CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-31408
Cleartext Storage of Sensitive Information in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote attacker to potentially steal user credentials that are stored in the user’s browsers local storage via cross-site-scripting attacks.
https://sick.com/psirt
2023-04-27T18:35:47.417Z
2023-05-15T10:55:39.301Z
2023-05-15T10:55:39.301Z
{'Vendor': 'SICK AG', 'Product': 'SICK FTMG-ESD15AXX AIR FLOW SENSOR', 'Versions': 'all firmware versions'}
CVE-2023-31058
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers would bypass the 'autoDeserialize' option filtering by adding blanks. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick  https://github.com/apache/inlong/pull/7674 https://github.com/apache/inlong/pull/7674 to solve it.
https://lists.apache.org/thread/bkcgbn9l61croxfyspf7xd42qb189s3z
2023-04-24T02:24:37.855Z
2023-05-22T12:54:12.153Z
2023-05-22T15:48:36.078Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.4.0'}
CVE-2023-31185
ROZCOM server framework - Misconfiguration may allow information disclosure via an unspecified request.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-04-24T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'ROZCOM', 'Product': 'server framework', 'Versions': 'Update to the latest version'}
CVE-2023-31490
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.
https://github.com/FRRouting/frr/issues/13099
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-11-15T05:06:58.706148
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31613
An issue in the __nss_database_lookup component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1121
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31756
A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter.
https://stanleyjobsonau.github.io/tp-link-advisory.html
2023-04-29T00:00:00
2023-05-19T00:00:00
2023-05-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31428
Brocade Fabric OS before Brocade Fabric OS v9.1.1c, v9.2.0 contains a vulnerability in the command line that could allow a local user to dump files under user's home directory using grep.
https://support.broadcom.com/external/content/SecurityAdvisories/0/22380
2023-04-28T00:14:58.125Z
2023-08-01T23:41:41.990Z
2023-08-01T23:41:50.210Z
{'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'before Brocade Fabric OS v9.1.1c, v9.2.0'}
CVE-2023-31582
jose4j before v0.9.3 allows attackers to set a low iteration count of 1000 or less.
https://bitbucket.org/b_c/jose4j/issues/203/insecure-support-of-setting-pbe-less-then
2023-04-29T00:00:00
2023-10-24T00:00:00
2023-10-24T22:30:18.964347
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31078
Cross-Site Request Forgery (CSRF) vulnerability in Marco Steinbrecher WP BrowserUpdate plugin <= 4.4.1 versions.
https://patchstack.com/database/vulnerability/wp-browser-update/wordpress-wp-browserupdate-plugin-4-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-04-24T05:42:59.932Z
2023-11-10T13:32:41.750Z
2023-11-10T13:32:41.750Z
{'Vendor': 'Marco Steinbrecher', 'Product': 'WP BrowserUpdate', 'Versions': 'n/a'}
CVE-2023-31994
Certain Hanwha products are vulnerable to Denial of Service (DoS). ck vector is: When an empty UDP packet is sent to the listening service, the service thread results in a non-functional service (DoS) via WS Discovery and Hanwha proprietary discovery services. This affects IP Camera ANE-L7012R 1.41.01 and IP Camera XNV-9082R 2.10.02.
https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31701
TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.
https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31594
IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via an exposed HTTP channel using VLC network.
http://ic.com
2023-04-29T00:00:00
2023-05-25T00:00:00
2023-05-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31982
Sngrep v1.6.0 was discovered to contain a heap buffer overflow via the function capture_packet_reasm_ip at /src/capture.c.
https://github.com/irontec/sngrep/issues/431
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31081
An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_bridge.c in the Linux kernel 6.2. There is a NULL pointer dereference in vidtv_mux_stop_thread. In vidtv_stop_streaming, after dvb->mux=NULL occurs, it executes vidtv_mux_stop_thread(dvb->mux).
https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag%40mail.gmail.com/
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-09-29T21:06:16.222122
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31717
A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database.
