CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-44486 | null | null | 2023-09-29T16:43:03.205Z | 2023-10-31T21:19:44.848Z | 2024-01-02T15:08:14.822Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44347 | Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/indesign/apsb23-55.html | 2023-09-28T16:25:40.450Z | 2023-11-16T10:11:16.856Z | 2023-11-16T10:11:16.856Z | {'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'} |
CVE-2023-44081 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-09-25T08:18:20.817Z | 2023-10-10T10:21:31.775Z | 2023-10-10T10:21:31.775Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'} |
CVE-2023-44828 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the CurrentPassword parameter in the CheckPasswdSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:42.307067 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44982 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina).This issue affects Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina): from n/a through 6.4.5.
| https://patchstack.com/database/vulnerability/wp-retina-2x/wordpress-wp-retina-2x-plugin-6-4-5-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | 2023-10-02T09:38:08.906Z | 2023-12-19T00:03:30.190Z | 2023-12-19T00:03:30.190Z | {'Vendor': 'Jordy Meow', 'Product': 'Perfect Images (Manage Image Sizes, Thumbnails, Replace, Retina)', 'Versions': 'n/a'} |
CVE-2023-44019 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the mac parameter in the GetParentControlInfo function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/5/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:46.743361 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44330 | Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/photoshop/apsb23-56.html | 2023-09-28T16:25:40.448Z | 2023-11-16T14:27:28.497Z | 2023-12-05T08:57:03.636Z | {'Vendor': 'Adobe', 'Product': 'Photoshop Desktop', 'Versions': '0'} |
CVE-2023-44760 | Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics. NOTE: the vendor disputes this because these header/footer changes can only be made by an admin, and allowing an admin to place JavaScript there is an intentional customization feature. Also, the exploitation method claimed by "sromanhu" does not provide any access to a Concrete CMS session, because the Concrete CMS session cookie is configured as HttpOnly. | https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes | 2023-10-02T00:00:00 | 2023-10-23T00:00:00 | 2023-11-15T21:41:41.055941 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44275 | OPNsense before 23.7.5 allows XSS via the index.php column_count parameter to the Lobby Dashboard. | https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense | 2023-09-28T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T04:24:35.043030 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44808 | D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the sub_4507CC function. | https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md | 2023-10-02T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T05:40:41.987178 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44367 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.454Z | 2023-11-16T09:52:44.714Z | 2023-11-16T09:52:44.714Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44388 | Discourse is an open source platform for community discussion. A malicious request can cause production log files to quickly fill up and thus result in the server running out of disk space. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 versions of Discourse. It is possible to temporarily work around this problem by reducing the `client_max_body_size nginx directive`. `client_max_body_size` will limit the size of uploads that can be uploaded directly to the server. | https://github.com/discourse/discourse/security/advisories/GHSA-89h3-g746-xmwq | 2023-09-28T17:56:32.613Z | 2023-10-16T21:11:26.719Z | 2023-10-16T21:11:26.719Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable <= 3.1.1, beta <= 3.2.0.beta2'} |
CVE-2023-44371 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.455Z | 2023-11-16T09:52:50.364Z | 2023-11-16T09:52:50.364Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44326 | Adobe Dimension versions 3.4.9 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-62.html | 2023-09-28T16:25:40.448Z | 2023-11-17T08:49:46.970Z | 2023-11-17T08:49:46.970Z | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': '0'} |
CVE-2023-44263 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Riyaz Social Metrics plugin <= 2.2 versions. | https://patchstack.com/database/vulnerability/social-metrics/wordpress-social-metrics-plugin-2-2-cross-site-scripting-xss?_s_id=cve | 2023-09-27T12:39:26.100Z | 2023-10-02T09:37:30.112Z | 2023-10-02T09:37:30.112Z | {'Vendor': 'Riyaz', 'Product': 'Social Metrics', 'Versions': 'n/a'} |
CVE-2023-44832 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the MacAddress parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:39.034632 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44998 | Cross-Site Request Forgery (CSRF) vulnerability in josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom Category Meta plugin plugin <= 1.2.8 versions. | https://patchstack.com/database/vulnerability/wp-category-meta/wordpress-category-meta-plugin-1-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T09:38:28.136Z | 2023-10-12T12:10:05.270Z | 2023-10-12T12:10:05.270Z | {'Vendor': 'josecoelho, Randy Hoyt, steveclarkcouk, Vitaliy Kukin, Eric Le Bail, Tom Ransom', 'Product': 'Category Meta plugin', 'Versions': 'n/a'} |
CVE-2023-44218 |
A flaw within the SonicWall NetExtender Pre-Logon feature enables an unauthorized user to gain access to the host Windows operating system with 'SYSTEM' level privileges, leading to a local privilege escalation (LPE) vulnerability.
