CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-50348
|
HCL DRYiCE MyXalytics is impacted by an improper error handling vulnerability. The application returns detailed error messages that can provide an attacker with insight into the application, system, etc.
|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
|
2023-12-07T03:55:55.605Z
|
2024-01-03T01:52:28.258Z
|
2024-01-03T01:52:28.258Z
|
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
|
CVE-2023-50431
|
sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info->pad0 is not initialized.
|
https://lists.freedesktop.org/archives/dri-devel/2023-November/431772.html
|
2023-12-09T00:00:00
|
2023-12-09T00:00:00
|
2023-12-09T22:40:51.812987
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50827
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Accredible Accredible Certificates & Open Badges allows Stored XSS.This issue affects Accredible Certificates & Open Badges: from n/a through 1.4.8.
|
https://patchstack.com/database/vulnerability/accredible-certificates/wordpress-accredible-certificates-open-badges-plugin-1-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-14T17:18:17.553Z
|
2023-12-21T14:48:27.932Z
|
2023-12-21T14:48:27.932Z
|
{'Vendor': 'Accredible', 'Product': 'Accredible Certificates & Open Badges', 'Versions': 'n/a'}
|
CVE-2023-50124
|
Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
2023-12-04T00:00:00
|
2024-01-11T00:00:00
|
2024-01-11T20:21:20.278558
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50466
|
An authenticated command injection vulnerability in Weintek cMT2078X easyweb Web Version v2.1.3, OS v20220215 allows attackers to execute arbitrary code or access sensitive information via injecting a crafted payload into the HMI Name parameter.
|
https://literate-bakery-10b.notion.site/Weintek-EasyWeb-cMT-Reports-3fc0b10798b54f51a61d719395c408da?pvs=4
|
2023-12-11T00:00:00
|
2023-12-19T00:00:00
|
2023-12-19T20:33:18.884089
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50870
|
In JetBrains TeamCity before 2023.11.1 a CSRF on login was possible
|
https://www.jetbrains.com/privacy-security/issues-fixed/
|
2023-12-15T13:47:59.412Z
|
2023-12-15T13:48:13.075Z
|
2023-12-15T13:48:13.075Z
|
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
|
CVE-2023-50671
|
In exiftags 1.01, nikon_prop1 in nikon.c has a heap-based buffer overflow (write of size 28) because snprintf can write to an unexpected address.
|
https://blog.yulun.ac.cn/posts/2023/fuzzing-exiftags/
|
2023-12-11T00:00:00
|
2024-01-11T00:00:00
|
2024-01-11T16:56:08.661685
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50333
|
Mattermost fails to update the permissions of the current session for a user who was just demoted to guest, allowing freshly demoted guests to change group names.
|
https://mattermost.com/security-updates
|
2023-12-21T08:00:43.432Z
|
2024-01-02T09:53:01.990Z
|
2024-01-02T09:53:01.990Z
|
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.7'}
|
CVE-2023-50919
|
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
|
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Authentication-bypass.md
|
2023-12-15T00:00:00
|
2024-01-12T00:00:00
|
2024-01-24T16:06:28.187977
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50775
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to copy jobs.
|
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3092
|
2023-12-13T13:06:36.477Z
|
2023-12-13T17:30:20.742Z
|
2023-12-13T17:30:20.742Z
|
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Deployment Dashboard Plugin', 'Versions': '0'}
|
CVE-2023-50630
|
Cross Site Scripting (XSS) vulnerability in xiweicheng TMS v.2.28.0 allows a remote attacker to execute arbitrary code via a crafted script to the click here function.
|
https://github.com/xiweicheng/tms/issues/19
|
2023-12-11T00:00:00
|
2024-01-04T00:00:00
|
2024-01-04T07:57:13.556857
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50722
|
XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, there is a reflected XSS or also direct remote code execution vulnerability in the code for displaying configurable admin sections. The code that can be passed through a URL parameter is only executed when the user who is visiting the crafted URL has edit right on at least one configuration section. While any user of the wiki could easily create such a section, this vulnerability doesn't require the attacker to have an account or any access on the wiki. It is sufficient to trick any admin user of the XWiki installation to visit the crafted URL. This vulnerability allows full remote code execution with programming rights and thus impacts the confidentiality, integrity and availability of the whole XWiki installation. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patch can be manually applied to the document `XWiki.ConfigurableClass`.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cp3j-273x-3jxc
|
2023-12-11T17:53:36.031Z
|
2023-12-15T19:02:52.134Z
|
2023-12-15T19:02:52.134Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 2.3, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
|
CVE-2023-50372
|
Cross-Site Request Forgery (CSRF) vulnerability in Hiroaki Miyashita Custom Post Type Page Template.This issue affects Custom Post Type Page Template: from n/a through 1.1.