https://github.com/frangoteam/FUXA
2023-04-29T00:00:00
2023-09-21T00:00:00
2023-09-21T23:04:13.257655
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31890
An XML Deserialization vulnerability in glazedlists v1.11.0 allows an attacker to execute arbitrary code via the BeanXMLByteCoder.decode() parameter.
https://github.com/glazedlists/glazedlists/issues/709
2023-04-29T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31193
Snap One OvrC Pro versions prior to 7.3 use HTTP connections when downloading a program from their servers. Because they do not use HTTPS, OvrC Pro devices are susceptible to exploitation.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01
2023-04-26T19:18:23.290Z
2023-05-22T19:28:43.975Z
2023-05-22T19:28:43.975Z
{'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'}
CVE-2023-31469
A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles. The issue is resolved by upgrading to StreamPipes 0.92.0.
https://lists.apache.org/thread/c4y8kf9bzpf36v4bottfmd8tc9cxo19m
2023-04-28T19:12:18.352Z
2023-06-23T07:07:42.875Z
2023-06-23T07:07:42.875Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache StreamPipes', 'Versions': '0.69.0'}
CVE-2023-31039
Security vulnerability in Apache bRPC <1.5.0 on all platforms allows attackers to execute arbitrary code via ServerOptions::pid_file. An attacker that can influence the ServerOptions pid_file parameter with which the bRPC server is started can execute arbitrary code with the permissions of the bRPC process. Solution: 1. upgrade to bRPC >= 1.5.0, download link:  https://dist.apache.org/repos/dist/release/brpc/1.5.0/ https://dist.apache.org/repos/dist/release/brpc/1.5.0/ 2. If you are using an old version of bRPC and hard to upgrade, you can apply this patch:  https://github.com/apache/brpc/pull/2218 https://github.com/apache/brpc/pull/2218
https://lists.apache.org/thread/jqpttrqbc38yhckgp67xk399hqxnz7jn
2023-04-23T03:28:24.815Z
2023-05-08T08:57:14.714Z
2023-05-08T08:57:14.714Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache bRPC', 'Versions': '0.9.0'}
CVE-2023-31486
HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
2023-04-28T00:00:00
2023-04-28T00:00:00
2023-06-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31740
There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface, thereby gaining shell privileges.
http://linksys.com
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31557
null
null
2023-04-29T00:00:00
2023-05-10T00:00:00
2023-07-21T21:37:25.887Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-31804
Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via the course category parameters.
http://chamilo.com
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31941
File Upload vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via a crafted PHP file to the employee_insert.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug1-File%20upload.md
2023-04-29T00:00:00
2023-08-17T00:00:00
2023-08-17T19:36:27.000552
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31412
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.
https://sick.com/psirt
2023-04-27T18:35:47.418Z
2023-08-24T18:15:53.835Z
2023-08-24T18:15:53.835Z
{'Vendor': 'SICK AG', 'Product': 'LMS5xx', 'Versions': 'all firmware versions'}
CVE-2023-31042
A flaw exists in FlashBlade Purity whereby an authenticated user with access to FlashBlade’s object store protocol can impact the availability of the system’s data access and replication protocols.
https://support.purestorage.com/Employee_Handbooks/Technical_Services/PSIRT/Security_Bulletin_for_FlashBlade_Object_Store_Protocol_CVE-2023-31042
2023-04-23T18:57:20.519Z
2023-10-02T22:39:02.597Z
2023-10-02T22:39:02.597Z
{'Vendor': 'Pure Storage', 'Product': 'FlashBlade Purity', 'Versions': '3.3.6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.1.0, 4.1.1'}
CVE-2023-31853
Cudy LT400 1.13.4 is vulnerable Cross Site Scripting (XSS) in /cgi-bin/luci/admin/network/bandwidth via the icon parameter.
