CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-44160 | Sensitive information manipulation due to cross-site request forgery. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-4083 | 2023-09-26T13:09:58.803Z | 2023-09-27T12:01:23.677Z | 2023-09-27T12:01:23.677Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'} |
CVE-2023-44249 | An authorization bypass through user-controlled key [CWE-639] vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 allows a remote attacker with low privileges to read sensitive information via crafted HTTP requests. | https://fortiguard.com/psirt/FG-IR-23-201 | 2023-09-27T12:26:48.750Z | 2023-10-10T16:48:38.122Z | 2023-10-10T16:48:38.122Z | {'Vendor': 'Fortinet', 'Product': 'FortiManager', 'Versions': '7.4.0, 7.2.0, 7.0.0, 6.4.0, 6.2.0'} |
CVE-2023-44199 |
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).
On Junos MX Series platforms with Precision Time Protocol (PTP) configured, a prolonged routing protocol churn can lead to an FPC crash and restart.
This issue affects Juniper Networks Junos OS on MX Series:
* All versions prior to 20.4R3-S4;
* 21.1 version 21.1R1 and later versions;
* 21.2 versions prior to 21.2R3-S2;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3;
* 22.1 versions prior to 22.1R3;
* 22.2 versions prior to 22.2R1-S1, 22.2R2.
| https://supportportal.juniper.net/JSA73165 | 2023-09-26T19:30:32.350Z | 2023-10-12T23:05:52.303Z | 2023-10-12T23:05:52.303Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2'} |
CVE-2023-44463 | An issue was discovered in pretix before 2023.7.1. Incorrect parsing of configuration files causes the application to trust unchecked X-Forwarded-For headers even though it has not been configured to do so. This can lead to IP address spoofing by users of the application. | https://pretix.eu/about/en/ticketing | 2023-09-29T00:00:00 | 2023-10-02T00:00:00 | 2023-10-02T19:21:37.920912 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44176 |
A Stack-based Buffer Overflow vulnerability in the CLI command of Juniper Networks Junos OS allows a low privileged attacker to execute a specific CLI commands leading to Denial of Service.
Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition.
This issue affects Juniper Networks:
Junos OS:
* All versions prior to 20.4R3-S8;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 22.1 versions prior to 22.1R3-S3;
* 22.3 versions prior to 22.3R3;
* 22.4 versions prior to 22.4R3.
| https://supportportal.juniper.net/JSA73140 | 2023-09-26T19:30:17.662Z | 2023-10-12T23:00:51.422Z | 2023-10-12T23:00:51.422Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.2, 21.3, 22.1, 22.3, 22.4'} |
CVE-2023-44121 | The vulnerability is an intent redirection in LG ThinQ Service ("com.lge.lms2") in the "com/lge/lms/things/ui/notification/NotificationManager.java" file. This vulnerability could be exploited by a third-party app installed on an LG device by sending a broadcast with the action "com.lge.lms.things.notification.ACTION". Additionally, this vulnerability is very dangerous because LG ThinQ Service is a system app (having android:sharedUserId="android.uid.system" setting). Intent redirection in this app leads to accessing arbitrary not exported activities of absolutely all apps. | https://lgsecurity.lge.com/bulletins/mobile#updateDetails | 2023-09-26T05:57:13.268Z | 2023-09-27T08:36:44.574Z | 2023-09-27T13:46:15.312Z | {'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 9'} |
CVE-2023-44208 | Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713. | https://security-advisory.acronis.com/advisories/SEC-6587 | 2023-09-26T20:08:46.834Z | 2023-10-04T11:47:43.666Z | 2023-10-04T11:47:43.666Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect Home Office', 'Versions': 'unspecified'} |
CVE-2023-44290 |
Dell Command | Monitor versions prior to 10.10.0, contain an improper access control vulnerability. A local malicious standard user could potentially exploit this vulnerability while repairing/changing installation, leading to privilege escalation.
| https://www.dell.com/support/kbdoc/en-us/000218628/dsa-2023-390-security-update-for-dell-command-configure-and-dell-command-monitor-vulnerabilities | 2023-09-28T09:32:10.185Z | 2023-11-23T06:46:03.616Z | 2023-11-23T06:46:03.616Z | {'Vendor': 'Dell', 'Product': 'Dell Command Monitor (DCM)', 'Versions': 'Versions prior to 10.10.0'} |
CVE-2023-44156 | Sensitive information disclosure due to spell-jacking. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-5124 | 2023-09-26T13:09:58.803Z | 2023-09-27T12:01:56.823Z | 2023-09-27T12:01:56.823Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'} |
CVE-2023-44013 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the list parameter in the fromSetIpMacBind function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:40.773271 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44228 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Onclick show popup plugin <= 8.1 versions. | https://patchstack.com/database/vulnerability/onclick-show-popup/wordpress-onclick-show-popup-plugin-8-1-cross-site-scripting-xss?_s_id=cve | 2023-09-27T06:25:00.436Z | 2023-10-02T10:33:14.127Z | 2023-10-02T10:33:14.127Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'Onclick show popup', 'Versions': 'n/a'} |
CVE-2023-44382 | October is a Content Management System (CMS) and web platform to assist with development workflow. An authenticated backend user with the `editor.cms_pages`, `editor.cms_layouts`, or `editor.cms_partials` permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to `cms.safe_mode` being enabled can write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This issue has been patched in 3.4.15. | https://github.com/octobercms/october/security/advisories/GHSA-p8q3-h652-65vx | 2023-09-28T17:56:32.612Z | 2023-12-01T21:48:41.764Z | 2023-12-01T21:48:41.764Z | {'Vendor': 'octobercms', 'Product': 'october', 'Versions': '>= 3.0.0, < 3.4.15'} |
