CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-50829
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aerin Loan Repayment Calculator and Application Form allows Stored XSS.This issue affects Loan Repayment Calculator and Application Form: from n/a through 2.9.3.
https://patchstack.com/database/vulnerability/quick-interest-slider/wordpress-loan-repayment-calculator-and-application-form-plugin-2-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.553Z
2023-12-21T17:10:51.231Z
2023-12-21T17:10:51.231Z
{'Vendor': 'Aerin', 'Product': 'Loan Repayment Calculator and Application Form', 'Versions': 'n/a'}
CVE-2023-50350
HCL DRYiCE MyXalytics is impacted by the use of a broken cryptographic algorithm for encryption, potentially giving an attacker ability to decrypt sensitive information.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.606Z
2024-01-03T01:50:00.848Z
2024-01-03T01:50:00.848Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50096
STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md
2023-12-04T00:00:00
2024-01-01T00:00:00
2024-01-01T17:49:20.858105
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50429
IzyBat Orange casiers before 20230803_1 allows getEnsemble.php ensemble SQL injection.
https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf
2023-12-09T00:00:00
2023-12-09T00:00:00
2023-12-09T21:19:28.151931
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50612
Insecure Permissions vulnerability in fit2cloud Cloud Explorer Lite version 1.4.1, allow local attackers to escalate privileges and obtain sensitive information via the cloud accounts parameter.
https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA
2023-12-11T00:00:00
2024-01-06T00:00:00
2024-01-06T02:45:27.069343
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50428
In Bitcoin Core through 26.0 and Bitcoin Knots before 25.1.knots20231115, datacarrier size limits can be bypassed by obfuscating data as code (e.g., with OP_FALSE OP_IF), as exploited in the wild by Inscriptions in 2022 and 2023. NOTE: although this is a vulnerability from the perspective of the Bitcoin Knots project, some others consider it "not a bug."
https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
2023-12-09T00:00:00
2023-12-09T00:00:00
2024-01-04T16:57:05.960073
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50351
HCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:59:48.771Z
2024-01-03T01:45:45.358Z
2024-01-03T01:45:45.358Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50982
Stud.IP 5.x through 5.3.3 allows XSS with resultant upload of executable files, because upload_action and edit_action in Admin_SmileysController do not check the file extension. This leads to remote code execution with the privileges of the www-data user. The fixed versions are 5.3.4, 5.2.6, 5.1.7, and 5.0.9.
https://sourceforge.net/projects/studip/files/Stud.IP/5.4/
2023-12-18T00:00:00
2024-01-08T00:00:00
2024-01-08T19:49:07.513208
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50828
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Vongries Ultimate Dashboard – Custom WordPress Dashboard allows Stored XSS.This issue affects Ultimate Dashboard – Custom WordPress Dashboard: from n/a through 3.7.11.
https://patchstack.com/database/vulnerability/ultimate-dashboard/wordpress-ultimate-dashboard-plugin-3-7-11-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.553Z
2023-12-21T14:50:26.284Z
2023-12-21T14:50:26.284Z
{'Vendor': 'David Vongries', 'Product': 'Ultimate Dashboard – Custom WordPress Dashboard', 'Versions': 'n/a'}
CVE-2023-50469
Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 was discovered to contain a buffer overflow via the ApCliEncrypType parameter at /apply.cgi.
https://github.com/forever-more-cjy/overflow/blob/main/LBT-T310%20Buffer%20overflow.md
2023-12-11T00:00:00
2023-12-15T00:00:00
2023-12-15T20:54:58.849493
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50255
Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.
https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2
2023-12-05T20:42:59.378Z
2023-12-27T16:16:51.459Z
2023-12-27T16:16:51.459Z
{'Vendor': 'linuxdeepin', 'Product': 'developer-center', 'Versions': '< 5.12.21'}
CVE-2023-50445
Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module.
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Using%20Shell%20Metacharacter%20Injection%20via%20API.md
2023-12-10T00:00:00
2023-12-28T00:00:00
2024-01-24T16:06:26.664696
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50916
Kyocera Device Manager before 3.1.1213.0 allows NTLM credential exposure during UNC path authentication via a crafted change from a local path to a UNC path. It allows administrators to configure the backup location of the database used by the application. Attempting to change this location to a UNC path via the GUI is rejected due to the use of a \ (backslash) character, which is supposed to be disallowed in a pathname. Intercepting and modifying this request via a proxy, or sending the request directly to the application endpoint, allows UNC paths to be set for the backup location. Once such a location is set, Kyocera Device Manager attempts to confirm access and will try to authenticate to the UNC path; depending on the configuration of the environment, this may authenticate to the UNC with Windows NTLM hashes. This could allow NTLM credential relaying or cracking attacks.