|
https://patchstack.com/database/vulnerability/custom-post-type-page-template/wordpress-custom-post-type-page-template-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-12-07T12:18:13.605Z
|
2023-12-18T10:15:28.593Z
|
2023-12-18T10:15:28.593Z
|
{'Vendor': 'Hiroaki Miyashita', 'Product': 'Custom Post Type Page Template', 'Versions': 'n/a'}
|
CVE-2023-50094
|
reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
|
https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195
|
2023-12-04T00:00:00
|
2024-01-01T00:00:00
|
2024-01-01T17:58:51.819166
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50082
|
Aoyun Technology pbootcms V3.1.2 is vulnerable to Incorrect Access Control, allows remote attackers to gain sensitive information via session leakage allows a user to avoid logging into the backend management platform.
|
https://github.com/juraorab/cve/blob/master/CVE/README.md
|
2023-12-04T00:00:00
|
2024-01-04T00:00:00
|
2024-01-04T07:40:21.105586
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50578
|
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
|
https://gitee.com/mingSoft/MCMS/issues/I8MAJK
|
2023-12-11T00:00:00
|
2023-12-30T00:00:00
|
2023-12-30T15:47:39.608559
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50128
|
The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
2023-12-04T00:00:00
|
2024-01-11T00:00:00
|
2024-01-11T20:23:13.183487
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50981
|
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
|
https://github.com/weidai11/cryptopp/issues/1249
|
2023-12-18T00:00:00
|
2023-12-18T00:00:00
|
2023-12-18T00:53:19.032355
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50651
|
TOTOLINK X6000R v9.4.0cu.852_B20230719 was discovered to contain a remote command execution (RCE) vulnerability via the component /cgi-bin/cstecgi.cgi.
|
http://totolink.com
|
2023-12-11T00:00:00
|
2023-12-30T00:00:00
|
2023-12-30T16:07:45.326525
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50344
|
HCL DRYiCE MyXalytics is impacted by improper access control (Unauthenticated File Download) vulnerability. An unauthenticated user can download certain files.
|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
|
2023-12-07T03:55:55.604Z
|
2024-01-03T02:25:23.360Z
|
2024-01-03T02:25:23.360Z
|
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
|
CVE-2023-50714
|
yii2-authclient is an extension that adds OpenID, OAuth, OAuth2 and OpenId Connect consumers for the Yii framework 2.0. In yii2-authclient prior to version 2.2.15, the Oauth2 PKCE implementation is vulnerable in 2 ways. First, the `authCodeVerifier` should be removed after usage (similar to `authState`). Second, there is a risk for a `downgrade attack` if PKCE is being relied on for CSRF protection. Version 2.2.15 contains a patch for the issue. No known workarounds are available.
|
https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-rw54-6826-c8j5
|
2023-12-11T17:53:36.029Z
|
2023-12-22T18:30:03.118Z
|
2023-12-22T18:30:03.118Z
|
{'Vendor': 'yiisoft', 'Product': 'yii2-authclient', 'Versions': '< 2.2.15'}
|
CVE-2023-50893
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UpSolution Impreza – WordPress Website and WooCommerce Builder allows Reflected XSS.This issue affects Impreza – WordPress Website and WooCommerce Builder: from n/a through 8.17.4.
|
https://patchstack.com/database/vulnerability/us-core/wordpress-upsolution-core-plugin-8-17-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-15T15:08:48.865Z
|
2023-12-29T11:12:36.317Z
|
2023-12-29T11:12:36.317Z
|
{'Vendor': 'UpSolution', 'Product': 'Impreza – WordPress Website and WooCommerce Builder', 'Versions': 'n/a'}
|
CVE-2023-50256
|
Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.
|
https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4
|
2023-12-05T20:42:59.378Z
|
2024-01-03T22:34:47.447Z
|
2024-01-03T22:34:47.447Z
|
{'Vendor': 'Froxlor', 'Product': 'Froxlor', 'Versions': '< 2.1.2'}
|
CVE-2023-50743
|
Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the registration.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/perahia/
|
2023-12-12T15:12:54.424Z
|
2024-01-04T14:08:35.684Z
|
2024-01-04T14:08:35.684Z
|
{'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'}
|
CVE-2023-50104
|
ZZCMS 2023 has a file upload vulnerability in 3/E_bak5.1/upload/index.php, allowing attackers to exploit this loophole to gain server privileges and execute arbitrary code.
