CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-44160
Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-4083
2023-09-26T13:09:58.803Z
2023-09-27T12:01:23.677Z
2023-09-27T12:01:23.677Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'}
CVE-2023-44249
An authorization bypass through user-controlled key [CWE-639] vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 allows a remote attacker with low privileges to read sensitive information via crafted HTTP requests.
https://fortiguard.com/psirt/FG-IR-23-201
2023-09-27T12:26:48.750Z
2023-10-10T16:48:38.122Z
2023-10-10T16:48:38.122Z
{'Vendor': 'Fortinet', 'Product': 'FortiManager', 'Versions': '7.4.0, 7.2.0, 7.0.0, 6.4.0, 6.2.0'}
CVE-2023-44199
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On Junos MX Series platforms with Precision Time Protocol (PTP) configured, a prolonged routing protocol churn can lead to an FPC crash and restart. This issue affects Juniper Networks Junos OS on MX Series: * All versions prior to 20.4R3-S4; * 21.1 version 21.1R1 and later versions; * 21.2 versions prior to 21.2R3-S2; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3; * 22.1 versions prior to 22.1R3; * 22.2 versions prior to 22.2R1-S1, 22.2R2.
https://supportportal.juniper.net/JSA73165
2023-09-26T19:30:32.350Z
2023-10-12T23:05:52.303Z
2023-10-12T23:05:52.303Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2'}
CVE-2023-44463
An issue was discovered in pretix before 2023.7.1. Incorrect parsing of configuration files causes the application to trust unchecked X-Forwarded-For headers even though it has not been configured to do so. This can lead to IP address spoofing by users of the application.
https://pretix.eu/about/en/ticketing
2023-09-29T00:00:00
2023-10-02T00:00:00
2023-10-02T19:21:37.920912
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44176
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service. Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks: Junos OS: * All versions prior to 20.4R3-S8; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.3 versions prior to 22.3R3; * 22.4 versions prior to 22.4R3.
https://supportportal.juniper.net/JSA73140
2023-09-26T19:30:17.662Z
2023-10-12T23:00:51.422Z
2023-10-12T23:00:51.422Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.2, 21.3, 22.1, 22.3, 22.4'}
CVE-2023-44121
The vulnerability is an intent redirection in LG ThinQ Service ("com.lge.lms2") in the "com/lge/lms/things/ui/notification/NotificationManager.java" file. This vulnerability could be exploited by a third-party app installed on an LG device by sending a broadcast with the action "com.lge.lms.things.notification.ACTION". Additionally, this vulnerability is very dangerous because LG ThinQ Service is a system app (having android:sharedUserId="android.uid.system" setting). Intent redirection in this app leads to accessing arbitrary not exported activities of absolutely all apps.
https://lgsecurity.lge.com/bulletins/mobile#updateDetails
2023-09-26T05:57:13.268Z
2023-09-27T08:36:44.574Z
2023-09-27T13:46:15.312Z
{'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 9'}
CVE-2023-44208
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.
https://security-advisory.acronis.com/advisories/SEC-6587
2023-09-26T20:08:46.834Z
2023-10-04T11:47:43.666Z
2023-10-04T11:47:43.666Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect Home Office', 'Versions': 'unspecified'}
CVE-2023-44290
Dell Command | Monitor versions prior to 10.10.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.
https://www.dell.com/support/kbdoc/en-us/000218628/dsa-2023-390-security-update-for-dell-command-configure-and-dell-command-monitor-vulnerabilities
2023-09-28T09:32:10.185Z
2023-11-23T06:46:03.616Z
2023-11-23T06:46:03.616Z
{'Vendor': 'Dell', 'Product': 'Dell Command Monitor (DCM)', 'Versions': 'Versions prior to 10.10.0'}
CVE-2023-44156
Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-5124
2023-09-26T13:09:58.803Z
2023-09-27T12:01:56.823Z
2023-09-27T12:01:56.823Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'}
CVE-2023-44013
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the list parameter in the fromSetIpMacBind function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:40.773271
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44228
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Onclick show popup plugin <= 8.1 versions.
https://patchstack.com/database/vulnerability/onclick-show-popup/wordpress-onclick-show-popup-plugin-8-1-cross-site-scripting-xss?_s_id=cve
2023-09-27T06:25:00.436Z
2023-10-02T10:33:14.127Z
2023-10-02T10:33:14.127Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'Onclick show popup', 'Versions': 'n/a'}
CVE-2023-44382
October is a Content Management System (CMS) and web platform to assist with development workflow. An authenticated backend user with the `editor.cms_pages`, `editor.cms_layouts`, or `editor.cms_partials` permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to `cms.safe_mode` being enabled can write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This issue has been patched in 3.4.15.