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
2023-12-15T00:00:00
2024-01-10T00:00:00
2024-01-10T18:51:05.934292
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50853
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nasirahmed Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms.This issue affects Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms: from n/a through 1.75.0.
https://patchstack.com/database/vulnerability/advanced-form-integration/wordpress-advanced-form-integration-plugin-1-75-0-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:16.269Z
2023-12-28T11:25:44.195Z
2023-12-28T11:25:44.195Z
{'Vendor': 'Nasirahmed', 'Product': 'Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms', 'Versions': 'n/a'}
CVE-2023-50783
Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an authenticated user without the variable edit permission, to update a variable. This flaw compromises the integrity of variable management, potentially leading to unauthorized data modification. Users are recommended to upgrade to 2.8.0, which fixes this issue
https://github.com/apache/airflow/pull/33932
2023-12-13T20:48:56.413Z
2023-12-21T09:28:47.746Z
2023-12-21T09:28:47.746Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-50453
An issue was discovered in Zammad before 6.2.0. It uses the public endpoint /api/v1/signshow for its login screen. This endpoint returns internal configuration data of user object attributes, such as selectable values, which should not be visible to the public.
https://zammad.com/en/advisories/zaa-2023-08
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T18:49:39.031213
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50845
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AyeCode - WordPress Business Directory Plugins GeoDirectory – WordPress Business Directory Plugin, or Classified Directory.This issue affects GeoDirectory – WordPress Business Directory Plugin, or Classified Directory: from n/a through 2.3.28.
https://patchstack.com/database/vulnerability/geodirectory/wordpress-geodirectory-plugin-2-3-28-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.629Z
2023-12-28T18:23:07.600Z
2023-12-28T18:23:07.600Z
{'Vendor': 'AyeCode - WordPress Business Directory Plugins', 'Product': 'GeoDirectory – WordPress Business Directory Plugin, or Classified Directory', 'Versions': 'n/a'}
CVE-2023-50865
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'city' parameter of the hotelSearch.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/evans/
2023-12-14T17:47:18.224Z
2024-01-04T14:32:13.376Z
2024-01-04T14:32:13.376Z
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
CVE-2023-50920
An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7.
https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Authentication-bypass-seesion-ID.md
2023-12-15T00:00:00
2024-01-12T00:00:00
2024-01-12T07:43:13.448812
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50473
Cross-Site Scripting (XSS) vulnerability in bill-ahmed qbit-matUI version 1.16.4, allows remote attackers to obtain sensitive information via fixed session identifiers (SID) in index.js file.
https://github.com/bill-ahmed/qbit-matUI/issues/207
2023-12-11T00:00:00
2023-12-21T00:00:00
2023-12-21T10:26:00.424879
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50832
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mondula GmbH Multi Step Form allows Stored XSS.This issue affects Multi Step Form: from n/a through 1.7.13.
https://patchstack.com/database/vulnerability/multi-step-form/wordpress-multi-step-form-plugin-1-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:45.974Z
2023-12-21T17:23:05.986Z
2023-12-21T17:23:05.986Z
{'Vendor': 'Mondula GmbH', 'Product': 'Multi Step Form', 'Versions': 'n/a'}
CVE-2023-50424
SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
https://me.sap.com/notes/3411067
2023-12-09T17:19:02.677Z
2023-12-12T01:59:36.703Z
2023-12-12T08:48:21.990Z
{'Vendor': 'SAP_SE', 'Product': 'github.com/sap/cloud-security-client-go', 'Versions': '< 0.17.0'}
CVE-2023-50127
Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an attacker to bring the alarm system to a disarmed state from any given phone number.
https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
2023-12-04T00:00:00
2024-01-11T00:00:00
2024-01-11T20:22:49.508674
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50824
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brian Batt Insert or Embed Articulate Content into WordPress allows Stored XSS.This issue affects Insert or Embed Articulate Content into WordPress: from n/a through 4.3000000021.
https://patchstack.com/database/vulnerability/insert-or-embed-articulate-content-into-wordpress/wordpress-insert-or-embed-articulate-content-into-wordpress-plugin-4-3000000021-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.552Z
2023-12-21T14:42:04.982Z
2023-12-21T14:42:04.982Z
{'Vendor': 'Brian Batt', 'Product': 'Insert or Embed Articulate Content into WordPress', 'Versions': 'n/a'}
CVE-2023-50259
Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testslack` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `slack_webhook` variable and passes it to the `notifiers.slack_notifier.test_notify` method, then `_notify_slack` and finally `_send_slack` method, which sends a POST request to the user-controlled URL on line 103 in `/medusa/notifiers/slack.py`, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue.