|
https://github.com/zzq66/cve4
|
2023-12-04T00:00:00
|
2023-12-28T00:00:00
|
2023-12-28T23:45:44.414859
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50692
|
File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory.
|
https://github.com/Cherry-toto/jizhicms/issues/91
|
2023-12-11T00:00:00
|
2023-12-28T00:00:00
|
2023-12-28T05:38:17.398224
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50368
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Shortcodes and extra features for Phlox theme allows Stored XSS.This issue affects Shortcodes and extra features for Phlox theme: from n/a through 2.15.2.
|
https://patchstack.com/database/vulnerability/auxin-elements/wordpress-shortcodes-and-extra-features-for-phlox-theme-plugin-2-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-07T12:18:13.605Z
|
2023-12-14T13:56:07.422Z
|
2023-12-14T13:56:07.422Z
|
{'Vendor': 'Averta', 'Product': 'Shortcodes and extra features for Phlox theme', 'Versions': 'n/a'}
|
CVE-2023-50446
|
An issue was discovered in Mullvad VPN Windows app before 2023.6-beta1. Insufficient permissions on a directory allow any local unprivileged user to escalate privileges to SYSTEM.
|
https://github.com/mullvad/mullvadvpn-app/pull/5398
|
2023-12-10T00:00:00
|
2023-12-10T00:00:00
|
2023-12-10T16:57:08.628337
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50846
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RegistrationMagic RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login.This issue affects RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login: from n/a through 5.2.4.5.
|
https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-4-5-sql-injection-vulnerability?_s_id=cve
|
2023-12-14T17:19:02.629Z
|
2023-12-28T18:19:26.402Z
|
2023-12-28T18:19:26.402Z
|
{'Vendor': 'RegistrationMagic', 'Product': 'RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login', 'Versions': 'n/a'}
|
CVE-2023-50000
|
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formResetMeshNode.
|
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_resetMesh/w30e_resetMesh.md
|
2023-12-04T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T16:59:41.166991
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50779
|
Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.
|
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3179
|
2023-12-13T13:06:36.478Z
|
2023-12-13T17:30:23.280Z
|
2023-12-13T17:30:23.280Z
|
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
|
CVE-2023-50778
|
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token.
|
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3179
|
2023-12-13T13:06:36.478Z
|
2023-12-13T17:30:22.627Z
|
2023-12-13T17:30:22.627Z
|
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
|
CVE-2023-50847
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Collne Inc. Welcart e-Commerce.This issue affects Welcart e-Commerce: from n/a through 2.9.3.
|
https://patchstack.com/database/vulnerability/usc-e-shop/wordpress-welcart-e-commerce-plugin-2-9-3-sql-injection-vulnerability?_s_id=cve
|
2023-12-14T17:19:02.630Z
|
2023-12-28T18:15:01.186Z
|
2023-12-28T18:15:01.186Z
|
{'Vendor': 'Collne Inc.', 'Product': 'Welcart e-Commerce', 'Versions': 'n/a'}
|
CVE-2023-50001
|
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formUpgradeMeshOnline.
|
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_upgradeMeshOnline/w30e_upgradeMeshOnline.md
|
2023-12-04T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T16:57:40.679679
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50902
|
Cross-Site Request Forgery (CSRF) vulnerability in WPExpertsio New User Approve.This issue affects New User Approve: from n/a through 2.5.1.
|
https://patchstack.com/database/vulnerability/new-user-approve/wordpress-new-user-approve-plugin-2-5-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-12-15T15:45:32.565Z
|
2023-12-29T12:28:46.992Z
|
2023-12-29T12:28:46.992Z
|
{'Vendor': 'WPExpertsio', 'Product': 'New User Approve', 'Versions': 'n/a'}
|
CVE-2023-50294
|
The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page.
|
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
|
2023-12-07T02:39:43.973Z
|
2023-12-26T07:21:19.831Z
|
2023-12-26T07:21:19.831Z
|
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.6'}
|
CVE-2023-50851
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in N Squared Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin.This issue affects Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin: from n/a before 1.6.6.1.
|
https://patchstack.com/database/vulnerability/simply-schedule-appointments/wordpress-simply-schedule-appointments-booking-plugin-1-6-6-1-sql-injection-vulnerability?_s_id=cve
|
2023-12-14T17:19:02.630Z
|
2023-12-28T11:28:30.036Z
|
2023-12-28T11:28:30.036Z
|
{'Vendor': 'N Squared', 'Product': 'Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin', 'Versions': 'n/a'}
|
CVE-2023-50447
|
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
|
https://github.com/python-pillow/Pillow/releases
|
2023-12-10T00:00:00
|
2024-01-19T00:00:00
|
2024-01-20T18:06:19.067532
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50017
|
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/database/backup
|
https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md
|
2023-12-04T00:00:00
|
2023-12-14T00:00:00
|
2023-12-14T18:13:48.135567
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50693
|
An issue in dom96 Jester v.0.6.0 and before allows a remote attacker to execute arbitrary code via a crafted request.