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0014 | 2023-09-26T23:29:39.789Z | 2023-10-03T08:00:04.401Z | 2023-10-03T08:00:04.401Z | {'Vendor': 'SonicWall', 'Product': 'NetExtender', 'Versions': '10.2.336 and earlier versions'} |
CVE-2023-44189 |
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device.
This issue affects Juniper Networks Junos OS Evolved on PTX10003 Series:
* All versions prior to 21.4R3-S4-EVO;
* 22.1 versions prior to 22.1R3-S3-EVO;
* 22.2 version 22.2R1-EVO and later versions;
* 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
* 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;
* 23.2 versions prior to 23.2R2-EVO.
| https://supportportal.juniper.net/JSA73153 | 2023-09-26T19:30:27.953Z | 2023-10-11T21:00:54.637Z | 2023-10-11T21:10:46.791Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 22.1, 22.2R1-EVO, 22.3, 22.4, 23.2'} |
CVE-2023-44473 | Cross-Site Request Forgery (CSRF) vulnerability in Michael Tran Table of Contents Plus plugin <= 2302 versions. | https://patchstack.com/database/vulnerability/table-of-contents-plus/wordpress-table-of-contents-plus-plugin-2302-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-29T14:00:23.568Z | 2023-10-09T10:08:47.756Z | 2023-10-09T10:08:47.756Z | {'Vendor': 'Michael Tran', 'Product': 'Table of Contents Plus', 'Versions': 'n/a'} |
CVE-2023-44023 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:50.405061 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44166 | The 'age' parameter of the process_registration.php resource
does not validate the characters received and they
are sent unfiltered to the database.
| https://fluidattacks.com/advisories/starr | 2023-09-26T15:21:50.713Z | 2023-09-28T21:51:51.812Z | 2023-09-28T21:51:51.812Z | {'Vendor': 'Online Movie Ticket Booking System', 'Product': 'Online Movie Ticket Booking System', 'Versions': '1.0'} |
CVE-2023-44170 | SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ping.php. | https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf | 2023-09-26T00:00:00 | 2023-09-26T00:00:00 | 2023-09-26T16:54:13.950900 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44259 | Cross-Site Request Forgery (CSRF) vulnerability in Mediavine Mediavine Control Panel plugin <= 2.10.2 versions. | https://patchstack.com/database/vulnerability/mediavine-control-panel/wordpress-mediavine-control-panel-plugin-2-10-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T12:39:26.099Z | 2023-10-10T08:59:38.357Z | 2023-10-10T08:59:48.671Z | {'Vendor': 'Mediavine', 'Product': 'Mediavine Control Panel', 'Versions': 'n/a'} |
CVE-2023-44961 | SQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows a remote attacker to obtain sensitive information via the intranet/cgi bin/cataloging/ysearch.pl. component. | https://github.com/ggb0n/CVE-2023-44961 | 2023-10-02T00:00:00 | 2023-10-11T00:00:00 | 2023-10-11T18:16:10.976431 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44824 | An issue in Expense Management System v.1.0 allows a local attacker to execute arbitrary code via a crafted file uploaded to the sign-up.php component. | https://abstracted-howler-727.notion.site/Vulnerability-Description-ccc2e6489a0d43859c61a7982e649da1 | 2023-10-02T00:00:00 | 2023-10-17T00:00:00 | 2023-10-30T21:57:11.076433 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44127 | he vulnerability is that the Call management ("com.android.server.telecom") app patched by LG launches implicit intents that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as contact details and phone numbers. | https://lgsecurity.lge.com/bulletins/mobile#updateDetails | 2023-09-26T05:57:13.719Z | 2023-09-27T14:05:24.523Z | 2023-09-27T14:05:24.523Z | {'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 8'} |