https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv
2023-12-05T20:42:59.379Z
2023-12-22T17:00:00.976Z
2023-12-22T17:00:00.976Z
{'Vendor': 'pymedusa', 'Product': 'Medusa', 'Versions': '< 1.0.19'}
CVE-2023-50609
Cross Site Scripting (XSS) vulnerability in AVA teaching video application service platform version 3.1, allows remote attackers to execute arbitrary code via a crafted script to ajax.aspx.
https://gist.github.com/zhishituboshu/f8f07e9df411b1ee3d8212a166b2034e
2023-12-11T00:00:00
2024-01-06T00:00:00
2024-01-06T03:40:05.718177
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50873
Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Add Any Extension to Pages.This issue affects Add Any Extension to Pages: from n/a through 1.4.
https://patchstack.com/database/vulnerability/add-any-extension-to-pages/wordpress-add-any-extension-to-pages-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-15T14:42:48.487Z
2023-12-28T10:28:27.063Z
2023-12-28T10:28:27.063Z
{'Vendor': 'Marios Alexandrou', 'Product': 'Add Any Extension to Pages', 'Versions': 'n/a'}
CVE-2023-50465
A stored cross-site scripting (XSS) vulnerability exists in Monica (aka MonicaHQ) 4.0.0 via an SVG document uploaded by an authenticated user.
https://github.com/monicahq/monica/releases
2023-12-11T00:00:00
2023-12-11T00:00:00
2023-12-11T00:15:18.554101
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50035
PHPGurukul Small CRM 3.0 is vulnerable to SQL Injection on the Users login panel because of "password" parameter is directly used in the SQL query without any sanitization and the SQL Injection payload being executed.
https://github.com/hackerhijeck/Exploited/blob/main/Small_CRM/SQL-Injection.md
2023-12-04T00:00:00
2023-12-29T00:00:00
2023-12-29T20:45:42.387178
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50275
HPE OneView may allow clusterService Authentication Bypass resulting in denial of service.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04586en_us
2023-12-06T14:22:26.840Z
2024-01-23T17:09:52.902Z
2024-01-23T17:10:14.116Z
{'Vendor': 'Hewlett Packard Enterprise', 'Product': 'HPE OneView', 'Versions': '0'}
CVE-2023-50760
Online Notice Board System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'f' parameter of user/update_profile_pic.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.
https://fluidattacks.com/advisories/arrau/
2023-12-12T15:12:54.429Z
2024-01-04T14:24:34.938Z
2024-01-04T14:24:34.938Z
{'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'}
CVE-2023-50019
An issue was discovered in open5gs v2.6.6. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of Nudm_UECM_Registration response.
https://github.com/open5gs/open5gs/issues/2733
2023-12-04T00:00:00
2024-01-02T00:00:00
2024-01-02T21:41:33.834621
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50449
JFinalCMS 5.0.0 could allow a remote attacker to read files via ../ Directory Traversal in the /common/down/file fileKey parameter.
https://gitee.com/heyewei/JFinalcms/issues/I7WGC6
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T17:52:52.268506
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50263
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs. In the default implementation used in Nautobot, as provided by `django-db-file-storage`, these URLs do not by default require any user authentication to access; they should instead be restricted to only users who have permissions to view Nautobot's `FileProxy` model instances. Note that no URL mechanism is provided for listing or traversal of the available file `name` values, so in practice an unauthenticated user would have to guess names to discover arbitrary files for download, but if a user knows the file name/path value, they can access it without authenticating, so we are considering this a vulnerability. Fixes are included in Nautobot 1.6.7 and Nautobot 2.0.6. No known workarounds are available other than applying the patches included in those versions.
https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q
2023-12-05T20:42:59.379Z
2023-12-12T22:17:00.858Z
2023-12-12T22:17:00.858Z
{'Vendor': 'nautobot', 'Product': 'nautobot', 'Versions': '>= 1.1.0, < 1.6.7, >= 2.0.0, < 2.0.6'}
CVE-2023-50776
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3182
2023-12-13T13:06:36.478Z
2023-12-13T17:30:21.372Z
2023-12-13T17:30:21.372Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'}
CVE-2023-50849
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in E2Pdf.Com E2Pdf – Export To Pdf Tool for WordPress.This issue affects E2Pdf – Export To Pdf Tool for WordPress: from n/a through 1.20.23.
