 'Product': 'traccar', 'Versions': '< 5.11'} |
CVE-2023-50841 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Repute Infosystems BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin.This issue affects BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin: from n/a through 1.0.72.
| https://patchstack.com/database/vulnerability/bookingpress-appointment-booking/wordpress-bookingpress-plugin-1-0-72-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:18:45.975Z | 2023-12-28T18:37:40.943Z | 2023-12-28T18:37:40.943Z | {'Vendor': 'Repute Infosystems', 'Product': 'BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin', 'Versions': 'n/a'} |
CVE-2023-50457 | An issue was discovered in Zammad before 6.2.0. When listing tickets linked to a knowledge base answer, or knowledge base answers of a ticket, a user could see entries for which they lack permissions. | https://zammad.com/en/advisories/zaa-2023-05 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T18:48:50.863927 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50768 | A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3203 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:16.219Z | 2023-12-13T17:30:16.219Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'} |
CVE-2023-50857 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit.This issue affects Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit: from n/a through 2.6.1.
| https://patchstack.com/database/vulnerability/wp-marketing-automations/wordpress-automation-by-funnelkit-plugin-2-6-1-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:16.269Z | 2023-12-28T10:57:46.626Z | 2023-12-28T10:57:46.626Z | {'Vendor': 'FunnelKit', 'Product': 'Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit', 'Versions': 'n/a'} |
CVE-2023-50441 | Encrypted folders created by PRIMX ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission) or ZONECENTRAL for Windows before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger outbound network traffic from computers on which folders are opened. | https://www.primx.eu/fr/blog/ | 2023-12-10T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T19:44:29.151334 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50011 | PopojiCMS version 2.0.1 is vulnerable to remote command execution in the Meta Social field. | https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html | 2023-12-04T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T14:43:22.770650 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50251 | php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when parsing the attributes passed to a `use` tag inside an svg document, an attacker can cause the system to go to an infinite recursion. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself. An attacker sending multiple request to a system to render the above payload can potentially cause resource exhaustion to the point that the system is unable to handle incoming request. Version 0.5.1 contains a patch for this issue. | https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2 | 2023-12-05T20:42:59.377Z | 2023-12-12T20:37:23.035Z | 2023-12-12T20:37:23.035Z | {'Vendor': 'dompdf', 'Product': 'php-svg-lib', 'Versions': '< 0.5.1'} |
CVE-2023-50343 | HCL DRYiCE MyXalytics is impacted by an Improper Access Control (Controller APIs) vulnerability. Certain API endpoints are accessible to Customer Admin Users that can allow access to sensitive information about other users.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-12-07T03:55:55.604Z | 2024-01-03T02:37:22.668Z | 2024-01-03T02:37:22.668Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-50713 | Speckle Server provides server, frontend, 3D viewer, and other JavaScript utilities for the Speckle 3D data platform. A vulnerability in versions prior to 2.17.6 affects users who: authorized an application which requested a 'token write' scope or, using frontend-2, created a Personal Access Token (PAT) with `token write` scope. When creating a new token an agent needs to authorise the request with an existing token (the 'requesting token'). The requesting token is required to have token write scope in order to generate new tokens. However, Speckle server was not verifying that other privileges granted to the new token were not in excess of the privileges of the requesting token. A malicious actor could use a token with only token write scope to subsequently generate further tokens with additional privileges. These privileges would only grant privileges up to the existing privileges of the user. This vulnerability cannot be used to escalate a user's privileges or grant privileges on behalf of other users.