CVE-2023-44276 | OPNsense before 23.7.5 allows XSS via the index.php sequence parameter to the Lobby Dashboard. | https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense | 2023-09-28T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T04:24:45.468009 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44333 | Adobe Photoshop versions 24.7.1 (and earlier) and 25.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/photoshop/apsb23-56.html | 2023-09-28T16:25:40.449Z | 2023-11-16T14:27:32.073Z | 2023-11-16T14:27:32.073Z | {'Vendor': 'Adobe', 'Product': 'Photoshop Desktop', 'Versions': '0'} |
CVE-2023-44763 | Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration. | https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail | 2023-10-02T00:00:00 | 2023-10-10T00:00:00 | 2023-10-26T03:43:28.356648 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44108 | Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.625Z | 2023-10-11T12:08:10.395Z | 2023-10-11T12:08:10.395Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-44221 | Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018 | 2023-09-26T23:29:39.790Z | 2023-12-05T20:10:35.186Z | 2023-12-05T20:10:35.186Z | {'Vendor': 'SonicWall', 'Product': 'SMA100', 'Versions': '10.2.1.9-57sv and earlier versions'} |
CVE-2023-44237 | Cross-Site Request Forgery (CSRF) vulnerability in Moriyan Jay WP Site Protector plugin <= 2.0 versions. | https://patchstack.com/database/vulnerability/wp-site-protector/wordpress-wp-site-protector-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T07:57:52.427Z | 2023-10-09T09:42:52.193Z | 2023-10-09T09:42:52.193Z | {'Vendor': 'Moriyan Jay', 'Product': 'WP Site Protector', 'Versions': 'n/a'} |
CVE-2023-44372 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.455Z | 2023-11-16T09:52:42.757Z | 2023-11-16T09:52:42.757Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44260 | Cross-Site Request Forgery (CSRF) vulnerability in Mikk Mihkel Nurges, Rebing OÜ Woocommerce ESTO plugin <= 2.23.1 versions. | https://patchstack.com/database/vulnerability/woo-esto/wordpress-woocommerce-esto-plugin-2-23-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T12:39:26.099Z | 2023-10-09T08:35:06.821Z | 2023-10-09T08:35:06.821Z | {'Vendor': 'Mikk Mihkel Nurges, Rebing OÜ', 'Product': 'Woocommerce ESTO', 'Versions': 'n/a'} |
CVE-2023-44325 | Adobe Animate versions 23.0.2 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/animate/apsb23-61.html | 2023-09-28T16:25:40.448Z | 2023-11-17T08:26:35.746Z | 2023-11-17T08:26:35.746Z | {'Vendor': 'Adobe', 'Product': 'Animate', 'Versions': '0'} |
CVE-2023-44831 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Type parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-05T00:00:00 | 2023-10-05T16:00:39.704575 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44098 | Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/11/ | 2023-09-25T09:11:04.623Z | 2023-11-08T09:02:05.173Z | 2023-11-08T09:02:05.173Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1'} |
CVE-2023-44077 | Studio Network Solutions ShareBrowser before 7.0 on macOS mishandles signature verification, aka PMP-2636. | https://support.studionetworksolutions.com/hc/en-us/articles/22494658980244-ShareBrowser-v-7-0-Released | 2023-09-25T00:00:00 | 2024-01-17T00:00:00 | 2024-01-17T19:59:30.800794 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44974 | An arbitrary file upload vulnerability in the component /admin/plugin.php of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. | https://github.com/yangliukk/emlog/blob/main/Plugin-getshell.md | 2023-10-02T00:00:00 | 2023-10-03T00:00:00 | 2023-10-03T20:09:46.442015 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44165 | null | null | 2023-09-26T15:21:50.713Z | 2023-09-28T21:48:38.838Z | 2024-01-02T21:49:59.743Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44470 | Cross-Site Request Forgery (CSRF) vulnerability in Kvvaradha Kv TinyMCE Editor Add Fonts plugin <= 1.1 versions. | https://patchstack.com/database/vulnerability/kv-tinymce-editor-fonts/wordpress-kv-tinymce-editor-add-fonts-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-29T14:00:23.568Z | 2023-10-10T13:59:01.385Z | 2023-10-10T13:59:01.385Z | {'Vendor': 'Kvvaradha', 'Product': 'Kv TinyMCE Editor Add Fonts', 'Versions': 'n/a'} |
