CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-31408 |
Cleartext Storage of Sensitive Information in SICK FTMg AIR FLOW SENSOR with
Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote
attacker to potentially steal user credentials that are stored in the user’s browsers local storage via
cross-site-scripting attacks.
| https://sick.com/psirt | 2023-04-27T18:35:47.417Z | 2023-05-15T10:55:39.301Z | 2023-05-15T10:55:39.301Z | {'Vendor': 'SICK AG', 'Product': 'SICK FTMG-ESD15AXX AIR FLOW SENSOR', 'Versions': 'all firmware versions'} |
CVE-2023-31058 | Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers would bypass the
'autoDeserialize' option filtering by adding blanks. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick
https://github.com/apache/inlong/pull/7674 https://github.com/apache/inlong/pull/7674 to solve it.
| https://lists.apache.org/thread/bkcgbn9l61croxfyspf7xd42qb189s3z | 2023-04-24T02:24:37.855Z | 2023-05-22T12:54:12.153Z | 2023-05-22T15:48:36.078Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.4.0'} |
CVE-2023-31185 | ROZCOM server framework - Misconfiguration may allow information disclosure via an unspecified request. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-04-24T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'ROZCOM', 'Product': 'server framework', 'Versions': 'Update to the latest version'} |
CVE-2023-31490 | An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function. | https://github.com/FRRouting/frr/issues/13099 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-11-15T05:06:58.706148 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31613 | An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1121 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31756 | A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter. | https://stanleyjobsonau.github.io/tp-link-advisory.html | 2023-04-29T00:00:00 | 2023-05-19T00:00:00 | 2023-05-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31428 | Brocade Fabric OS before Brocade Fabric OS v9.1.1c, v9.2.0 contains a vulnerability in the command line that could allow a local user to dump files under user's home directory using grep.
| https://support.broadcom.com/external/content/SecurityAdvisories/0/22380 | 2023-04-28T00:14:58.125Z | 2023-08-01T23:41:41.990Z | 2023-08-01T23:41:50.210Z | {'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'before Brocade Fabric OS v9.1.1c, v9.2.0'} |
CVE-2023-31582 | jose4j before v0.9.3 allows attackers to set a low iteration count of 1000 or less. | https://bitbucket.org/b_c/jose4j/issues/203/insecure-support-of-setting-pbe-less-then | 2023-04-29T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T22:30:18.964347 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31078 | Cross-Site Request Forgery (CSRF) vulnerability in Marco Steinbrecher WP BrowserUpdate plugin <= 4.4.1 versions. | https://patchstack.com/database/vulnerability/wp-browser-update/wordpress-wp-browserupdate-plugin-4-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-04-24T05:42:59.932Z | 2023-11-10T13:32:41.750Z | 2023-11-10T13:32:41.750Z | {'Vendor': 'Marco Steinbrecher', 'Product': 'WP BrowserUpdate', 'Versions': 'n/a'} |
CVE-2023-31994 | Certain Hanwha products are vulnerable to Denial of Service (DoS). ck vector is: When an empty UDP packet is sent to the listening service, the service thread results in a non-functional service (DoS) via WS Discovery and Hanwha proprietary discovery services. This affects IP Camera ANE-L7012R 1.41.01 and IP Camera XNV-9082R 2.10.02. | https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31701 | TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove. | https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31594 | IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via an exposed HTTP channel using VLC network. | http://ic.com | 2023-04-29T00:00:00 | 2023-05-25T00:00:00 | 2023-05-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31982 | Sngrep v1.6.0 was discovered to contain a heap buffer overflow via the function capture_packet_reasm_ip at /src/capture.c. | https://github.com/irontec/sngrep/issues/431 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31081 | An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_bridge.c in the Linux kernel 6.2. There is a NULL pointer dereference in vidtv_mux_stop_thread. In vidtv_stop_streaming, after dvb->mux=NULL occurs, it executes vidtv_mux_stop_thread(dvb->mux). | https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag%40mail.gmail.com/ | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-09-29T21:06:16.222122 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31717 | A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database. | https://github.com/frangoteam/FUXA | 2023-04-29T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T23:04:13.257655 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31890 | An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter. | https://github.com/glazedlists/glazedlists/issues/709 | 2023-04-29T00:00:00 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31193 |
Snap One OvrC Pro versions prior to 7.3 use HTTP connections when downloading a program from their servers. Because they do not use HTTPS, OvrC Pro devices are susceptible to exploitation.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | 2023-04-26T19:18:23.290Z | 2023-05-22T19:28:43.975Z | 2023-05-22T19:28:43.975Z | {'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'} |
CVE-2023-31469 |
A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles.