https://patchstack.com/database/vulnerability/e2pdf/wordpress-e2pdf-plugin-1-20-23-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.630Z
2023-12-28T11:34:41.193Z
2023-12-28T11:34:41.193Z
{'Vendor': 'E2Pdf.com', 'Product': 'E2Pdf – Export To Pdf Tool for WordPress', 'Versions': 'n/a'}
CVE-2023-50721
XWiki Platform is a generic wiki platform. Starting in 4.5-rc-1 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the search administration interface doesn't properly escape the id and label of search user interface extensions, allowing the injection of XWiki syntax containing script macros including Groovy macros that allow remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki instance. This attack can be executed by any user who can edit some wiki page like the user's profile (editable by default) as user interface extensions that will be displayed in the search administration can be added on any document by any user. The necessary escaping has been added in XWiki 14.10.15, 15.5.2 and 15.7RC1. As a workaround, the patch can be applied manually applied to the page `XWiki.SearchAdmin`.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7654-vfh6-rw6x
2023-12-11T17:53:36.031Z
2023-12-15T19:02:46.076Z
2023-12-15T19:02:46.076Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 4.5-rc-1, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'}
CVE-2023-50371
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Page Visit Counter Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress allows Stored XSS.This issue affects Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress: from n/a through 8.0.6.
https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-8-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-07T12:18:13.605Z
2023-12-14T12:57:08.454Z
2023-12-14T13:53:20.290Z
{'Vendor': 'Page Visit Counter', 'Product': 'Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-50950
IBM QRadar SIEM 7.5 could disclose sensitive email information in responses from offense rules. IBM X-Force ID: 275709.
https://www.ibm.com/support/pages/node/7108657
2023-12-16T19:35:35.358Z
2024-01-17T17:08:30.053Z
2024-01-17T17:08:30.053Z
{'Vendor': 'IBM', 'Product': 'QRadar SIEM', 'Versions': '7.5'}
CVE-2023-50268
jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.
https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j
2023-12-05T20:42:59.380Z
2023-12-13T20:49:54.982Z
2023-12-13T20:49:54.982Z
{'Vendor': 'jqlang', 'Product': 'jq', 'Versions': '= 1.7'}
CVE-2023-50454
An issue was discovered in Zammad before 6.2.0. In several subsystems, SSL/TLS was used to establish connections to external services without proper validation of hostname and certificate authority. This is exploitable by man-in-the-middle attackers.
https://zammad.com/en/advisories/zaa-2023-04
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T18:49:27.881075
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50842
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Matthew Fries MF Gig Calendar.This issue affects MF Gig Calendar: from n/a through 1.2.1.
https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.629Z
2023-12-28T18:32:33.166Z
2023-12-28T18:32:33.166Z
{'Vendor': 'Matthew Fries', 'Product': 'MF Gig Calendar', 'Versions': 'n/a'}
CVE-2023-50784
A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms.
https://www.unrealircd.org/index/news
2023-12-14T00:00:00
2023-12-16T00:00:00
2023-12-26T03:06:13.346235
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50442
Encrypted folders created by PRIMX ZONECENTRAL through 2023.5 can be modified by a local attacker (with appropriate privileges) so that specific file types are excluded from encryption temporarily. (This modification can, however, be detected, as described in the Administrator Guide.)
https://www.primx.eu/fr/blog/
2023-12-10T00:00:00
2023-12-13T00:00:00
2023-12-13T20:32:41.286847
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50854
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Squirrly Squirrly SEO - Advanced Pack.This issue affects Squirrly SEO - Advanced Pack: from n/a through 2.3.8.
https://patchstack.com/database/vulnerability/squirrly-seo-pack/wordpress-squirrly-seo-advanced-pack-plugin-2-3-8-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:16.269Z
2023-12-28T11:21:59.393Z
2023-12-28T11:21:59.393Z
{'Vendor': 'Squirrly', 'Product': 'Squirrly SEO - Advanced Pack', 'Versions': 'n/a'}
CVE-2023-50100
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via carousel image editing.
https://github.com/Jarvis-616/cms/blob/master/There%20is%20a%20storage%20type%20XSS%20for%20carousel%20image%20editing.md
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T15:57:02.885717
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50550
layui up to v2.74 was discovered to contain a cross-site scripting (XSS) vulnerability via the data-content parameter.
https://gitee.com/layui/layui/issues?utf8=%E2%9C%93&state=all&issue_search=xss
2023-12-11T00:00:00
2023-12-30T00:00:00
2023-12-30T15:12:00.475659
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50252
php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling `<use>` tag that references an `<image>` tag, it merges the attributes from the `<use>` tag to the `<image>` tag. The problem pops up especially when the `href` attribute from the `<use>` tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue.
https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr
2023-12-05T20:42:59.378Z
2023-12-12T20:39:17.905Z
2023-12-12T20:39:17.905Z
{'Vendor': 'dompdf', 'Product': 'php-svg-lib', 'Versions': '< 0.5.1'}
CVE-2023-50878
Cross-Site Request Forgery (CSRF) vulnerability in InspireUI MStore API.This issue affects MStore API: from n/a through 4.10.1.