CVE-2023-44020 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the security parameter in the formWifiBasicSet function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:47.538290 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44309 | Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset. | https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309 | 2023-09-28T11:23:54.829Z | 2023-10-17T08:23:27.403Z | 2023-10-17T08:23:27.403Z | {'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.4.13'} |
CVE-2023-44173 | Online Movie Ticket Booking System v1.0 is vulnerable to
an authenticated Reflected Cross-Site Scripting vulnerability.
| https://fluidattacks.com/advisories/harrison | 2023-09-26T17:33:21.242Z | 2023-09-28T20:55:48.677Z | 2023-09-28T20:55:48.677Z | {'Vendor': 'Online Movie Ticket Booking System', 'Product': 'Online Movie Ticket Booking System', 'Versions': '1.0'} |
CVE-2023-44466 | An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32. | https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph | 2023-09-29T00:00:00 | 2023-09-29T00:00:00 | 2023-11-16T15:07:05.929296 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44124 | The vulnerability is to theft of arbitrary files with system privilege in the Screen recording ("com.lge.gametools.gamerecorder") app in the "com/lge/gametools/gamerecorder/settings/ProfilePreferenceFragment.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The Screen recording app saves contents of arbitrary URIs to SD card which is a world-readable storage. | https://lgsecurity.lge.com/bulletins/mobile#updateDetails | 2023-09-26T05:57:13.269Z | 2023-09-27T13:55:26.031Z | 2023-09-27T13:55:26.031Z | {'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 12, 13'} |
CVE-2023-44827 | An issue in ZenTao Community Edition v.18.6 and before, ZenTao Biz v.8.6 and before, ZenTao Max v.4.7 and before allows an attacker to execute arbitrary code via a crafted script to the Office Conversion Settings function. | https://spotted-topaz-6aa.notion.site/Zentao-Authorized-Remote-Code-Execution-Vulnerability-CVE-2023-44827-be731cbe8607496cae35c08cb9ba2436 | 2023-10-02T00:00:00 | 2023-10-10T00:00:00 | 2023-10-10T02:19:59.557088 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44962 | File Upload vulnerability in Koha Library Software 23.05.04 and before allows a remote attacker to read arbitrary files via the upload-cover-image.pl component. | https://github.com/ggb0n/CVE-2023-44962 | 2023-10-02T00:00:00 | 2023-10-11T00:00:00 | 2023-10-11T18:32:51.779629 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44061 | File Upload vulnerability in Simple and Nice Shopping Cart Script v.1.0 allows a remote attacker to execute arbitrary code via the upload function in the edit profile component. | https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md | 2023-09-25T00:00:00 | 2023-10-06T00:00:00 | 2023-10-06T22:21:23.276447 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44348 | Adobe Acrobat Reader versions 23.006.20360 (and earlier) and 20.005.30524 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-54.htm | 2023-09-28T16:25:40.451Z | 2023-11-16T09:52:58.486Z | 2023-12-04T15:51:26.674Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-44295 |
Dell PowerScale OneFS versions 8.2.2.x through 9.6.0.x contains an improper control of a resource through its lifetime vulnerability. A low privilege attacker could potentially exploit this vulnerability, leading to loss of information, and information disclosure.