|
https://github.com/dom96/jester/issues/326
|
2023-12-11T00:00:00
|
2024-01-19T00:00:00
|
2024-01-19T19:47:43.751276
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50369
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alma Alma – Pay in installments or later for WooCommerce allows Stored XSS.This issue affects Alma – Pay in installments or later for WooCommerce: from n/a through 5.1.3.
|
https://patchstack.com/database/vulnerability/alma-gateway-for-woocommerce/wordpress-alma-plugin-5-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-07T12:18:13.605Z
|
2023-12-14T13:50:39.339Z
|
2023-12-14T13:50:47.184Z
|
{'Vendor': 'Alma', 'Product': 'Alma – Pay in installments or later for WooCommerce', 'Versions': 'n/a'}
|
CVE-2023-50943
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
|
https://github.com/apache/airflow/pull/36255
|
2023-12-16T16:02:36.817Z
|
2024-01-24T12:57:07.287Z
|
2024-01-24T12:57:07.287Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
|
CVE-2023-50892
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodexThemes TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme allows Reflected XSS.This issue affects TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme: from n/a through 5.9.1.
|
https://patchstack.com/database/vulnerability/thegem/wordpress-thegem-theme-5-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-15T15:08:48.865Z
|
2023-12-29T11:15:38.381Z
|
2023-12-29T11:15:38.381Z
|
{'Vendor': 'CodexThemes', 'Product': 'TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme', 'Versions': 'n/a'}
|
CVE-2023-50345
|
HCL DRYiCE MyXalytics is impacted by an Open Redirect vulnerability which could allow an attacker to redirect users to malicious sites, potentially leading to phishing attacks or other security threats.
|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
|
2023-12-07T03:55:55.604Z
|
2024-01-03T02:01:57.575Z
|
2024-01-03T02:01:57.575Z
|
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
|
CVE-2023-50715
|
Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue.
When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles.
However, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it.
|
https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83
|
2023-12-11T17:53:36.029Z
|
2023-12-15T02:05:57.580Z
|
2023-12-15T02:05:57.580Z
|
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.12.3'}
|
CVE-2023-50129
|
Missing encryption in the NFC tags of the Flient Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original tags, which results in an attacker gaining access to the perimeter.
|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
2023-12-04T00:00:00
|
2024-01-11T00:00:00
|
2024-01-11T20:23:43.268805
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50980
|
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
|
https://github.com/weidai11/cryptopp/issues/1248
|
2023-12-18T00:00:00
|
2023-12-18T00:00:00
|
2023-12-18T00:53:52.054168
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50703
|
An attacker with network access could perform a man-in-the-middle (MitM) attack and capture sensitive information to gain unauthorized access to the application.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03
|
2023-12-11T16:37:13.793Z
|
2023-12-19T23:40:49.215Z
|
2023-12-19T23:40:49.215Z
|
{'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'}
|
CVE-2023-50979
|
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
|
https://github.com/weidai11/cryptopp/issues/1247
|
2023-12-18T00:00:00
|
2023-12-18T00:00:00
|
2023-12-18T00:54:28.451183
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50723
|
XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, anyone who can edit an arbitrary wiki page in an XWiki installation can gain programming right through several cases of missing escaping in the code for displaying sections in the administration interface. This impacts the confidentiality, integrity and availability of the whole XWiki installation. Normally, all users are allowed to edit their own user profile so this should be exploitable by all users of the XWiki instance. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patches can be manually applied to the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qj86-p74r-7wp5
|
2023-12-11T17:53:36.031Z
|
2023-12-15T19:02:57.939Z
|
2023-12-15T19:02:57.939Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 2.3, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
|
CVE-2023-50774
|
A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system.
|
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3183
|
2023-12-13T13:06:36.477Z
|
2023-12-13T17:30:20.085Z
|
2023-12-13T17:30:20.085Z
|
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins HTMLResource Plugin', 'Versions': '0'}
|
CVE-2023-50918
|
app/Controller/AuditLogsController.php in MISP before 2.4.182 mishandles ACLs for audit logs.
|
https://github.com/MISP/MISP/commit/92888b1376246c0f20c256aaa3c57b6f12115fa1
|
2023-12-15T00:00:00
|
2023-12-15T00:00:00
|
2023-12-15T17:31:55.318250
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50762
|
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1862625
|
2023-12-12T16:29:47.908Z
|
2023-12-19T13:38:34.261Z
|
2023-12-19T13:38:34.261Z
|
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
|
CVE-2023-50332
|
Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.