CVE-2023-44101 | The Bluetooth module has a vulnerability in permission control for broadcast notifications.Successful exploitation of this vulnerability may affect confidentiality. | https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540 | 2023-09-25T09:11:04.624Z | 2023-10-11T11:48:56.203Z | 2023-10-11T11:48:56.203Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 2.1.0, 2.0.0'} |
CVE-2023-44044 | Super Store Finder v3.6 and below was discovered to contain a SQL injection vulnerability via the Search parameter at /admin/stores.php. | https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL | 2023-09-25T00:00:00 | 2023-09-26T00:00:00 | 2023-09-26T20:35:50.945275 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44394 | MantisBT is an open source bug tracker. Due to insufficient access-level checks on the Wiki redirection page, any user can reveal private Projects' names, by accessing wiki.php with sequentially incremented IDs. This issue has been addressed in commit `65c44883f` which has been included in release `2.258`. Users are advised to upgrade. Users unable to upgrade should disable wiki integration ( `$g_wiki_enable = OFF;`). | https://github.com/mantisbt/mantisbt/security/advisories/GHSA-v642-mh27-8j6m | 2023-09-28T17:56:32.614Z | 2023-10-16T21:00:46.324Z | 2023-10-16T21:00:46.324Z | {'Vendor': 'mantisbt', 'Product': 'mantisbt', 'Versions': '< 2.258'} |
CVE-2023-44117 | Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2024/1/ | 2023-09-25T09:11:04.626Z | 2024-01-16T07:49:56.189Z | 2024-01-16T07:49:56.189Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0'} |
CVE-2023-44402 | Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. This only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to macOS as these fuses are only currently supported on macOS. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the `.app` bundle on macOS which these fuses are supposed to protect against. There are no app side workarounds, you must update to a patched version of Electron. | https://github.com/electron/electron/security/advisories/GHSA-7m48-wc93-9g85 | 2023-09-28T17:56:32.615Z | 2023-12-01T21:45:18.379Z | 2023-12-01T21:45:18.379Z | {'Vendor': 'electron', 'Product': 'electron', 'Versions': '< 22.3.24, >= 23.0.0-alpha.1, <= 23.3.13, >= 24.0.0-alpha.1, < 24.8.3, >= 25.0.0-alpha.1, < 25.8.1, >= 26.0.0-alpha.1, < 26.2.1, >= 27.0.0-alpha.1, < 27.0.0-alpha.7'} |
CVE-2023-44286 |
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a DOM-based Cross-Site Scripting vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the injection of malicious HTML or JavaScript code to a victim user's DOM environment in the browser. . Exploitation may lead to information disclosure, session theft, or client-side request forgery.
| https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities | 2023-09-28T09:25:45.714Z | 2023-12-14T15:35:32.521Z | 2023-12-14T15:35:32.521Z | {'Vendor': 'Dell', 'Product': 'PowerProtect DD ', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110ersions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110'} |
CVE-2023-44793 | null | null | 2023-10-02T00:00:00 | null | 2023-10-12T04:03:18.731261 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44212 | Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31477. | https://security-advisory.acronis.com/advisories/SEC-5528 | 2023-09-26T20:08:46.835Z | 2023-10-05T21:01:44.247Z | 2023-10-05T21:01:44.247Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-44357 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.453Z | 2023-11-16T09:52:59.244Z | 2023-12-04T15:55:46.621Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44838 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:34.409248 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44245 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Leap Contractor Contact Form Website to Workflow Tool plugin <= 4.0.0 versions. | https://patchstack.com/database/vulnerability/contractor-contact-form-website-to-workflow-tool/wordpress-contractor-contact-form-website-to-workflow-tool-plugin-4-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-27T07:57:52.428Z | 2023-10-02T09:58:45.465Z | 2023-10-02T09:58:45.465Z | {'Vendor': 'Leap', 'Product': 'Contractor Contact Form Website to Workflow Tool', 'Versions': 'n/a'} |
CVE-2023-44300 |
Dell DM5500 5.14.0.0, contain a Plain-text Password Storage Vulnerability in the appliance. A local attacker with privileges could potentially exploit this vulnerability, leading to the disclosure of certain service credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
| https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities | 2023-09-28T09:44:52.815Z | 2023-12-04T08:36:47.480Z | 2023-12-18T06:05:43.712Z | {'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'} |
CVE-2023-44183 |
An Improper Input Validation vulnerability in the VxLAN packet forwarding engine (PFE) of Juniper Networks Junos OS on QFX5000 Series, EX4600 Series devices allows an unauthenticated, adjacent attacker, sending two or more genuine packets in the same VxLAN topology to possibly cause a DMA memory leak to occur under various specific operational conditions. The scenario described here is the worst-case scenario. There are other scenarios that require operator action to occur.
An indicator of compromise may be seen when multiple devices indicate that FPC0 has gone missing when issuing a show chassis fpc command for about 10 to 20 minutes, and a number of interfaces have also gone missing.
