CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-50829 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aerin Loan Repayment Calculator and Application Form allows Stored XSS.This issue affects Loan Repayment Calculator and Application Form: from n/a through 2.9.3.
| https://patchstack.com/database/vulnerability/quick-interest-slider/wordpress-loan-repayment-calculator-and-application-form-plugin-2-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:17.553Z | 2023-12-21T17:10:51.231Z | 2023-12-21T17:10:51.231Z | {'Vendor': 'Aerin', 'Product': 'Loan Repayment Calculator and Application Form', 'Versions': 'n/a'} |
CVE-2023-50350 | HCL DRYiCE MyXalytics is impacted by the use of a broken cryptographic algorithm for encryption, potentially giving an attacker ability to decrypt sensitive information.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-12-07T03:55:55.606Z | 2024-01-03T01:50:00.848Z | 2024-01-03T01:50:00.848Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-50096 | STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application. | https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md | 2023-12-04T00:00:00 | 2024-01-01T00:00:00 | 2024-01-01T17:49:20.858105 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50429 | IzyBat Orange casiers before 20230803_1 allows getEnsemble.php ensemble SQL injection. | https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf | 2023-12-09T00:00:00 | 2023-12-09T00:00:00 | 2023-12-09T21:19:28.151931 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50612 | Insecure Permissions vulnerability in fit2cloud Cloud Explorer Lite version 1.4.1, allow local attackers to escalate privileges and obtain sensitive information via the cloud accounts parameter. | https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA | 2023-12-11T00:00:00 | 2024-01-06T00:00:00 | 2024-01-06T02:45:27.069343 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50428 | In Bitcoin Core through 26.0 and Bitcoin Knots before 25.1.knots20231115, datacarrier size limits can be bypassed by obfuscating data as code (e.g., with OP_FALSE OP_IF), as exploited in the wild by Inscriptions in 2022 and 2023. NOTE: although this is a vulnerability from the perspective of the Bitcoin Knots project, some others consider it "not a bug." | https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures | 2023-12-09T00:00:00 | 2023-12-09T00:00:00 | 2024-01-04T16:57:05.960073 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50351 | HCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-12-07T03:59:48.771Z | 2024-01-03T01:45:45.358Z | 2024-01-03T01:45:45.358Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-50982 | Stud.IP 5.x through 5.3.3 allows XSS with resultant upload of executable files, because upload_action and edit_action in Admin_SmileysController do not check the file extension. This leads to remote code execution with the privileges of the www-data user. The fixed versions are 5.3.4, 5.2.6, 5.1.7, and 5.0.9. | https://sourceforge.net/projects/studip/files/Stud.IP/5.4/ | 2023-12-18T00:00:00 | 2024-01-08T00:00:00 | 2024-01-08T19:49:07.513208 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50828 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Vongries Ultimate Dashboard – Custom WordPress Dashboard allows Stored XSS.This issue affects Ultimate Dashboard – Custom WordPress Dashboard: from n/a through 3.7.11.
| https://patchstack.com/database/vulnerability/ultimate-dashboard/wordpress-ultimate-dashboard-plugin-3-7-11-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:17.553Z | 2023-12-21T14:50:26.284Z | 2023-12-21T14:50:26.284Z | {'Vendor': 'David Vongries', 'Product': 'Ultimate Dashboard – Custom WordPress Dashboard', 'Versions': 'n/a'} |
CVE-2023-50469 | Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 was discovered to contain a buffer overflow via the ApCliEncrypType parameter at /apply.cgi. | https://github.com/forever-more-cjy/overflow/blob/main/LBT-T310%20Buffer%20overflow.md | 2023-12-11T00:00:00 | 2023-12-15T00:00:00 | 2023-12-15T20:54:58.849493 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50255 | Deepin-Compressor is the default archive manager of Deepin Linux OS. Prior to 5.12.21, there's a path traversal vulnerability in deepin-compressor that can be exploited to achieve Remote Command Execution on the target system upon opening crafted archives. Users are advised to update to version 5.12.21 which addresses the issue. There are no known workarounds for this vulnerability.
| https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2 | 2023-12-05T20:42:59.378Z | 2023-12-27T16:16:51.459Z | 2023-12-27T16:16:51.459Z | {'Vendor': 'linuxdeepin', 'Product': 'developer-center', 'Versions': '< 5.12.21'} |
CVE-2023-50445 | Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 v4.4.6, AXT1800 v4.4.6, MT3000 v4.4.6, MT2500 v4.4.6, MT6000 v4.5.0, MT1300 v4.3.7, MT300N-V2 v4.3.7, AR750S v4.3.7, AR750 v4.3.7, AR300M v4.3.7, and B1300 v4.3.7., allows local attackers to execute arbitrary code via the get_system_log and get_crash_log functions of the logread module, as well as the upgrade_online function of the upgrade module. | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Using%20Shell%20Metacharacter%20Injection%20via%20API.md | 2023-12-10T00:00:00 | 2023-12-28T00:00:00 | 2024-01-24T16:06:26.664696 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50916 | Kyocera Device Manager before 3.1.1213.0 allows NTLM credential exposure during UNC path authentication via a crafted change from a local path to a UNC path. It allows administrators to configure the backup location of the database used by the application. Attempting to change this location to a UNC path via the GUI is rejected due to the use of a \ (backslash) character, which is supposed to be disallowed in a pathname. Intercepting and modifying this request via a proxy, or sending the request directly to the application endpoint, allows UNC paths to be set for the backup location. Once such a location is set, Kyocera Device Manager attempts to confirm access and will try to authenticate to the UNC path; depending on the configuration of the environment, this may authenticate to the UNC with Windows NTLM hashes. This could allow NTLM credential relaying or cracking attacks. | https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ | 2023-12-15T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T18:51:05.934292 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50853 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nasirahmed Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms.This issue affects Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms: from n/a through 1.75.0.
