CVE_ID
stringlengths
9
213
⌀
Description
stringlengths
24
3.87k
⌀
URL
stringlengths
12
306
⌀
DateReserved
stringlengths
19
24
⌀
DatePublished
stringlengths
19
75
⌀
DateUpdated
stringlengths
19
61
⌀
AffectedProducts
stringlengths
46
143k
⌀
CVE-2023-50348
HCL DRYiCE MyXalytics is impacted by an improper error handling vulnerability. The application returns detailed error messages that can provide an attacker with insight into the application, system, etc.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.605Z
2024-01-03T01:52:28.258Z
2024-01-03T01:52:28.258Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50431
sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info->pad0 is not initialized.
https://lists.freedesktop.org/archives/dri-devel/2023-November/431772.html
2023-12-09T00:00:00
2023-12-09T00:00:00
2023-12-09T22:40:51.812987
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50827
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Accredible Accredible Certificates & Open Badges allows Stored XSS.This issue affects Accredible Certificates & Open Badges: from n/a through 1.4.8.
https://patchstack.com/database/vulnerability/accredible-certificates/wordpress-accredible-certificates-open-badges-plugin-1-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.553Z
2023-12-21T14:48:27.932Z
2023-12-21T14:48:27.932Z
{'Vendor': 'Accredible', 'Product': 'Accredible Certificates & Open Badges', 'Versions': 'n/a'}
CVE-2023-50124
Flient Smart Door Lock v1.0 is vulnerable to Use of Default Credentials. Due to default credentials on a debug interface, in combination with certain design choices, an attacker can unlock the Flient Smart Door Lock by replacing the fingerprint that is stored on the scanner.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:21:20.278558
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50466
An authenticated command injection vulnerability in Weintek cMT2078X easyweb Web Version v2.1.3, OS v20220215 allows attackers to execute arbitrary code or access sensitive information via injecting a crafted payload into the HMI Name parameter.
https://literate-bakery-10b.notion.site/Weintek-EasyWeb-cMT-Reports-3fc0b10798b54f51a61d719395c408da?pvs=4
2023-12-11T00:00:00
2023-12-19T00:00:00
2023-12-19T20:33:18.884089
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50870
In JetBrains TeamCity before 2023.11.1 a CSRF on login was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-12-15T13:47:59.412Z
2023-12-15T13:48:13.075Z
2023-12-15T13:48:13.075Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-50671
In exiftags 1.01, nikon_prop1 in nikon.c has a heap-based buffer overflow (write of size 28) because snprintf can write to an unexpected address.
https://blog.yulun.ac.cn/posts/2023/fuzzing-exiftags/
2023-12-11T00:00:00
2024-01-11T00:00:00
2024-01-11T16:56:08.661685
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50333
Mattermost fails to update the permissions of the current session for a user who was just demoted to guest, allowing freshly demoted guests to change group names.
https://mattermost.com/security-updates
2023-12-21T08:00:43.432Z
2024-01-02T09:53:01.990Z
2024-01-02T09:53:01.990Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.7'}
CVE-2023-50919
An issue was discovered on GL.iNet devices before version 4.5.0. There is an NGINX authentication bypass via Lua string pattern matching. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Authentication-bypass.md
2023-12-15T00:00:00
2024-01-12T00:00:00
2024-01-24T16:06:28.187977
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50775
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to copy jobs.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3092
2023-12-13T13:06:36.477Z
2023-12-13T17:30:20.742Z
2023-12-13T17:30:20.742Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Deployment Dashboard Plugin', 'Versions': '0'}
CVE-2023-50630
Cross Site Scripting (XSS) vulnerability in xiweicheng TMS v.2.28.0 allows a remote attacker to execute arbitrary code via a crafted script to the click here function.
https://github.com/xiweicheng/tms/issues/19
2023-12-11T00:00:00
2024-01-04T00:00:00
2024-01-04T07:57:13.556857
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50722
XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, there is a reflected XSS or also direct remote code execution vulnerability in the code for displaying configurable admin sections. The code that can be passed through a URL parameter is only executed when the user who is visiting the crafted URL has edit right on at least one configuration section. While any user of the wiki could easily create such a section, this vulnerability doesn't require the attacker to have an account or any access on the wiki. It is sufficient to trick any admin user of the XWiki installation to visit the crafted URL. This vulnerability allows full remote code execution with programming rights and thus impacts the confidentiality, integrity and availability of the whole XWiki installation. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patch can be manually applied to the document `XWiki.ConfigurableClass`.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cp3j-273x-3jxc
2023-12-11T17:53:36.031Z
2023-12-15T19:02:52.134Z
2023-12-15T19:02:52.134Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 2.3, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
CVE-2023-50372
Cross-Site Request Forgery (CSRF) vulnerability in Hiroaki Miyashita Custom Post Type Page Template.This issue affects Custom Post Type Page Template: from n/a through 1.1.