https://github.com/octobercms/october/security/advisories/GHSA-p8q3-h652-65vx
2023-09-28T17:56:32.612Z
2023-12-01T21:48:41.764Z
2023-12-01T21:48:41.764Z
{'Vendor': 'octobercms', 'Product': 'october', 'Versions': '>= 3.0.0, < 3.4.15'}
CVE-2023-44101
The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality.
https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540
2023-09-25T09:11:04.624Z
2023-10-11T11:48:56.203Z
2023-10-11T11:48:56.203Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 2.1.0, 2.0.0'}
CVE-2023-44044
Super Store Finder v3.6 and below was discovered to contain a SQL injection vulnerability via the Search parameter at /admin/stores.php.
https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL
2023-09-25T00:00:00
2023-09-26T00:00:00
2023-09-26T20:35:50.945275
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44394
MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`).
https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m
2023-09-28T17:56:32.614Z
2023-10-16T21:00:46.324Z
2023-10-16T21:00:46.324Z
{'Vendor': 'mantisbt', 'Product': 'mantisbt', 'Versions': '< 2.258'}
CVE-2023-44117
Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2024/1/
2023-09-25T09:11:04.626Z
2024-01-16T07:49:56.189Z
2024-01-16T07:49:56.189Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0'}
CVE-2023-44402
Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. This only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to macOS as these fuses are only currently supported on macOS. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the `.app` bundle on macOS which these fuses are supposed to protect against. There are no app side workarounds, you must update to a patched version of Electron.
https://github.com/electron/electron/security/advisories/GHSA-7m48-wc93-9g85
2023-09-28T17:56:32.615Z
2023-12-01T21:45:18.379Z
2023-12-01T21:45:18.379Z
{'Vendor': 'electron', 'Product': 'electron', 'Versions': '< 22.3.24, >= 23.0.0-alpha.1, <= 23.3.13, >= 24.0.0-alpha.1, < 24.8.3, >= 25.0.0-alpha.1, < 25.8.1, >= 26.0.0-alpha.1, < 26.2.1, >= 27.0.0-alpha.1, < 27.0.0-alpha.7'}
CVE-2023-44286
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities
2023-09-28T09:25:45.714Z
2023-12-14T15:35:32.521Z
2023-12-14T15:35:32.521Z
{'Vendor': 'Dell', 'Product': 'PowerProtect DD ', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110'}
CVE-2023-44793
null
null
2023-10-02T00:00:00
null
2023-10-12T04:03:18.731261
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44212
Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31477.
https://security-advisory.acronis.com/advisories/SEC-5528
2023-09-26T20:08:46.835Z
2023-10-05T21:01:44.247Z
2023-10-05T21:01:44.247Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-44357
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.453Z
2023-11-16T09:52:59.244Z
2023-12-04T15:55:46.621Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44838
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:34.409248
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44245
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Leap Contractor Contact Form Website to Workflow Tool plugin <= 4.0.0 versions.
https://patchstack.com/database/vulnerability/contractor-contact-form-website-to-workflow-tool/wordpress-contractor-contact-form-website-to-workflow-tool-plugin-4-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-27T07:57:52.428Z
2023-10-02T09:58:45.465Z
2023-10-02T09:58:45.465Z
{'Vendor': 'Leap', 'Product': 'Contractor Contact Form Website to Workflow Tool', 'Versions': 'n/a'}
CVE-2023-44300
Dell DM5500 5.14.0.0, contain a Plain-text Password Storage Vulnerability in the appliance. A local attacker with privileges could potentially exploit this vulnerability, leading to the disclosure of certain service credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities
2023-09-28T09:44:52.815Z
2023-12-04T08:36:47.480Z
2023-12-18T06:05:43.712Z
{'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'}
CVE-2023-44183
An Improper Input Validation vulnerability in the VxLAN packet forwarding engine (PFE) of Juniper Networks Junos OS on QFX5000 Series, EX4600 Series devices allows an unauthenticated, adjacent attacker, sending two or more genuine packets in the same VxLAN topology to possibly cause a DMA memory leak to occur under various specific operational conditions. The scenario described here is the worst-case scenario. There are other scenarios that require operator action to occur. An indicator of compromise may be seen when multiple devices indicate that FPC0 has gone missing when issuing a show chassis fpc command for about 10 to 20 minutes, and a number of interfaces have also gone missing. Use the following command to determine if FPC0 has gone missing from the device. show chassis fpc detail This issue affects: Juniper Networks Junos OS on QFX5000 Series, EX4600 Series: * 18.4 version 18.4R2 and later versions prior to 20.4R3-S8; * 21.1 version 21.1R1 and later versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2.