| https://patchstack.com/database/vulnerability/advanced-form-integration/wordpress-advanced-form-integration-plugin-1-75-0-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:16.269Z | 2023-12-28T11:25:44.195Z | 2023-12-28T11:25:44.195Z | {'Vendor': 'Nasirahmed', 'Product': 'Advanced Form Integration – Connect WooCommerce and Contact Form 7 to Google Sheets and other platforms', 'Versions': 'n/a'} |
CVE-2023-50783 | Apache Airflow, versions before 2.8.0, is affected by a vulnerability that allows an authenticated user without the variable edit permission, to update a variable.
This flaw compromises the integrity of variable management, potentially leading to unauthorized data modification.
Users are recommended to upgrade to 2.8.0, which fixes this issue | https://github.com/apache/airflow/pull/33932 | 2023-12-13T20:48:56.413Z | 2023-12-21T09:28:47.746Z | 2023-12-21T09:28:47.746Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'} |
CVE-2023-50453 | An issue was discovered in Zammad before 6.2.0. It uses the public endpoint /api/v1/signshow for its login screen. This endpoint returns internal configuration data of user object attributes, such as selectable values, which should not be visible to the public. | https://zammad.com/en/advisories/zaa-2023-08 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T18:49:39.031213 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50845 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AyeCode - WordPress Business Directory Plugins GeoDirectory – WordPress Business Directory Plugin, or Classified Directory.This issue affects GeoDirectory – WordPress Business Directory Plugin, or Classified Directory: from n/a through 2.3.28.
| https://patchstack.com/database/vulnerability/geodirectory/wordpress-geodirectory-plugin-2-3-28-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:02.629Z | 2023-12-28T18:23:07.600Z | 2023-12-28T18:23:07.600Z | {'Vendor': 'AyeCode - WordPress Business Directory Plugins', 'Product': 'GeoDirectory – WordPress Business Directory Plugin, or Classified Directory', 'Versions': 'n/a'} |
CVE-2023-50865 | Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'city' parameter of the hotelSearch.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/evans/ | 2023-12-14T17:47:18.224Z | 2024-01-04T14:32:13.376Z | 2024-01-04T14:32:13.376Z | {'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'} |
CVE-2023-50920 | An issue was discovered on GL.iNet devices before version 4.5.0. They assign the same session ID after each user reboot, allowing attackers to share session identifiers between different sessions and bypass authentication or access control measures. Attackers can impersonate legitimate users or perform unauthorized actions. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7. | https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Authentication-bypass-seesion-ID.md | 2023-12-15T00:00:00 | 2024-01-12T00:00:00 | 2024-01-12T07:43:13.448812 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50473 | Cross-Site Scripting (XSS) vulnerability in bill-ahmed qbit-matUI version 1.16.4, allows remote attackers to obtain sensitive information via fixed session identifiers (SID) in index.js file. | https://github.com/bill-ahmed/qbit-matUI/issues/207 | 2023-12-11T00:00:00 | 2023-12-21T00:00:00 | 2023-12-21T10:26:00.424879 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50832 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mondula GmbH Multi Step Form allows Stored XSS.This issue affects Multi Step Form: from n/a through 1.7.13.
| https://patchstack.com/database/vulnerability/multi-step-form/wordpress-multi-step-form-plugin-1-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:45.974Z | 2023-12-21T17:23:05.986Z | 2023-12-21T17:23:05.986Z | {'Vendor': 'Mondula GmbH', 'Product': 'Multi Step Form', 'Versions': 'n/a'} |
CVE-2023-50424 | SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
| https://me.sap.com/notes/3411067 | 2023-12-09T17:19:02.677Z | 2023-12-12T01:59:36.703Z | 2023-12-12T08:48:21.990Z | {'Vendor': 'SAP_SE', 'Product': 'github.com/sap/cloud-security-client-go', 'Versions': '< 0.17.0'} |
CVE-2023-50127 | Hozard alarm system (Alarmsysteem) v1.0 is vulnerable to Improper Authentication. Commands sent via the SMS functionality are accepted from random phone numbers, which allows an attacker to bring the alarm system to a disarmed state from any given phone number. | https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices | 2023-12-04T00:00:00 | 2024-01-11T00:00:00 | 2024-01-11T20:22:49.508674 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50824 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brian Batt Insert or Embed Articulate Content into WordPress allows Stored XSS.This issue affects Insert or Embed Articulate Content into WordPress: from n/a through 4.3000000021.