Use the following command to determine if FPC0 has gone missing from the device.
show chassis fpc detail
This issue affects:
Juniper Networks Junos OS on QFX5000 Series, EX4600 Series:
* 18.4 version 18.4R2 and later versions prior to 20.4R3-S8;
* 21.1 version 21.1R1 and later versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S4;
* 22.1 versions prior to 22.1R3-S3;
* 22.2 versions prior to 22.2R3-S1;
* 22.3 versions prior to 22.3R2-S2, 22.3R3;
* 22.4 versions prior to 22.4R2.
| https://supportportal.juniper.net/JSA73148 | 2023-09-26T19:30:17.664Z | 2023-10-12T23:02:20.206Z | 2023-10-12T23:02:20.206Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '18.4R2, 20.4, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'} |
CVE-2023-44479 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jim Krill WP Jump Menu plugin <= 3.6.4 versions. | https://patchstack.com/database/vulnerability/wp-jump-menu/wordpress-wp-jump-menu-plugin-3-6-4-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-29T14:00:23.569Z | 2023-10-02T08:13:52.369Z | 2023-10-02T08:13:52.369Z | {'Vendor': 'Jim Krill', 'Product': 'WP Jump Menu', 'Versions': 'n/a'} |
CVE-2023-44195 |
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system.
If specific packets reach the Routing-Engine (RE) these will be processed normally even if firewall filters are in place which should have prevented this. This can lead to a limited, increased consumption of resources resulting in a Denial-of-Service (DoS), and unauthorized access.
CVE-2023-44196 is a prerequisite for this issue.
This issue affects Juniper Networks Junos OS Evolved:
* 21.3-EVO versions prior to 21.3R3-S5-EVO;
* 21.4-EVO versions prior to 21.4R3-S4-EVO;
* 22.1-EVO version 22.1R1-EVO and later;
* 22.2-EVO version 22.2R1-EVO and later;
* 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
* 22.4-EVO versions prior to 22.4R3-EVO.
This issue doesn't not affected Junos OS Evolved versions prior to 21.3R1-EVO.
| https://supportportal.juniper.net/JSA73160 | 2023-09-26T19:30:32.349Z | 2023-10-12T23:04:32.068Z | 2023-10-12T23:04:32.068Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 21.3-EVO, 21.4-EVO, 22.1R1-EVO, 22.2R1-EVO, 22.3-EVO, 22.4-EVO'} |
CVE-2023-44480 | Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setcasualleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://projectworlds.in/ | 2023-09-29T14:42:05.477Z | 2023-10-27T20:52:46.311Z | 2023-11-08T15:37:53.208Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Leave Management System Project', 'Versions': '1.0'} |
CVE-2023-44204 |
An Improper Validation of Syntactic Correctness of Input vulnerability in Routing Protocol Daemon (rpd) Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS).
When a malformed BGP UPDATE packet is received over an established BGP session, the rpd crashes and restarts.
This issue affects both eBGP and iBGP implementations.
This issue affects:
Juniper Networks Junos OS
* 21.4 versions prior to 21.4R3-S4;
* 22.1 versions prior to 22.1R3-S3;
* 22.2 versions prior to 22.2R3-S2;
* 22.3 versions prior to 22.3R2-S2, 22.3R3;
* 22.4 versions prior to 22.4R2-S1, 22.4R3;
* 23.2 versions prior to 23.2R1, 23.2R2;
Juniper Networks Junos OS Evolved
* 21.4 versions prior to 21.4R3-S5-EVO;
* 22.1 versions prior to 22.1R3-S3-EVO;
* 22.2 versions prior to 22.2R3-S3-EVO;
* 22.3 versions prior to 22.3R2-S2-EVO;
* 22.4 versions prior to 22.4R3-EVO;
* 23.2 versions prior to 23.2R2-EVO;
| https://supportportal.juniper.net/JSA73170 | 2023-09-26T19:30:32.350Z | 2023-10-12T23:06:37.422Z | 2023-10-12T23:06:37.422Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '21.4, 22.1, 22.2, 22.3, 22.4, 23.2'} |
CVE-2023-44341 | Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/indesign/apsb23-55.html | 2023-09-28T16:25:40.450Z | 2023-11-16T10:11:18.407Z | 2023-11-16T10:11:18.407Z | {'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'} |
CVE-2023-44984 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Robin Wilson bbp style pack plugin <= 5.6.7 versions. | https://patchstack.com/database/vulnerability/bbp-style-pack/wordpress-bbp-style-pack-plugin-5-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-02T09:38:08.906Z | 2023-10-16T10:41:37.562Z | 2023-10-16T10:41:37.562Z | {'Vendor': 'Robin Wilson', 'Product': 'bbp style pack', 'Versions': 'n/a'} |
CVE-2023-44087 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-09-25T08:18:20.818Z | 2023-10-10T10:21:40.787Z | 2023-10-10T10:21:40.787Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'} |
CVE-2023-44126 | The vulnerability is that the Call management ("com.android.server.telecom") app patched by LG sends a lot of LG-owned implicit broadcasts that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as call states, durations, called numbers, contacts info, etc. | https://lgsecurity.lge.com/bulletins/mobile#updateDetails | 2023-09-26T05:57:13.719Z | 2023-09-27T14:01:46.084Z | 2023-09-27T14:01:46.084Z | {'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 8'} |
CVE-2023-44464 | pretix before 2023.7.2 allows Pillow to parse EPS files. | https://pretix.eu/about/en/ticketing | 2023-09-29T00:00:00 | 2023-09-29T00:00:00 | 2023-10-04T19:04:47.190924 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44171 | SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_smtp.php. | https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf | 2023-09-26T00:00:00 | 2023-09-26T00:00:00 | 2023-09-26T16:54:15.306919 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44188 |
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debugging Streaming Daemon (jkdsd) process to crash, leading to a Denial of Service (DoS). Continued receipt and processing of telemetry requests will repeatedly crash the jkdsd process and sustain the Denial of Service (DoS) condition.