https://supportportal.juniper.net/JSA73148
2023-09-26T19:30:17.664Z
2023-10-12T23:02:20.206Z
2023-10-12T23:02:20.206Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '18.4R2, 20.4, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'}
CVE-2023-44479
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jim Krill WP Jump Menu plugin <= 3.6.4 versions.
https://patchstack.com/database/vulnerability/wp-jump-menu/wordpress-wp-jump-menu-plugin-3-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-29T14:00:23.569Z
2023-10-02T08:13:52.369Z
2023-10-02T08:13:52.369Z
{'Vendor': 'Jim Krill', 'Product': 'WP Jump Menu', 'Versions': 'n/a'}
CVE-2023-44195
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system. If specific packets reach the Routing-Engine (RE) these will be processed normally even if firewall filters are in place which should have prevented this. This can lead to a limited, increased consumption of resources resulting in a Denial-of-Service (DoS), and unauthorized access. CVE-2023-44196 is a prerequisite for this issue. This issue affects Juniper Networks Junos OS Evolved: * 21.3-EVO versions prior to 21.3R3-S5-EVO; * 21.4-EVO versions prior to 21.4R3-S4-EVO; * 22.1-EVO version 22.1R1-EVO and later; * 22.2-EVO version 22.2R1-EVO and later; * 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4-EVO versions prior to 22.4R3-EVO. This issue doesn't not affected Junos OS Evolved versions prior to 21.3R1-EVO.
https://supportportal.juniper.net/JSA73160
2023-09-26T19:30:32.349Z
2023-10-12T23:04:32.068Z
2023-10-12T23:04:32.068Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 21.3-EVO, 21.4-EVO, 22.1R1-EVO, 22.2R1-EVO, 22.3-EVO, 22.4-EVO'}
CVE-2023-44480
Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setcasualleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
https://projectworlds.in/
2023-09-29T14:42:05.477Z
2023-10-27T20:52:46.311Z
2023-11-08T15:37:53.208Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Leave Management System Project', 'Versions': '1.0'}
CVE-2023-44204
An Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). When a malformed BGP UPDATE packet is received over an established BGP session, the rpd crashes and restarts. This issue affects both eBGP and iBGP implementations. This issue affects: Juniper Networks Junos OS * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R1, 23.2R2; Juniper Networks Junos OS Evolved * 21.4 versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S3-EVO; * 22.2 versions prior to 22.2R3-S3-EVO; * 22.3 versions prior to 22.3R2-S2-EVO; * 22.4 versions prior to 22.4R3-EVO; * 23.2 versions prior to 23.2R2-EVO;
https://supportportal.juniper.net/JSA73170
2023-09-26T19:30:32.350Z
2023-10-12T23:06:37.422Z
2023-10-12T23:06:37.422Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '21.4, 22.1, 22.2, 22.3, 22.4, 23.2'}
CVE-2023-44341
Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-55.html
2023-09-28T16:25:40.450Z
2023-11-16T10:11:18.407Z
2023-11-16T10:11:18.407Z
{'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'}
CVE-2023-44984
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Robin Wilson bbp style pack plugin <= 5.6.7 versions.
https://patchstack.com/database/vulnerability/bbp-style-pack/wordpress-bbp-style-pack-plugin-5-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-02T09:38:08.906Z
2023-10-16T10:41:37.562Z
2023-10-16T10:41:37.562Z
{'Vendor': 'Robin Wilson', 'Product': 'bbp style pack', 'Versions': 'n/a'}
CVE-2023-44087
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-09-25T08:18:20.818Z
2023-10-10T10:21:40.787Z
2023-10-10T10:21:40.787Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'}
CVE-2023-44126
The vulnerability is that the Call management ("com.android.server.telecom") app patched by LG sends a lot of LG-owned implicit broadcasts that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as call states, durations, called numbers, contacts info, etc.
https://lgsecurity.lge.com/bulletins/mobile#updateDetails
2023-09-26T05:57:13.719Z
2023-09-27T14:01:46.084Z
2023-09-27T14:01:46.084Z
{'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 8'}
CVE-2023-44464
pretix before 2023.7.2 allows Pillow to parse EPS files.
https://pretix.eu/about/en/ticketing
2023-09-29T00:00:00
2023-09-29T00:00:00
2023-10-04T19:04:47.190924
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44171
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_smtp.php.