| https://patchstack.com/database/vulnerability/insert-or-embed-articulate-content-into-wordpress/wordpress-insert-or-embed-articulate-content-into-wordpress-plugin-4-3000000021-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:17.552Z | 2023-12-21T14:42:04.982Z | 2023-12-21T14:42:04.982Z | {'Vendor': 'Brian Batt', 'Product': 'Insert or Embed Articulate Content into WordPress', 'Versions': 'n/a'} |
CVE-2023-50259 | Medusa is an automatic video library manager for TV shows. Versions prior to 1.0.19 are vulnerable to unauthenticated blind server-side request forgery (SSRF). The `testslack` request handler in `medusa/server/web/home/handler.py` does not validate the user-controlled `slack_webhook` variable and passes it to the `notifiers.slack_notifier.test_notify` method, then `_notify_slack` and finally `_send_slack` method, which sends a POST request to the user-controlled URL on line 103 in `/medusa/notifiers/slack.py`, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting POST requests on behalf of the Medusa server. Version 1.0.19 contains a fix for the issue. | https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv | 2023-12-05T20:42:59.379Z | 2023-12-22T17:00:00.976Z | 2023-12-22T17:00:00.976Z | {'Vendor': 'pymedusa', 'Product': 'Medusa', 'Versions': '< 1.0.19'} |
CVE-2023-50609 | Cross Site Scripting (XSS) vulnerability in AVA teaching video application service platform version 3.1, allows remote attackers to execute arbitrary code via a crafted script to ajax.aspx. | https://gist.github.com/zhishituboshu/f8f07e9df411b1ee3d8212a166b2034e | 2023-12-11T00:00:00 | 2024-01-06T00:00:00 | 2024-01-06T03:40:05.718177 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50873 | Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Add Any Extension to Pages.This issue affects Add Any Extension to Pages: from n/a through 1.4.
| https://patchstack.com/database/vulnerability/add-any-extension-to-pages/wordpress-add-any-extension-to-pages-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-15T14:42:48.487Z | 2023-12-28T10:28:27.063Z | 2023-12-28T10:28:27.063Z | {'Vendor': 'Marios Alexandrou', 'Product': 'Add Any Extension to Pages', 'Versions': 'n/a'} |
CVE-2023-50465 | A stored cross-site scripting (XSS) vulnerability exists in Monica (aka MonicaHQ) 4.0.0 via an SVG document uploaded by an authenticated user. | https://github.com/monicahq/monica/releases | 2023-12-11T00:00:00 | 2023-12-11T00:00:00 | 2023-12-11T00:15:18.554101 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50035 | PHPGurukul Small CRM 3.0 is vulnerable to SQL Injection on the Users login panel because of "password" parameter is directly used in the SQL query without any sanitization and the SQL Injection payload being executed. | https://github.com/hackerhijeck/Exploited/blob/main/Small_CRM/SQL-Injection.md | 2023-12-04T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T20:45:42.387178 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50275 | HPE OneView may allow clusterService Authentication Bypass resulting in denial of service. | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04586en_us | 2023-12-06T14:22:26.840Z | 2024-01-23T17:09:52.902Z | 2024-01-23T17:10:14.116Z | {'Vendor': 'Hewlett Packard Enterprise', 'Product': 'HPE OneView', 'Versions': '0'} |
CVE-2023-50760 | Online Notice Board System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'f' parameter of user/update_profile_pic.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.
| https://fluidattacks.com/advisories/arrau/ | 2023-12-12T15:12:54.429Z | 2024-01-04T14:24:34.938Z | 2024-01-04T14:24:34.938Z | {'Vendor': 'Kashipara Group', 'Product': 'Online Notice Board System', 'Versions': '1.0'} |
CVE-2023-50019 | An issue was discovered in open5gs v2.6.6. InitialUEMessage, Registration request sent at a specific time can crash AMF due to incorrect error handling of Nudm_UECM_Registration response. | https://github.com/open5gs/open5gs/issues/2733 | 2023-12-04T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T21:41:33.834621 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50449 | JFinalCMS 5.0.0 could allow a remote attacker to read files via ../ Directory Traversal in the /common/down/file fileKey parameter. | https://gitee.com/heyewei/JFinalcms/issues/I7WGC6 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T17:52:52.268506 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50263 | Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs.
In the default implementation used in Nautobot, as provided by `django-db-file-storage`, these URLs do not by default require any user authentication to access; they should instead be restricted to only users who have permissions to view Nautobot's `FileProxy` model instances.
Note that no URL mechanism is provided for listing or traversal of the available file `name` values, so in practice an unauthenticated user would have to guess names to discover arbitrary files for download, but if a user knows the file name/path value, they can access it without authenticating, so we are considering this a vulnerability.
Fixes are included in Nautobot 1.6.7 and Nautobot 2.0.6. No known workarounds are available other than applying the patches included in those versions. | https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q | 2023-12-05T20:42:59.379Z | 2023-12-12T22:17:00.858Z | 2023-12-12T22:17:00.858Z | {'Vendor': 'nautobot', 'Product': 'nautobot', 'Versions': '>= 1.1.0, < 1.6.7, >= 2.0.0, < 2.0.6'} |
CVE-2023-50776 | Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier stores PaaSLane authentication tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3182 | 2023-12-13T13:06:36.478Z | 2023-12-13T17:30:21.372Z | 2023-12-13T17:30:21.372Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins PaaSLane Estimate Plugin', 'Versions': '0'} |
CVE-2023-50849 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in E2Pdf.Com E2Pdf – Export To Pdf Tool for WordPress.This issue affects E2Pdf – Export To Pdf Tool for WordPress: from n/a through 1.20.23.