https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-4-10-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-15T14:42:48.488Z
2023-12-29T12:32:10.418Z
2023-12-29T12:32:10.418Z
{'Vendor': 'InspireUI', 'Product': 'MStore API', 'Versions': 'n/a'}
CVE-2023-50481
An issue was discovered in blinksocks version 3.3.8, allows remote attackers to obtain sensitive information via weak encryption algorithms in the component /presets/ssr-auth-chain.js.
https://github.com/blinksocks/blinksocks/issues/108
2023-12-11T00:00:00
2023-12-21T00:00:00
2023-12-21T10:26:13.759758
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50710
Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly.
https://github.com/honojs/hono/security/advisories/GHSA-f6gv-hh8j-q8vq
2023-12-11T17:53:36.028Z
2023-12-14T17:22:26.836Z
2023-12-14T17:22:26.836Z
{'Vendor': 'honojs', 'Product': 'hono', 'Versions': '< 3.11.7'}
CVE-2023-50985
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the lanGw parameter in the lanCfgSet function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:40.669186
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50439
ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission), ZED! for Windows before Q.2021.2 (ANSSI qualification submission), ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission), ZONECENTRAL for Windows before 2023.5, or ZEDMAIL for Windows before 2023.5 disclose the original path in which the containers were created, which allows an unauthenticated attacker to obtain some information regarding the context of use (project name, etc.).
https://www.primx.eu/fr/blog/
2023-12-10T00:00:00
2023-12-13T00:00:00
2023-12-13T20:17:26.437262
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50069
WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized.
https://github.com/holomekc/wiremock/issues/51
2023-12-04T00:00:00
2023-12-29T00:00:00
2023-12-29T20:54:31.313808
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50706
A user without administrator permissions with access to the UC500 windows system could perform a memory dump of the running processes and extract clear credentials or valid session tokens.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03
2023-12-11T16:37:13.794Z
2023-12-19T23:47:49.654Z
2023-12-19T23:47:49.654Z
{'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'}
CVE-2023-50643
An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.
http://evernote.com
2023-12-11T00:00:00
2024-01-09T00:00:00
2024-01-09T00:41:50.741697
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50839
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.8.1.
https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-8-1-unauthenticated-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:18:45.975Z
2023-12-28T20:02:13.704Z
2023-12-28T20:02:13.704Z
{'Vendor': 'JS Help Desk', 'Product': 'JS Help Desk – Best Help Desk & Support Plugin', 'Versions': 'n/a'}
CVE-2023-50993
Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 and WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 was discovered to contain a command injection vulnerability via the function downFiles.
https://github.com/ef4tless/vuln/blob/master/iot/WS6008-WS6108/1.md
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:44:30.122859
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50090
Arbitrary File Write vulnerability in the saveReportFile method of ureport2 2.2.9 and before allows attackers to write arbitrary files and run arbitrary commands via crafted POST request.
https://lemono.fun/thoughts/UReport2-RCE.html
2023-12-04T00:00:00
2024-01-03T00:00:00
2024-01-03T19:56:06.955459
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50585
Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function.
https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.md
2023-12-11T00:00:00
2024-01-09T00:00:00
2024-01-09T08:13:03.708174
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50614
An issue discovereed in EBYTE E880-IR01-V1.1 allows an attacker to obtain sensitive information via crafted POST request to /cgi-bin/luci.
https://github.com/cvdyfbwa/Password-plaintext-output/blob/main/README.md
2023-12-11T00:00:00
2024-01-18T00:00:00
2024-01-18T21:27:42.640542
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50881
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More allows Stored XSS.This issue affects Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.15.
https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-15-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T14:42:48.489Z
2023-12-29T11:26:11.706Z
2023-12-29T11:26:11.706Z
{'Vendor': 'AAM', 'Product': 'Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More', 'Versions': 'n/a'}
CVE-2023-50028
In the module "Sliding cart block" (blockslidingcart) up to version 2.3.8 from PrestashopModules.eu for PrestaShop, a guest can perform SQL injection.
https://addons.prestashop.com/en/express-checkout-process/3321-block-sliding-cart.html
2023-12-04T00:00:00
2024-01-19T00:00:00
2024-01-19T13:17:30.302410
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50376
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smp7, wp.Insider Simple Membership allows Reflected XSS.This issue affects Simple Membership: from n/a through 4.3.8.
https://patchstack.com/database/vulnerability/simple-membership/wordpress-simple-membership-plugin-4-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-07T12:18:13.606Z
2023-12-19T08:27:46.189Z
2023-12-19T08:27:46.189Z
{'Vendor': 'smp7, wp.insider', 'Product': 'Simple Membership', 'Versions': 'n/a'}
CVE-2023-50264
Bazarr manages and downloads subtitles. Prior to 1.3.1, Bazarr contains an arbitrary file read in /system/backup/download/ endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1.