https://patchstack.com/database/vulnerability/custom-post-type-page-template/wordpress-custom-post-type-page-template-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-07T12:18:13.605Z
2023-12-18T10:15:28.593Z
2023-12-18T10:15:28.593Z
{'Vendor': 'Hiroaki Miyashita', 'Product': 'Custom Post Type Page Template', 'Versions': 'n/a'}
CVE-2023-50094
reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195
2023-12-04T00:00:00
2024-01-01T00:00:00
2024-01-01T17:58:51.819166
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50082
Aoyun Technology pbootcms V3.1.2 is vulnerable to Incorrect Access Control, allows remote attackers to gain sensitive information via session leakage allows a user to avoid logging into the backend management platform.
https://github.com/juraorab/cve/blob/master/CVE/README.md
2023-12-04T00:00:00
2024-01-04T00:00:00
2024-01-04T07:40:21.105586
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50578
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
https://gitee.com/mingSoft/MCMS/issues/I8MAJK
2023-12-11T00:00:00
2023-12-30T00:00:00
2023-12-30T15:47:39.608559
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50128
The remote keyless system of the Hozard alarm system (alarmsystemen) v1.0 sends an identical radio frequency signal for each request, which results in an attacker being able to conduct replay attacks to bring the alarm system to a disarmed state.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:23:13.183487
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50981
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
https://github.com/weidai11/cryptopp/issues/1249
2023-12-18T00:00:00
2023-12-18T00:00:00
2023-12-18T00:53:19.032355
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50651
TOTOLINK X6000R v9.4.0cu.852_B20230719 was discovered to contain a remote command execution (RCE) vulnerability via the component /cgi-bin/cstecgi.cgi.
http://totolink.com
2023-12-11T00:00:00
2023-12-30T00:00:00
2023-12-30T16:07:45.326525
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50344
HCL DRYiCE MyXalytics is impacted by improper access control (Unauthenticated File Download) vulnerability. An unauthenticated user can download certain files.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.604Z
2024-01-03T02:25:23.360Z
2024-01-03T02:25:23.360Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50714
yii2-authclient is an extension that adds OpenID, OAuth, OAuth2 and OpenId Connect consumers for the Yii framework 2.0. In yii2-authclient prior to version 2.2.15, the Oauth2 PKCE implementation is vulnerable in 2 ways. First, the `authCodeVerifier` should be removed after usage (similar to `authState`). Second, there is a risk for a `downgrade attack` if PKCE is being relied on for CSRF protection. Version 2.2.15 contains a patch for the issue. No known workarounds are available.
https://github.com/yiisoft/yii2-authclient/security/advisories/GHSA-rw54-6826-c8j5
2023-12-11T17:53:36.029Z
2023-12-22T18:30:03.118Z
2023-12-22T18:30:03.118Z
{'Vendor': 'yiisoft', 'Product': 'yii2-authclient', 'Versions': '< 2.2.15'}
CVE-2023-50893
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UpSolution Impreza – WordPress Website and WooCommerce Builder allows Reflected XSS.This issue affects Impreza – WordPress Website and WooCommerce Builder: from n/a through 8.17.4.
https://patchstack.com/database/vulnerability/us-core/wordpress-upsolution-core-plugin-8-17-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T15:08:48.865Z
2023-12-29T11:12:36.317Z
2023-12-29T11:12:36.317Z
{'Vendor': 'UpSolution', 'Product': 'Impreza – WordPress Website and WooCommerce Builder', 'Versions': 'n/a'}
CVE-2023-50256
Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.
https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4
2023-12-05T20:42:59.378Z
2024-01-03T22:34:47.447Z
2024-01-03T22:34:47.447Z
{'Vendor': 'Froxlor', 'Product': 'Froxlor', 'Versions': '< 2.1.2'}
CVE-2023-50743
Online Notice Board System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'dd' parameter of the registration.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/perahia/
2023-12-12T15:12:54.424Z
2024-01-04T14:08:35.684Z
2024-01-04T14:08:35.684Z
{'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'}
CVE-2023-50104
ZZCMS 2023 has a file upload vulnerability in 3/E_bak5.1/upload/index.php, allowing attackers to exploit this loophole to gain server privileges and execute arbitrary code.