https://www.cudy.com
2023-04-29T00:00:00
2023-07-17T00:00:00
2023-07-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31150
A Storing Passwords in a Recoverable Format vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) database system could allow an authenticated attacker to retrieve passwords. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:04.957Z
2023-05-10T19:21:07.126Z
2023-05-10T19:21:07.126Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R122-V0, R122-V0, R122-V0, R122-V0'}
CVE-2023-31015
NVIDIA DGX H100 BMC contains a vulnerability in the REST service where a host user may cause as improper authentication issue. A successful exploit of this vulnerability may lead to escalation of privileges, information disclosure, code execution, and denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-04-22T02:38:25.654Z
2023-09-20T01:12:02.303Z
2023-09-20T01:12:02.303Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-31445
Cassia Access controller before 2.1.1.2203171453, was discovered to have a unprivileged -information disclosure vulnerability that allows read-only users have the ability to enumerate all other users and discover e-mail addresses, phone numbers, and privileges of all other users.
https://www.cassianetworks.com
2023-04-28T00:00:00
2023-05-11T00:00:00
2023-09-25T20:07:02.794577
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31916
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c.
https://github.com/jerryscript-project/jerryscript/issues/5062
2023-04-29T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31296
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows attackers to obtain sensitive information via the User Name field.
https://herolab.usd.de/en/security-advisories/usd-2022-0054/
2023-04-27T00:00:00
2023-12-29T00:00:00
2023-12-29T03:21:48.218347
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31629
An issue in the sqlo_union_scope component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1139
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31146
Vyper is a Pythonic smart contract language for the Ethereum virtual machine. Prior to version 0.3.8, during codegen, the length word of a dynarray is written before the data, which can result in out-of-bounds array access in the case where the dynarray is on both the lhs and rhs of an assignment. The issue can cause data corruption across call frames. The expected behavior is to revert due to out-of-bounds array access. Version 0.3.8 contains a patch for this issue.
https://github.com/vyperlang/vyper/security/advisories/GHSA-3p37-3636-q8wv
2023-04-24T21:44:10.418Z
2023-05-11T20:51:51.666Z
2023-05-11T20:51:51.666Z
{'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '< 0.3.8'}
CVE-2023-31845
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_class.php?id=.
https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-4.md
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31453
Incorrect Permission Assignment for Critical Resource Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.2.0 through 1.6.0. The attacker can delete others' subscriptions, even if they are not the owner of the deleted subscription. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/7949 https://github.com/apache/inlong/pull/7949
https://lists.apache.org/thread/9nz8o2skgc5230w276h4w92j0zstnl06
2023-04-28T09:51:46.162Z
2023-05-22T13:25:47.820Z
2023-05-22T13:25:47.820Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.2.0'}
CVE-2023-31003
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain root access due to improper access controls. IBM X-Force ID: 254658.
https://www.ibm.com/support/pages/node/7106586
2023-04-21T17:50:04.655Z
2024-01-11T02:22:44.925Z
2024-01-11T02:22:44.925Z
{'Vendor': 'IBM', 'Product': 'Security Verify Access Appliance', 'Versions': '10.0.0.0'}
CVE-2023-31541
A unrestricted file upload vulnerability was discovered in the ‘Browse and upload images’ feature of the CKEditor v1.2.3 plugin for Redmine, which allows arbitrary files to be uploaded to the server.
http://redmine.com
2023-04-29T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31404
Under certain conditions, SAP BusinessObjects Business Intelligence Platform (Central Management Service) - versions 420, 430, allows an attacker to access information which would otherwise be restricted. Some users with specific privileges could have access to credentials of other users. It could let them access data sources which would otherwise be restricted.
https://launchpad.support.sap.com/#/notes/3038911
2023-04-27T18:29:50.455Z
2023-05-09T01:37:04.867Z
2023-05-09T01:37:04.867Z
{'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Business Intelligence Platform (Central Management Service)', 'Versions': '420, 430'}
CVE-2023-31238
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). Affected devices are missing cookie protection flags when using the default settings. An attacker who gains access to a session token can use it to impersonate a legitimate application user.