| https://patchstack.com/database/vulnerability/e2pdf/wordpress-e2pdf-plugin-1-20-23-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:02.630Z | 2023-12-28T11:34:41.193Z | 2023-12-28T11:34:41.193Z | {'Vendor': 'E2Pdf.com', 'Product': 'E2Pdf – Export To Pdf Tool for WordPress', 'Versions': 'n/a'} |
CVE-2023-50721 | XWiki Platform is a generic wiki platform. Starting in 4.5-rc-1 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the search administration interface doesn't properly escape the id and label of search user interface extensions, allowing the injection of XWiki syntax containing script macros including Groovy macros that allow remote code execution, impacting the confidentiality, integrity and availability of the whole XWiki instance. This attack can be executed by any user who can edit some wiki page like the user's profile (editable by default) as user interface extensions that will be displayed in the search administration can be added on any document by any user. The necessary escaping has been added in XWiki 14.10.15, 15.5.2 and 15.7RC1. As a workaround, the patch can be applied manually applied to the page `XWiki.SearchAdmin`. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7654-vfh6-rw6x | 2023-12-11T17:53:36.031Z | 2023-12-15T19:02:46.076Z | 2023-12-15T19:02:46.076Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 4.5-rc-1, < 14.10.15, >= 15.0-rc-1, < 15.5.2, >= 15.6-rc-1, < 15.7-rc-1'} |
CVE-2023-50371 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Page Visit Counter Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress allows Stored XSS.This issue affects Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress: from n/a through 8.0.6.
| https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-8-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-07T12:18:13.605Z | 2023-12-14T12:57:08.454Z | 2023-12-14T13:53:20.290Z | {'Vendor': 'Page Visit Counter', 'Product': 'Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress', 'Versions': 'n/a'} |
CVE-2023-50950 | IBM QRadar SIEM 7.5 could disclose sensitive email information in responses from offense rules. IBM X-Force ID: 275709. | https://www.ibm.com/support/pages/node/7108657 | 2023-12-16T19:35:35.358Z | 2024-01-17T17:08:30.053Z | 2024-01-17T17:08:30.053Z | {'Vendor': 'IBM', 'Product': 'QRadar SIEM', 'Versions': '7.5'} |
CVE-2023-50268 | jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue. | https://github.com/jqlang/jq/security/advisories/GHSA-7hmr-442f-qc8j | 2023-12-05T20:42:59.380Z | 2023-12-13T20:49:54.982Z | 2023-12-13T20:49:54.982Z | {'Vendor': 'jqlang', 'Product': 'jq', 'Versions': '= 1.7'} |
CVE-2023-50454 | An issue was discovered in Zammad before 6.2.0. In several subsystems, SSL/TLS was used to establish connections to external services without proper validation of hostname and certificate authority. This is exploitable by man-in-the-middle attackers. | https://zammad.com/en/advisories/zaa-2023-04 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T18:49:27.881075 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50842 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Matthew Fries MF Gig Calendar.This issue affects MF Gig Calendar: from n/a through 1.2.1.
| https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:02.629Z | 2023-12-28T18:32:33.166Z | 2023-12-28T18:32:33.166Z | {'Vendor': 'Matthew Fries', 'Product': 'MF Gig Calendar', 'Versions': 'n/a'} |
CVE-2023-50784 | A buffer overflow in websockets in UnrealIRCd 6.1.0 through 6.1.3 before 6.1.4 allows an unauthenticated remote attacker to crash the server by sending an oversized packet (if a websocket port is open). Remote code execution might be possible on some uncommon, older platforms. | https://www.unrealircd.org/index/news | 2023-12-14T00:00:00 | 2023-12-16T00:00:00 | 2023-12-26T03:06:13.346235 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50442 | Encrypted folders created by PRIMX ZONECENTRAL through 2023.5 can be modified by a local attacker (with appropriate privileges) so that specific file types are excluded from encryption temporarily. (This modification can, however, be detected, as described in the Administrator Guide.) | https://www.primx.eu/fr/blog/ | 2023-12-10T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T20:32:41.286847 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50854 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Squirrly Squirrly SEO - Advanced Pack.This issue affects Squirrly SEO - Advanced Pack: from n/a through 2.3.8.
| https://patchstack.com/database/vulnerability/squirrly-seo-pack/wordpress-squirrly-seo-advanced-pack-plugin-2-3-8-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:16.269Z | 2023-12-28T11:21:59.393Z | 2023-12-28T11:21:59.393Z | {'Vendor': 'Squirrly', 'Product': 'Squirrly SEO - Advanced Pack', 'Versions': 'n/a'} |
CVE-2023-50100 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via carousel image editing. | https://github.com/Jarvis-616/cms/blob/master/There%20is%20a%20storage%20type%20XSS%20for%20carousel%20image%20editing.md | 2023-12-04T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T15:57:02.885717 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50550 | layui up to v2.74 was discovered to contain a cross-site scripting (XSS) vulnerability via the data-content parameter. | https://gitee.com/layui/layui/issues?utf8=%E2%9C%93&state=all&issue_search=xss | 2023-12-11T00:00:00 | 2023-12-30T00:00:00 | 2023-12-30T15:12:00.475659 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50252 | php-svg-lib is an SVG file parsing / rendering library. Prior to version 0.5.1, when handling `<use>` tag that references an `<image>` tag, it merges the attributes from the `<use>` tag to the `<image>` tag. The problem pops up especially when the `href` attribute from the `<use>` tag has not been sanitized. This can lead to an unsafe file read that can cause PHAR Deserialization vulnerability in PHP prior to version 8. Version 0.5.1 contains a patch for this issue. | https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr | 2023-12-05T20:42:59.378Z | 2023-12-12T20:39:17.905Z | 2023-12-12T20:39:17.905Z | {'Vendor': 'dompdf', 'Product': 'php-svg-lib', 'Versions': '< 0.5.1'} |
CVE-2023-50878 | Cross-Site Request Forgery (CSRF) vulnerability in InspireUI MStore API.This issue affects MStore API: from n/a through 4.10.1.