https://github.com/zzq66/cve4
2023-12-04T00:00:00
2023-12-28T00:00:00
2023-12-28T23:45:44.414859
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50692
File Upload vulnerability in JIZHICMS v.2.5, allows remote attacker to execute arbitrary code via a crafted file uploaded and downloaded to the download_url parameter in the app/admin/exts/ directory.
https://github.com/Cherry-toto/jizhicms/issues/91
2023-12-11T00:00:00
2023-12-28T00:00:00
2023-12-28T05:38:17.398224
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50368
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Shortcodes and extra features for Phlox theme allows Stored XSS.This issue affects Shortcodes and extra features for Phlox theme: from n/a through 2.15.2.
https://patchstack.com/database/vulnerability/auxin-elements/wordpress-shortcodes-and-extra-features-for-phlox-theme-plugin-2-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-07T12:18:13.605Z
2023-12-14T13:56:07.422Z
2023-12-14T13:56:07.422Z
{'Vendor': 'Averta', 'Product': 'Shortcodes and extra features for Phlox theme', 'Versions': 'n/a'}
CVE-2023-50446
An issue was discovered in Mullvad VPN Windows app before 2023.6-beta1. Insufficient permissions on a directory allow any local unprivileged user to escalate privileges to SYSTEM.
https://github.com/mullvad/mullvadvpn-app/pull/5398
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T16:57:08.628337
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50846
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RegistrationMagic RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login.This issue affects RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login: from n/a through 5.2.4.5.
https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-4-5-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.629Z
2023-12-28T18:19:26.402Z
2023-12-28T18:19:26.402Z
{'Vendor': 'RegistrationMagic', 'Product': 'RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login', 'Versions': 'n/a'}
CVE-2023-50000
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formResetMeshNode.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_resetMesh/w30e_resetMesh.md
2023-12-04T00:00:00
2023-12-07T00:00:00
2023-12-07T16:59:41.166991
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50779
Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3179
2023-12-13T13:06:36.478Z
2023-12-13T17:30:23.280Z
2023-12-13T17:30:23.280Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
CVE-2023-50778
A cross-site request forgery (CSRF) vulnerability in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using an attacker-specified token.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3179
2023-12-13T13:06:36.478Z
2023-12-13T17:30:22.627Z
2023-12-13T17:30:22.627Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
CVE-2023-50847
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Collne Inc. Welcart e-Commerce.This issue affects Welcart e-Commerce: from n/a through 2.9.3.
https://patchstack.com/database/vulnerability/usc-e-shop/wordpress-welcart-e-commerce-plugin-2-9-3-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.630Z
2023-12-28T18:15:01.186Z
2023-12-28T18:15:01.186Z
{'Vendor': 'Collne Inc.', 'Product': 'Welcart e-Commerce', 'Versions': 'n/a'}
CVE-2023-50001
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formUpgradeMeshOnline.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_upgradeMeshOnline/w30e_upgradeMeshOnline.md
2023-12-04T00:00:00
2023-12-07T00:00:00
2023-12-07T16:57:40.679679
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50902
Cross-Site Request Forgery (CSRF) vulnerability in WPExpertsio New User Approve.This issue affects New User Approve: from n/a through 2.5.1.
https://patchstack.com/database/vulnerability/new-user-approve/wordpress-new-user-approve-plugin-2-5-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-15T15:45:32.565Z
2023-12-29T12:28:46.992Z
2023-12-29T12:28:46.992Z
{'Vendor': 'WPExpertsio', 'Product': 'New User Approve', 'Versions': 'n/a'}
CVE-2023-50294
The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:43.973Z
2023-12-26T07:21:19.831Z
2023-12-26T07:21:19.831Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.6'}
CVE-2023-50851
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in N Squared Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin.This issue affects Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin: from n/a before 1.6.6.1.
https://patchstack.com/database/vulnerability/simply-schedule-appointments/wordpress-simply-schedule-appointments-booking-plugin-1-6-6-1-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.630Z
2023-12-28T11:28:30.036Z
2023-12-28T11:28:30.036Z
{'Vendor': 'N Squared', 'Product': 'Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin', 'Versions': 'n/a'}
CVE-2023-50447
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter).