https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf
2023-09-26T00:00:00
2023-09-26T00:00:00
2023-09-26T16:54:15.306919
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44188
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debugging Streaming Daemon (jkdsd) process to crash, leading to a Denial of Service (DoS). Continued receipt and processing of telemetry requests will repeatedly crash the jkdsd process and sustain the Denial of Service (DoS) condition. This issue is seen on all Junos platforms. The crash is triggered when multiple telemetry requests come from different collectors. As the load increases, the Dynamic Rendering Daemon (drend) decides to defer processing and continue later, which results in a timing issue accessing stale memory, causing the jkdsd process to crash and restart. Note: jkdsd is not shipped with SRX Series devices and therefore are not affected by this vulnerability. This issue affects: Juniper Networks Junos OS: * 20.4 versions prior to 20.4R3-S9; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S1, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S2, 22.4R3; * 23.1 versions prior to 23.1R2; * 23.2 versions prior to 23.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 19.4R1.
https://supportportal.juniper.net/JSA73152
2023-09-26T19:30:27.953Z
2023-10-11T20:55:03.190Z
2023-10-25T22:36:11.507Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 20.4, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4, 23.1, 23.2'}
CVE-2023-44022
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:51.278211
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44167
null
null
2023-09-26T15:21:50.714Z
2023-09-28T21:54:23.748Z
2024-01-02T21:50:59.239Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44219
A local privilege escalation vulnerability in SonicWall Directory Services Connector Windows MSI client 4.1.21 and earlier versions allows a local low-privileged user to gain system privileges through running the recovery feature.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0016
2023-09-26T23:29:39.789Z
2023-10-27T07:22:35.702Z
2023-10-27T07:22:35.702Z
{'Vendor': 'SonicWall', 'Product': 'Directory Services Connector', 'Versions': '4.1.21 and earlier versions'}
CVE-2023-44075
Cross Site Scripting vulnerability in Small CRM in PHP v.3.0 allows a remote attacker to execute arbitrary code via a crafted payload to the Address parameter.
https://github.com/TheKongV/CVE/blob/main/CVE-2023-44075
2023-09-25T00:00:00
2023-10-04T00:00:00
2023-10-04T19:16:48.186989
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44833
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the GuardInt parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:38.190732
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44327
Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/bridge/apsb23-57.html
2023-09-28T16:25:40.448Z
2023-11-16T14:32:44.041Z
2023-12-04T15:39:09.218Z
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}
CVE-2023-44262
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Renzo Johnson Blocks plugin <= 1.6.41 versions.
https://patchstack.com/database/vulnerability/blocks/wordpress-blocks-plugin-1-6-41-cross-site-scripting-xss?_s_id=cve
2023-09-27T12:39:26.100Z
2023-10-02T09:55:30.136Z
2023-10-02T09:55:30.136Z
{'Vendor': 'Renzo Johnson', 'Product': 'Blocks', 'Versions': 'n/a'}
CVE-2023-44848
An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_template.php component.
https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
2023-10-02T00:00:00
2023-10-10T00:00:00
2023-10-10T00:36:37.232942
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44366
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.454Z
2023-11-16T09:52:54.439Z
2023-11-16T09:52:54.439Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44389
Zope is an open-source web application server. The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected. Patches will be released with Zope versions 4.8.11 and 5.8.6.
https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh
2023-09-28T17:56:32.613Z
2023-10-04T20:07:34.274Z
2023-10-10T21:48:55.985Z
{'Vendor': 'zopefoundation', 'Product': 'Zope', 'Versions': '>= 4.0.0, < 4.8.11, >= 5.0.0, < 5.8.6'}
CVE-2023-44809
D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md
2023-10-02T00:00:00
2023-10-16T00:00:00
2023-10-16T05:37:28.372454
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44331
Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/photoshop/apsb23-56.html
2023-09-28T16:25:40.449Z
2023-11-16T14:27:30.884Z
2023-11-16T14:27:30.884Z
{'Vendor': 'Adobe', 'Product': 'Photoshop Desktop', 'Versions': '0'}
CVE-2023-44761
Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS versions affected to 8.5.13 and below, and 9.0.0 through 9.2.1 allow a local attacker to execute arbitrary code via a crafted script to the Forms of the Data objects.
https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms
2023-10-02T00:00:00
2023-10-06T00:00:00
2023-12-07T07:23:09.966138
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44018
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the domain parameter in the add_white_node function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:45.410265
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44080
An issue in PGYER codefever v.2023.8.14-2ce4006 allows a remote attacker to execute arbitrary code via a crafted request to the branchList component.
https://gist.github.com/one-pyy/330548f740415dff49f59d56e14b4219
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T21:52:50.324445
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44829
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:41.413851
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44983
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Aruba.It Aruba HiSpeed Cache.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.6.
