CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-44486
null
null
2023-09-29T16:43:03.205Z
2023-10-31T21:19:44.848Z
2024-01-02T15:08:14.822Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44347
Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-55.html
2023-09-28T16:25:40.450Z
2023-11-16T10:11:16.856Z
2023-11-16T10:11:16.856Z
{'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'}
CVE-2023-44081
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-09-25T08:18:20.817Z
2023-10-10T10:21:31.775Z
2023-10-10T10:21:31.775Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'}
CVE-2023-44828
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the CurrentPassword parameter in the CheckPasswdSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:42.307067
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44982
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina).This issue affects Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina): from n/a through 6.4.5.
https://patchstack.com/database/vulnerability/wp-retina-2x/wordpress-wp-retina-2x-plugin-6-4-5-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
2023-10-02T09:38:08.906Z
2023-12-19T00:03:30.190Z
2023-12-19T00:03:30.190Z
{'Vendor': 'Jordy Meow', 'Product': 'Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina)', 'Versions': 'n/a'}
CVE-2023-44019
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the mac parameter in the GetParentControlInfo function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/5/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:46.743361
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44330
Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/photoshop/apsb23-56.html
2023-09-28T16:25:40.448Z
2023-11-16T14:27:28.497Z
2023-12-05T08:57:03.636Z
{'Vendor': 'Adobe', 'Product': 'Photoshop Desktop', 'Versions': '0'}
CVE-2023-44760
Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics. NOTE: the vendor disputes this because these header/footer changes can only be made by an admin, and allowing an admin to place JavaScript there is an intentional customization feature. Also, the exploitation method claimed by "sromanhu" does not provide any access to a Concrete CMS session, because the Concrete CMS session cookie is configured as HttpOnly.
https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes
2023-10-02T00:00:00
2023-10-23T00:00:00
2023-11-15T21:41:41.055941
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44275
OPNsense before 23.7.5 allows XSS via the index.php column_count parameter to the Lobby Dashboard.
https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense
2023-09-28T00:00:00
2023-09-28T00:00:00
2023-09-28T04:24:35.043030
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44808
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_4507CC function.
https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md
2023-10-02T00:00:00
2023-10-16T00:00:00
2023-10-16T05:40:41.987178
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44367
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.454Z
2023-11-16T09:52:44.714Z
2023-11-16T09:52:44.714Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44388
Discourse is an open source platform for community discussion. A malicious request can cause production log files to quickly fill up and thus result in the server running out of disk space. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. It is possible to temporarily work around this problem by reducing the `client_max_body_size nginx directive`. `client_max_body_size` will limit the size of uploads that can be uploaded directly to the server.
https://github.com/discourse/discourse/security/advisories/GHSA-89h3-g746-xmwq
2023-09-28T17:56:32.613Z
2023-10-16T21:11:26.719Z
2023-10-16T21:11:26.719Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable <= 3.1.1, beta <= 3.2.0.beta2'}
CVE-2023-44371
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.455Z
2023-11-16T09:52:50.364Z
2023-11-16T09:52:50.364Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44326
Adobe Dimension versions 3.4.9 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-62.html
2023-09-28T16:25:40.448Z
2023-11-17T08:49:46.970Z
2023-11-17T08:49:46.970Z
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': '0'}
CVE-2023-44263
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Riyaz Social Metrics plugin <= 2.2 versions.
https://patchstack.com/database/vulnerability/social-metrics/wordpress-social-metrics-plugin-2-2-cross-site-scripting-xss?_s_id=cve
2023-09-27T12:39:26.100Z
2023-10-02T09:37:30.112Z
2023-10-02T09:37:30.112Z
{'Vendor': 'Riyaz', 'Product': 'Social Metrics', 'Versions': 'n/a'}
CVE-2023-44832
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the MacAddress parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:39.034632
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44998
Cross-Site Request Forgery (CSRF) vulnerability in josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom Category Meta plugin plugin <= 1.2.8 versions.