|
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
|
2023-12-07T02:39:51.268Z
|
2023-12-26T07:21:24.393Z
|
2023-12-26T07:21:24.393Z
|
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.6'}
|
CVE-2023-50559
|
An issue was discovered in XiangShan v2.1, allows local attackers to obtain sensitive information via the L1D cache.
|
https://github.com/OpenXiangShan/XiangShan/issues/2534
|
2023-12-11T00:00:00
|
2023-12-29T00:00:00
|
2023-12-29T23:43:47.085469
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50172
|
A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to the silent creation of a recovery pass code for any user.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897
|
2023-12-06T18:44:23.364Z
|
2024-01-10T15:48:08.638Z
|
2024-01-12T17:23:11.253Z
|
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
|
CVE-2023-50871
|
In JetBrains YouTrack before 2023.3.22268 authorization check for inline comments inside thread replies was missed
|
https://www.jetbrains.com/privacy-security/issues-fixed/
|
2023-12-15T13:47:59.896Z
|
2023-12-15T13:48:13.458Z
|
2023-12-15T13:48:13.458Z
|
{'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'}
|
CVE-2023-50430
|
The Goodix Fingerprint Device, as shipped in Dell Inspiron 15 computers, does not follow the Secure Device Connection Protocol (SDCP) when enrolling via Linux, and accepts an unauthenticated configuration packet to select the Windows template database, which allows bypass of Windows Hello authentication by enrolling an attacker's fingerprint.
|
https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/
|
2023-12-09T00:00:00
|
2023-12-09T00:00:00
|
2023-12-09T21:57:50.015272
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50963
|
IBM Storage Defender - Data Protect 1.0.0 through 1.4.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 276101.
|
https://www.ibm.com/support/pages/node/7106918
|
2023-12-16T19:35:51.573Z
|
2024-01-19T01:30:49.594Z
|
2024-01-19T01:30:49.594Z
|
{'Vendor': 'IBM', 'Product': 'Storage Defender - Data Protect', 'Versions': '1.0.0'}
|
CVE-2023-50826
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Freshlight Lab Menu Image, Icons made easy allows Stored XSS.This issue affects Menu Image, Icons made easy: from n/a through 3.10.
|
https://patchstack.com/database/vulnerability/menu-image/wordpress-menu-image-icons-made-easy-plugin-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-14T17:18:17.553Z
|
2023-12-21T14:46:28.254Z
|
2023-12-21T14:46:28.254Z
|
{'Vendor': 'Freshlight Lab', 'Product': 'Menu Image, Icons made easy', 'Versions': 'n/a'}
|
CVE-2023-50125
|
A default engineer password set on the Hozard alarm system (Alarmsysteem) v1.0 allows an attacker to bring the alarm system to a disarmed state.
|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
2023-12-04T00:00:00
|
2024-01-11T00:00:00
|
2024-01-11T20:21:48.426417
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50719
|
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p6cp-6r35-32mh
|
2023-12-11T17:53:36.030Z
|
2023-12-15T19:02:40.905Z
|
2023-12-15T19:02:40.905Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.2-milestone-2, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
|
CVE-2023-50563
|
Semcms v4.8 was discovered to contain a SQL injection vulnerability via the AID parameter at SEMCMS_Function.php.
|
https://github.com/SecBridge/Cms_Vuls_test/blob/main/Semcms/Semcms_Sql_Inject.md
|
2023-12-11T00:00:00
|
2023-12-14T00:00:00
|
2023-12-14T14:32:31.847470
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50830
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seosbg Seos Contact Form allows Stored XSS.This issue affects Seos Contact Form: from n/a through 1.8.0.
|
https://patchstack.com/database/vulnerability/seos-contact-form/wordpress-seos-contact-form-plugin-1-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-14T17:18:17.553Z
|
2023-12-21T17:15:03.688Z
|
2023-12-21T17:15:03.688Z
|
{'Vendor': 'Seosbg', 'Product': 'Seos Contact Form', 'Versions': 'n/a'}
|
CVE-2023-50471
|
cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_InsertItemInArray at cJSON.c.