This issue is seen on all Junos platforms. The crash is triggered when multiple telemetry requests come from different collectors. As the load increases, the Dynamic Rendering Daemon (drend) decides to defer processing and continue later, which results in a timing issue accessing stale memory, causing the jkdsd process to crash and restart.
Note: jkdsd is not shipped with SRX Series devices and therefore are not affected by this vulnerability.
This issue affects:
Juniper Networks Junos OS:
* 20.4 versions prior to 20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S5;
* 22.1 versions prior to 22.1R3-S4;
* 22.2 versions prior to 22.2R3-S2;
* 22.3 versions prior to 22.3R2-S1, 22.3R3-S1;
* 22.4 versions prior to 22.4R2-S2, 22.4R3;
* 23.1 versions prior to 23.1R2;
* 23.2 versions prior to 23.2R2.
This issue does not affect Juniper Networks Junos OS versions prior to 19.4R1.
| https://supportportal.juniper.net/JSA73152 | 2023-09-26T19:30:27.953Z | 2023-10-11T20:55:03.190Z | 2023-10-25T22:36:11.507Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 20.4, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4, 23.1, 23.2'} |
CVE-2023-44022 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:51.278211 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44167 | null | null | 2023-09-26T15:21:50.714Z | 2023-09-28T21:54:23.748Z | 2024-01-02T21:50:59.239Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44219 | A local privilege escalation vulnerability in SonicWall Directory Services Connector Windows MSI client 4.1.21 and earlier versions allows a local low-privileged user to gain system privileges through running the recovery feature. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0016 | 2023-09-26T23:29:39.789Z | 2023-10-27T07:22:35.702Z | 2023-10-27T07:22:35.702Z | {'Vendor': 'SonicWall', 'Product': 'Directory Services Connector', 'Versions': '4.1.21 and earlier versions'} |
CVE-2023-44075 | Cross Site Scripting vulnerability in Small CRM in PHP v.3.0 allows a remote attacker to execute arbitrary code via a crafted payload to the Address parameter. | https://github.com/TheKongV/CVE/blob/main/CVE-2023-44075 | 2023-09-25T00:00:00 | 2023-10-04T00:00:00 | 2023-10-04T19:16:48.186989 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44833 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the GuardInt parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:38.190732 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44327 | Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/bridge/apsb23-57.html | 2023-09-28T16:25:40.448Z | 2023-11-16T14:32:44.041Z | 2023-12-04T15:39:09.218Z | {'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'} |
CVE-2023-44262 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Renzo Johnson Blocks plugin <= 1.6.41 versions. | https://patchstack.com/database/vulnerability/blocks/wordpress-blocks-plugin-1-6-41-cross-site-scripting-xss?_s_id=cve | 2023-09-27T12:39:26.100Z | 2023-10-02T09:55:30.136Z | 2023-10-02T09:55:30.136Z | {'Vendor': 'Renzo Johnson', 'Product': 'Blocks', 'Versions': 'n/a'} |
CVE-2023-44848 | An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_template.php component. | https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 | 2023-10-02T00:00:00 | 2023-10-10T00:00:00 | 2023-10-10T00:36:37.232942 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44366 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.454Z | 2023-11-16T09:52:54.439Z | 2023-11-16T09:52:54.439Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44389 | Zope is an open-source web application server. The title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI). All versions of Zope 4 and Zope 5 are affected. Patches will be released with Zope versions 4.8.11 and 5.8.6. | https://github.com/zopefoundation/Zope/security/advisories/GHSA-m755-gxxg-r5qh | 2023-09-28T17:56:32.613Z | 2023-10-04T20:07:34.274Z | 2023-10-10T21:48:55.985Z | {'Vendor': 'zopefoundation', 'Product': 'Zope', 'Versions': '>= 4.0.0, < 4.8.11, >= 5.0.0, < 5.8.6'} |
CVE-2023-44809 | D-Link device DIR-820L 1.05B03 is vulnerable to Insecure Permissions. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md | 2023-10-02T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T05:37:28.372454 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44331 | Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/photoshop/apsb23-56.html | 2023-09-28T16:25:40.449Z | 2023-11-16T14:27:30.884Z | 2023-11-16T14:27:30.884Z | {'Vendor': 'Adobe', 'Product': 'Photoshop Desktop', 'Versions': '0'} |
CVE-2023-44761 | Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS versions affected to 8.5.13 and below, and 9.0.0 through 9.2.1 allow a local attacker to execute arbitrary code via a crafted script to the Forms of the Data objects. | https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms | 2023-10-02T00:00:00 | 2023-10-06T00:00:00 | 2023-12-07T07:23:09.966138 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44018 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the domain parameter in the add_white_node function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:45.410265 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44080 | An issue in PGYER codefever v.2023.8.14-2ce4006 allows a remote attacker to execute arbitrary code via a crafted request to the branchList component. | https://gist.github.com/one-pyy/330548f740415dff49f59d56e14b4219 | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T21:52:50.324445 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44829 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the AdminPassword parameter in the SetDeviceSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:41.413851 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44983 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Aruba.It Aruba HiSpeed Cache.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.6.
| https://patchstack.com/database/vulnerability/aruba-hispeed-cache/wordpress-aruba-hispeed-cache-plugin-2-0-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | 2023-10-02T09:38:08.906Z | 2023-12-19T15:29:33.268Z | 2023-12-19T15:29:33.268Z | {'Vendor': 'Aruba.it', 'Product': 'Aruba HiSpeed Cache', 'Versions': 'n/a'} |
CVE-2023-44203 |
An Improper Check or Handling of Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600 allows a adjacent attacker to send specific traffic, which leads to packet flooding, resulting in a Denial of Service (DoS).