| https://www.dell.com/support/kbdoc/en-us/000219932/dsa-2023-417-dell-powerscale-onefs-security-updates-for-multiple-security-vulnerabilities | 2023-09-28T09:32:10.186Z | 2023-12-05T05:41:26.725Z | 2023-12-05T05:41:26.725Z | {'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': 'Version 8.2.2.x through 9.6.0.x'} |
CVE-2023-44016 | Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the deviceId parameter in the addWifiMacFilter function. | https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md | 2023-09-25T00:00:00 | 2023-09-27T00:00:00 | 2023-09-27T13:33:43.755184 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44153 | Sensitive information disclosure due to cleartext storage of sensitive information in memory. The following products are affected: Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-1994 | 2023-09-26T13:09:58.802Z | 2023-09-27T12:00:09.210Z | 2023-09-27T12:00:09.210Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect 15', 'Versions': 'unspecified'} |
CVE-2023-44387 | Gradle is a build tool with a focus on build automation and support for multi-language development. When copying or archiving symlinked files, Gradle resolves them but applies the permissions of the symlink itself instead of the permissions of the linked file to the resulting file. This leads to files having too much permissions given that symlinks usually are world readable and writeable. While it is unlikely this results in a direct vulnerability for the impacted build, it may open up attack vectors depending on where build artifacts end up being copied to or un-archived. In versions 7.6.3, 8.4 and above, Gradle will now properly use the permissions of the file pointed at by the symlink to set permissions of the copied or archived file. | https://github.com/gradle/gradle/security/advisories/GHSA-43r3-pqhv-f7h9 | 2023-09-28T17:56:32.613Z | 2023-10-05T17:51:15.407Z | 2023-10-05T17:51:15.407Z | {'Vendor': 'gradle', 'Product': 'gradle', 'Versions': '>= 7.6.0, < 7.6.3, < 8.4.0'} |
CVE-2023-44104 | Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.624Z | 2023-10-11T11:52:52.971Z | 2023-10-11T11:52:52.971Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-44807 | D-Link DIR-820L 1.05B03 has a stack overflow vulnerability in the cancelPing function. | https://www.dlink.com/en/security-bulletin/ | 2023-10-02T00:00:00 | 2023-10-06T00:00:00 | 2023-10-06T16:51:09.562620 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44391 | Discourse is an open source platform for community discussion. User summaries are accessible for anonymous users even when `hide_user_profiles_from_public` is enabled. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/discourse/discourse/security/advisories/GHSA-7px5-fqcf-7mfr | 2023-09-28T17:56:32.613Z | 2023-10-16T21:22:24.719Z | 2023-10-16T21:22:24.719Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable <= 3.1.1, beta <= 3.2.0.beta2'} |
CVE-2023-44954 | Cross Site Scripting vulnerability in BigTree CMS v.4.5.7 allows a remote attacker to execute arbitrary code via the ID parameter in the Developer Settings functions. | https://www.bigtreecms.org/download/core/ | 2023-10-02T00:00:00 | 2023-11-01T00:00:00 | 2023-11-01T22:16:20.010212 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44811 | Cross Site Request Forgery (CSRF) vulnerability in MooSocial v.3.1.8 allows a remote attacker to execute arbitrary code and obtain sensitive information via the admin Password Change Function. | https://github.com/ahrixia/CVE-2023-44811 | 2023-10-02T00:00:00 | 2023-10-09T00:00:00 | 2023-10-09T19:59:34.277941 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44112 | Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality. | https://consumer.huawei.com/en/support/bulletin/2024/1/ | 2023-09-25T09:11:04.625Z | 2024-01-16T08:00:06.992Z | 2024-01-16T08:00:06.992Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-44796 | Cross Site Scripting (XSS) vulnerability in LimeSurvey before version 6.2.9-230925 allows a remote attacker to escalate privileges via a crafted script to the _generaloptions_panel.php component. | https://github.com/LimeSurvey/LimeSurvey/pull/3483 | 2023-10-02T00:00:00 | 2023-11-17T00:00:00 | 2024-01-10T02:06:22.858305 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44329 | Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/bridge/apsb23-57.html | 2023-09-28T16:25:40.448Z | 2023-11-16T14:32:46.016Z | 2023-12-04T15:42:57.637Z | {'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'} |