https://patchstack.com/database/vulnerability/aruba-hispeed-cache/wordpress-aruba-hispeed-cache-plugin-2-0-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
2023-10-02T09:38:08.906Z
2023-12-19T15:29:33.268Z
2023-12-19T15:29:33.268Z
{'Vendor': 'Aruba.it', 'Product': 'Aruba HiSpeed Cache', 'Versions': 'n/a'}
CVE-2023-44203
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600 allows a adjacent attacker to send specific traffic, which leads to packet flooding, resulting in a Denial of Service (DoS). When a specific IGMP packet is received in an isolated VLAN, it is duplicated to all other ports under the primary VLAN, which causes a flood. This issue affects QFX5000 series, EX2300, EX3400, EX4100, EX4400 and EX4600 platforms only. This issue affects Juniper Junos OS on on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600: * All versions prior to 20.4R3-S5; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S3; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S2; * 22.1 versions prior to 22.1R3; * 22.2 versions prior to 22.2R3; * 22.3 versions prior to 22.3R2.
https://supportportal.juniper.net/JSA73169
2023-09-26T19:30:32.350Z
2023-10-12T23:06:21.471Z
2023-10-12T23:06:21.471Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'}
CVE-2023-44346
Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-55.html
2023-09-28T16:25:40.450Z
2023-11-16T10:11:17.626Z
2023-11-16T10:11:17.626Z
{'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'}
CVE-2023-44192
An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause memory leak, leading to Denial of Service (DoS). On all Junos OS QFX5000 Series platforms, when pseudo-VTEP (Virtual Tunnel End Point) is configured under EVPN-VXLAN scenario, and specific DHCP packets are transmitted, DMA memory leak is observed. Continuous receipt of these specific DHCP packets will cause memory leak to reach 99% and then cause the protocols to stop working and traffic is impacted, leading to Denial of Service (DoS) condition. A manual reboot of the system recovers from the memory leak. To confirm the memory leak, monitor for "sheaf:possible leak" and "vtep not found" messages in the logs. This issue affects: Juniper Networks Junos OS QFX5000 Series: * All versions prior to 20.4R3-S6; * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S4; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R3-S2; * 22.2 versions prior to 22.2R2-S2, 22.2R3; * 22.3 versions prior to 22.3R2-S1, 22.3R3; * 22.4 versions prior to 22.4R1-S2, 22.4R2.
https://supportportal.juniper.net/JSA73156
2023-09-26T19:30:27.954Z
2023-10-12T23:03:45.324Z
2023-10-12T23:03:45.324Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'}
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
2023-09-29T00:00:00
2023-10-10T00:00:00
2023-12-02T01:06:19.527380
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44311
Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311
2023-09-28T11:23:54.829Z
2023-10-17T09:39:07.508Z
2023-10-17T09:39:07.508Z
{'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.4.13.u41'}
CVE-2023-44184
An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device's control plane. This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S7; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S2; * 22.2 versions prior to 22.2R3; * 22.3 versions prior to 22.3R2-S1, 22.3R3; * 22.4 versions prior to 22.4R1-S2, 22.4R2. Juniper Networks Junos OS Evolved * All versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S2-EVO; * 22.2 versions prior to 22.2R3-EVO; * 22.3 versions prior to 22.3R3-EVO; * 22.4 versions prior to 22.4R2-EVO. An indicator of compromise can be seen by first determining if the NETCONF client is logged in and fails to log out after a reasonable period of time and secondly reviewing the WCPU percentage for the mgd process by running the following command: mgd process example: user@device-re#> show system processes extensive | match "mgd|PID" | except last PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 92476 root 100 0 500M 89024K CPU3 3 57.5H 89.60% mgd <<<<<<<<<<< review the high cpu percentage. Example to check for NETCONF activity: While there is no specific command that shows a specific session in use for NETCONF, you can review logs for UI_LOG_EVENT with "client-mode 'netconf'" For example: mgd[38121]: UI_LOGIN_EVENT: User 'root' login, class 'super-user' [38121], ssh-connection '10.1.1.1 201 55480 10.1.1.2 22', client-mode 'netconf'
https://supportportal.juniper.net/JSA73147
2023-09-26T19:30:17.664Z
2023-10-12T23:02:34.571Z
2023-10-13T18:18:27.354Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'}
CVE-2023-44242
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 2J Slideshow Team Slideshow, Image Slider by 2J plugin <= 1.3.54 versions.
https://patchstack.com/database/vulnerability/2j-slideshow/wordpress-slideshow-image-slider-by-2j-plugin-1-3-54-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-27T07:57:52.428Z
2023-10-02T10:02:20.524Z
2023-10-02T10:02:20.524Z
{'Vendor': '2J Slideshow Team', 'Product': 'Slideshow, Image Slider by 2J', 'Versions': 'n/a'}
CVE-2023-44995
Cross-Site Request Forgery (CSRF) vulnerability in WP Doctor WooCommerce Login Redirect plugin <= 2.2.4 versions.