When a specific IGMP packet is received in an isolated VLAN, it is duplicated to all other ports under the primary VLAN, which causes a flood.
This issue affects QFX5000 series, EX2300, EX3400, EX4100, EX4400 and EX4600 platforms only.
This issue affects Juniper Junos OS on on QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600:
* All versions prior to 20.4R3-S5;
* 21.1 versions prior to 21.1R3-S4;
* 21.2 versions prior to 21.2R3-S3;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S2;
* 22.1 versions prior to 22.1R3;
* 22.2 versions prior to 22.2R3;
* 22.3 versions prior to 22.3R2.
| https://supportportal.juniper.net/JSA73169 | 2023-09-26T19:30:32.350Z | 2023-10-12T23:06:21.471Z | 2023-10-12T23:06:21.471Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'} |
CVE-2023-44346 | Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/indesign/apsb23-55.html | 2023-09-28T16:25:40.450Z | 2023-11-16T10:11:17.626Z | 2023-11-16T10:11:17.626Z | {'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'} |
CVE-2023-44192 |
An Improper Input Validation vulnerability in the Packet Forwarding Engine of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause memory leak, leading to Denial of Service (DoS).
On all Junos OS QFX5000 Series platforms, when pseudo-VTEP (Virtual Tunnel End Point) is configured under EVPN-VXLAN scenario, and specific DHCP packets are transmitted, DMA memory leak is observed. Continuous receipt of these specific DHCP packets will cause memory leak to reach 99% and then cause the protocols to stop working and traffic is impacted, leading to Denial of Service (DoS) condition. A manual reboot of the system recovers from the memory leak.
To confirm the memory leak, monitor for "sheaf:possible leak" and "vtep not found" messages in the logs.
This issue affects:
Juniper Networks Junos OS QFX5000 Series:
* All versions prior to 20.4R3-S6;
* 21.1 versions prior to 21.1R3-S5;
* 21.2 versions prior to 21.2R3-S5;
* 21.3 versions prior to 21.3R3-S4;
* 21.4 versions prior to 21.4R3-S3;
* 22.1 versions prior to 22.1R3-S2;
* 22.2 versions prior to 22.2R2-S2, 22.2R3;
* 22.3 versions prior to 22.3R2-S1, 22.3R3;
* 22.4 versions prior to 22.4R1-S2, 22.4R2.
| https://supportportal.juniper.net/JSA73156 | 2023-09-26T19:30:27.954Z | 2023-10-12T23:03:45.324Z | 2023-10-12T23:03:45.324Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'} |
CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. | https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73 | 2023-09-29T00:00:00 | 2023-10-10T00:00:00 | 2023-12-02T01:06:19.527380 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44311 | Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941. | https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311 | 2023-09-28T11:23:54.829Z | 2023-10-17T09:39:07.508Z | 2023-10-17T09:39:07.508Z | {'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.4.13.u41'} |
CVE-2023-44184 |
An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device's control plane.
This issue affects:
Juniper Networks Junos OS
* All versions prior to 20.4R3-S7;
* 21.2 versions prior to 21.2R3-S5;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S4;
* 22.1 versions prior to 22.1R3-S2;
* 22.2 versions prior to 22.2R3;
* 22.3 versions prior to 22.3R2-S1, 22.3R3;
* 22.4 versions prior to 22.4R1-S2, 22.4R2.
Juniper Networks Junos OS Evolved
* All versions prior to 21.4R3-S4-EVO;
* 22.1 versions prior to 22.1R3-S2-EVO;
* 22.2 versions prior to 22.2R3-EVO;
* 22.3 versions prior to 22.3R3-EVO;
* 22.4 versions prior to 22.4R2-EVO.
An indicator of compromise can be seen by first determining if the NETCONF client is logged in and fails to log out after a reasonable period of time and secondly reviewing the WCPU percentage for the mgd process by running the following command:
mgd process example:
user@device-re#> show system processes extensive | match "mgd|PID" | except last
PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND
92476 root 100 0 500M 89024K CPU3 3 57.5H 89.60% mgd <<<<<<<<<<< review the high cpu percentage.
Example to check for NETCONF activity:
While there is no specific command that shows a specific session in use for NETCONF, you can review logs for UI_LOG_EVENT with "client-mode 'netconf'"
For example:
mgd[38121]: UI_LOGIN_EVENT: User 'root' login, class 'super-user' [38121], ssh-connection '10.1.1.1 201 55480 10.1.1.2 22', client-mode 'netconf'
| https://supportportal.juniper.net/JSA73147 | 2023-09-26T19:30:17.664Z | 2023-10-12T23:02:34.571Z | 2023-10-13T18:18:27.354Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'} |
CVE-2023-44242 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 2J Slideshow Team Slideshow, Image Slider by 2J plugin <= 1.3.54 versions. | https://patchstack.com/database/vulnerability/2j-slideshow/wordpress-slideshow-image-slider-by-2j-plugin-1-3-54-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-27T07:57:52.428Z | 2023-10-02T10:02:20.524Z | 2023-10-02T10:02:20.524Z | {'Vendor': '2J Slideshow Team', 'Product': 'Slideshow, Image Slider by 2J', 'Versions': 'n/a'} |
CVE-2023-44995 | Cross-Site Request Forgery (CSRF) vulnerability in WP Doctor WooCommerce Login Redirect plugin <= 2.2.4 versions. | https://patchstack.com/database/vulnerability/woo-login-redirect/wordpress-woocommerce-login-redirect-plugin-2-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T09:38:28.135Z | 2023-10-10T15:46:48.770Z | 2023-10-10T15:46:48.770Z | {'Vendor': 'WP Doctor', 'Product': 'WooCommerce Login Redirect', 'Versions': 'n/a'} |
CVE-2023-44096 | Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.623Z | 2023-10-11T10:37:38.290Z | 2023-10-11T10:39:45.891Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0, 4.0.0'} |
CVE-2023-44350 | Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html | 2023-09-28T16:25:40.451Z | 2023-11-17T13:31:30.360Z | 2023-11-17T13:31:30.360Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-44002 | null | null | 2023-09-25T00:00:00 | null | 2023-10-29T23:07:12.456049 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44281 |
Dell Pair Installer version prior to 1.2.1 contains an elevation of privilege vulnerability. A low privilege user with local access to the system could potentially exploit this vulnerability to delete arbitrary files and result in Denial of Service.