The issue is resolved by upgrading to StreamPipes 0.92.0.
| https://lists.apache.org/thread/c4y8kf9bzpf36v4bottfmd8tc9cxo19m | 2023-04-28T19:12:18.352Z | 2023-06-23T07:07:42.875Z | 2023-06-23T07:07:42.875Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache StreamPipes', 'Versions': '0.69.0'} |
CVE-2023-31039 | Security vulnerability in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file.
An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process.
Solution:
1. upgrade to bRPC >= 1.5.0, download link: https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/
2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch: https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218 | https://lists.apache.org/thread/jqpttrqbc38yhckgp67xk399hqxnz7jn | 2023-04-23T03:28:24.815Z | 2023-05-08T08:57:14.714Z | 2023-05-08T08:57:14.714Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache bRPC', 'Versions': '0.9.0'} |
CVE-2023-31486 | HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates. | https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/ | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | 2023-06-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31740 | There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface, thereby gaining shell privileges. | http://linksys.com | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31557 | null | null | 2023-04-29T00:00:00 | 2023-05-10T00:00:00 | 2023-07-21T21:37:25.887Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-31804 | Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via the course category parameters. | http://chamilo.com | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31941 | File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the employee_insert.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug1-File%20upload.md | 2023-04-29T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T19:36:27.000552 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31412 | The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password. | https://sick.com/psirt | 2023-04-27T18:35:47.418Z | 2023-08-24T18:15:53.835Z | 2023-08-24T18:15:53.835Z | {'Vendor': 'SICK AG', 'Product': 'LMS5xx', 'Versions': 'all firmware versions'} |
CVE-2023-31042 | A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
| https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042 | 2023-04-23T18:57:20.519Z | 2023-10-02T22:39:02.597Z | 2023-10-02T22:39:02.597Z | {'Vendor': 'Pure Storage', 'Product': 'FlashBlade Purity', 'Versions': '3.3.6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1.0, 4.1.1'} |
CVE-2023-31853 | Cudy LT400 1.13.4 is vulnerable Cross Site Scripting (XSS) in /cgi-bin/luci/admin/network/bandwidth via the icon parameter. | https://www.cudy.com | 2023-04-29T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31150 |
A Storing Passwords in a Recoverable Format vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) database system could allow an authenticated attacker to retrieve passwords.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:04.957Z | 2023-05-10T19:21:07.126Z | 2023-05-10T19:21:07.126Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R122-V0, R122-V0, R122-V0, R122-V0'} |
CVE-2023-31015 | NVIDIA DGX H100 BMC contains a vulnerability in the REST service where a host user may cause as improper authentication issue. A successful exploit of this vulnerability may lead to escalation of privileges, information disclosure, code execution, and denial of service. | https://nvidia.custhelp.com/app/answers/detail/a_id/5473 | 2023-04-22T02:38:25.654Z | 2023-09-20T01:12:02.303Z | 2023-09-20T01:12:02.303Z | {'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'} |
CVE-2023-31445 | Cassia Access controller before 2.1.1.2203171453, was discovered to have a unprivileged -information disclosure vulnerability that allows read-only users have the ability to enumerate all other users and discover e-mail addresses, phone numbers, and privileges of all other users. | https://www.cassianetworks.com | 2023-04-28T00:00:00 | 2023-05-11T00:00:00 | 2023-09-25T20:07:02.794577 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31916 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c. | https://github.com/jerryscript-project/jerryscript/issues/5062 | 2023-04-29T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31296 | CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows attackers to obtain sensitive information via the User Name field. | https://herolab.usd.de/en/security-advisories/usd-2022-0054/ | 2023-04-27T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T03:21:48.218347 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31629 | An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1139 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31146 | Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue. | https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv | 2023-04-24T21:44:10.418Z | 2023-05-11T20:51:51.666Z | 2023-05-11T20:51:51.666Z | {'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '< 0.3.8'} |
CVE-2023-31845 | Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_class.php?id=. | https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-4.md | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31453 | Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. The attacker can delete others' subscriptions, even if they are not the owner
of the deleted subscription. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick [1] to solve it.