https://patchstack.com/database/vulnerability/wp-category-meta/wordpress-category-meta-plugin-1-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T09:38:28.136Z
2023-10-12T12:10:05.270Z
2023-10-12T12:10:05.270Z
{'Vendor': 'josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom', 'Product': 'Category Meta plugin', 'Versions': 'n/a'}
CVE-2023-44218
A flaw within the SonicWall NetExtender Pre-Logon feature enables an unauthorized user to gain access to the host Windows operating system with 'SYSTEM' level privileges, leading to a local privilege escalation (LPE) vulnerability.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0014
2023-09-26T23:29:39.789Z
2023-10-03T08:00:04.401Z
2023-10-03T08:00:04.401Z
{'Vendor': 'SonicWall', 'Product': 'NetExtender', 'Versions': '10.2.336 and earlier versions'}
CVE-2023-44189
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device. This issue affects Juniper Networks Junos OS Evolved on PTX10003 Series: * All versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S3-EVO; * 22.2 version 22.2R1-EVO and later versions; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R2-EVO.
https://supportportal.juniper.net/JSA73153
2023-09-26T19:30:27.953Z
2023-10-11T21:00:54.637Z
2023-10-11T21:10:46.791Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 22.1, 22.2R1-EVO, 22.3, 22.4, 23.2'}
CVE-2023-44473
Cross-Site Request Forgery (CSRF) vulnerability in Michael Tran Table of Contents Plus plugin <= 2302 versions.
https://patchstack.com/database/vulnerability/table-of-contents-plus/wordpress-table-of-contents-plus-plugin-2302-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-29T14:00:23.568Z
2023-10-09T10:08:47.756Z
2023-10-09T10:08:47.756Z
{'Vendor': 'Michael Tran', 'Product': 'Table of Contents Plus', 'Versions': 'n/a'}
CVE-2023-44023
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:50.405061
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44166
The 'age' parameter of the process_registration.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/starr
2023-09-26T15:21:50.713Z
2023-09-28T21:51:51.812Z
2023-09-28T21:51:51.812Z
{'Vendor': 'Online Movie Ticket Booking System', 'Product': 'Online Movie Ticket Booking System', 'Versions': '1.0'}
CVE-2023-44170
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ping.php.
https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf
2023-09-26T00:00:00
2023-09-26T00:00:00
2023-09-26T16:54:13.950900
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44259
Cross-Site Request Forgery (CSRF) vulnerability in Mediavine Mediavine Control Panel plugin <= 2.10.2 versions.
https://patchstack.com/database/vulnerability/mediavine-control-panel/wordpress-mediavine-control-panel-plugin-2-10-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T12:39:26.099Z
2023-10-10T08:59:38.357Z
2023-10-10T08:59:48.671Z
{'Vendor': 'Mediavine', 'Product': 'Mediavine Control Panel', 'Versions': 'n/a'}
CVE-2023-44961
SQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows a remote attacker to obtain sensitive information via the intranet/cgi bin/cataloging/ysearch.pl. component.
https://github.com/ggb0n/CVE-2023-44961
2023-10-02T00:00:00
2023-10-11T00:00:00
2023-10-11T18:16:10.976431
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44824
An issue in Expense Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted file uploaded to the sign-up.php component.
https://abstracted-howler-727.notion.site/Vulnerability-Description-ccc2e6489a0d43859c61a7982e649da1
2023-10-02T00:00:00
2023-10-17T00:00:00
2023-10-30T21:57:11.076433
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44127
he vulnerability is that the Call management ("com.android.server.telecom") app patched by LG launches implicit intents that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as contact details and phone numbers.
https://lgsecurity.lge.com/bulletins/mobile#updateDetails
2023-09-26T05:57:13.719Z
2023-09-27T14:05:24.523Z
2023-09-27T14:05:24.523Z
{'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 8'}
CVE-2023-44276
OPNsense before 23.7.5 allows XSS via the index.php sequence parameter to the Lobby Dashboard.