https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
2023-12-05T20:42:59.379Z
2023-12-15T20:42:22.304Z
2023-12-15T20:42:22.304Z
{'Vendor': 'morpheus65535', 'Product': 'bazarr', 'Versions': '< 1.3.1'}
CVE-2023-50771
Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-2979
2023-12-13T13:06:36.477Z
2023-12-13T17:30:18.172Z
2023-12-13T17:30:18.172Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenId Connect Authentication Plugin', 'Versions': '0'}
CVE-2023-50858
Cross-Site Request Forgery (CSRF) vulnerability in Bill Minozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan.This issue affects Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan: from n/a through 4.34.
https://patchstack.com/database/vulnerability/antihacker/wordpress-anti-hacker-plugin-4-34-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-14T17:19:16.270Z
2023-12-28T10:31:43.530Z
2023-12-28T10:31:43.530Z
{'Vendor': 'Bill Minozzi', 'Product': 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan', 'Versions': 'n/a'}
CVE-2023-50272
A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 6 (iLO 6). The vulnerability could be remotely exploited to allow authentication bypass.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04584en_us
2023-12-06T14:22:26.839Z
2023-12-19T15:42:21.932Z
2023-12-19T15:42:39.708Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE Integrated Lights-out 5 (iLO 5), HPE Integrated Lights-out 6 (iLO 6), ', 'Versions': 'iLO 5 - v2.63 through versions prior to v3.00, iLO 6 - v1.05 through versions prior to v1.55'}
CVE-2023-50767
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3204
2023-12-13T13:06:36.477Z
2023-12-13T17:30:15.589Z
2023-12-13T17:30:15.589Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'}
CVE-2023-50730
Grackle is a GraphQL server written in functional Scala, built on the Typelevel stack. The GraphQL specification requires that GraphQL fragments must not form cycles, either directly or indirectly. Prior to Grackle version 0.18.0, that requirement wasn't checked, and queries with cyclic fragments would have been accepted for type checking and compilation. The attempted compilation of such fragments would result in a JVM `StackOverflowError` being thrown. Some knowledge of an applications GraphQL schema would be required to construct such a query, however no knowledge of any application-specific performance or other behavioural characteristics would be needed. Grackle uses the cats-parse library for parsing GraphQL queries. Prior to version 0.18.0, Grackle made use of the cats-parse `recursive` operator. However, `recursive` is not currently stack safe. `recursive` was used in three places in the parser: nested selection sets, nested input values (lists and objects), and nested list type declarations. Consequently, queries with deeply nested selection sets, input values or list types could be constructed which exploited this, causing a JVM `StackOverflowException` to be thrown during parsing. Because this happens very early in query processing, no specific knowledge of an applications GraphQL schema would be required to construct such a query. The possibility of small queries resulting in stack overflow is a potential denial of service vulnerability. This potentially affects all applications using Grackle which have untrusted users. Both stack overflow issues have been resolved in the v0.18.0 release of Grackle. As a workaround, users could interpose a sanitizing layer in between untrusted input and Grackle query processing.
https://github.com/typelevel/grackle/security/advisories/GHSA-g56x-7j6w-g8r8
2023-12-11T17:53:36.032Z
2023-12-22T20:36:11.402Z
2023-12-22T20:36:11.402Z
{'Vendor': 'typelevel', 'Product': 'grackle', 'Versions': '< 0.18.0'}
CVE-2023-50874
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney WordPress Infinite Scroll – Ajax Load More allows Stored XSS.This issue affects WordPress Infinite Scroll – Ajax Load More: from n/a through 6.1.0.1.
https://patchstack.com/database/vulnerability/ajax-load-more/wordpress-ajax-load-more-plugin-6-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T14:42:48.487Z
2023-12-28T10:01:09.439Z
2023-12-28T10:01:09.439Z
{'Vendor': 'Darren Cooney', 'Product': 'WordPress Infinite Scroll – Ajax Load More', 'Versions': 'n/a'}
CVE-2023-50931
An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28
2023-12-15T00:00:00
2024-01-09T00:00:00
2024-01-09T06:16:01.145513
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50823
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wipeout Media CSS & JavaScript Toolbox allows Stored XSS.This issue affects CSS & JavaScript Toolbox: from n/a through 11.7.
https://patchstack.com/database/vulnerability/css-javascript-toolbox/wordpress-css-javascript-toolbox-plugin-11-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.552Z
2023-12-21T14:35:29.199Z
2023-12-21T14:35:29.199Z
{'Vendor': 'Wipeout Media', 'Product': 'CSS & JavaScript Toolbox', 'Versions': 'n/a'}
CVE-2023-50989
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the pingSet function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:47.633637
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50120
MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file.