[1]
https://github.com/apache/inlong/pull/7949 https://github.com/apache/inlong/pull/7949
| https://lists.apache.org/thread/9nz8o2skgc5230w276h4w92j0zstnl06 | 2023-04-28T09:51:46.162Z | 2023-05-22T13:25:47.820Z | 2023-05-22T13:25:47.820Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.2.0'} |
CVE-2023-31003 | IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain root access due to improper access controls. IBM X-Force ID: 254658. | https://www.ibm.com/support/pages/node/7106586 | 2023-04-21T17:50:04.655Z | 2024-01-11T02:22:44.925Z | 2024-01-11T02:22:44.925Z | {'Vendor': 'IBM', 'Product': 'Security Verify Access Appliance', 'Versions': '10.0.0.0'} |
CVE-2023-31541 | A unrestricted file upload vulnerability was discovered in the ‘Browse and upload images’ feature of the CKEditor v1.2.3 plugin for Redmine, which allows arbitrary files to be uploaded to the server. | http://redmine.com | 2023-04-29T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31404 | Under certain conditions, SAP BusinessObjects Business Intelligence Platform (Central Management Service) - versions 420, 430, allows an attacker to access information which would otherwise be restricted. Some users with specific privileges could have access to credentials of other users. It could let them access data sources which would otherwise be restricted.
| https://launchpad.support.sap.com/#/notes/3038911 | 2023-04-27T18:29:50.455Z | 2023-05-09T01:37:04.867Z | 2023-05-09T01:37:04.867Z | {'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Business Intelligence Platform (Central Management Service)', 'Versions': '420, 430'} |
CVE-2023-31238 | A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). Affected devices are missing cookie protection flags when using the default settings. An attacker who gains access to a session token can use it to impersonate a legitimate application user. | https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf | 2023-04-26T17:03:00.579Z | 2023-06-13T08:17:13.351Z | 2024-01-09T09:59:42.265Z | {'Vendor': 'Siemens', 'Product': 'POWER METER SICAM Q100', 'Versions': 'All versions < V2.60'} |
CVE-2023-44985 | Auth. (contributo+) Stored Cross-Site Scripting (XSS) vulnerability in Cytech BuddyMeet plugin <= 2.2.0 versions. | https://patchstack.com/database/vulnerability/buddymeet/wordpress-buddymeet-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-02T09:38:08.906Z | 2023-10-16T10:46:45.179Z | 2023-10-16T10:46:45.179Z | {'Vendor': 'Cytech', 'Product': 'BuddyMeet', 'Versions': 'n/a'} |
CVE-2023-44086 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-09-25T08:18:20.817Z | 2023-10-10T10:21:39.731Z | 2023-10-10T10:21:39.731Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'} |
CVE-2023-44205 | Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-4321 | 2023-09-26T20:08:46.833Z | 2023-09-27T12:01:46.915Z | 2023-09-27T12:01:46.915Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'} |
CVE-2023-44340 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.450Z | 2023-11-16T09:52:53.197Z | 2023-12-04T15:49:25.932Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44194 |
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to create a backdoor with root privileges. The issue is caused by improper directory permissions on a certain system directory, allowing an attacker with access to this directory to create a backdoor with root privileges.
This issue affects Juniper Networks Junos OS:
* All versions prior to 20.4R3-S5;
* 21.1 versions prior to 21.1R3-S4;
* 21.2 versions prior to 21.2R3-S4;
* 21.3 versions prior to 21.3R3-S3;
* 21.4 versions prior to 21.4R3-S1.
| https://supportportal.juniper.net/JSA73158 | 2023-09-26T19:30:27.955Z | 2023-10-12T23:04:18.124Z | 2023-10-12T23:04:18.124Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4'} |
CVE-2023-44481 | Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setearnleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://projectworlds.in/ | 2023-09-29T14:42:05.477Z | 2023-12-21T18:58:20.939Z | 2023-12-21T18:58:20.939Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Leave Management System Project', 'Versions': '1.0'} |
CVE-2023-44252 | ** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1 through 5.1.2 may allow an authenticated attacker to escalate his privileges via HTTP or HTTPs requests with crafted JWT token values. | https://fortiguard.com/psirt/FG-IR-23-061 | 2023-09-27T12:26:48.750Z | 2023-12-13T08:52:59.178Z | 2023-12-13T08:52:59.178Z | {'Vendor': 'Fortinet', 'Product': 'FortiWAN', 'Versions': '5.2.0, 5.1.1'} |
CVE-2023-44317 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device. | https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | 2023-09-28T16:18:45.647Z | 2023-11-14T11:03:48.999Z | 2023-12-12T11:26:37.911Z | {'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions < V7.2.2'} |
CVE-2023-44182 |
An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfaces causes unintended effects such as demotion or elevation of privileges associated with an operators actions to occur.