| https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-4-10-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-15T14:42:48.488Z | 2023-12-29T12:32:10.418Z | 2023-12-29T12:32:10.418Z | {'Vendor': 'InspireUI', 'Product': 'MStore API', 'Versions': 'n/a'} |
CVE-2023-50481 | An issue was discovered in blinksocks version 3.3.8, allows remote attackers to obtain sensitive information via weak encryption algorithms in the component /presets/ssr-auth-chain.js. | https://github.com/blinksocks/blinksocks/issues/108 | 2023-12-11T00:00:00 | 2023-12-21T00:00:00 | 2023-12-21T10:26:13.759758 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50710 | Hono is a web framework written in TypeScript. Prior to version 3.11.7, clients may override named path parameter values from previous requests if the application is using TrieRouter. So, there is a risk that a privileged user may use unintended parameters when deleting REST API resources. TrieRouter is used either explicitly or when the application matches a pattern that is not supported by the default RegExpRouter. Version 3.11.7 includes the change to fix this issue. As a workaround, avoid using TrieRouter directly. | https://github.com/honojs/hono/security/advisories/GHSA-f6gv-hh8j-q8vq | 2023-12-11T17:53:36.028Z | 2023-12-14T17:22:26.836Z | 2023-12-14T17:22:26.836Z | {'Vendor': 'honojs', 'Product': 'hono', 'Versions': '< 3.11.7'} |
CVE-2023-50985 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the lanGw parameter in the lanCfgSet function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:40.669186 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50439 | ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission), ZED! for Windows before Q.2021.2 (ANSSI qualification submission), ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission), ZONECENTRAL for Windows before 2023.5, or ZEDMAIL for Windows before 2023.5 disclose the original path in which the containers were created, which allows an unauthenticated attacker to obtain some information regarding the context of use (project name, etc.). | https://www.primx.eu/fr/blog/ | 2023-12-10T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T20:17:26.437262 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50069 | WireMock with GUI versions 3.2.0.0 through 3.0.4.0 are vulnerable to stored cross-site scripting (SXSS) through the recording feature. An attacker can host a malicious payload and perform a test mapping pointing to the attacker's file, and the result will render on the Matched page in the Body area, resulting in the execution of the payload. This occurs because the response body is not validated or sanitized. | https://github.com/holomekc/wiremock/issues/51 | 2023-12-04T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T20:54:31.313808 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50706 |
A user without administrator permissions with access to the UC500 windows system could perform a memory dump of the running processes and extract clear credentials or valid session tokens.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-03 | 2023-12-11T16:37:13.794Z | 2023-12-19T23:47:49.654Z | 2023-12-19T23:47:49.654Z | {'Vendor': 'EFACEC', 'Product': 'UC 500E', 'Versions': 'version 10.1.0'} |
CVE-2023-50643 | An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components. | http://evernote.com | 2023-12-11T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T00:41:50.741697 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50839 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.8.1.
| https://patchstack.com/database/vulnerability/js-support-ticket/wordpress-js-help-desk-plugin-2-8-1-unauthenticated-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:18:45.975Z | 2023-12-28T20:02:13.704Z | 2023-12-28T20:02:13.704Z | {'Vendor': 'JS Help Desk', 'Product': 'JS Help Desk – Best Help Desk & Support Plugin', 'Versions': 'n/a'} |
CVE-2023-50993 | Ruijie WS6008 v1.x v2.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 and WS6108 v1.x AC_RGOS11.9(6)W3B2_G2C6-01_10221911 was discovered to contain a command injection vulnerability via the function downFiles. | https://github.com/ef4tless/vuln/blob/master/iot/WS6008-WS6108/1.md | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:44:30.122859 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50090 | Arbitrary File Write vulnerability in the saveReportFile method of ureport2 2.2.9 and before allows attackers to write arbitrary files and run arbitrary commands via crafted POST request. | https://lemono.fun/thoughts/UReport2-RCE.html | 2023-12-04T00:00:00 | 2024-01-03T00:00:00 | 2024-01-03T19:56:06.955459 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50585 | Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function. | https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.md | 2023-12-11T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T08:13:03.708174 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50614 | An issue discovereed in EBYTE E880-IR01-V1.1 allows an attacker to obtain sensitive information via crafted POST request to /cgi-bin/luci. | https://github.com/cvdyfbwa/Password-plaintext-output/blob/main/README.md | 2023-12-11T00:00:00 | 2024-01-18T00:00:00 | 2024-01-18T21:27:42.640542 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50881 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More allows Stored XSS.This issue affects Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.15.