https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf
2023-04-26T17:03:00.579Z
2023-06-13T08:17:13.351Z
2024-01-09T09:59:42.265Z
{'Vendor': 'Siemens', 'Product': 'POWER METER SICAM Q100', 'Versions': 'All versions < V2.60'}
CVE-2023-44985
Auth. (contributo+) Stored Cross-Site Scripting (XSS) vulnerability in Cytech BuddyMeet plugin <= 2.2.0 versions.
https://patchstack.com/database/vulnerability/buddymeet/wordpress-buddymeet-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-02T09:38:08.906Z
2023-10-16T10:46:45.179Z
2023-10-16T10:46:45.179Z
{'Vendor': 'Cytech', 'Product': 'BuddyMeet', 'Versions': 'n/a'}
CVE-2023-44086
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-09-25T08:18:20.817Z
2023-10-10T10:21:39.731Z
2023-10-10T10:21:39.731Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'}
CVE-2023-44205
Sensitive information disclosure due to improper authorization. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-4321
2023-09-26T20:08:46.833Z
2023-09-27T12:01:46.915Z
2023-09-27T12:01:46.915Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'}
CVE-2023-44340
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.450Z
2023-11-16T09:52:53.197Z
2023-12-04T15:49:25.932Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44194
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to create a backdoor with root privileges. The issue is caused by improper directory permissions on a certain system directory, allowing an attacker with access to this directory to create a backdoor with root privileges. This issue affects Juniper Networks Junos OS: * All versions prior to 20.4R3-S5; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S4; * 21.3 versions prior to 21.3R3-S3; * 21.4 versions prior to 21.4R3-S1.
https://supportportal.juniper.net/JSA73158
2023-09-26T19:30:27.955Z
2023-10-12T23:04:18.124Z
2023-10-12T23:04:18.124Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4'}
CVE-2023-44481
Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setearnleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
https://projectworlds.in/
2023-09-29T14:42:05.477Z
2023-12-21T18:58:20.939Z
2023-12-21T18:58:20.939Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Leave Management System Project', 'Versions': '1.0'}
CVE-2023-44252
** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1 through 5.1.2 may allow an authenticated attacker to escalate his privileges via HTTP or HTTPs requests with crafted JWT token values.
https://fortiguard.com/psirt/FG-IR-23-061
2023-09-27T12:26:48.750Z
2023-12-13T08:52:59.178Z
2023-12-13T08:52:59.178Z
{'Vendor': 'Fortinet', 'Product': 'FortiWAN', 'Versions': '5.2.0, 5.1.1'}
CVE-2023-44317
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device.
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
2023-09-28T16:18:45.647Z
2023-11-14T11:03:48.999Z
2023-12-12T11:26:37.911Z
{'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions < V7.2.2'}
CVE-2023-44182
An Unchecked Return Value vulnerability in the user interfaces to the Juniper Networks Junos OS and Junos OS Evolved, the CLI, the XML API, the XML Management Protocol, the NETCONF Management Protocol, the gNMI interfaces, and the J-Web User Interfaces causes unintended effects such as demotion or elevation of privileges associated with an operators actions to occur. Multiple scenarios may occur; for example: privilege escalation over the device or another account, access to files that should not otherwise be accessible, files not being accessible where they should be accessible, code expected to run as non-root may run as root, and so forth. This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S7; * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S4; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R3-S2; * 22.2 versions prior to 22.2R2-S2, 22.2R3; * 22.3 versions prior to 22.3R1-S2, 22.3R2. Juniper Networks Junos OS Evolved * All versions prior to 21.4R3-S3-EVO; * 22.1-EVO version 22.1R1-EVO and later versions prior to 22.2R2-S2-EVO, 22.2R3-EVO; * 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.
https://supportportal.juniper.net/JSA73149
2023-09-26T19:30:17.664Z
2023-10-12T23:01:52.460Z
2023-10-12T23:07:05.978Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'}
CVE-2023-44244
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FooPlugins FooGallery plugin <= 2.2.44 versions.