https://patchstack.com/database/vulnerability/woo-login-redirect/wordpress-woocommerce-login-redirect-plugin-2-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T09:38:28.135Z
2023-10-10T15:46:48.770Z
2023-10-10T15:46:48.770Z
{'Vendor': 'WP Doctor', 'Product': 'WooCommerce Login Redirect', 'Versions': 'n/a'}
CVE-2023-44096
Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.623Z
2023-10-11T10:37:38.290Z
2023-10-11T10:39:45.891Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0, 4.0.0'}
CVE-2023-44350
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html
2023-09-28T16:25:40.451Z
2023-11-17T13:31:30.360Z
2023-11-17T13:31:30.360Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-44002
null
null
2023-09-25T00:00:00
null
2023-10-29T23:07:12.456049
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44281
Dell Pair Installer version prior to 1.2.1 contains an elevation of privilege vulnerability. A low privilege user with local access to the system could potentially exploit this vulnerability to delete arbitrary files and result in Denial of Service.
https://www.dell.com/support/kbdoc/en-us/000219185/dsa-2023-141
2023-09-28T09:25:45.713Z
2024-01-24T15:38:32.061Z
2024-01-24T15:38:32.061Z
{'Vendor': 'Dell', 'Product': 'Dell Pair', 'Versions': 'Versions prior to 1.2.1'}
CVE-2023-44794
An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL.
https://github.com/dromara/Sa-Token/issues/515
2023-10-02T00:00:00
2023-10-25T00:00:00
2023-10-25T05:34:54.056834
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44110
Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.625Z
2023-10-11T11:57:43.178Z
2023-10-11T11:57:43.178Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1'}
CVE-2023-44813
Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the mode parameter of the invite friend login function.
https://github.com/ahrixia/CVE-2023-44813
2023-10-02T00:00:00
2023-10-09T00:00:00
2023-10-09T20:10:02.855864
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44393
Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue.
https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg
2023-09-28T17:56:32.614Z
2023-10-09T14:52:42.879Z
2023-10-09T14:52:42.879Z
{'Vendor': 'Piwigo', 'Product': 'Piwigo', 'Versions': '< 14.0.0beta4'}
CVE-2023-44239
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jobin Jose WWM Social Share On Image Hover plugin <= 2.2 versions.
https://patchstack.com/database/vulnerability/wwm-social-share-on-image-hover/wordpress-wwm-social-share-on-image-hover-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-27T07:57:52.427Z
2023-10-02T09:30:42.508Z
2023-10-02T09:30:42.508Z
{'Vendor': 'Jobin Jose', 'Product': 'WWM Social Share On Image Hover', 'Versions': 'n/a'}
CVE-2023-44106
API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.624Z
2023-10-11T11:55:10.352Z
2023-10-11T11:55:10.352Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-44043
A reflected cross-site scripting (XSS) vulnerability in /install/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website title parameter.
https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1
2023-09-25T00:00:00
2023-09-26T00:00:00
2023-10-03T19:51:23.282324
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44690
Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive information via /mycli/config.py
https://github.com/dbcli/mycli/issues/1131
2023-10-02T00:00:00
2023-10-19T00:00:00
2023-10-19T21:25:39.347596
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44385
The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161.
https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp
2023-09-28T17:56:32.613Z
2023-10-19T22:02:52.674Z
2023-10-19T22:02:52.674Z
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.7'}
CVE-2023-44014
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain multiple stack overflows in the formSetMacFilterCfg function via the macFilterType and deviceList parameters.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:41.952428
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44297
Dell PowerEdge platforms 16G Intel E5 BIOS and Dell Precision BIOS, version 1.4.4, contain active debug code security vulnerability. An unauthenticated physical attacker could potentially exploit this vulnerability, leading to information disclosure, information tampering, code execution, denial of service.
https://www.dell.com/support/kbdoc/en-us/000220047/dsa-2023-429-security-update-for-dell-16g-poweredge-server-bios-for-a-debug-code-security-vulnerability
2023-09-28T09:44:52.814Z
2023-12-05T15:52:27.262Z
2023-12-05T15:52:27.262Z
{'Vendor': 'Dell', 'Product': 'PowerEdge BIOS', 'Versions': 'Version 1.4.4'}
CVE-2023-44278
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities
2023-09-28T09:25:45.713Z
2023-12-14T15:17:01.213Z
2023-12-14T15:17:01.213Z
{'Vendor': 'Dell', 'Product': 'PowerProtect DD', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 '}
CVE-2023-44296
Dell ELab-Navigator, version 3.1.9 contains a hard-coded credential vulnerability. A local attacker could potentially exploit this vulnerability, leading to unauthorized access to sensitive data. Successful exploitation may result in the compromise of confidential user information.