Multiple scenarios may occur; for example: privilege escalation over the device or another account, access to files that should not otherwise be accessible, files not being accessible where they should be accessible, code expected to run as non-root may run as root, and so forth.
This issue affects:
Juniper Networks Junos OS
* All versions prior to 20.4R3-S7;
* 21.1 versions prior to 21.1R3-S5;
* 21.2 versions prior to 21.2R3-S5;
* 21.3 versions prior to 21.3R3-S4;
* 21.4 versions prior to 21.4R3-S3;
* 22.1 versions prior to 22.1R3-S2;
* 22.2 versions prior to 22.2R2-S2, 22.2R3;
* 22.3 versions prior to 22.3R1-S2, 22.3R2.
Juniper Networks Junos OS Evolved
* All versions prior to 21.4R3-S3-EVO;
* 22.1-EVO version 22.1R1-EVO and later versions prior to 22.2R2-S2-EVO, 22.2R3-EVO;
* 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.
| https://supportportal.juniper.net/JSA73149 | 2023-09-26T19:30:17.664Z | 2023-10-12T23:01:52.460Z | 2023-10-12T23:07:05.978Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'} |
CVE-2023-44244 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.44 versions. | https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve | 2023-09-27T07:57:52.428Z | 2023-10-02T08:58:32.940Z | 2023-10-02T08:58:32.940Z | {'Vendor': 'FooPlugins', 'Product': 'FooGallery', 'Versions': 'n/a'} |
CVE-2023-44301 |
Dell DM5500 5.14.0.0 and prior contain a Reflected Cross-Site Scripting Vulnerability. A network attacker with low privileges could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
| https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities | 2023-09-28T09:44:52.815Z | 2023-12-04T08:40:48.299Z | 2023-12-18T06:06:52.861Z | {'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'} |
CVE-2023-44993 | Cross-Site Request Forgery (CSRF) vulnerability in QuantumCloud AI ChatBot plugin <= 4.7.8 versions. | https://patchstack.com/database/vulnerability/chatbot/wordpress-ai-chatbot-plugin-4-7-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T09:38:28.135Z | 2023-10-09T10:11:26.641Z | 2023-10-09T10:11:26.641Z | {'Vendor': 'QuantumCloud', 'Product': 'AI ChatBot', 'Versions': 'n/a'} |
CVE-2023-44839 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:33.732201 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44213 | Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 35739. | https://security-advisory.acronis.com/advisories/SEC-5286 | 2023-09-26T20:08:46.835Z | 2023-10-05T21:56:48.957Z | 2023-10-05T21:56:48.957Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-44356 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.452Z | 2023-11-16T09:52:57.281Z | 2023-12-04T15:54:30.522Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44141 | Inkdrop prior to v5.6.0 allows a local attacker to conduct a code injection attack by having a legitimate user open a specially crafted markdown file. | https://www.inkdrop.app/ | 2023-09-26T06:46:01.793Z | 2023-10-30T03:42:18.099Z | 2023-10-30T03:42:18.099Z | {'Vendor': 'Takuya Matsuyama', 'Product': 'Inkdrop', 'Versions': 'prior to v5.6.0'} |
CVE-2023-44268 | null | null | 2023-09-27T15:01:09.066Z | 2023-10-26T22:04:22.592Z | 2024-01-02T19:08:25.196Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44116 | Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.626Z | 2023-10-11T12:01:44.161Z | 2023-10-11T12:01:44.161Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-44395 | Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue. | https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx | 2023-09-28T17:56:32.614Z | 2024-01-22T14:51:14.371Z | 2024-01-22T14:51:14.371Z | {'Vendor': 'autolab', 'Product': 'Autolab', 'Versions': '< 2.12.0'} |
CVE-2023-44100 | Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.624Z | 2023-10-11T11:47:55.811Z | 2023-10-11T11:47:55.811Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1, 2.0.0'} |