https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense
2023-09-28T00:00:00
2023-09-28T00:00:00
2023-09-28T04:24:45.468009
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44333
Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/photoshop/apsb23-56.html
2023-09-28T16:25:40.449Z
2023-11-16T14:27:32.073Z
2023-11-16T14:27:32.073Z
{'Vendor': 'Adobe', 'Product': 'Photoshop Desktop', 'Versions': '0'}
CVE-2023-44763
Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.
https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail
2023-10-02T00:00:00
2023-10-10T00:00:00
2023-10-26T03:43:28.356648
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44108
Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.625Z
2023-10-11T12:08:10.395Z
2023-10-11T12:08:10.395Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-44221
Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018
2023-09-26T23:29:39.790Z
2023-12-05T20:10:35.186Z
2023-12-05T20:10:35.186Z
{'Vendor': 'SonicWall', 'Product': 'SMA100', 'Versions': '10.2.1.9-57sv and earlier versions'}
CVE-2023-44237
Cross-Site Request Forgery (CSRF) vulnerability in Moriyan Jay WP Site Protector plugin <= 2.0 versions.
https://patchstack.com/database/vulnerability/wp-site-protector/wordpress-wp-site-protector-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T07:57:52.427Z
2023-10-09T09:42:52.193Z
2023-10-09T09:42:52.193Z
{'Vendor': 'Moriyan Jay', 'Product': 'WP Site Protector', 'Versions': 'n/a'}
CVE-2023-44372
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.455Z
2023-11-16T09:52:42.757Z
2023-11-16T09:52:42.757Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44260
Cross-Site Request Forgery (CSRF) vulnerability in Mikk Mihkel Nurges, Rebing OÜ Woocommerce ESTO plugin <= 2.23.1 versions.
https://patchstack.com/database/vulnerability/woo-esto/wordpress-woocommerce-esto-plugin-2-23-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T12:39:26.099Z
2023-10-09T08:35:06.821Z
2023-10-09T08:35:06.821Z
{'Vendor': 'Mikk Mihkel Nurges, Rebing OÜ', 'Product': 'Woocommerce ESTO', 'Versions': 'n/a'}
CVE-2023-44325
Adobe Animate versions 23.0.2 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/animate/apsb23-61.html
2023-09-28T16:25:40.448Z
2023-11-17T08:26:35.746Z
2023-11-17T08:26:35.746Z
{'Vendor': 'Adobe', 'Product': 'Animate', 'Versions': '0'}
CVE-2023-44831
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Type parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-05T00:00:00
2023-10-05T16:00:39.704575
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44098
Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/11/
2023-09-25T09:11:04.623Z
2023-11-08T09:02:05.173Z
2023-11-08T09:02:05.173Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1'}
CVE-2023-44077
Studio Network Solutions ShareBrowser before 7.0 on macOS mishandles signature verification, aka PMP-2636.
https://support.studionetworksolutions.com/hc/en-us/articles/22494658980244-ShareBrowser-v-7-0-Released
2023-09-25T00:00:00
2024-01-17T00:00:00
2024-01-17T19:59:30.800794
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44974
An arbitrary file upload vulnerability in the component /admin/plugin.php of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
https://github.com/yangliukk/emlog/blob/main/Plugin-getshell.md
2023-10-02T00:00:00
2023-10-03T00:00:00
2023-10-03T20:09:46.442015
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44165
null
null
2023-09-26T15:21:50.713Z
2023-09-28T21:48:38.838Z
2024-01-02T21:49:59.743Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44470
Cross-Site Request Forgery (CSRF) vulnerability in Kvvaradha Kv TinyMCE Editor Add Fonts plugin <= 1.1 versions.
https://patchstack.com/database/vulnerability/kv-tinymce-editor-fonts/wordpress-kv-tinymce-editor-add-fonts-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-29T14:00:23.568Z
2023-10-10T13:59:01.385Z
2023-10-10T13:59:01.385Z
{'Vendor': 'Kvvaradha', 'Product': 'Kv TinyMCE Editor Add Fonts', 'Versions': 'n/a'}
CVE-2023-44020
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the security parameter in the formWifiBasicSet function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:47.538290
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44309
Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset.