|
https://github.com/DaveGamble/cJSON/issues/802
|
2023-12-11T00:00:00
|
2023-12-14T00:00:00
|
2023-12-30T21:06:22.540901
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50922
|
An issue was discovered on GL.iNet devices through 4.5.0. Attackers who are able to steal the AdminToken cookie can execute arbitrary code by uploading a crontab-formatted file to a specific directory and waiting for its execution. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
|
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Remote%20code%20execution%20due%20to%20gl_crontabs.md
|
2023-12-15T00:00:00
|
2024-01-03T00:00:00
|
2024-01-03T07:47:27.685463
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50867
|
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the signupAction.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/evans/
|
2023-12-14T17:47:18.224Z
|
2024-01-04T14:33:52.582Z
|
2024-01-04T14:33:52.582Z
|
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
|
CVE-2023-50164
|
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
|
https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj
|
2023-12-04T08:37:57.468Z
|
2023-12-07T08:49:19.853Z
|
2023-12-12T09:26:34.588Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Struts', 'Versions': '2.0.0, 6.0.0'}
|
CVE-2023-50308
|
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 under certain circumstances could allow an authenticated user to the database to cause a denial of service when a statement is run on columnar tables. IBM X-Force ID: 273393.
|
https://www.ibm.com/support/pages/node/7105506
|
2023-12-07T01:28:46.424Z
|
2024-01-22T18:44:56.572Z
|
2024-01-22T18:44:56.572Z
|
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'}
|
CVE-2023-50720
|
XWiki Platform is a generic wiki platform. Prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the email addresses of users even when obfuscation of email addresses is enabled. To demonstrate the vulnerability, search for `objcontent:email*` using XWiki's regular search interface. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1 by not indexing email address properties when obfuscation is enabled. There are no known workarounds for this vulnerability.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2grh-gr37-2283
|
2023-12-11T17:53:36.030Z
|
2023-12-15T19:02:35.372Z
|
2023-12-15T19:02:35.372Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
|
CVE-2023-50370
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh WPBakery Page Builder Addons by Livemesh allows Stored XSS.This issue affects WPBakery Page Builder Addons by Livemesh: from n/a through 3.5.
|
https://patchstack.com/database/vulnerability/addons-for-visual-composer/wordpress-livemesh-addons-for-wpbakery-page-builder-plugin-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-07T12:18:13.605Z
|
2023-12-14T13:42:59.541Z
|
2023-12-14T13:52:22.096Z
|
{'Vendor': 'Livemesh', 'Product': 'WPBakery Page Builder Addons by Livemesh', 'Versions': 'n/a'}
|
CVE-2023-50848
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aaron J 404 Solution.This issue affects 404 Solution: from n/a through 2.34.0.
|
https://patchstack.com/database/vulnerability/404-solution/wordpress-404-solution-plugin-2-34-0-sql-injection-vulnerability?_s_id=cve
|
2023-12-14T17:19:02.630Z
|
2023-12-28T11:38:06.049Z
|
2023-12-28T11:38:06.049Z
|
{'Vendor': 'Aaron J', 'Product': '404 Solution', 'Versions': 'n/a'}
|
CVE-2023-50262
|
Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chained using two or more SVG documents is not correctly validated. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself.
php-svg-lib, when run in isolation, does not support SVG references for `image` elements. However, when used in combination with Dompdf, php-svg-lib will process SVG images referenced by an `image` element. Dompdf currently includes validation to prevent self-referential `image` references, but a chained reference is not checked. A malicious actor may thus trigger infinite recursion by chaining references between two or more SVG images.
When Dompdf parses a malicious payload, it will crash due after exceeding the allowed execution time or memory usage. An attacker sending multiple request to a system can potentially cause resource exhaustion to the point that the system is unable to handle incoming request.
Version 2.0.4 contains a fix for this issue.
|
https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2
|
2023-12-05T20:42:59.379Z
|
2023-12-13T20:52:56.173Z
|
2023-12-13T20:52:56.173Z
|
{'Vendor': 'dompdf', 'Product': 'dompdf', 'Versions': '< 2.0.4'}
|
CVE-2023-50777
|
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
|
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3182
|
2023-12-13T13:06:36.478Z
|
2023-12-13T17:30:21.995Z
|
2023-12-13T17:30:21.995Z
|
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
|
CVE-2023-50448
|
In ActiveAdmin (aka Active Admin) before 2.12.0, a concurrency issue allows a malicious actor to access potentially private data (that belongs to another user) by making CSV export requests at certain specific times.
|
https://github.com/activeadmin/activeadmin/pull/7336
|
2023-12-10T00:00:00
|
2023-12-28T00:00:00
|
2023-12-28T22:53:41.043972
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50274
|
HPE OneView may allow command injection with local privilege escalation.