CVE-2023-44229 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Tiny Carousel Horizontal Slider plugin <= 8.1 versions. | https://patchstack.com/database/vulnerability/tiny-carousel-horizontal-slider/wordpress-tiny-carousel-horizontal-slider-plugin-8-1-cross-site-scripting-xss?_s_id=cve | 2023-09-27T06:25:00.436Z | 2023-10-16T10:29:02.804Z | 2023-10-16T10:43:12.890Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'Tiny Carousel Horizontal Slider', 'Versions': 'n/a'} |
CVE-2023-44383 | October is a Content Management System (CMS) and web platform to assist with development workflow. A user with access to the media manager that stores SVG files could create a stored XSS attack against themselves and any other user with access to the media manager when SVG files are supported. This issue has been patched in version 3.5.2. | https://github.com/octobercms/october/security/advisories/GHSA-rvx8-p3xp-fj3p | 2023-09-28T17:56:32.612Z | 2023-11-29T19:57:38.263Z | 2023-11-29T19:57:38.263Z | {'Vendor': 'octobercms', 'Product': 'october', 'Versions': '>= 3.0.0, 3.5.2'} |
CVE-2023-44157 | Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-3956 | 2023-09-26T13:09:58.803Z | 2023-09-27T12:01:02.383Z | 2023-09-27T12:01:02.383Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'} |
CVE-2023-44012 | Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component. | https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012 | 2023-09-25T00:00:00 | 2023-10-02T00:00:00 | 2023-10-02T21:11:16.595999 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44291 |
Dell DM5500 5.14.0.0 contains an OS command injection vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
| https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities | 2023-09-28T09:32:10.185Z | 2023-12-04T08:13:28.742Z | 2023-12-18T06:00:25.005Z | {'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'} |
CVE-2023-44209 | Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29051. | https://security-advisory.acronis.com/advisories/SEC-2119 | 2023-09-26T20:08:46.834Z | 2023-10-04T19:44:00.895Z | 2023-10-04T19:44:00.895Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-44120 | A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q4). The affected product's sudo configuration permits the local administrative account to execute several entries as root user. This could allow an authenticated local attacker to inject arbitrary code and gain root access. | https://cert-portal.siemens.com/productcert/pdf/ssa-786191.pdf | 2023-09-25T10:24:56.157Z | 2024-01-09T09:59:44.755Z | 2024-01-09T09:59:44.755Z | {'Vendor': 'Siemens', 'Product': 'Spectrum Power 7', 'Versions': 'All versions < V23Q4'} |
CVE-2023-44198 |
An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks.
If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid.
This issue affects Juniper Networks Junos OS on SRX Series and MX Series:
* 20.4 versions prior to 20.4R3-S5;
* 21.1 versions prior to 21.1R3-S4;
* 21.2 versions prior to 21.2R3-S4;
* 21.3 versions prior to 21.3R3-S3;
* 21.4 versions prior to 21.4R3-S2;
* 22.1 versions prior to 22.1R2-S2, 22.1R3;
* 22.2 versions prior to 22.2R2-S1, 22.2R3;
* 22.3 versions prior to 22.3R1-S2, 22.3R2.
This issue doesn't not affected releases prior to 20.4R1.
| https://supportportal.juniper.net/JSA73164 | 2023-09-26T19:30:32.350Z | 2023-10-12T23:05:42.031Z | 2023-10-12T23:05:42.031Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 0'} |
CVE-2023-44177 |
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.
Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks:
Junos OS:
* All versions prior to 19.1R3-S10;
* 19.2 versions prior to 19.2R3-S7;
* 19.3 versions prior to 19.3R3-S8;
* 19.4 versions prior to 19.4R3-S12;
* 20.2 versions prior to 20.2R3-S8;
* 20.4 versions prior to 20.4R3-S8;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S4;
* 22.1 versions prior to 22.1R3-S3;
* 22.2 versions prior to 22.2R3-S1;
* 22.3 versions prior to 22.3R3;
* 22.4 versions prior to 22.4R2.