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309
2023-09-28T11:23:54.829Z
2023-10-17T08:23:27.403Z
2023-10-17T08:23:27.403Z
{'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.4.13'}
CVE-2023-44173
Online Movie Ticket Booking System v1.0 is vulnerable to an authenticated Reflected Cross-Site Scripting vulnerability.
https://fluidattacks.com/advisories/harrison
2023-09-26T17:33:21.242Z
2023-09-28T20:55:48.677Z
2023-09-28T20:55:48.677Z
{'Vendor': 'Online Movie Ticket Booking System', 'Product': 'Online Movie Ticket Booking System', 'Versions': '1.0'}
CVE-2023-44466
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph
2023-09-29T00:00:00
2023-09-29T00:00:00
2023-11-16T15:07:05.929296
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44124
The vulnerability is to theft of arbitrary files with system privilege in the Screen recording ("com.lge.gametools.gamerecorder") app in the "com/lge/gametools/gamerecorder/settings/ProfilePreferenceFragment.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The Screen recording app saves contents of arbitrary URIs to SD card which is a world-readable storage.
https://lgsecurity.lge.com/bulletins/mobile#updateDetails
2023-09-26T05:57:13.269Z
2023-09-27T13:55:26.031Z
2023-09-27T13:55:26.031Z
{'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 12, 13'}
CVE-2023-44827
An issue in ZenTao Community Edition v.18.6 and before, ZenTao Biz v.8.6 and before, ZenTao Max v.4.7 and before allows an attacker to execute arbitrary code via a crafted script to the Office Conversion Settings function.
https://spotted-topaz-6aa.notion.site/Zentao-Authorized-Remote-Code-Execution-Vulnerability-CVE-2023-44827-be731cbe8607496cae35c08cb9ba2436
2023-10-02T00:00:00
2023-10-10T00:00:00
2023-10-10T02:19:59.557088
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44962
File Upload vulnerability in Koha Library Software 23.05.04 and before allows a remote attacker to read arbitrary files via the upload-cover-image.pl component.
https://github.com/ggb0n/CVE-2023-44962
2023-10-02T00:00:00
2023-10-11T00:00:00
2023-10-11T18:32:51.779629
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44061
File Upload vulnerability in Simple and Nice Shopping Cart Script v.1.0 allows a remote attacker to execute arbitrary code via the upload function in the edit profile component.
https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md
2023-09-25T00:00:00
2023-10-06T00:00:00
2023-10-06T22:21:23.276447
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44348
Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm
2023-09-28T16:25:40.451Z
2023-11-16T09:52:58.486Z
2023-12-04T15:51:26.674Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-44295
Dell PowerScale OneFS versions 8.2.2.x through 9.6.0.x contains an improper control of a resource through its lifetime vulnerability. A low privilege attacker could potentially exploit this vulnerability, leading to loss of information, and information disclosure.
https://www.dell.com/support/kbdoc/en-us/000219932/dsa-2023-417-dell-powerscale-onefs-security-updates-for-multiple-security-vulnerabilities
2023-09-28T09:32:10.186Z
2023-12-05T05:41:26.725Z
2023-12-05T05:41:26.725Z
{'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': 'Version 8.2.2.x through 9.6.0.x'}
CVE-2023-44016
Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the deviceId parameter in the addWifiMacFilter function.
https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md
2023-09-25T00:00:00
2023-09-27T00:00:00
2023-09-27T13:33:43.755184
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44153
Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-1994
2023-09-26T13:09:58.802Z
2023-09-27T12:00:09.210Z
2023-09-27T12:00:09.210Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'}
CVE-2023-44387
Gradle is a build tool with a focus on build automation and support for multi-language development. When copying or archiving symlinked files, Gradle resolves them but applies the permissions of the symlink itself instead of the permissions of the linked file to the resulting file. This leads to files having too much permissions given that symlinks usually are world readable and writeable. While it is unlikely this results in a direct vulnerability for the impacted build, it may open up attack vectors depending on where build artifacts end up being copied to or un-archived. In versions 7.6.3, 8.4 and above, Gradle will now properly use the permissions of the file pointed at by the symlink to set permissions of the copied or archived file.