https://github.com/python-pillow/Pillow/releases
2023-12-10T00:00:00
2024-01-19T00:00:00
2024-01-20T18:06:19.067532
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50017
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/database/backup
https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T18:13:48.135567
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50693
An issue in dom96 Jester v.0.6.0 and before allows a remote attacker to execute arbitrary code via a crafted request.
https://github.com/dom96/jester/issues/326
2023-12-11T00:00:00
2024-01-19T00:00:00
2024-01-19T19:47:43.751276
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50369
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alma Alma – Pay in installments or later for WooCommerce allows Stored XSS.This issue affects Alma – Pay in installments or later for WooCommerce: from n/a through 5.1.3.
https://patchstack.com/database/vulnerability/alma-gateway-for-woocommerce/wordpress-alma-plugin-5-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-07T12:18:13.605Z
2023-12-14T13:50:39.339Z
2023-12-14T13:50:47.184Z
{'Vendor': 'Alma', 'Product': 'Alma – Pay in installments or later for WooCommerce', 'Versions': 'n/a'}
CVE-2023-50943
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attacker to poison the XCom data by bypassing the protection of "enable_xcom_pickling=False" configuration setting resulting in poisoned data after XCom deserialization. This vulnerability is considered low since it requires a DAG author to exploit it. Users are recommended to upgrade to version 2.8.1 or later, which fixes this issue.
https://github.com/apache/airflow/pull/36255
2023-12-16T16:02:36.817Z
2024-01-24T12:57:07.287Z
2024-01-24T12:57:07.287Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-50892
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodexThemes TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme allows Reflected XSS.This issue affects TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme: from n/a through 5.9.1.
https://patchstack.com/database/vulnerability/thegem/wordpress-thegem-theme-5-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T15:08:48.865Z
2023-12-29T11:15:38.381Z
2023-12-29T11:15:38.381Z
{'Vendor': 'CodexThemes', 'Product': 'TheGem - Creative Multi-Purpose & WooCommerce WordPress Theme', 'Versions': 'n/a'}
CVE-2023-50345
HCL DRYiCE MyXalytics is impacted by an Open Redirect vulnerability which could allow an attacker to redirect users to malicious sites, potentially leading to phishing attacks or other security threats.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.604Z
2024-01-03T02:01:57.575Z
2024-01-03T02:01:57.575Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50715
Home Assistant is open source home automation software. Prior to version 2023.12.3, the login page discloses all active user accounts to any unauthenticated browsing request originating on the Local Area Network. Version 2023.12.3 contains a patch for this issue. When starting the Home Assistant 2023.12 release, the login page returns all currently active user accounts to browsing requests from the Local Area Network. Tests showed that this occurs when the request is not authenticated and the request originated locally, meaning on the Home Assistant host local subnet or any other private subnet. The rationale behind this is to make the login more user-friendly and an experience better aligned with other applications that have multiple user-profiles. However, as a result, all accounts are displayed regardless of them having logged in or not and for any device that navigates to the server. This disclosure is mitigated by the fact that it only occurs for requests originating from a LAN address. But note that this applies to the local subnet where Home Assistant resides and to any private subnet that can reach it.
https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83
2023-12-11T17:53:36.029Z
2023-12-15T02:05:57.580Z
2023-12-15T02:05:57.580Z
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.12.3'}
CVE-2023-50129
Missing encryption in the NFC tags of the Flient Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original tags, which results in an attacker gaining access to the perimeter.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:23:43.268805
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50980
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
https://github.com/weidai11/cryptopp/issues/1248
2023-12-18T00:00:00
2023-12-18T00:00:00
2023-12-18T00:53:52.054168
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50703
An attacker with network access could perform a man-in-the-middle (MitM) attack and capture sensitive information to gain unauthorized access to the application.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03
2023-12-11T16:37:13.793Z
2023-12-19T23:40:49.215Z
2023-12-19T23:40:49.215Z
{'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'}
CVE-2023-50979
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
https://github.com/weidai11/cryptopp/issues/1247
2023-12-18T00:00:00
2023-12-18T00:00:00
2023-12-18T00:54:28.451183
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50723
XWiki Platform is a generic wiki platform. Starting in 2.3 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, anyone who can edit an arbitrary wiki page in an XWiki installation can gain programming right through several cases of missing escaping in the code for displaying sections in the administration interface. This impacts the confidentiality, integrity and availability of the whole XWiki installation. Normally, all users are allowed to edit their own user profile so this should be exploitable by all users of the XWiki instance. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1. The patches can be manually applied to the `XWiki.ConfigurableClassMacros` and `XWiki.ConfigurableClass` pages.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qj86-p74r-7wp5
2023-12-11T17:53:36.031Z
2023-12-15T19:02:57.939Z
2023-12-15T19:02:57.939Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 2.3, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
CVE-2023-50774
A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3183
2023-12-13T13:06:36.477Z
2023-12-13T17:30:20.085Z
2023-12-13T17:30:20.085Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins HTMLResource Plugin', 'Versions': '0'}
CVE-2023-50918
app/Controller/AuditLogsController.php in MISP before 2.4.182 mishandles ACLs for audit logs.