| https://www.dell.com/support/kbdoc/en-us/000219185/dsa-2023-141 | 2023-09-28T09:25:45.713Z | 2024-01-24T15:38:32.061Z | 2024-01-24T15:38:32.061Z | {'Vendor': 'Dell', 'Product': 'Dell Pair', 'Versions': 'Versions prior to 1.2.1'} |
CVE-2023-44794 | An issue in Dromara SaToken version 1.36.0 and before allows a remote attacker to escalate privileges via a crafted payload to the URL. | https://github.com/dromara/Sa-Token/issues/515 | 2023-10-02T00:00:00 | 2023-10-25T00:00:00 | 2023-10-25T05:34:54.056834 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44110 | Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.625Z | 2023-10-11T11:57:43.178Z | 2023-10-11T11:57:43.178Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.1'} |
CVE-2023-44813 | Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the mode parameter of the invite friend login function. | https://github.com/ahrixia/CVE-2023-44813 | 2023-10-02T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T20:10:02.855864 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44393 | Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue. | https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg | 2023-09-28T17:56:32.614Z | 2023-10-09T14:52:42.879Z | 2023-10-09T14:52:42.879Z | {'Vendor': 'Piwigo', 'Product': 'Piwigo', 'Versions': '< 14.0.0beta4'} |
CVE-2023-44239 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jobin Jose WWM Social Share On Image Hover plugin <= 2.2 versions. | https://patchstack.com/database/vulnerability/wwm-social-share-on-image-hover/wordpress-wwm-social-share-on-image-hover-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-27T07:57:52.427Z | 2023-10-02T09:30:42.508Z | 2023-10-02T09:30:42.508Z | {'Vendor': 'Jobin Jose', 'Product': 'WWM Social Share On Image Hover', 'Versions': 'n/a'} |
CVE-2023-44106 | API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.624Z | 2023-10-11T11:55:10.352Z | 2023-10-11T11:55:10.352Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-44043 | A reflected cross-site scripting (XSS) vulnerability in /install/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website title parameter. | https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1 | 2023-09-25T00:00:00 | 2023-09-26T00:00:00 | 2023-10-03T19:51:23.282324 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44690 | Inadequate encryption strength in mycli 1.27.0 allows attackers to view sensitive information via /mycli/config.py | https://github.com/dbcli/mycli/issues/1131 | 2023-10-02T00:00:00 | 2023-10-19T00:00:00 | 2023-10-19T21:25:39.347596 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44385 | The Home Assistant Companion for iOS and macOS app up to version 2023.4 are vulnerable to Client-Side Request Forgery. Attackers may send malicious links/QRs to victims that, when visited, will make the victim to call arbitrary services in their Home Assistant installation. Combined with this security advisory, may result in full compromise and remote code execution (RCE). Version 2023.7 addresses this issue and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: GHSL-2023-161. | https://github.com/home-assistant/core/security/advisories/GHSA-h2jp-7grc-9xpp | 2023-09-28T17:56:32.613Z | 2023-10-19T22:02:52.674Z | 2023-10-19T22:02:52.674Z | {'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.7'} |
CVE-2023-44014 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain multiple stack overflows in the formSetMacFilterCfg function via the macFilterType and deviceList parameters. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:41.952428 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44297 |
Dell PowerEdge platforms 16G Intel E5 BIOS and Dell Precision BIOS, version 1.4.4, contain active debug code security vulnerability. An unauthenticated physical attacker could potentially exploit this vulnerability, leading to information disclosure, information tampering, code execution, denial of service.
| https://www.dell.com/support/kbdoc/en-us/000220047/dsa-2023-429-security-update-for-dell-16g-poweredge-server-bios-for-a-debug-code-security-vulnerability | 2023-09-28T09:44:52.814Z | 2023-12-05T15:52:27.262Z | 2023-12-05T15:52:27.262Z | {'Vendor': 'Dell', 'Product': 'PowerEdge BIOS', 'Versions': 'Version 1.4.4'} |
CVE-2023-44278 |
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain a path traversal vulnerability. A local high privileged attacker could potentially exploit this vulnerability, to gain unauthorized read and write access to the OS files stored on the server filesystem, with the privileges of the running application.
| https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities | 2023-09-28T09:25:45.713Z | 2023-12-14T15:17:01.213Z | 2023-12-14T15:17:01.213Z | {'Vendor': 'Dell', 'Product': 'PowerProtect DD', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 '} |
CVE-2023-44296 |
Dell ELab-Navigator, version 3.1.9 contains a hard-coded credential vulnerability. A local attacker could potentially exploit this vulnerability, leading to unauthorized access to sensitive data. Successful exploitation may result in the compromise of confidential user information.