https://github.com/gradle/gradle/security/advisories/GHSA-43r3-pqhv-f7h9
2023-09-28T17:56:32.613Z
2023-10-05T17:51:15.407Z
2023-10-05T17:51:15.407Z
{'Vendor': 'gradle', 'Product': 'gradle', 'Versions': '>= 7.6.0, < 7.6.3, < 8.4.0'}
CVE-2023-44104
Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.624Z
2023-10-11T11:52:52.971Z
2023-10-11T11:52:52.971Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-44807
D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the cancelPing function.
https://www.dlink.com/en/security-bulletin/
2023-10-02T00:00:00
2023-10-06T00:00:00
2023-10-06T16:51:09.562620
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44391
Discourse is an open source platform for community discussion. User summaries are accessible for anonymous users even when `hide_user_profiles_from_public` is enabled. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/discourse/discourse/security/advisories/GHSA-7px5-fqcf-7mfr
2023-09-28T17:56:32.613Z
2023-10-16T21:22:24.719Z
2023-10-16T21:22:24.719Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable <= 3.1.1, beta <= 3.2.0.beta2'}
CVE-2023-44954
Cross Site Scripting vulnerability in BigTree CMS v.4.5.7 allows a remote attacker to execute arbitrary code via the ID parameter in the Developer Settings functions.
https://www.bigtreecms.org/download/core/
2023-10-02T00:00:00
2023-11-01T00:00:00
2023-11-01T22:16:20.010212
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44811
Cross Site Request Forgery (CSRF) vulnerability in MooSocial v.3.1.8 allows a remote attacker to execute arbitrary code and obtain sensitive information via the admin Password Change Function.
https://github.com/ahrixia/CVE-2023-44811
2023-10-02T00:00:00
2023-10-09T00:00:00
2023-10-09T19:59:34.277941
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44112
Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality.
https://consumer.huawei.com/en/support/bulletin/2024/1/
2023-09-25T09:11:04.625Z
2024-01-16T08:00:06.992Z
2024-01-16T08:00:06.992Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-44796
Cross Site Scripting (XSS) vulnerability in LimeSurvey before version 6.2.9-230925 allows a remote attacker to escalate privileges via a crafted script to the _generaloptions_panel.php component.
https://github.com/LimeSurvey/LimeSurvey/pull/3483
2023-10-02T00:00:00
2023-11-17T00:00:00
2024-01-10T02:06:22.858305
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44329
Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/bridge/apsb23-57.html
2023-09-28T16:25:40.448Z
2023-11-16T14:32:46.016Z
2023-12-04T15:42:57.637Z
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}
CVE-2023-44000
An issue in Otakara lapis totuka mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/CVE-2023-44000.md
2023-09-25T00:00:00
2024-01-24T00:00:00
2024-01-24T09:40:30.112567
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44145
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in jesweb.Dev Anchor Episodes Index (Spotify for Podcasters) plugin <= 2.1.7 versions.
https://patchstack.com/database/vulnerability/anchor-episodes-index/wordpress-anchor-episodes-index-spotify-for-podcasters-plugin-2-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-26T07:47:31.221Z
2023-10-02T09:49:37.487Z
2023-10-02T09:49:37.487Z
{'Vendor': 'jesweb.dev', 'Product': 'Anchor Episodes Index (Spotify for Podcasters)', 'Versions': 'n/a'}
CVE-2023-44846
An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ notify.php component.