https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve
2023-09-27T07:57:52.428Z
2023-10-02T08:58:32.940Z
2023-10-02T08:58:32.940Z
{'Vendor': 'FooPlugins', 'Product': 'FooGallery', 'Versions': 'n/a'}
CVE-2023-44301
Dell DM5500 5.14.0.0 and prior contain a Reflected Cross-Site Scripting Vulnerability. A network attacker with low privileges could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.
https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities
2023-09-28T09:44:52.815Z
2023-12-04T08:40:48.299Z
2023-12-18T06:06:52.861Z
{'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'}
CVE-2023-44993
Cross-Site Request Forgery (CSRF) vulnerability in QuantumCloud AI ChatBot plugin <= 4.7.8 versions.
https://patchstack.com/database/vulnerability/chatbot/wordpress-ai-chatbot-plugin-4-7-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T09:38:28.135Z
2023-10-09T10:11:26.641Z
2023-10-09T10:11:26.641Z
{'Vendor': 'QuantumCloud', 'Product': 'AI ChatBot', 'Versions': 'n/a'}
CVE-2023-44839
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:33.732201
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44213
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 35739.
https://security-advisory.acronis.com/advisories/SEC-5286
2023-09-26T20:08:46.835Z
2023-10-05T21:56:48.957Z
2023-10-05T21:56:48.957Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-44356
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.452Z
2023-11-16T09:52:57.281Z
2023-12-04T15:54:30.522Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44141
Inkdrop prior to v5.6.0 allows a local attacker to conduct a code injection attack by having a legitimate user open a specially crafted markdown file.
https://www.inkdrop.app/
2023-09-26T06:46:01.793Z
2023-10-30T03:42:18.099Z
2023-10-30T03:42:18.099Z
{'Vendor': 'Takuya Matsuyama', 'Product': 'Inkdrop', 'Versions': 'prior to v5.6.0'}
CVE-2023-44268
null
null
2023-09-27T15:01:09.066Z
2023-10-26T22:04:22.592Z
2024-01-02T19:08:25.196Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44116
Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.626Z
2023-10-11T12:01:44.161Z
2023-10-11T12:01:44.161Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-44395
Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue.
https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx
2023-09-28T17:56:32.614Z
2024-01-22T14:51:14.371Z
2024-01-22T14:51:14.371Z
{'Vendor': 'autolab', 'Product': 'Autolab', 'Versions': '< 2.12.0'}
CVE-2023-44100
Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.624Z
2023-10-11T11:47:55.811Z
2023-10-11T11:47:55.811Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1, 2.0.0'}
CVE-2023-44229
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Tiny Carousel Horizontal Slider plugin <= 8.1 versions.
https://patchstack.com/database/vulnerability/tiny-carousel-horizontal-slider/wordpress-tiny-carousel-horizontal-slider-plugin-8-1-cross-site-scripting-xss?_s_id=cve
2023-09-27T06:25:00.436Z
2023-10-16T10:29:02.804Z
2023-10-16T10:43:12.890Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'Tiny Carousel Horizontal Slider', 'Versions': 'n/a'}
CVE-2023-44383
October is a Content Management System (CMS) and web platform to assist with development workflow. A user with access to the media manager that stores SVG files could create a stored XSS attack against themselves and any other user with access to the media manager when SVG files are supported. This issue has been patched in version 3.5.2.
https://github.com/octobercms/october/security/advisories/GHSA-rvx8-p3xp-fj3p
2023-09-28T17:56:32.612Z
2023-11-29T19:57:38.263Z
2023-11-29T19:57:38.263Z
{'Vendor': 'octobercms', 'Product': 'october', 'Versions': '>= 3.0.0, 3.5.2'}
CVE-2023-44157
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-3956
2023-09-26T13:09:58.803Z
2023-09-27T12:01:02.383Z
2023-09-27T12:01:02.383Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'}
CVE-2023-44012
Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.
https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012
2023-09-25T00:00:00
2023-10-02T00:00:00
2023-10-02T21:11:16.595999
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44291
Dell DM5500 5.14.0.0 contains an OS command injection vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities
2023-09-28T09:32:10.185Z
2023-12-04T08:13:28.742Z
2023-12-18T06:00:25.005Z
{'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'}
CVE-2023-44209
Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29051.