| https://www.dell.com/support/kbdoc/en-us/000219558/dsa-2023-419-security-update-for-mobility-e-lab-navigator-vulnerabilities | 2023-09-28T09:32:10.186Z | 2023-11-16T07:46:18.250Z | 2023-11-16T07:46:18.250Z | {'Vendor': 'Dell', 'Product': 'Mobility - E-Lab Navigator', 'Versions': 'Versions 3.1.8 and 3.1.9'} |
CVE-2023-44279 |
Dell PowerProtect DD , versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A local high privileged attacker could potentially exploit this vulnerability, to bypass security restrictions. Exploitation may lead to a system take over by an attacker
| https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities | 2023-09-28T09:25:45.713Z | 2023-12-14T15:22:27.116Z | 2023-12-14T15:22:27.116Z | {'Vendor': 'Dell', 'Product': 'PowerProtect DD', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110'} |
CVE-2023-44150 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress.This issue affects Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress: from n/a through 4.13.2.
| https://patchstack.com/database/vulnerability/wp-user-avatar/wordpress-profilepress-plugin-4-13-2-sensitive-data-exposure-via-debug-log-vulnerability?_s_id=cve | 2023-09-26T07:47:31.222Z | 2023-11-30T14:50:35.916Z | 2023-11-30T14:50:35.916Z | {'Vendor': 'ProfilePress Membership Team', 'Product': 'Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress', 'Versions': 'n/a'} |
CVE-2023-44015 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the schedEndTime parameter in the setSchedWifi function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:42.872269 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44384 | Discourse-jira is a Discourse plugin allows Jira projects, issue types, fields and field options will be synced automatically. An administrator user can make an SSRF attack by setting the Jira URL to an arbitrary location and enabling the `discourse_jira_verbose_log` site setting. A moderator user could manipulate the request path to the Jira API, allowing them to perform arbitrary GET requests using the Jira API credentials, potentially with elevated permissions, used by the application. | https://github.com/discourse/discourse-jira/security/advisories/GHSA-pmv5-h2x6-35fh | 2023-09-28T17:56:32.612Z | 2023-10-06T17:15:57.596Z | 2023-10-06T17:15:57.596Z | {'Vendor': 'discourse', 'Product': 'discourse-jira', 'Versions': '<= f11be4c'} |
CVE-2023-44107 | Vulnerability of defects introduced in the design process in the screen projection module.Successful exploitation of this vulnerability may affect service availability and integrity. | https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540 | 2023-09-25T09:11:04.625Z | 2023-10-11T12:06:58.651Z | 2023-10-11T12:06:58.651Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.1.0'} |
CVE-2023-44042 | A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website header parameter. | https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1 | 2023-09-25T00:00:00 | 2023-09-26T00:00:00 | 2023-09-26T20:50:13.254445 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44392 | Garden provides automation for Kubernetes development and testing. Prior tov ersions 0.13.17 and 0.12.65, Garden has a dependency on the cryo library, which is vulnerable to code injection due to an insecure implementation of deserialization. Garden stores serialized objects using cryo in the Kubernetes `ConfigMap` resources prefixed with `test-result` and `run-result` to cache Garden test and run results. These `ConfigMaps` are stored either in the `garden-system` namespace or the configured user namespace. When a user invokes the command `garden test` or `garden run` objects stored in the `ConfigMap` are retrieved and deserialized. This can be used by an attacker with access to the Kubernetes cluster to store malicious objects in the `ConfigMap`, which can trigger a remote code execution on the users machine when cryo deserializes the object. In order to exploit this vulnerability, an attacker must have access to the Kubernetes cluster used to deploy garden remote environments. Further, a user must actively invoke either a `garden test` or `garden run` which has previously cached results. The issue has been patched in Garden versions `0.13.17` (Bonsai) and `0.12.65` (Acorn). Only Garden versions prior to these are vulnerable. No known workarounds are available. | https://github.com/garden-io/garden/security/advisories/GHSA-hm75-6vc9-8rpr | 2023-09-28T17:56:32.614Z | 2023-10-09T19:06:04.694Z | 2023-10-09T19:06:04.694Z | {'Vendor': 'garden-io', 'Product': 'garden', 'Versions': '< 0.12.65, >= 0.13.0, < 0.13.17'} |
CVE-2023-44238 | Cross-Site Request Forgery (CSRF) vulnerability in Joakim Ling Remove slug from custom post type plugin <= 1.0.3 versions. | https://patchstack.com/database/vulnerability/remove-slug-from-custom-post-type/wordpress-remove-slug-from-custom-post-type-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T07:57:52.427Z | 2023-10-09T09:57:11.398Z | 2023-10-09T09:57:11.398Z | {'Vendor': 'Joakim Ling', 'Product': 'Remove slug from custom post type', 'Versions': 'n/a'} |
CVE-2023-44111 | Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.625Z | 2023-10-11T11:59:01.687Z | 2023-10-11T11:59:01.687Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-44812 | Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the admin_redirect_url parameter of the user login function. | https://github.com/ahrixia/CVE-2023-44812 | 2023-10-02T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T20:03:12.811477 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44146 | Cross-Site Request Forgery (CSRF) vulnerability in Checkfront Inc. Checkfront Online Booking System plugin <= 3.6 versions. | https://patchstack.com/database/vulnerability/checkfront-wp-booking/wordpress-checkfront-online-booking-system-plugin-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-26T07:47:31.221Z | 2023-10-06T14:59:34.450Z | 2023-10-06T14:59:34.450Z | {'Vendor': 'Checkfront Inc.', 'Product': 'Checkfront Online Booking System', 'Versions': 'n/a'} |