https://github.com/gpac/gpac/issues/2698
2023-12-04T00:00:00
2024-01-10T00:00:00
2024-01-10T08:37:18.316348
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50570
An issue in the component IPAddressBitsDivision of IPAddress v5.1.0 leads to an infinite loop. This is disputed because an infinite loop occurs only for cases in which the developer supplies invalid arguments. The product is not intended to always halt for contrived inputs.
https://github.com/seancfoley/IPAddress/issues/118
2023-12-11T00:00:00
2023-12-29T00:00:00
2024-01-12T05:22:27.675581
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50566
A stored cross-site scripting (XSS) vulnerability in EyouCMS-V1.6.5-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Registration Number parameter.
https://github.com/weng-xianhu/eyoucms/issues/56
2023-12-11T00:00:00
2023-12-14T00:00:00
2023-12-14T14:32:34.997776
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50136
Cross Site Scripting (XSS) vulnerability in JFinalcms 5.0.0 allows attackers to run arbitrary code via the name field when creating a new custom table.
https://github.com/yukino-hiki/CVE/blob/main/2/There%20is%20a%20stored%20xss%20at%20the%20custom%20table.md
2023-12-04T00:00:00
2024-01-09T00:00:00
2024-01-09T22:04:30.576814
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50835
Cross-Site Request Forgery (CSRF) vulnerability in Praveen Goswami Advanced Category Template.This issue affects Advanced Category Template: from n/a through 0.1.
https://patchstack.com/database/vulnerability/advanced-category-template/wordpress-advanced-category-template-plugin-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-14T17:18:45.974Z
2023-12-19T21:45:49.285Z
2023-12-19T21:45:49.285Z
{'Vendor': 'Praveen Goswami', 'Product': 'Advanced Category Template', 'Versions': 'n/a'}
CVE-2023-50423
SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
https://me.sap.com/notes/3411067
2023-12-09T17:19:02.677Z
2023-12-12T01:52:44.999Z
2023-12-12T08:47:08.230Z
{'Vendor': 'SAP_SE', 'Product': 'sap-xssec', 'Versions': '< 4.1.0'}
CVE-2023-50589
Grupo Embras GEOSIAP ERP v2.2.167.02 was discovered to contain a SQL injection vulnerability via the codLogin parameter on the login page.
https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
2023-12-11T00:00:00
2023-12-30T00:00:00
2023-12-30T16:20:36.619795
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50073
EmpireCMS v7.5 was discovered to contain a SQL injection vulnerability via the ftppassword parameter at SetEnews.php.
https://github.com/leadscloud/EmpireCMS/issues/7
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T14:32:30.127856
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50862
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the booking.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/evans/
2023-12-14T17:47:18.223Z
2024-01-04T14:29:39.872Z
2024-01-04T14:29:39.872Z
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
CVE-2023-50248
CKAN is an open-source data management system for powering data hubs and data portals. Starting in version 2.0.0 and prior to versions 2.9.10 and 2.10.3, when submitting a POST request to the `/dataset/new` endpoint (including either the auth cookie or the `Authorization` header) with a specially-crafted field, an attacker can create an out-of-memory error in the hosting server. To trigger this error, the attacker need to have permissions to create or edit datasets. This vulnerability has been patched in CKAN 2.10.3 and 2.9.10.
https://github.com/ckan/ckan/security/advisories/GHSA-7fgc-89cx-w8j5
2023-12-05T20:42:59.377Z
2023-12-13T20:47:12.784Z
2023-12-13T20:47:12.784Z
{'Vendor': 'ckan', 'Product': 'ckan', 'Versions': '>= 2.0.0, < 2.9.10, >= 2.10.0, < 2.10.3'}
CVE-2023-50249
Sentry-Javascript is official Sentry SDKs for JavaScript. A ReDoS (Regular expression Denial of Service) vulnerability has been identified in Sentry's Astro SDK 7.78.0-7.86.0. Under certain conditions, this vulnerability allows an attacker to cause excessive computation times on the server, leading to denial of service (DoS). This vulnerability has been patched in sentry/astro version 7.87.0.
https://github.com/getsentry/sentry-javascript/security/advisories/GHSA-x3v3-8xg8-8v72
2023-12-05T20:42:59.377Z
2023-12-20T13:53:00.512Z
2023-12-20T13:53:00.512Z
{'Vendor': 'getsentry', 'Product': 'sentry-javascript', 'Versions': '>= 7.78.0, < 7.87.0'}
CVE-2023-50863
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the generateReceipt.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/evans/
2023-12-14T17:47:18.223Z
2024-01-04T14:30:22.853Z
2024-01-04T14:30:22.853Z
{'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'}
CVE-2023-50475
An issue was discovered in bcoin-org bcoin version 2.2.0, allows remote attackers to obtain sensitive information via weak hashing algorithms in the component \vendor\faye-websocket.js.