https://security-advisory.acronis.com/advisories/SEC-2119
2023-09-26T20:08:46.834Z
2023-10-04T19:44:00.895Z
2023-10-04T19:44:00.895Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-44120
A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q4). The affected product's sudo configuration permits the local administrative account to execute several entries as root user. This could allow an authenticated local attacker to inject arbitrary code and gain root access.
https://cert-portal.siemens.com/productcert/pdf/ssa-786191.pdf
2023-09-25T10:24:56.157Z
2024-01-09T09:59:44.755Z
2024-01-09T09:59:44.755Z
{'Vendor': 'Siemens', 'Product': 'Spectrum Power 7', 'Versions': 'All versions < V23Q4'}
CVE-2023-44198
An Improper Check for Unusual or Exceptional Conditions vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX Series and MX Series allows an unauthenticated network-based attacker to cause an integrity impact in connected networks. If the SIP ALG is configured and a device receives a specifically malformed SIP packet, the device prevents this packet from being forwarded, but any subsequently received retransmissions of the same packet are forwarded as if they were valid. This issue affects Juniper Networks Junos OS on SRX Series and MX Series: * 20.4 versions prior to 20.4R3-S5; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S4; * 21.3 versions prior to 21.3R3-S3; * 21.4 versions prior to 21.4R3-S2; * 22.1 versions prior to 22.1R2-S2, 22.1R3; * 22.2 versions prior to 22.2R2-S1, 22.2R3; * 22.3 versions prior to 22.3R1-S2, 22.3R2. This issue doesn't not affected releases prior to 20.4R1.
https://supportportal.juniper.net/JSA73164
2023-09-26T19:30:32.350Z
2023-10-12T23:05:42.031Z
2023-10-12T23:05:42.031Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 0'}
CVE-2023-44177
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos and Junos EVO allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions prior to 19.1R3-S10; * 19.2 versions prior to 19.2R3-S7; * 19.3 versions prior to 19.3R3-S8; * 19.4 versions prior to 19.4R3-S12; * 20.2 versions prior to 20.2R3-S8; * 20.4 versions prior to 20.4R3-S8; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R3; * 22.4 versions prior to 22.4R2. Junos OS Evolved: * All versions prior to 20.4R3-S8-EVO; * 21.2 versions prior to 21.2R3-S6-EVO; * 21.3 versions prior to 21.3R3-S5-EVO; * 21.4 versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S3-EVO; * 22.2 versions prior to 22.2R3-S1-EVO; * 22.3 versions prior to 22.3R3-EVO; * 22.4 versions prior to 22.4R2-EVO.
https://supportportal.juniper.net/JSA73140
2023-09-26T19:30:17.662Z
2023-10-12T23:00:43.889Z
2023-10-12T23:00:43.889Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 19.2, 19.3, 19.4, 20.2, 20.4, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'}
CVE-2023-44248
An improper access control vulnerability [CWE-284] in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all may allow a local attacker to prevent the collector service to start in the next system reboot by tampering with some registry keys of the service.
https://fortiguard.com/psirt/FG-IR-23-306
2023-09-27T12:26:48.750Z
2023-11-14T18:05:53.643Z
2023-11-14T18:05:53.643Z
{'Vendor': 'Fortinet', 'Product': 'FortiEDR', 'Versions': '5.0.3, 5.0.0, 4.0.0'}
CVE-2023-44474
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MD Jakir Hosen Tiger Forms – Drag and Drop Form Builder plugin <= 2.0.0 versions.