https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501
2023-10-02T00:00:00
2023-10-10T00:00:00
2023-10-10T00:36:31.681288
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44352
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html
2023-09-28T16:25:40.451Z
2023-11-17T13:31:31.903Z
2023-11-17T13:31:31.903Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-44217
A local privilege escalation vulnerability in SonicWall Net Extender MSI client for Windows 10.2.336 and earlier versions allows a local low-privileged user to gain system privileges through running repair functionality.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0013
2023-09-26T23:29:39.789Z
2023-10-03T07:54:14.937Z
2023-10-03T07:54:14.937Z
{'Vendor': 'SonicWall', 'Product': 'NetExtender', 'Versions': '10.2.336 and earlier versions'}
CVE-2023-44094
Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.623Z
2023-10-11T10:43:24.196Z
2023-10-11T10:43:24.196Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-44997
Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha plugin <= 4.1 versions.
https://patchstack.com/database/vulnerability/wp-forms-puzzle-captcha/wordpress-wp-forms-puzzle-captcha-plugin-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T09:38:28.135Z
2023-10-11T07:57:45.140Z
2023-10-11T07:57:45.140Z
{'Vendor': 'Nitin Rathod', 'Product': 'WP Forms Puzzle Captcha', 'Versions': 'n/a'}
CVE-2023-44305
Dell DM5500 5.14.0.0, contains a Stack-based Buffer Overflow Vulnerability in the appliance. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending specially crafted input data.
https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities
2023-09-28T09:44:52.816Z
2023-12-04T08:25:57.337Z
2023-12-18T06:03:24.933Z
{'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'}
CVE-2023-44240
Cross-Site Request Forgery (CSRF) vulnerability in Peter Butler Timthumb Vulnerability Scanner plugin <= 1.54 versions.
https://patchstack.com/database/vulnerability/timthumb-vulnerability-scanner/wordpress-timthumb-vulnerability-scanner-plugin-1-54-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T07:57:52.427Z
2023-10-09T10:05:02.895Z
2023-10-09T10:05:02.895Z
{'Vendor': 'Peter Butler', 'Product': 'Timthumb Vulnerability Scanner', 'Versions': 'n/a'}
CVE-2023-44169
SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_notify.php.
https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf
2023-09-26T00:00:00
2023-09-26T00:00:00
2023-09-26T16:54:12.923242
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44186
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition. This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor. Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability. This issue affects: Juniper Networks Junos OS: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; * 22.4 versions prior to 22.4R2-S1, 22.4R3; * 23.2 versions prior to 23.2R2. Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S8-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S6-EVO; * 21.3 versions prior to 21.3R3-S5-EVO; * 21.4 versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions prior to 22.2R3-S2-EVO; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R2-EVO.
https://supportportal.juniper.net/JSA73150
2023-09-26T19:30:27.953Z
2023-10-11T20:08:26.308Z
2023-10-16T20:20:42.773Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4, 23.2'}
CVE-2023-44256
A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.
https://fortiguard.com/psirt/FG-IR-19-039
2023-09-27T12:26:48.751Z
2023-10-20T09:04:52.906Z
2023-10-20T09:04:52.906Z
{'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.4.0, 7.2.0, 7.0.2, 6.4.8'}
CVE-2023-44485
null
null
2023-09-29T16:43:03.205Z
2023-10-31T21:14:37.563Z
2024-01-02T15:07:42.804Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44190
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device. This issue affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016: * All versions prior to 21.4R3-S5-EVO; * 22.1 versions prior to 22.1R3-S4-EVO; * 22.2 versions 22.2R1-EVO and later; * 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO; * 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO; * 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO.