| https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-15-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-15T14:42:48.489Z | 2023-12-29T11:26:11.706Z | 2023-12-29T11:26:11.706Z | {'Vendor': 'AAM', 'Product': 'Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More', 'Versions': 'n/a'} |
CVE-2023-50028 | In the module "Sliding cart block" (blockslidingcart) up to version 2.3.8 from PrestashopModules.eu for PrestaShop, a guest can perform SQL injection. | https://addons.prestashop.com/en/express-checkout-process/3321-block-sliding-cart.html | 2023-12-04T00:00:00 | 2024-01-19T00:00:00 | 2024-01-19T13:17:30.302410 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50376 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smp7, wp.Insider Simple Membership allows Reflected XSS.This issue affects Simple Membership: from n/a through 4.3.8.
| https://patchstack.com/database/vulnerability/simple-membership/wordpress-simple-membership-plugin-4-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-07T12:18:13.606Z | 2023-12-19T08:27:46.189Z | 2023-12-19T08:27:46.189Z | {'Vendor': 'smp7, wp.insider', 'Product': 'Simple Membership', 'Versions': 'n/a'} |
CVE-2023-50264 | Bazarr manages and downloads subtitles. Prior to 1.3.1, Bazarr contains an arbitrary file read in /system/backup/download/ endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1. | https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ | 2023-12-05T20:42:59.379Z | 2023-12-15T20:42:22.304Z | 2023-12-15T20:42:22.304Z | {'Vendor': 'morpheus65535', 'Product': 'bazarr', 'Versions': '< 1.3.1'} |
CVE-2023-50771 | Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-2979 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:18.172Z | 2023-12-13T17:30:18.172Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenId Connect Authentication Plugin', 'Versions': '0'} |
CVE-2023-50858 | Cross-Site Request Forgery (CSRF) vulnerability in Bill Minozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan.This issue affects Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan: from n/a through 4.34.
| https://patchstack.com/database/vulnerability/antihacker/wordpress-anti-hacker-plugin-4-34-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-14T17:19:16.270Z | 2023-12-28T10:31:43.530Z | 2023-12-28T10:31:43.530Z | {'Vendor': 'Bill Minozzi', 'Product': 'Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan', 'Versions': 'n/a'} |
CVE-2023-50272 | A potential security vulnerability has been identified in HPE Integrated Lights-Out 5 (iLO 5) and Integrated Lights-Out 6 (iLO 6). The vulnerability could be remotely exploited to allow authentication bypass. | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04584en_us | 2023-12-06T14:22:26.839Z | 2023-12-19T15:42:21.932Z | 2023-12-19T15:42:39.708Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE Integrated Lights-out 5 (iLO 5), HPE Integrated Lights-out 6 (iLO 6), ', 'Versions': 'iLO 5 - v2.63 through versions prior to v3.00, iLO 6 - v1.05 through versions prior to v1.55'} |
CVE-2023-50767 | Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3204 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:15.589Z | 2023-12-13T17:30:15.589Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'} |
CVE-2023-50730 | Grackle is a GraphQL server written in functional Scala, built on the Typelevel stack. The GraphQL specification requires that GraphQL fragments must not form cycles, either directly or indirectly. Prior to Grackle version 0.18.0, that requirement wasn't checked, and queries with cyclic fragments would have been accepted for type checking and compilation. The attempted compilation of such fragments would result in a JVM `StackOverflowError` being thrown. Some knowledge of an applications GraphQL schema would be required to construct such a query, however no knowledge of any application-specific performance or other behavioural characteristics would be needed.
Grackle uses the cats-parse library for parsing GraphQL queries. Prior to version 0.18.0, Grackle made use of the cats-parse `recursive` operator. However, `recursive` is not currently stack safe. `recursive` was used in three places in the parser: nested selection sets, nested input values (lists and objects), and nested list type declarations. Consequently, queries with deeply nested selection sets, input values or list types could be constructed which exploited this, causing a JVM `StackOverflowException` to be thrown during parsing. Because this happens very early in query processing, no specific knowledge of an applications GraphQL schema would be required to construct such a query.
The possibility of small queries resulting in stack overflow is a potential denial of service vulnerability. This potentially affects all applications using Grackle which have untrusted users. Both stack overflow issues have been resolved in the v0.18.0 release of Grackle. As a workaround, users could interpose a sanitizing layer in between untrusted input and Grackle query processing. | https://github.com/typelevel/grackle/security/advisories/GHSA-g56x-7j6w-g8r8 | 2023-12-11T17:53:36.032Z | 2023-12-22T20:36:11.402Z | 2023-12-22T20:36:11.402Z | {'Vendor': 'typelevel', 'Product': 'grackle', 'Versions': '< 0.18.0'} |
CVE-2023-50874 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Darren Cooney WordPress Infinite Scroll – Ajax Load More allows Stored XSS.This issue affects WordPress Infinite Scroll – Ajax Load More: from n/a through 6.1.0.1.