https://patchstack.com/database/vulnerability/tiger-form/wordpress-tiger-forms-plugin-2-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-29T14:00:23.569Z
2023-10-02T08:53:03.698Z
2023-10-02T08:53:03.698Z
{'Vendor': 'MD Jakir Hosen', 'Product': 'Tiger Forms – Drag and Drop Form Builder', 'Versions': 'n/a'}
CVE-2023-44024
SQL injection vulnerability in KnowBand Module One Page Checkout, Social Login & Mailchimp (supercheckout) v.8.0.3 and before allows a remote attacker to execute arbitrary code via a crafted request to the updateCheckoutBehaviour function in the supercheckout.php component.
https://security.friendsofpresta.org/modules/2023/10/05/supercheckout.html
2023-09-25T00:00:00
2023-10-05T00:00:00
2023-10-05T19:09:25.348067
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44161
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-4084
2023-09-26T13:09:58.803Z
2023-09-27T12:01:35.358Z
2023-09-27T12:01:35.358Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'}
CVE-2023-44835
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Mac parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:36.653442
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44771
A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout.
https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout
2023-10-02T00:00:00
2023-10-06T00:00:00
2023-10-06T12:34:36.871168
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44321
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
2023-09-28T16:18:45.648Z
2023-11-14T11:04:02.880Z
2023-12-12T11:26:53.871Z
{'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions'}
CVE-2023-44264
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed – Custom Feed plugin <= 2.2.5 versions.
https://patchstack.com/database/vulnerability/wp-facebook-feed/wordpress-the-awesome-feed-custom-feed-plugin-2-2-5-cross-site-scripting-xss?_s_id=cve
2023-09-27T12:39:26.100Z
2023-10-02T10:06:27.286Z
2023-10-02T10:06:42.215Z
{'Vendor': 'Arrow Plugins', 'Product': 'The Awesome Feed – Custom Feed', 'Versions': 'n/a'}
CVE-2023-44008
File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the File Manager function.
https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008
2023-09-25T00:00:00
2023-10-02T00:00:00
2023-10-02T20:58:28.766430
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44376
null
null
2023-09-28T17:27:10.438Z
2023-10-27T12:15:02.285Z
2024-01-02T19:12:28.325Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44233
Cross-Site Request Forgery (CSRF) vulnerability in FooPlugins Best WordPress Gallery Plugin – FooGallery plugin <= 2.2.44 versions.
https://patchstack.com/database/vulnerability/foogallery/wordpress-foogallery-plugin-2-2-44-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T06:25:00.437Z
2023-10-06T15:04:46.655Z
2023-10-06T15:04:46.655Z
{'Vendor': 'FooPlugins', 'Product': 'Best WordPress Gallery Plugin – FooGallery', 'Versions': 'n/a'}
CVE-2023-44399
ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.
https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff
2023-09-28T17:56:32.614Z
2023-10-10T16:55:45.309Z
2023-10-10T16:55:45.309Z
{'Vendor': 'zitadel', 'Product': 'zitadel', 'Versions': '< 2.37.3'}
CVE-2023-44360
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.454Z
2023-11-16T09:52:56.492Z
2023-12-04T15:57:49.738Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44337
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.449Z
2023-11-16T09:52:43.530Z
2023-11-16T09:52:43.530Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44767
A File upload vulnerability in RiteCMS 3.0 allows a local attacker to upload a SVG file with XSS content.
https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md
2023-10-02T00:00:00
2023-10-24T00:00:00
2023-10-24T21:50:30.871346
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44272
A cross-site scripting vulnerability exists in Citadel versions prior to 994. When a malicious user sends an instant message with some JavaScript code, the script may be executed on the web browser of the victim user.
https://www.citadel.org/download.html
2023-09-28T02:30:04.107Z
2023-10-04T08:07:46.459Z
2023-10-04T08:07:46.459Z
{'Vendor': 'Citadel', 'Product': 'Citadel', 'Versions': 'prior to 994'}
CVE-2023-44336
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.449Z
2023-11-16T09:52:46.907Z
2023-11-16T09:52:46.907Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44766
A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 allows an attacker to execute arbitrary code via a crafted script to the SEO - Extra from Page Settings. NOTE: the vendor disputes this because this SEO-related header change can only be made by an admin, and allowing an admin to place JavaScript there is an intentional customization feature.