|
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04586en_us
|
2023-12-06T14:22:26.839Z
|
2024-01-23T17:02:38.098Z
|
2024-01-23T17:02:38.098Z
|
{'Vendor': 'Hewlett Packard Enterprise', 'Product': 'HPE OneView', 'Versions': '0'}
|
CVE-2023-50761
|
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird < 115.6.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1865647
|
2023-12-12T16:29:47.908Z
|
2023-12-19T13:38:35.397Z
|
2023-12-19T13:38:35.397Z
|
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
|
CVE-2023-50258
|
Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testDiscord` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `discord_webhook` variable and passes it to the `notifiers.discord_notifier.test_notify` method, then `_notify_discord` and finally `_send_discord_msg` method, which sends a POST request to the user-controlled URL on line 64 in `/medusa/notifiers/discord.py`, which leads to a blind server-side request forgery. This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.
|
https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g
|
2023-12-05T20:42:59.378Z
|
2023-12-22T16:55:58.406Z
|
2023-12-22T16:55:58.406Z
|
{'Vendor': 'pymedusa', 'Product': 'Medusa', 'Versions': '< 1.0.19'}
|
CVE-2023-50126
|
Missing encryption in the RFID tags of the Hozard alarm system (Alarmsysteem) v1.0 allow attackers to create a cloned tag via brief physical proximity to one of the original tags, which results in an attacker being able to bring the alarm system to a disarmed state.
|
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
2023-12-04T00:00:00
|
2024-01-11T00:00:00
|
2024-01-11T20:22:14.930458
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50825
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terrier Tenacity iframe Shortcode allows Stored XSS.This issue affects iframe Shortcode: from n/a through 2.0.
|
https://patchstack.com/database/vulnerability/iframe-shortcode/wordpress-iframe-shortcode-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-14T17:18:17.553Z
|
2023-12-21T14:44:20.101Z
|
2023-12-21T14:44:20.101Z
|
{'Vendor': 'Terrier Tenacity', 'Product': 'iframe Shortcode', 'Versions': 'n/a'}
|
CVE-2023-50833
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExtendThemes Colibri Page Builder allows Stored XSS.This issue affects Colibri Page Builder: from n/a through 1.0.239.
|
https://patchstack.com/database/vulnerability/colibri-page-builder/wordpress-colibri-page-builder-plugin-1-0-239-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-14T17:18:45.974Z
|
2023-12-21T17:53:55.510Z
|
2023-12-21T17:53:55.510Z
|
{'Vendor': 'ExtendThemes', 'Product': 'Colibri Page Builder', 'Versions': 'n/a'}
|
CVE-2023-50976
|
Redpanda before 23.1.21 and 23.2.x before 23.2.18 has missing authorization checks in the Transactions API.
|
https://github.com/redpanda-data/redpanda/pull/14969
|
2023-12-17T00:00:00
|
2023-12-17T00:00:00
|
2023-12-17T23:15:09.141264
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50864
|
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelId' parameter of the hotelDetails.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/evans/
|
2023-12-14T17:47:18.224Z
|
2024-01-04T14:31:24.671Z
|
2024-01-04T14:31:24.671Z
|
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
|
CVE-2023-50921
|
An issue was discovered on GL.iNet devices through 4.5.0. Attackers can invoke the add_user interface in the system module to gain root privileges. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
|
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Add_user_vulnerability.md
|
2023-12-15T00:00:00
|
2024-01-03T00:00:00
|
2024-01-03T08:08:04.850108
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50472
|
cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_SetValuestring at cJSON.c.
|
https://github.com/DaveGamble/cJSON/issues/803
|
2023-12-11T00:00:00
|
2023-12-14T00:00:00
|
2023-12-14T20:01:20.426391
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50110
|
TestLink through 1.9.20 allows type juggling for authentication bypass because === is not used.
|
https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357
|
2023-12-04T00:00:00
|
2023-12-30T00:00:00
|
2023-12-30T16:27:53.450924
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50901
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HT Mega – Absolute Addons For Elementor allows Reflected XSS.This issue affects HT Mega – Absolute Addons For Elementor: from n/a through 2.3.8.
|
https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-absolute-addons-for-elementor-plugin-2-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-15T15:45:32.564Z
|
2023-12-29T11:06:04.834Z
|
2023-12-29T11:06:04.834Z
|
{'Vendor': 'HasThemes', 'Product': 'HT Mega – Absolute Addons For Elementor', 'Versions': 'n/a'}
|
CVE-2023-50002
|
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formRebootMeshNode.
|
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md
|
2023-12-04T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T16:51:15.402232
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50147
|
There is an arbitrary command execution vulnerability in the setDiagnosisCfg function of the cstecgi .cgi of the TOTOlink A3700R router device in its firmware version V9.1.2u.5822_B20200513.