https://supportportal.juniper.net/JSA73154
2023-09-26T19:30:27.953Z
2023-10-11T21:04:01.884Z
2023-10-11T21:11:10.663Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 22.1, 22.2R1-EVO, 22.3, 22.4, 23.2'}
CVE-2023-44344
Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-55.html
2023-09-28T16:25:40.450Z
2023-11-16T10:11:19.676Z
2023-11-16T10:11:19.676Z
{'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'}
CVE-2023-44201
An Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Juniper Networks Junos OS and Junos OS Evolved allows a local authenticated attacker to read configuration changes without having the permissions. When a user with the respective permissions commits a configuration change, a specific file is created. That file is readable even by users with no permissions to access the configuration. This can lead to privilege escalation as the user can read the password hash when a password change is being committed. This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S4; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S2; * 21.3 versions prior to 21.3R2-S2, 21.3R3-S1; * 21.4 versions prior to 21.4R2-S1, 21.4R3. Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S4-EVO; * 21.1 versions prior to 21.1R3-S2-EVO; * 21.2 versions prior to 21.2R3-S2-EVO; * 21.3 versions prior to 21.3R3-S1-EVO; * 21.4 versions prior to 21.4R2-S2-EVO.
https://supprtportal.juniper.net/JSA73167
2023-09-26T19:30:32.350Z
2023-10-12T23:06:03.943Z
2023-10-12T23:06:03.943Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4'}
CVE-2023-44981
Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like '[email protected]', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default. Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue. Alternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue. See the documentation for more details on correct cluster administration.
https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b
2023-10-02T08:44:58.183Z
2023-10-11T11:55:47.925Z
2023-10-11T11:55:47.925Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache ZooKeeper', 'Versions': '3.9.0, 3.8.0, 3.7.0, 0'}
CVE-2023-44128
he vulnerability is to delete arbitrary files in LGInstallService ("com.lge.lginstallservies") app. The app contains the exported "com.lge.lginstallservies.InstallService" service that exposes an AIDL interface. All its "installPackage*" methods are finally calling the "installPackageVerify()" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.
https://lgsecurity.lge.com/bulletins/mobile#updateDetails
2023-09-26T05:57:13.719Z
2023-09-27T14:08:51.040Z
2023-09-27T14:13:34.358Z
{'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 4'}
CVE-2023-44082
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-09-25T08:18:20.817Z
2023-10-10T10:21:32.863Z
2023-10-10T10:21:32.863Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'}
CVE-2023-44129
The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
https://lgsecurity.lge.com/bulletins/mobile#updateDetails
2023-09-26T05:57:13.719Z
2023-09-27T14:10:56.347Z
2023-09-27T14:10:56.347Z
{'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 12'}
CVE-2023-44083
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-09-25T08:18:20.817Z
2023-10-10T10:21:34.659Z
2023-10-10T10:21:34.659Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'}
CVE-2023-44345
Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-55.html
2023-09-28T16:25:40.450Z
2023-11-16T10:11:20.455Z
2023-11-16T10:11:20.455Z
{'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'}
CVE-2023-44484
Online Blood Donation Management System v1.0 is vulnerable to a Stored Cross-Site Scripting vulnerability. The 'firstName' parameter of the users/register.php resource is copied into the users/member.php document as plain text between tags. Any input is echoed unmodified in the users/member.php response.
https://fluidattacks.com/advisories/carpenter/
2023-09-29T16:43:03.204Z
2023-10-31T21:09:22.667Z
2024-01-02T15:12:37.655Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Blood Donation Management System', 'Versions': '1.0'}
CVE-2023-44191
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). On all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured, a specific DHCP packet will cause PFE hogging which will lead to dropping of socket connections. This issue affects: Juniper Networks Junos OS on QFX5000 Series and EX4000 Series * 21.1 versions prior to 21.1R3-S5; * 21.2 versions prior to 21.2R3-S5; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S4; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S1; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1
https://supportportal.juniper.net/JSA73155
2023-09-26T19:30:27.953Z
2023-10-12T23:03:20.746Z
2023-10-12T23:03:20.746Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'}
CVE-2023-44257
Cross-Site Request Forgery (CSRF) vulnerability in Hometory Mang Board WP plugin <= 1.7.6 versions.