Junos OS Evolved:
* All versions prior to 20.4R3-S8-EVO;
* 21.2 versions prior to 21.2R3-S6-EVO;
* 21.3 versions prior to 21.3R3-S5-EVO;
* 21.4 versions prior to 21.4R3-S4-EVO;
* 22.1 versions prior to 22.1R3-S3-EVO;
* 22.2 versions prior to 22.2R3-S1-EVO;
* 22.3 versions prior to 22.3R3-EVO;
* 22.4 versions prior to 22.4R2-EVO.
| https://supportportal.juniper.net/JSA73140 | 2023-09-26T19:30:17.662Z | 2023-10-12T23:00:43.889Z | 2023-10-12T23:00:43.889Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 19.2, 19.3, 19.4, 20.2, 20.4, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'} |
CVE-2023-44248 | An improper access control vulnerability [CWE-284] in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all may allow a local attacker to prevent the collector service to start in the next system reboot by tampering with some registry keys of the service. | https://fortiguard.com/psirt/FG-IR-23-306 | 2023-09-27T12:26:48.750Z | 2023-11-14T18:05:53.643Z | 2023-11-14T18:05:53.643Z | {'Vendor': 'Fortinet', 'Product': 'FortiEDR', 'Versions': '5.0.3, 5.0.0, 4.0.0'} |
CVE-2023-44474 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MD Jakir Hosen Tiger Forms – Drag and Drop Form Builder plugin <= 2.0.0 versions. | https://patchstack.com/database/vulnerability/tiger-form/wordpress-tiger-forms-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-29T14:00:23.569Z | 2023-10-02T08:53:03.698Z | 2023-10-02T08:53:03.698Z | {'Vendor': 'MD Jakir Hosen', 'Product': 'Tiger Forms – Drag and Drop Form Builder', 'Versions': 'n/a'} |
CVE-2023-44024 | SQL injection vulnerability in KnowBand Module One Page Checkout, Social Login & Mailchimp (supercheckout) v.8.0.3 and before allows a remote attacker to execute arbitrary code via a crafted request to the updateCheckoutBehaviour function in the supercheckout.php component. | https://security.friendsofpresta.org/modules/2023/10/05/supercheckout.html | 2023-09-25T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T19:09:25.348067 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44161 | Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-4084 | 2023-09-26T13:09:58.803Z | 2023-09-27T12:01:35.358Z | 2023-09-27T12:01:35.358Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'} |
CVE-2023-44835 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Mac parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:36.653442 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44771 | A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout. | https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout | 2023-10-02T00:00:00 | 2023-10-06T00:00:00 | 2023-10-06T12:34:36.871168 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44321 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again. | https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | 2023-09-28T16:18:45.648Z | 2023-11-14T11:04:02.880Z | 2023-12-12T11:26:53.871Z | {'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions'} |
CVE-2023-44264 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed – Custom Feed plugin <= 2.2.5 versions. | https://patchstack.com/database/vulnerability/wp-facebook-feed/wordpress-the-awesome-feed-custom-feed-plugin-2-2-5-cross-site-scripting-xss?_s_id=cve | 2023-09-27T12:39:26.100Z | 2023-10-02T10:06:27.286Z | 2023-10-02T10:06:42.215Z | {'Vendor': 'Arrow Plugins', 'Product': 'The Awesome Feed – Custom Feed', 'Versions': 'n/a'} |
CVE-2023-44008 | File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the File Manager function. | https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008 | 2023-09-25T00:00:00 | 2023-10-02T00:00:00 | 2023-10-02T20:58:28.766430 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44376 | null | null | 2023-09-28T17:27:10.438Z | 2023-10-27T12:15:02.285Z | 2024-01-02T19:12:28.325Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44233 | Cross-Site Request Forgery (CSRF) vulnerability in FooPlugins Best WordPress Gallery Plugin – FooGallery plugin <= 2.2.44 versions. | https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T06:25:00.437Z | 2023-10-06T15:04:46.655Z | 2023-10-06T15:04:46.655Z | {'Vendor': 'FooPlugins', 'Product': 'Best WordPress Gallery Plugin – FooGallery', 'Versions': 'n/a'} |
CVE-2023-44399 | ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available. | https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff | 2023-09-28T17:56:32.614Z | 2023-10-10T16:55:45.309Z | 2023-10-10T16:55:45.309Z | {'Vendor': 'zitadel', 'Product': 'zitadel', 'Versions': '< 2.37.3'} |