This has been patched as of version 2.17.6. All operators of Speckle servers should upgrade their server to version 2.17.6 or higher. Any users who authorized an application with 'token write' scope, or created a token in frontend-2 with `token write` scope should review existing tokens and permanently revoke any they do not recognize, revoke existing tokens and create new tokens, and review usage of their account for suspicious activity. No known workarounds for this issue exist. | https://github.com/specklesystems/speckle-server/security/advisories/GHSA-xpf3-5q5x-3qwh | 2023-12-11T17:53:36.029Z | 2023-12-14T18:08:57.974Z | 2023-12-14T18:08:57.974Z | {'Vendor': 'specklesystems', 'Product': 'speckle-server', 'Versions': '< 2.17.6'} |
CVE-2023-50986 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the time parameter in the sysLogin function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:43.689972 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50705 |
An attacker could create malicious requests to obtain sensitive information about the web server.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03 | 2023-12-11T16:37:13.794Z | 2023-12-19T23:45:17.101Z | 2023-12-19T23:45:17.101Z | {'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'} |
CVE-2023-50093 | APIIDA API Gateway Manager for Broadcom Layer7 v2023.2.2 is vulnerable to Host Header Injection. | https://apiida.com/product/apiida-api-gateway-manager/ | 2023-12-04T00:00:00 | 2024-01-03T00:00:00 | 2024-01-03T13:51:50.832051 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50569 | Reflected Cross Site Scripting (XSS) vulnerability in Cacti v1.2.25, allows remote attackers to escalate privileges when uploading an xml template file via templates_import.php. | https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf | 2023-12-11T00:00:00 | 2023-12-22T00:00:00 | 2023-12-24T15:40:28.654152 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50990 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the rebootTime parameter in the sysScheduleRebootSet function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:48.581990 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50247 | h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The QUIC stack (quicly), as used by H2O up to commit 43f86e5 (in version 2.3.0-beta and prior), is susceptible to a state exhaustion attack. When H2O is serving HTTP/3, a remote attacker can exploit this vulnerability to progressively increase the memory retained by the QUIC stack. This can eventually cause H2O to abort due to memory exhaustion. The vulnerability has been resolved in commit d67e81d03be12a9d53dc8271af6530f40164cd35. HTTP/1 and HTTP/2 are not affected by this vulnerability as they do not use QUIC. Administrators looking to mitigate this issue without upgrading can disable HTTP/3 support. | https://github.com/h2o/h2o/security/advisories/GHSA-2ch5-p59c-7mv6 | 2023-12-05T20:42:59.377Z | 2023-12-12T19:56:20.726Z | 2023-12-12T19:56:20.726Z | {'Vendor': 'h2o', 'Product': 'h2o', 'Versions': '<= 2.3.0-beta2'} |
CVE-2023-50752 | Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'e' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/perahia/ | 2023-12-12T15:12:54.427Z | 2024-01-04T14:09:22.028Z | 2024-01-04T14:09:22.028Z | {'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'} |
CVE-2023-50928 | "Sandbox Accounts for Events" provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially claim and access empty AWS accounts by sending request payloads to the account API containing non-existent event ids and self-defined budget & duration. This issue only affects cleaned AWS accounts, it is not possible to access AWS accounts in use or existing data/infrastructure. This issue has been patched in version 1.1.0. | https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-cg8w-7q5v-g32r | 2023-12-15T20:57:23.174Z | 2023-12-22T21:00:49.814Z | 2023-12-22T21:00:49.814Z | {'Vendor': 'awslabs', 'Product': 'sandbox-accounts-for-events', 'Versions': '< 1.1.0'} |
CVE-2023-50020 | An issue was discovered in open5gs v2.6.6. SIGPIPE can be used to crash AMF. | https://github.com/open5gs/open5gs/issues/2734 | 2023-12-04T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T21:47:13.868846 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50470 | A cross-site scripting (XSS) vulnerability in the component admin_ Video.php of SeaCMS v12.8 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | http://seacms.com | 2023-12-11T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T14:53:15.148541 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50889 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Beaver Builder Team Beaver Builder – WordPress Page Builder allows Stored XSS.This issue affects Beaver Builder – WordPress Page Builder: from n/a through 2.7.2.
| https://patchstack.com/database/vulnerability/beaver-builder-lite-version/wordpress-beaver-builder-plugin-2-7-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-15T15:08:48.865Z | 2023-12-29T11:21:56.258Z | 2023-12-29T11:21:56.258Z | {'Vendor': 'The Beaver Builder Team', 'Product': 'Beaver Builder – WordPress Page Builder', 'Versions': 'n/a'} |
CVE-2023-50866 | Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the loginAction.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/evans/ | 2023-12-14T17:47:18.224Z | 2024-01-04T14:32:53.660Z | 2024-01-04T14:32:53.660Z | {'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'} |
CVE-2023-50974 | In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwrite user are stored in a ~/.appwrite/prefs.json file with 0644 as UNIX permissions. Any user of the local system can access those credentials. | https://gist.github.com/SkypLabs/72ee00ecfa7d1a3494e2d69a24279c1d | 2023-12-17T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T08:36:25.462934 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50831 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme CURCY – Multi Currency for WooCommerce allows Stored XSS.This issue affects CURCY – Multi Currency for WooCommerce: from n/a through 2.2.0.
| https://patchstack.com/database/vulnerability/woo-multi-currency/wordpress-curcy-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:17.554Z | 2023-12-21T17:20:49.830Z | 2023-12-21T17:20:49.830Z | {'Vendor': 'VillaTheme', 'Product': 'CURCY – Multi Currency for WooCommerce', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.