https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO
2023-10-02T00:00:00
2023-10-06T00:00:00
2023-11-15T21:45:04.261605
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44273
Consensys gnark-crypto through 0.11.2 allows Signature Malleability. This occurs because deserialisation of EdDSA and ECDSA signatures does not ensure that the data is in a certain interval.
https://verichains.io
2023-09-28T00:00:00
2023-09-28T00:00:00
2023-09-28T03:40:49.574895
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44048
Sourcecodester Expense Tracker App v1 is vulnerable to Cross Site Scripting (XSS) via add category.
https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T21:03:12.315571
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44361
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.454Z
2023-11-16T09:52:51.115Z
2023-11-16T09:52:51.115Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44377
null
null
2023-09-28T17:27:10.438Z
2023-10-27T12:15:59.654Z
2024-01-02T19:12:49.504Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44232
Cross-Site Request Forgery (CSRF) vulnerability in Huseyin Berberoglu WP Hide Pages plugin <= 1.0 versions.
https://patchstack.com/database/vulnerability/wp-hide-pages/wordpress-wp-hide-pages-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T06:25:00.437Z
2023-10-09T08:43:31.872Z
2023-10-09T08:43:31.872Z
{'Vendor': 'Huseyin Berberoglu', 'Product': 'WP Hide Pages', 'Versions': 'n/a'}
CVE-2023-44398
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds write was found in Exiv2 version v0.28.0. The vulnerable function, `BmffImage::brotliUncompress`, is new in v0.28.0, so earlier versions of Exiv2 are _not_ affected. The out-of-bounds write is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. This bug is fixed in version v0.28.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/Exiv2/exiv2/security/advisories/GHSA-hrw9-ggg3-3r4r
2023-09-28T17:56:32.614Z
2023-11-06T17:30:54.394Z
2023-11-06T17:30:54.394Z
{'Vendor': 'Exiv2', 'Product': 'exiv2', 'Versions': '= 0.28.0'}
CVE-2023-44009
File Upload vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the Skin Management function.
https://www.mojoportal.com/
2023-09-25T00:00:00
2023-10-02T00:00:00
2023-10-02T20:46:12.524914
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44770
A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows an attacker to execute arbitrary code via a crafted script to the Organizer - Spare alias.
https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md
2023-10-02T00:00:00
2023-10-06T00:00:00
2023-10-06T12:38:42.287639
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44320
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL-Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly validate the authentication when performing certain modifications in the web interface allowing an authenticated attacker to influence the user interface configured by an administrator.
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
2023-09-28T16:18:45.648Z
2023-11-14T11:03:59.528Z
2023-12-12T11:26:49.827Z
{'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions'}
CVE-2023-44265
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Popup contact form plugin <= 7.1 versions.
https://patchstack.com/database/vulnerability/popup-contact-form/wordpress-popup-contact-form-plugin-7-1-cross-site-scripting-xss?_s_id=cve
2023-09-27T12:39:26.100Z
2023-10-02T10:14:31.576Z
2023-10-02T10:14:31.576Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'Popup contact form', 'Versions': 'n/a'}
CVE-2023-44834
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the StartTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:37.505598
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44475
Cross-Site Request Forgery (CSRF) vulnerability in Michael Simpson Add Shortcodes Actions And Filters plugin <= 2.0.9 versions.
https://patchstack.com/database/vulnerability/add-actions-and-filters/wordpress-add-shortcodes-actions-and-filters-plugin-2-0-9-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-29T14:00:23.569Z
2023-10-10T14:25:19.501Z
2023-10-10T14:25:19.501Z
{'Vendor': 'Michael Simpson', 'Product': 'Add Shortcodes Actions And Filters', 'Versions': 'n/a'}
CVE-2023-44025
SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component.
https://security.friendsofpresta.org/modules/2023/10/31/addifyfreegifts.html
2023-09-25T00:00:00
2023-11-01T00:00:00
2023-11-01T21:27:22.849631
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}