https://github.com/MISP/MISP/commit/92888b1376246c0f20c256aaa3c57b6f12115fa1
2023-12-15T00:00:00
2023-12-15T00:00:00
2023-12-15T17:31:55.318250
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50762
When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird < 115.6.
https://bugzilla.mozilla.org/show_bug.cgi?id=1862625
2023-12-12T16:29:47.908Z
2023-12-19T13:38:34.261Z
2023-12-19T13:38:34.261Z
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
CVE-2023-50332
Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:51.268Z
2023-12-26T07:21:24.393Z
2023-12-26T07:21:24.393Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.6'}
CVE-2023-50559
An issue was discovered in XiangShan v2.1, allows local attackers to obtain sensitive information via the L1D cache.
https://github.com/OpenXiangShan/XiangShan/issues/2534
2023-12-11T00:00:00
2023-12-29T00:00:00
2023-12-29T23:43:47.085469
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50172
A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to the silent creation of a recovery pass code for any user.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897
2023-12-06T18:44:23.364Z
2024-01-10T15:48:08.638Z
2024-01-12T17:23:11.253Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
CVE-2023-50871
In JetBrains YouTrack before 2023.3.22268 authorization check for inline comments inside thread replies was missed
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-12-15T13:47:59.896Z
2023-12-15T13:48:13.458Z
2023-12-15T13:48:13.458Z
{'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'}
CVE-2023-50430
The Goodix Fingerprint Device, as shipped in Dell Inspiron 15 computers, does not follow the Secure Device Connection Protocol (SDCP) when enrolling via Linux, and accepts an unauthenticated configuration packet to select the Windows template database, which allows bypass of Windows Hello authentication by enrolling an attacker's fingerprint.
https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/
2023-12-09T00:00:00
2023-12-09T00:00:00
2023-12-09T21:57:50.015272
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50963
IBM Storage Defender - Data Protect 1.0.0 through 1.4.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 276101.
https://www.ibm.com/support/pages/node/7106918
2023-12-16T19:35:51.573Z
2024-01-19T01:30:49.594Z
2024-01-19T01:30:49.594Z
{'Vendor': 'IBM', 'Product': 'Storage Defender - Data Protect', 'Versions': '1.0.0'}
CVE-2023-50826
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Freshlight Lab Menu Image, Icons made easy allows Stored XSS.This issue affects Menu Image, Icons made easy: from n/a through 3.10.
https://patchstack.com/database/vulnerability/menu-image/wordpress-menu-image-icons-made-easy-plugin-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.553Z
2023-12-21T14:46:28.254Z
2023-12-21T14:46:28.254Z
{'Vendor': 'Freshlight Lab', 'Product': 'Menu Image, Icons made easy', 'Versions': 'n/a'}
CVE-2023-50125
A default engineer password set on the Hozard alarm system (Alarmsysteem) v1.0 allows an attacker to bring the alarm system to a disarmed state.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:21:48.426417
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50719
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p6cp-6r35-32mh
2023-12-11T17:53:36.030Z
2023-12-15T19:02:40.905Z
2023-12-15T19:02:40.905Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.2-milestone-2, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
CVE-2023-50563
Semcms v4.8 was discovered to contain a SQL injection vulnerability via the AID parameter at SEMCMS_Function.php.
https://github.com/SecBridge/Cms_Vuls_test/blob/main/Semcms/Semcms_Sql_Inject.md
2023-12-11T00:00:00
2023-12-14T00:00:00
2023-12-14T14:32:31.847470
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50830
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seosbg Seos Contact Form allows Stored XSS.This issue affects Seos Contact Form: from n/a through 1.8.0.
https://patchstack.com/database/vulnerability/seos-contact-form/wordpress-seos-contact-form-plugin-1-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.553Z
2023-12-21T17:15:03.688Z
2023-12-21T17:15:03.688Z
{'Vendor': 'Seosbg', 'Product': 'Seos Contact Form', 'Versions': 'n/a'}
CVE-2023-50471
cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_InsertItemInArray at cJSON.c.