CVE-2023-44360 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.454Z | 2023-11-16T09:52:56.492Z | 2023-12-04T15:57:49.738Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44337 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.449Z | 2023-11-16T09:52:43.530Z | 2023-11-16T09:52:43.530Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44767 | A File upload vulnerability in RiteCMS 3.0 allows a local attacker to upload a SVG file with XSS content. | https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md | 2023-10-02T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T21:50:30.871346 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44272 | A cross-site scripting vulnerability exists in Citadel versions prior to 994. When a malicious user sends an instant message with some JavaScript code, the script may be executed on the web browser of the victim user. | https://www.citadel.org/download.html | 2023-09-28T02:30:04.107Z | 2023-10-04T08:07:46.459Z | 2023-10-04T08:07:46.459Z | {'Vendor': 'Citadel', 'Product': 'Citadel', 'Versions': 'prior to 994'} |
CVE-2023-44336 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.449Z | 2023-11-16T09:52:46.907Z | 2023-11-16T09:52:46.907Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44766 | A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the SEO - Extra from Page Settings. NOTE: the vendor disputes this because this SEO-related header change can only be made by an admin, and allowing an admin to place JavaScript there is an intentional customization feature. | https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO | 2023-10-02T00:00:00 | 2023-10-06T00:00:00 | 2023-11-15T21:45:04.261605 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44273 | Consensys gnark-crypto through 0.11.2 allows Signature Malleability. This occurs because deserialisation of EdDSA and ECDSA signatures does not ensure that the data is in a certain interval. | https://verichains.io | 2023-09-28T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T03:40:49.574895 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44048 | Sourcecodester Expense Tracker App v1 is vulnerable to Cross Site Scripting (XSS) via add category. | https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T21:03:12.315571 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44361 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.454Z | 2023-11-16T09:52:51.115Z | 2023-11-16T09:52:51.115Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44377 | null | null | 2023-09-28T17:27:10.438Z | 2023-10-27T12:15:59.654Z | 2024-01-02T19:12:49.504Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44232 | Cross-Site Request Forgery (CSRF) vulnerability in Huseyin Berberoglu WP Hide Pages plugin <= 1.0 versions. | https://patchstack.com/database/vulnerability/wp-hide-pages/wordpress-wp-hide-pages-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T06:25:00.437Z | 2023-10-09T08:43:31.872Z | 2023-10-09T08:43:31.872Z | {'Vendor': 'Huseyin Berberoglu', 'Product': 'WP Hide Pages', 'Versions': 'n/a'} |
CVE-2023-44398 | Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/Exiv2/exiv2/security/advisories/GHSA-hrw9-ggg3-3r4r | 2023-09-28T17:56:32.614Z | 2023-11-06T17:30:54.394Z | 2023-11-06T17:30:54.394Z | {'Vendor': 'Exiv2', 'Product': 'exiv2', 'Versions': '= 0.28.0'} |
CVE-2023-44009 | File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the Skin Management function. | https://www.mojoportal.com/ | 2023-09-25T00:00:00 | 2023-10-02T00:00:00 | 2023-10-02T20:46:12.524914 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44770 | A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows an attacker to execute arbitrary code via a crafted script to the Organizer - Spare alias. | https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md | 2023-10-02T00:00:00 | 2023-10-06T00:00:00 | 2023-10-06T12:38:42.287639 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44320 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator. | https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf | 2023-09-28T16:18:45.648Z | 2023-11-14T11:03:59.528Z | 2023-12-12T11:26:49.827Z | {'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions'} |
CVE-2023-44265 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin <= 7.1 versions. | https://patchstack.com/database/vulnerability/popup-contact-form/wordpress-popup-contact-form-plugin-7-1-cross-site-scripting-xss?_s_id=cve | 2023-09-27T12:39:26.100Z | 2023-10-02T10:14:31.576Z | 2023-10-02T10:14:31.576Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'Popup contact form', 'Versions': 'n/a'} |
CVE-2023-44834 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the StartTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:37.505598 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44475 | Cross-Site Request Forgery (CSRF) vulnerability in Michael Simpson Add Shortcodes Actions And Filters plugin <= 2.0.9 versions. | https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-0-9-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-29T14:00:23.569Z | 2023-10-10T14:25:19.501Z | 2023-10-10T14:25:19.501Z | {'Vendor': 'Michael Simpson', 'Product': 'Add Shortcodes Actions And Filters', 'Versions': 'n/a'} |
CVE-2023-44025 | SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component. | https://security.friendsofpresta.org/modules/2023/10/31/addifyfreegifts.html | 2023-09-25T00:00:00 | 2023-11-01T00:00:00 | 2023-11-01T21:27:22.849631 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.