CVE-2023-44214 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. | https://security-advisory.acronis.com/advisories/SEC-5902 | 2023-09-26T20:08:46.835Z | 2023-10-05T21:57:00.522Z | 2023-10-05T21:57:00.522Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-44351 | Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html | 2023-09-28T16:25:40.451Z | 2023-11-17T13:31:34.680Z | 2023-11-17T13:31:34.680Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-44078 | null | null | 2023-09-25T00:00:00 | null | 2023-10-30T13:29:24.282431 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44994 | Cross-Site Request Forgery (CSRF) vulnerability in Bainternet ShortCodes UI plugin <= 1.9.8 versions. | https://patchstack.com/database/vulnerability/shortcodes-ui/wordpress-shortcodes-ui-plugin-1-9-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T09:38:28.135Z | 2023-10-10T14:31:06.843Z | 2023-10-10T14:31:06.843Z | {'Vendor': 'Bainternet', 'Product': 'ShortCodes UI', 'Versions': 'n/a'} |
CVE-2023-44097 | Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.623Z | 2023-10-11T11:46:30.245Z | 2023-10-11T11:46:30.245Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 2.0.1'} |
CVE-2023-44243 | Cross-Site Request Forgery (CSRF) vulnerability in Dylan Blokhuis Instant CSS plugin <= 1.2.1 versions. | https://patchstack.com/database/vulnerability/instant-css/wordpress-instant-css-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T07:57:52.428Z | 2023-10-06T15:02:21.092Z | 2023-10-06T15:02:21.092Z | {'Vendor': 'Dylan Blokhuis', 'Product': 'Instant CSS', 'Versions': 'n/a'} |
CVE-2023-44306 |
Dell DM5500 contains a path traversal vulnerability in the appliance. A remote attacker with high privileges could potentially exploit this vulnerability to overwrite configuration files stored on the server filesystem.
| https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities | 2023-09-28T09:44:52.816Z | 2023-12-04T08:32:35.434Z | 2023-12-18T06:04:40.452Z | {'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'} |
CVE-2023-44185 |
An Improper Input Validation vulnerability in the routing protocol daemon (rpd) of Juniper Networks allows an attacker to cause a Denial of Service (DoS )to the device upon receiving and processing a specific malformed ISO VPN BGP UPDATE packet.
Continued receipt of this packet will cause a sustained Denial of Service condition.
This issue affects:
* Juniper Networks Junos OS:
* All versions prior to 20.4R3-S6;
* 21.1 versions prior to 21.1R3-S5;
* 21.2 versions prior to 21.2R3-S4;
* 21.3 versions prior to 21.3R3-S3;
* 21.4 versions prior to 21.4R3-S3;
* 22.1 versions prior to 22.1R2-S2, 22.1R3;
* 22.2 versions prior to 22.2R2-S1, 22.2R3;
* 22.3 versions prior to 22.3R1-S2, 22.3R2.
Juniper Networks Junos OS Evolved:
* All versions prior to 20.4R3-S6-EVO;
* 21.1-EVO version 21.1R1-EVO and later versions prior to 21.2R3-S4-EVO;
* 21.3-EVO versions prior to 21.3R3-S3-EVO;
* 21.4-EVO versions prior to 21.4R3-S3-EVO;
* 22.1-EVO versions prior to 22.1R3-EVO;
* 22.2-EVO versions prior to 22.2R2-S1-EVO, 22.2R3-EVO;
* 22.3-EVO versions prior to 22.3R1-S2-EVO, 22.3R2-EVO.
| https://supportportal.juniper.net/JSA73146 | 2023-09-26T19:30:27.953Z | 2023-10-12T23:02:53.740Z | 2023-10-12T23:02:53.740Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'} |
CVE-2023-44310 | Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page's "Name" text field. | https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310 | 2023-09-28T11:23:54.829Z | 2023-10-17T09:28:17.244Z | 2023-10-17T09:28:17.244Z | {'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.3.10.sp1, 7.4.13'} |
CVE-2023-44193 |
An Improper Release of Memory Before Removing Last Reference vulnerability in Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a local, low privileged attacker to cause an FPC crash, leading to Denial of Service (DoS).
On all Junos MX Series with MPC1 - MPC9, LC480, LC2101, MX10003, and MX80, when Connectivity-Fault-Management (CFM) is enabled in a VPLS scenario, and a specific LDP related command is run, an FPC will crash and reboot. Continued execution of this specific LDP command can lead to sustained Denial of Service condition.
This issue affects:
Juniper Networks Junos OS on MX Series:
* All versions prior to 20.4R3-S7;
* 21.1 versions prior to 21.1R3-S5;
* 21.2 versions prior to 21.2R3-S4;
* 21.3 versions prior to 21.3R3-S4;
* 21.4 versions prior to 21.4R3-S3;
* 22.1 versions prior to 22.1R3-S1;
* 22.2 versions prior to 22.2R2-S1, 22.2R3;
* 22.3 versions prior to 22.3R1-S2, 22.3R2.
| https://supportportal.juniper.net/JSA73157 | 2023-09-26T19:30:27.955Z | 2023-10-12T23:04:00.332Z | 2023-10-12T23:04:00.332Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'} |
CVE-2023-44469 | A Server-Side Request Forgery issue in the OpenID Connect Issuer in LemonLDAP::NG before 2.17.1 allows authenticated remote attackers to send GET requests to arbitrary URLs through the request_uri authorization parameter. This is similar to CVE-2020-10770. | https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2998 | 2023-09-29T00:00:00 | 2023-09-29T00:00:00 | 2023-10-08T18:06:24.190250 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.