https://github.com/DaveGamble/cJSON/issues/802
2023-12-11T00:00:00
2023-12-14T00:00:00
2023-12-30T21:06:22.540901
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50922
An issue was discovered on GL.iNet devices through 4.5.0. Attackers who are able to steal the AdminToken cookie can execute arbitrary code by uploading a crontab-formatted file to a specific directory and waiting for its execution. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Remote%20code%20execution%20due%20to%20gl_crontabs.md
2023-12-15T00:00:00
2024-01-03T00:00:00
2024-01-03T07:47:27.685463
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50867
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the signupAction.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/evans/
2023-12-14T17:47:18.224Z
2024-01-04T14:33:52.582Z
2024-01-04T14:33:52.582Z
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
CVE-2023-50164
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj
2023-12-04T08:37:57.468Z
2023-12-07T08:49:19.853Z
2023-12-12T09:26:34.588Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Struts', 'Versions': '2.0.0, 6.0.0'}
CVE-2023-50308
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 under certain circumstances could allow an authenticated user to the database to cause a denial of service when a statement is run on columnar tables. IBM X-Force ID: 273393.
https://www.ibm.com/support/pages/node/7105506
2023-12-07T01:28:46.424Z
2024-01-22T18:44:56.572Z
2024-01-22T18:44:56.572Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'}
CVE-2023-50720
XWiki Platform is a generic wiki platform. Prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the email addresses of users even when obfuscation of email addresses is enabled. To demonstrate the vulnerability, search for `objcontent:email*` using XWiki's regular search interface. This has been fixed in XWiki 14.10.15, 15.5.2 and 15.7RC1 by not indexing email address properties when obfuscation is enabled. There are no known workarounds for this vulnerability.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2grh-gr37-2283
2023-12-11T17:53:36.030Z
2023-12-15T19:02:35.372Z
2023-12-15T19:02:35.372Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
CVE-2023-50370
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh WPBakery Page Builder Addons by Livemesh allows Stored XSS.This issue affects WPBakery Page Builder Addons by Livemesh: from n/a through 3.5.
https://patchstack.com/database/vulnerability/addons-for-visual-composer/wordpress-livemesh-addons-for-wpbakery-page-builder-plugin-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-07T12:18:13.605Z
2023-12-14T13:42:59.541Z
2023-12-14T13:52:22.096Z
{'Vendor': 'Livemesh', 'Product': 'WPBakery Page Builder Addons by Livemesh', 'Versions': 'n/a'}
CVE-2023-50848
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aaron J 404 Solution.This issue affects 404 Solution: from n/a through 2.34.0.
https://patchstack.com/database/vulnerability/404-solution/wordpress-404-solution-plugin-2-34-0-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.630Z
2023-12-28T11:38:06.049Z
2023-12-28T11:38:06.049Z
{'Vendor': 'Aaron J', 'Product': '404 Solution', 'Versions': 'n/a'}
CVE-2023-50262
Dompdf is an HTML to PDF converter for PHP. When parsing SVG images Dompdf performs an initial validation to ensure that paths within the SVG are allowed. One of the validations is that the SVG document does not reference itself. However, prior to version 2.0.4, a recursive chained using two or more SVG documents is not correctly validated. Depending on the system configuration and attack pattern this could exhaust the memory available to the executing process and/or to the server itself. php-svg-lib, when run in isolation, does not support SVG references for `image` elements. However, when used in combination with Dompdf, php-svg-lib will process SVG images referenced by an `image` element. Dompdf currently includes validation to prevent self-referential `image` references, but a chained reference is not checked. A malicious actor may thus trigger infinite recursion by chaining references between two or more SVG images. When Dompdf parses a malicious payload, it will crash due after exceeding the allowed execution time or memory usage. An attacker sending multiple request to a system can potentially cause resource exhaustion to the point that the system is unable to handle incoming request. Version 2.0.4 contains a fix for this issue.
https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2
2023-12-05T20:42:59.379Z
2023-12-13T20:52:56.173Z
2023-12-13T20:52:56.173Z
{'Vendor': 'dompdf', 'Product': 'dompdf', 'Versions': '< 2.0.4'}
CVE-2023-50777
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3182
2023-12-13T13:06:36.478Z
2023-12-13T17:30:21.995Z
2023-12-13T17:30:21.995Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
CVE-2023-50448
In ActiveAdmin (aka Active Admin) before 2.12.0, a concurrency issue allows a malicious actor to access potentially private data (that belongs to another user) by making CSV export requests at certain specific times.