https://www.dell.com/support/kbdoc/en-us/000219558/dsa-2023-419-security-update-for-mobility-e-lab-navigator-vulnerabilities
2023-09-28T09:32:10.186Z
2023-11-16T07:46:18.250Z
2023-11-16T07:46:18.250Z
{'Vendor': 'Dell', 'Product': 'Mobility - E-Lab Navigator', 'Versions': 'Versions 3.1.8 and 3.1.9'}
CVE-2023-44279
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities
2023-09-28T09:25:45.713Z
2023-12-14T15:22:27.116Z
2023-12-14T15:22:27.116Z
{'Vendor': 'Dell', 'Product': 'PowerProtect DD', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110'}
CVE-2023-44150
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress.This issue affects Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress: from n/a through 4.13.2.
https://patchstack.com/database/vulnerability/wp-user-avatar/wordpress-profilepress-plugin-4-13-2-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve
2023-09-26T07:47:31.222Z
2023-11-30T14:50:35.916Z
2023-11-30T14:50:35.916Z
{'Vendor': 'ProfilePress Membership Team', 'Product': 'Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress', 'Versions': 'n/a'}
CVE-2023-44015
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the schedEndTime parameter in the setSchedWifi function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:42.872269
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44384
Discourse-jira is a Discourse plugin allows Jira projects, issue types, fields and field options will be synced automatically. An administrator user can make an SSRF attack by setting the Jira URL to an arbitrary location and enabling the `discourse_jira_verbose_log` site setting. A moderator user could manipulate the request path to the Jira API, allowing them to perform arbitrary GET requests using the Jira API credentials, potentially with elevated permissions, used by the application.
https://github.com/discourse/discourse-jira/security/advisories/GHSA-pmv5-h2x6-35fh
2023-09-28T17:56:32.612Z
2023-10-06T17:15:57.596Z
2023-10-06T17:15:57.596Z
{'Vendor': 'discourse', 'Product': 'discourse-jira', 'Versions': '<= f11be4c'}
CVE-2023-44107
Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity.
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540
2023-09-25T09:11:04.625Z
2023-10-11T12:06:58.651Z
2023-10-11T12:06:58.651Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.1.0'}
CVE-2023-44042
A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website header parameter.
https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1
2023-09-25T00:00:00
2023-09-26T00:00:00
2023-09-26T20:50:13.254445
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44392
Garden provides automation for Kubernetes development and testing. Prior tov ersions 0.13.17 and 0.12.65, Garden has a dependency on the cryo library, which is vulnerable to code injection due to an insecure implementation of deserialization. Garden stores serialized objects using cryo in the Kubernetes `ConfigMap` resources prefixed with `test-result` and `run-result` to cache Garden test and run results. These `ConfigMaps` are stored either in the `garden-system` namespace or the configured user namespace. When a user invokes the command `garden test` or `garden run` objects stored in the `ConfigMap` are retrieved and deserialized. This can be used by an attacker with access to the Kubernetes cluster to store malicious objects in the `ConfigMap`, which can trigger a remote code execution on the users machine when cryo deserializes the object. In order to exploit this vulnerability, an attacker must have access to the Kubernetes cluster used to deploy garden remote environments. Further, a user must actively invoke either a `garden test` or `garden run` which has previously cached results. The issue has been patched in Garden versions `0.13.17` (Bonsai) and `0.12.65` (Acorn). Only Garden versions prior to these are vulnerable. No known workarounds are available.
https://github.com/garden-io/garden/security/advisories/GHSA-hm75-6vc9-8rpr
2023-09-28T17:56:32.614Z
2023-10-09T19:06:04.694Z
2023-10-09T19:06:04.694Z
{'Vendor': 'garden-io', 'Product': 'garden', 'Versions': '< 0.12.65, >= 0.13.0, < 0.13.17'}
CVE-2023-44238
Cross-Site Request Forgery (CSRF) vulnerability in Joakim Ling Remove slug from custom post type plugin <= 1.0.3 versions.
https://patchstack.com/database/vulnerability/remove-slug-from-custom-post-type/wordpress-remove-slug-from-custom-post-type-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T07:57:52.427Z
2023-10-09T09:57:11.398Z
2023-10-09T09:57:11.398Z
{'Vendor': 'Joakim Ling', 'Product': 'Remove slug from custom post type', 'Versions': 'n/a'}
CVE-2023-44111
Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.625Z
2023-10-11T11:59:01.687Z
2023-10-11T11:59:01.687Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-44812
Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the admin_redirect_url parameter of the user login function.