https://patchstack.com/database/vulnerability/mangboard/wordpress-mang-board-wp-plugin-1-7-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T12:39:26.099Z
2023-10-10T08:56:36.819Z
2023-10-10T08:56:36.819Z
{'Vendor': 'Hometory', 'Product': 'Mang Board WP', 'Versions': 'n/a'}
CVE-2023-44168
null
null
2023-09-26T15:21:50.714Z
2023-09-28T21:55:31.951Z
2024-01-02T21:52:13.275Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-44187
An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system. This issue affects Juniper Networks Junos OS Evolved: * All versions prior to 20.4R3-S7-EVO; * 21.1 versions 21.1R1-EVO and later; * 21.2 versions prior to 21.2R3-S5-EVO; * 21.3 versions prior to 21.3R3-S4-EVO; * 21.4 versions prior to 21.4R3-S4-EVO; * 22.1 versions prior to 22.1R3-S2-EVO; * 22.2 versions prior to 22.2R2-EVO.
https://supportportal.juniper.net/JSA73151
2023-09-26T19:30:27.953Z
2023-10-11T20:37:23.379Z
2023-10-11T21:09:50.294Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2'}
CVE-2023-44304
Dell DM5500 contains a privilege escalation vulnerability in the appliance. A remote attacker with low privileges could potentially exploit this vulnerability to escape the restricted shell and gain root access to the appliance.
https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities
2023-09-28T09:44:52.816Z
2023-12-04T08:19:09.994Z
2023-12-18T06:01:54.513Z
{'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'}
CVE-2023-44241
Cross-Site Request Forgery (CSRF) vulnerability in Keap Keap Landing Pages plugin <= 1.4.2 versions.
https://patchstack.com/database/vulnerability/infusionsoft-landing-pages/wordpress-keap-landing-pages-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-27T07:57:52.428Z
2023-10-10T13:56:08.611Z
2023-10-10T13:56:08.611Z
{'Vendor': 'Keap', 'Product': 'Keap Landing Pages', 'Versions': 'n/a'}
CVE-2023-44095
Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash.
https://consumer.huawei.com/en/support/bulletin/2023/10/
2023-09-25T09:11:04.623Z
2023-10-11T11:44:10.955Z
2023-10-11T11:44:10.955Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.0.1'}
CVE-2023-44996
Cross-Site Request Forgery (CSRF) vulnerability in Naresh Parmar Post View Count plugin <= 1.8.2 versions.
https://patchstack.com/database/vulnerability/wp-simple-post-view/wordpress-post-view-count-plugin-1-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-02T09:38:28.135Z
2023-10-10T15:50:17.715Z
2023-10-10T15:50:17.715Z
{'Vendor': 'Naresh Parmar', 'Product': 'Post View Count', 'Versions': 'n/a'}
CVE-2023-44353
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html
2023-09-28T16:25:40.452Z
2023-11-17T13:31:31.132Z
2023-11-17T13:31:31.132Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-44216
PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin.
https://www.hertzbleed.com/gpu.zip/
2023-09-26T00:00:00
2023-09-26T00:00:00
2023-10-03T04:46:57.617853
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44001
An issue in Ailand clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/CVE-2023-44001.md
2023-09-25T00:00:00
2024-01-24T00:00:00
2024-01-24T09:40:36.640157
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44144
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dreamfox Payment gateway per Product for WooCommerce plugin <= 3.2.7 versions.
https://patchstack.com/database/vulnerability/woocommerce-product-payments/wordpress-payment-gateway-per-product-for-woocommerce-plugin-3-2-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-26T07:47:31.220Z
2023-10-02T09:43:00.906Z
2023-10-02T09:43:00.906Z
{'Vendor': 'Dreamfox', 'Product': 'Payment gateway per Product for WooCommerce', 'Versions': 'n/a'}
CVE-2023-44847
An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ Weixin.php component.
https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
2023-10-02T00:00:00
2023-10-10T00:00:00
2023-10-10T00:36:35.028951
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-44328
Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/bridge/apsb23-57.html
2023-09-28T16:25:40.448Z
2023-11-16T14:32:44.846Z
2023-12-04T15:48:44.521Z
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}