https://github.com/activeadmin/activeadmin/pull/7336
2023-12-10T00:00:00
2023-12-28T00:00:00
2023-12-28T22:53:41.043972
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50274
HPE OneView may allow command injection with local privilege escalation.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04586en_us
2023-12-06T14:22:26.839Z
2024-01-23T17:02:38.098Z
2024-01-23T17:02:38.098Z
{'Vendor': 'Hewlett Packard Enterprise', 'Product': 'HPE OneView', 'Versions': '0'}
CVE-2023-50761
The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird < 115.6.
https://bugzilla.mozilla.org/show_bug.cgi?id=1865647
2023-12-12T16:29:47.908Z
2023-12-19T13:38:35.397Z
2023-12-19T13:38:35.397Z
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
CVE-2023-50258
Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testDiscord` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `discord_webhook` variable and passes it to the `notifiers.discord_notifier.test_notify` method, then `_notify_discord` and finally `_send_discord_msg` method, which sends a POST request to the user-controlled URL on line 64 in `/medusa/notifiers/discord.py`, which leads to a blind server-side request forgery. This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.
https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g
2023-12-05T20:42:59.378Z
2023-12-22T16:55:58.406Z
2023-12-22T16:55:58.406Z
{'Vendor': 'pymedusa', 'Product': 'Medusa', 'Versions': '< 1.0.19'}
CVE-2023-50126
Missing encryption in the RFID tags of the Hozard alarm system (Alarmsysteem) v1.0 allow attackers to create a cloned tag via brief physical proximity to one of the original tags, which results in an attacker being able to bring the alarm system to a disarmed state.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:22:14.930458
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50825
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Terrier Tenacity iframe Shortcode allows Stored XSS.This issue affects iframe Shortcode: from n/a through 2.0.
https://patchstack.com/database/vulnerability/iframe-shortcode/wordpress-iframe-shortcode-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.553Z
2023-12-21T14:44:20.101Z
2023-12-21T14:44:20.101Z
{'Vendor': 'Terrier Tenacity', 'Product': 'iframe Shortcode', 'Versions': 'n/a'}
CVE-2023-50833
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ExtendThemes Colibri Page Builder allows Stored XSS.This issue affects Colibri Page Builder: from n/a through 1.0.239.
https://patchstack.com/database/vulnerability/colibri-page-builder/wordpress-colibri-page-builder-plugin-1-0-239-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:45.974Z
2023-12-21T17:53:55.510Z
2023-12-21T17:53:55.510Z
{'Vendor': 'ExtendThemes', 'Product': 'Colibri Page Builder', 'Versions': 'n/a'}
CVE-2023-50976
Redpanda before 23.1.21 and 23.2.x before 23.2.18 has missing authorization checks in the Transactions API.
https://github.com/redpanda-data/redpanda/pull/14969
2023-12-17T00:00:00
2023-12-17T00:00:00
2023-12-17T23:15:09.141264
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50864
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelId' parameter of the hotelDetails.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/evans/
2023-12-14T17:47:18.224Z
2024-01-04T14:31:24.671Z
2024-01-04T14:31:24.671Z
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
CVE-2023-50921
An issue was discovered on GL.iNet devices through 4.5.0. Attackers can invoke the add_user interface in the system module to gain root privileges. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Add_user_vulnerability.md
2023-12-15T00:00:00
2024-01-03T00:00:00
2024-01-03T08:08:04.850108
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50472
cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_SetValuestring at cJSON.c.
https://github.com/DaveGamble/cJSON/issues/803
2023-12-11T00:00:00
2023-12-14T00:00:00
2023-12-14T20:01:20.426391
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50110
TestLink through 1.9.20 allows type juggling for authentication bypass because === is not used.
https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357
2023-12-04T00:00:00
2023-12-30T00:00:00
2023-12-30T16:27:53.450924
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50901
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HT Mega – Absolute Addons For Elementor allows Reflected XSS.This issue affects HT Mega – Absolute Addons For Elementor: from n/a through 2.3.8.