https://github.com/ahrixia/CVE-2023-44812
2023-10-02T00:00:00
2023-10-09T00:00:00
2023-10-09T20:03:12.811477
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44146
Cross-Site Request Forgery (CSRF) vulnerability in Checkfront Inc. Checkfront Online Booking System plugin <= 3.6 versions.
https://patchstack.com/database/vulnerability/checkfront-wp-booking/wordpress-checkfront-online-booking-system-plugin-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-26T07:47:31.221Z
2023-10-06T14:59:34.450Z
2023-10-06T14:59:34.450Z
{'Vendor': 'Checkfront Inc.', 'Product': 'Checkfront Online Booking System', 'Versions': 'n/a'}
CVE-2023-44214
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739.
https://security-advisory.acronis.com/advisories/SEC-5902
2023-09-26T20:08:46.835Z
2023-10-05T21:57:00.522Z
2023-10-05T21:57:00.522Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-44351
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html
2023-09-28T16:25:40.451Z
2023-11-17T13:31:34.680Z
2023-11-17T13:31:34.680Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-44078
null
null
2023-09-25T00:00:00
null
2023-10-30T13:29:24.282431
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44994
Cross-Site Request Forgery (CSRF) vulnerability in Bainternet ShortCodes UI plugin <= 1.9.8 versions.
https://patchstack.com/database/vulnerability/shortcodes-ui/wordpress-shortcodes-ui-plugin-1-9-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T09:38:28.135Z
2023-10-10T14:31:06.843Z
2023-10-10T14:31:06.843Z
{'Vendor': 'Bainternet', 'Product': 'ShortCodes UI', 'Versions': 'n/a'}
CVE-2023-44097
Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.623Z
2023-10-11T11:46:30.245Z
2023-10-11T11:46:30.245Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 2.0.1'}
CVE-2023-44243
Cross-Site Request Forgery (CSRF) vulnerability in Dylan Blokhuis Instant CSS plugin <= 1.2.1 versions.
https://patchstack.com/database/vulnerability/instant-css/wordpress-instant-css-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T07:57:52.428Z
2023-10-06T15:02:21.092Z
2023-10-06T15:02:21.092Z
{'Vendor': 'Dylan Blokhuis', 'Product': 'Instant CSS', 'Versions': 'n/a'}
CVE-2023-44306
Dell DM5500 contains a path traversal vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability to overwrite configuration files stored on the server filesystem.
https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities
2023-09-28T09:44:52.816Z
2023-12-04T08:32:35.434Z
2023-12-18T06:04:40.452Z
{'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'}
CVE-2023-44185
An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet. Continued receipt of this packet will cause a sustained Denial of Service condition. This issue affects: * Juniper Networks Junos OS: * All versions prior to 20.4R3-S6; * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S4; * 21.3 versions prior to 21.3R3-S3; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R2-S2, 22.1R3; * 22.2 versions prior to 22.2R2-S1, 22.2R3; * 22.3 versions prior to 22.3R1-S2, 22.3R2. Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S6-EVO; * 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO; * 21.3-EVO versions prior to 21.3R3-S3-EVO; * 21.4-EVO versions prior to 21.4R3-S3-EVO; * 22.1-EVO versions prior to 22.1R3-EVO; * 22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO; * 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.
https://supportportal.juniper.net/JSA73146
2023-09-26T19:30:27.953Z
2023-10-12T23:02:53.740Z
2023-10-12T23:02:53.740Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'}
CVE-2023-44310
Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page's "Name" text field.
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310
2023-09-28T11:23:54.829Z
2023-10-17T09:28:17.244Z
2023-10-17T09:28:17.244Z
{'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.3.10.sp1, 7.4.13'}
CVE-2023-44193
An Improper Release of Memory Before Removing Last Reference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a local, low privileged attacker to cause an FPC crash, leading to Denial of Service (DoS). On all Junos MX Series with MPC1 - MPC9, LC480, LC2101, MX10003, and MX80, when Connectivity-Fault-Management (CFM) is enabled in a VPLS scenario, and a specific LDP related command is run, an FPC will crash and reboot. Continued execution of this specific LDP command can lead to sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS on MX Series: * All versions prior to 20.4R3-S7; * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S4; * 21.3 versions prior to 21.3R3-S4; * 21.4 versions prior to 21.4R3-S3; * 22.1 versions prior to 22.1R3-S1; * 22.2 versions prior to 22.2R2-S1, 22.2R3; * 22.3 versions prior to 22.3R1-S2, 22.3R2.
https://supportportal.juniper.net/JSA73157
2023-09-26T19:30:27.955Z
2023-10-12T23:04:00.332Z
2023-10-12T23:04:00.332Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'}
CVE-2023-44469
A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770.
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998
2023-09-29T00:00:00
2023-09-29T00:00:00
2023-10-08T18:06:24.190250
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}