| https://patchstack.com/database/vulnerability/ajax-load-more/wordpress-ajax-load-more-plugin-6-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-15T14:42:48.487Z | 2023-12-28T10:01:09.439Z | 2023-12-28T10:01:09.439Z | {'Vendor': 'Darren Cooney', 'Product': 'WordPress Infinite Scroll – Ajax Load More', 'Versions': 'n/a'} |
CVE-2023-50931 | An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | 2023-12-15T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T06:16:01.145513 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50823 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wipeout Media CSS & JavaScript Toolbox allows Stored XSS.This issue affects CSS & JavaScript Toolbox: from n/a through 11.7.
| https://patchstack.com/database/vulnerability/css-javascript-toolbox/wordpress-css-javascript-toolbox-plugin-11-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:17.552Z | 2023-12-21T14:35:29.199Z | 2023-12-21T14:35:29.199Z | {'Vendor': 'Wipeout Media', 'Product': 'CSS & JavaScript Toolbox', 'Versions': 'n/a'} |
CVE-2023-50989 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a command injection vulnerability via the pingSet function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:47.633637 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50120 | MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file. | https://github.com/gpac/gpac/issues/2698 | 2023-12-04T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T08:37:18.316348 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50570 | An issue in the component IPAddressBitsDivision of IPAddress v5.1.0 leads to an infinite loop. This is disputed because an infinite loop occurs only for cases in which the developer supplies invalid arguments. The product is not intended to always halt for contrived inputs. | https://github.com/seancfoley/IPAddress/issues/118 | 2023-12-11T00:00:00 | 2023-12-29T00:00:00 | 2024-01-12T05:22:27.675581 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50566 | A stored cross-site scripting (XSS) vulnerability in EyouCMS-V1.6.5-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Registration Number parameter. | https://github.com/weng-xianhu/eyoucms/issues/56 | 2023-12-11T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T14:32:34.997776 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50136 | Cross Site Scripting (XSS) vulnerability in JFinalcms 5.0.0 allows attackers to run arbitrary code via the name field when creating a new custom table. | https://github.com/yukino-hiki/CVE/blob/main/2/There%20is%20a%20stored%20xss%20at%20the%20custom%20table.md | 2023-12-04T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T22:04:30.576814 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50835 | Cross-Site Request Forgery (CSRF) vulnerability in Praveen Goswami Advanced Category Template.This issue affects Advanced Category Template: from n/a through 0.1.
| https://patchstack.com/database/vulnerability/advanced-category-template/wordpress-advanced-category-template-plugin-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-14T17:18:45.974Z | 2023-12-19T21:45:49.285Z | 2023-12-19T21:45:49.285Z | {'Vendor': 'Praveen Goswami', 'Product': 'Advanced Category Template', 'Versions': 'n/a'} |
CVE-2023-50423 | SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
| https://me.sap.com/notes/3411067 | 2023-12-09T17:19:02.677Z | 2023-12-12T01:52:44.999Z | 2023-12-12T08:47:08.230Z | {'Vendor': 'SAP_SE', 'Product': 'sap-xssec', 'Versions': '< 4.1.0'} |
CVE-2023-50589 | Grupo Embras GEOSIAP ERP v2.2.167.02 was discovered to contain a SQL injection vulnerability via the codLogin parameter on the login page. | https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html | 2023-12-11T00:00:00 | 2023-12-30T00:00:00 | 2023-12-30T16:20:36.619795 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50073 | EmpireCMS v7.5 was discovered to contain a SQL injection vulnerability via the ftppassword parameter at SetEnews.php. | https://github.com/leadscloud/EmpireCMS/issues/7 | 2023-12-04T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T14:32:30.127856 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50862 | Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the booking.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/evans/ | 2023-12-14T17:47:18.223Z | 2024-01-04T14:29:39.872Z | 2024-01-04T14:29:39.872Z | {'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'} |
CVE-2023-50248 | CKAN is an open-source data management system for powering data hubs and data portals. Starting in version 2.0.0 and prior to versions 2.9.10 and 2.10.3, when submitting a POST request to the `/dataset/new` endpoint (including either the auth cookie or the `Authorization` header) with a specially-crafted field, an attacker can create an out-of-memory error in the hosting server. To trigger this error, the attacker need to have permissions to create or edit datasets. This vulnerability has been patched in CKAN 2.10.3 and 2.9.10. | https://github.com/ckan/ckan/security/advisories/GHSA-7fgc-89cx-w8j5 | 2023-12-05T20:42:59.377Z | 2023-12-13T20:47:12.784Z | 2023-12-13T20:47:12.784Z | {'Vendor': 'ckan', 'Product': 'ckan', 'Versions': '>= 2.0.0, < 2.9.10, >= 2.10.0, < 2.10.3'} |
CVE-2023-50249 | Sentry-Javascript is official Sentry SDKs for JavaScript. A ReDoS (Regular expression Denial of Service) vulnerability has been identified in Sentry's Astro SDK 7.78.0-7.86.0. Under certain conditions, this vulnerability allows an attacker to cause excessive computation times on the server, leading to denial of service (DoS). This vulnerability has been patched in sentry/astro version 7.87.0. | https://github.com/getsentry/sentry-javascript/security/advisories/GHSA-x3v3-8xg8-8v72 | 2023-12-05T20:42:59.377Z | 2023-12-20T13:53:00.512Z | 2023-12-20T13:53:00.512Z | {'Vendor': 'getsentry', 'Product': 'sentry-javascript', 'Versions': '>= 7.78.0, < 7.87.0'} |
CVE-2023-50863 | Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the generateReceipt.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/evans/ | 2023-12-14T17:47:18.223Z | 2024-01-04T14:30:22.853Z | 2024-01-04T14:30:22.853Z | {'Vendor': 'Kashipara Group', 'Product': 'Travel Website', 'Versions': '1.0'} |
CVE-2023-50475 | An issue was discovered in bcoin-org bcoin version 2.2.0, allows remote attackers to obtain sensitive information via weak hashing algorithms in the component \vendor\faye-websocket.js. | https://github.com/bcoin-org/bcoin/issues/1174 | 2023-12-11T00:00:00 | 2023-12-21T00:00:00 | 2023-12-21T10:26:02.135853 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50137 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the site management office. | https://github.com/yukino-hiki/CVE/blob/main/3/There%20is%20a%20storage%20type%20xss%20in%20the%20site%20management%20office.md | 2023-12-04T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T16:05:24.817790 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50834 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in August Infotech WooCommerce Menu Extension allows Stored XSS.This issue affects WooCommerce Menu Extension: from n/a through 1.6.2.