https://github.com/bcoin-org/bcoin/issues/1174
2023-12-11T00:00:00
2023-12-21T00:00:00
2023-12-21T10:26:02.135853
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50137
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the site management office.
https://github.com/yukino-hiki/CVE/blob/main/3/There%20is%20a%20storage%20type%20xss%20in%20the%20site%20management%20office.md
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T16:05:24.817790
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50834
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in August Infotech WooCommerce Menu Extension allows Stored XSS.This issue affects WooCommerce Menu Extension: from n/a through 1.6.2.
https://patchstack.com/database/vulnerability/woocommerce-menu-extension/wordpress-woocommerce-menu-extension-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:45.974Z
2023-12-21T18:14:32.124Z
2023-12-21T18:14:32.124Z
{'Vendor': 'August Infotech', 'Product': 'WooCommerce Menu Extension', 'Versions': 'n/a'}
CVE-2023-50422
SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
https://me.sap.com/notes/3411067
2023-12-09T17:19:02.677Z
2023-12-12T01:31:17.991Z
2024-01-09T01:38:42.375Z
{'Vendor': 'SAP_SE', 'Product': 'cloud-security-services-integration-library', 'Versions': '< 2.17.0, 3.0.0'}
CVE-2023-50072
A Stored Cross-Site Scripting (XSS) vulnerability exists in OpenKM version 7.1.40 (dbb6e88) With Professional Extension that allows an authenticated user to upload a note on a file which acts as a stored XSS payload. Any user who opens the note of a document file will trigger the XSS.
https://github.com/ahrixia/CVE-2023-50072
2023-12-04T00:00:00
2024-01-13T00:00:00
2024-01-13T00:56:56.423776
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50658
The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317
2023-12-11T00:00:00
2023-12-25T00:00:00
2023-12-25T21:39:17.515741
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50822
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Currency.Wiki Currency Converter Widget – Exchange Rates allows Stored XSS.This issue affects Currency Converter Widget – Exchange Rates: from n/a through 3.0.2.
https://patchstack.com/database/vulnerability/currency-converter-widget/wordpress-currency-converter-widget-plugin-3-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:18:17.552Z
2023-12-21T14:33:06.623Z
2023-12-21T14:33:06.623Z
{'Vendor': 'Currency.Wiki', 'Product': 'Currency Converter Widget – Exchange Rates', 'Versions': 'n/a'}
CVE-2023-50988
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the bandwidth parameter in the wifiRadioSetIndoor function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:45.920771
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50121
Autel EVO NANO drone flight control firmware version 1.6.5 is vulnerable to denial of service (DoS).
https://github.com/Drone-Lab/Reports-of-AUTEL-drones-losing-control-at-the-edge-of-the-no-fly-zone/tree/main
2023-12-04T00:00:00
2024-01-06T00:00:00
2024-01-06T05:06:57.013808
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50571
easy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule.
https://github.com/j-easy/easy-rules/issues/419
2023-12-11T00:00:00
2023-12-29T00:00:00
2023-12-29T14:37:59.058274
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50930
An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
https://help.savignano.net/snotify-email-encryption/sa-2023-11-28
2023-12-15T00:00:00
2024-01-09T00:00:00
2024-01-09T06:15:35.837601
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50463
The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions).
https://github.com/shift72/caddy-geo-ip/issues/4
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T22:30:47.439576
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50731
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put` method in `mindsdb/mindsdb/api/http/namespaces/file.py` does not validate the user-controlled name value, which is used in a temporary file name, which is afterwards opened for writing on lines 122-125, which leads to path injection. Later in the method, the temporary directory is deleted on line 151, but since we can write outside of the directory using the path injection vulnerability, the potentially dangerous file is not deleted. Arbitrary file contents can be written due to `f.write(chunk)` on line 125. Mindsdb does check later on line 149 in the `save_file` method in `file-controller.py` which calls the `_handle_source` method in `file_handler.py` if a file is of one of the types `csv`, `json`, `parquet`, `xls`, or `xlsx`. However, since the check happens after the file has already been written, the files will still exist (and will not be removed due to the path injection described earlier), just the `_handle_source` method will return an error. The same user-controlled source source is used also in another path injection sink on line 138. This leads to another path injection, which allows an attacker to delete any `zip` or `tar.gz` files on the server.
https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/
2023-12-11T17:53:36.032Z
2023-12-22T20:43:18.036Z
2023-12-22T20:43:18.036Z
{'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.11.4.1'}
CVE-2023-50766
A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3204
2023-12-13T13:06:36.477Z
2023-12-13T17:30:14.962Z
2023-12-13T17:30:14.962Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'}