https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-absolute-addons-for-elementor-plugin-2-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T15:45:32.564Z
2023-12-29T11:06:04.834Z
2023-12-29T11:06:04.834Z
{'Vendor': 'HasThemes', 'Product': 'HT Mega – Absolute Addons For Elementor', 'Versions': 'n/a'}
CVE-2023-50002
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formRebootMeshNode.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md
2023-12-04T00:00:00
2023-12-07T00:00:00
2023-12-07T16:51:15.402232
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50147
There is an arbitrary command execution vulnerability in the setDiagnosisCfg function of the cstecgi .cgi of the TOTOlink A3700R router device in its firmware version V9.1.2u.5822_B20200513.
https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R%28setDiagnosisCfg%29/
2023-12-04T00:00:00
2023-12-22T00:00:00
2023-12-22T19:02:35.333177
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50844
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in James Ward Mail logging – WP Mail Catcher.This issue affects Mail logging – WP Mail Catcher: from n/a through 2.1.3.
https://patchstack.com/database/vulnerability/wp-mail-catcher/wordpress-wp-mail-catcher-plugin-2-1-3-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.629Z
2023-12-28T18:27:16.774Z
2023-12-28T18:27:16.774Z
{'Vendor': 'James Ward', 'Product': 'Mail logging – WP Mail Catcher', 'Versions': 'n/a'}
CVE-2023-50628
Buffer Overflow vulnerability in libming version 0.4.8, allows attackers to execute arbitrary code and obtain sensitive information via parser.c component.
https://github.com/libming/libming/issues/289
2023-12-11T00:00:00
2023-12-20T00:00:00
2023-12-20T08:46:07.819098
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50297
Open redirect vulnerability in PowerCMS (6 Series, 5 Series, and 4 Series) allows a remote unauthenticated attacker to redirect users to arbitrary web sites via a specially crafted URL. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
https://www.powercms.jp/news/release-powercms-202312.html
2023-12-21T12:24:05.573Z
2023-12-26T05:53:48.253Z
2023-12-26T05:53:48.253Z
{'Vendor': 'Alfasado Inc.', 'Product': 'PowerCMS (PowerCMS 6 Series)', 'Versions': '6.31 and earlier'}
CVE-2023-50444
By default, .ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; and ZED! for Windows, Mac, Linux before 2023.5 include an encrypted version of sensitive user information, which could allow an unauthenticated attacker to obtain it via brute force.
https://www.primx.eu/fr/blog/
2023-12-10T00:00:00
2023-12-13T00:00:00
2023-12-13T20:08:45.780353
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50917
MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.
https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178
2023-12-15T00:00:00
2023-12-15T00:00:00
2024-01-22T17:06:23.789653
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50852
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes Booking Calendar | Appointment Booking | BookIt.This issue affects Booking Calendar | Appointment Booking | BookIt: from n/a through 2.4.3.
https://patchstack.com/database/vulnerability/bookit/wordpress-bookit-plugin-2-4-3-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:16.268Z
2023-12-28T11:30:57.071Z
2023-12-28T11:30:57.071Z
{'Vendor': 'StylemixThemes', 'Product': 'Booking Calendar | Appointment Booking | BookIt', 'Versions': 'n/a'}
CVE-2023-50254
Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue.
https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495
2023-12-05T20:42:59.378Z
2023-12-22T16:49:48.977Z
2023-12-22T16:49:48.977Z
{'Vendor': 'linuxdeepin', 'Product': 'developer-center', 'Versions': '< 6.0.7'}
CVE-2023-50891
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zoho Forms Form plugin for WordPress – Zoho Forms allows Stored XSS.This issue affects Form plugin for WordPress – Zoho Forms: from n/a through 3.0.1.
https://patchstack.com/database/vulnerability/zoho-forms/wordpress-zoho-forms-plugin-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T15:08:48.865Z
2023-12-29T11:19:01.969Z
2023-12-29T11:19:01.969Z
{'Vendor': 'Zoho Forms', 'Product': 'Form plugin for WordPress – Zoho Forms', 'Versions': 'n/a'}
CVE-2023-50038
There is an arbitrary file upload vulnerability in the background of textpattern cms v4.8.8, which leads to the loss of server permissions.
https://www.cnblogs.com/fengzun/articles/17862578.html
2023-12-04T00:00:00
2023-12-28T00:00:00
2023-12-28T06:22:23.712185
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50346
HCL DRYiCE MyXalytics is impacted by an information disclosure vulnerability. Certain endpoints within the application disclose detailed file information.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.605Z
2024-01-03T01:59:00.314Z
2024-01-03T01:59:00.314Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50983
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the sysScheduleRebootSet function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:38.971273
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}