| https://patchstack.com/database/vulnerability/woocommerce-menu-extension/wordpress-woocommerce-menu-extension-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:45.974Z | 2023-12-21T18:14:32.124Z | 2023-12-21T18:14:32.124Z | {'Vendor': 'August Infotech', 'Product': 'WooCommerce Menu Extension', 'Versions': 'n/a'} |
CVE-2023-50422 | SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
| https://me.sap.com/notes/3411067 | 2023-12-09T17:19:02.677Z | 2023-12-12T01:31:17.991Z | 2024-01-09T01:38:42.375Z | {'Vendor': 'SAP_SE', 'Product': 'cloud-security-services-integration-library', 'Versions': '< 2.17.0, 3.0.0'} |
CVE-2023-50072 | A Stored Cross-Site Scripting (XSS) vulnerability exists in OpenKM version 7.1.40 (dbb6e88) With Professional Extension that allows an authenticated user to upload a note on a file which acts as a stored XSS payload. Any user who opens the note of a document file will trigger the XSS. | https://github.com/ahrixia/CVE-2023-50072 | 2023-12-04T00:00:00 | 2024-01-13T00:00:00 | 2024-01-13T00:56:56.423776 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50658 | The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. | https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317 | 2023-12-11T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T21:39:17.515741 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50822 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Currency.Wiki Currency Converter Widget – Exchange Rates allows Stored XSS.This issue affects Currency Converter Widget – Exchange Rates: from n/a through 3.0.2.
| https://patchstack.com/database/vulnerability/currency-converter-widget/wordpress-currency-converter-widget-plugin-3-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:18:17.552Z | 2023-12-21T14:33:06.623Z | 2023-12-21T14:33:06.623Z | {'Vendor': 'Currency.Wiki', 'Product': 'Currency Converter Widget – Exchange Rates', 'Versions': 'n/a'} |
CVE-2023-50988 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the bandwidth parameter in the wifiRadioSetIndoor function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:45.920771 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50121 | Autel EVO NANO drone flight control firmware version 1.6.5 is vulnerable to denial of service (DoS). | https://github.com/Drone-Lab/Reports-of-AUTEL-drones-losing-control-at-the-edge-of-the-no-fly-zone/tree/main | 2023-12-04T00:00:00 | 2024-01-06T00:00:00 | 2024-01-06T05:06:57.013808 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50571 | easy-rules-mvel v4.1.0 was discovered to contain a remote code execution (RCE) vulnerability via the component MVELRule. | https://github.com/j-easy/easy-rules/issues/419 | 2023-12-11T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T14:37:59.058274 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50930 | An issue was discovered in savignano S/Notify before 4.0.2 for Jira. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Jira, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | https://help.savignano.net/snotify-email-encryption/sa-2023-11-28 | 2023-12-15T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T06:15:35.837601 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50463 | The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions). | https://github.com/shift72/caddy-geo-ip/issues/4 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T22:30:47.439576 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50731 | MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put` method in `mindsdb/mindsdb/api/http/namespaces/file.py` does not validate the user-controlled name value, which is used in a temporary file name, which is afterwards opened for writing on lines 122-125, which leads to path injection. Later in the method, the temporary directory is deleted on line 151, but since we can write outside of the directory using the path injection vulnerability, the potentially dangerous file is not deleted. Arbitrary file contents can be written due to `f.write(chunk)` on line 125. Mindsdb does check later on line 149 in the `save_file` method in `file-controller.py` which calls the `_handle_source` method in `file_handler.py` if a file is of one of the types `csv`, `json`, `parquet`, `xls`, or `xlsx`. However, since the check happens after the file has already been written, the files will still exist (and will not be removed due to the path injection described earlier), just the `_handle_source` method will return an error. The same user-controlled source source is used also in another path injection sink on line 138. This leads to another path injection, which allows an attacker to delete any `zip` or `tar.gz` files on the server. | https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/ | 2023-12-11T17:53:36.032Z | 2023-12-22T20:43:18.036Z | 2023-12-22T20:43:18.036Z | {'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.11.4.1'} |
CVE-2023-50766 | A cross-site request forgery (CSRF) vulnerability in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3204 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:14.962Z | 2023-12-13T17:30:14.962Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Nexus Platform Plugin', 'Versions': '0'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.