|
https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R%28setDiagnosisCfg%29/
|
2023-12-04T00:00:00
|
2023-12-22T00:00:00
|
2023-12-22T19:02:35.333177
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50844
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in James Ward Mail logging – WP Mail Catcher.This issue affects Mail logging – WP Mail Catcher: from n/a through 2.1.3.
|
https://patchstack.com/database/vulnerability/wp-mail-catcher/wordpress-wp-mail-catcher-plugin-2-1-3-sql-injection-vulnerability?_s_id=cve
|
2023-12-14T17:19:02.629Z
|
2023-12-28T18:27:16.774Z
|
2023-12-28T18:27:16.774Z
|
{'Vendor': 'James Ward', 'Product': 'Mail logging – WP Mail Catcher', 'Versions': 'n/a'}
|
CVE-2023-50628
|
Buffer Overflow vulnerability in libming version 0.4.8, allows attackers to execute arbitrary code and obtain sensitive information via parser.c component.
|
https://github.com/libming/libming/issues/289
|
2023-12-11T00:00:00
|
2023-12-20T00:00:00
|
2023-12-20T08:46:07.819098
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50297
|
Open redirect vulnerability in PowerCMS (6 Series, 5 Series, and 4 Series) allows a remote unauthenticated attacker to redirect users to arbitrary web sites via a specially crafted URL. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
|
https://www.powercms.jp/news/release-powercms-202312.html
|
2023-12-21T12:24:05.573Z
|
2023-12-26T05:53:48.253Z
|
2023-12-26T05:53:48.253Z
|
{'Vendor': 'Alfasado Inc.', 'Product': 'PowerCMS (PowerCMS 6 Series)', 'Versions': '6.31 and earlier'}
|
CVE-2023-50444
|
By default, .ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; and ZED! for Windows, Mac, Linux before 2023.5 include an encrypted version of sensitive user information, which could allow an unauthenticated attacker to obtain it via brute force.
|
https://www.primx.eu/fr/blog/
|
2023-12-10T00:00:00
|
2023-12-13T00:00:00
|
2023-12-13T20:08:45.780353
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50917
|
MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.
|
https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178
|
2023-12-15T00:00:00
|
2023-12-15T00:00:00
|
2024-01-22T17:06:23.789653
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50852
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes Booking Calendar | Appointment Booking | BookIt.This issue affects Booking Calendar | Appointment Booking | BookIt: from n/a through 2.4.3.
|
https://patchstack.com/database/vulnerability/bookit/wordpress-bookit-plugin-2-4-3-sql-injection-vulnerability?_s_id=cve
|
2023-12-14T17:19:16.268Z
|
2023-12-28T11:30:57.071Z
|
2023-12-28T11:30:57.071Z
|
{'Vendor': 'StylemixThemes', 'Product': 'Booking Calendar | Appointment Booking | BookIt', 'Versions': 'n/a'}
|
CVE-2023-50254
|
Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue.
|
https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495
|
2023-12-05T20:42:59.378Z
|
2023-12-22T16:49:48.977Z
|
2023-12-22T16:49:48.977Z
|
{'Vendor': 'linuxdeepin', 'Product': 'developer-center', 'Versions': '< 6.0.7'}
|
CVE-2023-50891
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zoho Forms Form plugin for WordPress – Zoho Forms allows Stored XSS.This issue affects Form plugin for WordPress – Zoho Forms: from n/a through 3.0.1.
|
https://patchstack.com/database/vulnerability/zoho-forms/wordpress-zoho-forms-plugin-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-12-15T15:08:48.865Z
|
2023-12-29T11:19:01.969Z
|
2023-12-29T11:19:01.969Z
|
{'Vendor': 'Zoho Forms', 'Product': 'Form plugin for WordPress – Zoho Forms', 'Versions': 'n/a'}
|
CVE-2023-50038
|
There is an arbitrary file upload vulnerability in the background of textpattern cms v4.8.8, which leads to the loss of server permissions.
|
https://www.cnblogs.com/fengzun/articles/17862578.html
|
2023-12-04T00:00:00
|
2023-12-28T00:00:00
|
2023-12-28T06:22:23.712185
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-50346
|
HCL DRYiCE MyXalytics is impacted by an information disclosure vulnerability. Certain endpoints within the application disclose detailed file information.
|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
|
2023-12-07T03:55:55.605Z
|
2024-01-03T01:59:00.314Z
|
2024-01-03T01:59:00.314Z
|
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
|
CVE-2023-50983
|
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the sysScheduleRebootSet function.
|
http://tenda.com
|
2023-12-18T00:00:00
|
2023-12-20T00:00:00
|
2023-12-20T21:41:38.971273
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.