CVE-2023-44000 | An issue in Otakara lapis totuka mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. | https://github.com/syz913/CVE-reports/blob/main/CVE-2023-44000.md | 2023-09-25T00:00:00 | 2024-01-24T00:00:00 | 2024-01-24T09:40:30.112567 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44145 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in jesweb.Dev Anchor Episodes Index (Spotify for Podcasters) plugin <= 2.1.7 versions. | https://patchstack.com/database/vulnerability/anchor-episodes-index/wordpress-anchor-episodes-index-spotify-for-podcasters-plugin-2-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-26T07:47:31.221Z | 2023-10-02T09:49:37.487Z | 2023-10-02T09:49:37.487Z | {'Vendor': 'jesweb.dev', 'Product': 'Anchor Episodes Index (Spotify for Podcasters)', 'Versions': 'n/a'} |
CVE-2023-44846 | An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ notify.php component. | https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501 | 2023-10-02T00:00:00 | 2023-10-10T00:00:00 | 2023-10-10T00:36:31.681288 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44352 | Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html | 2023-09-28T16:25:40.451Z | 2023-11-17T13:31:31.903Z | 2023-11-17T13:31:31.903Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-44217 |
A local privilege escalation vulnerability in SonicWall Net Extender MSI client for Windows 10.2.336 and earlier versions allows a local low-privileged user to gain system privileges through running repair functionality.
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0013 | 2023-09-26T23:29:39.789Z | 2023-10-03T07:54:14.937Z | 2023-10-03T07:54:14.937Z | {'Vendor': 'SonicWall', 'Product': 'NetExtender', 'Versions': '10.2.336 and earlier versions'} |
CVE-2023-44094 | Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.623Z | 2023-10-11T10:43:24.196Z | 2023-10-11T10:43:24.196Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-44997 | Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha plugin <= 4.1 versions. | https://patchstack.com/database/vulnerability/wp-forms-puzzle-captcha/wordpress-wp-forms-puzzle-captcha-plugin-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T09:38:28.135Z | 2023-10-11T07:57:45.140Z | 2023-10-11T07:57:45.140Z | {'Vendor': 'Nitin Rathod', 'Product': 'WP Forms Puzzle Captcha', 'Versions': 'n/a'} |
CVE-2023-44305 |
Dell DM5500 5.14.0.0, contains a Stack-based Buffer Overflow Vulnerability in the appliance. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending specially crafted input data.
| https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities | 2023-09-28T09:44:52.816Z | 2023-12-04T08:25:57.337Z | 2023-12-18T06:03:24.933Z | {'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'} |
CVE-2023-44240 | Cross-Site Request Forgery (CSRF) vulnerability in Peter Butler Timthumb Vulnerability Scanner plugin <= 1.54 versions. | https://patchstack.com/database/vulnerability/timthumb-vulnerability-scanner/wordpress-timthumb-vulnerability-scanner-plugin-1-54-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T07:57:52.427Z | 2023-10-09T10:05:02.895Z | 2023-10-09T10:05:02.895Z | {'Vendor': 'Peter Butler', 'Product': 'Timthumb Vulnerability Scanner', 'Versions': 'n/a'} |
CVE-2023-44169 | SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_notify.php. | https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20file%20write%20vulnerability.pdf | 2023-09-26T00:00:00 | 2023-09-26T00:00:00 | 2023-09-26T16:54:12.923242 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44186 |
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.
This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.
Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability.
This issue affects:
Juniper Networks Junos OS:
* All versions prior to 20.4R3-S8;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S6;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S5;
* 22.1 versions prior to 22.1R3-S4;
* 22.2 versions prior to 22.2R3-S2;
* 22.3 versions prior to 22.3R2-S2, 22.3R3-S1;
* 22.4 versions prior to 22.4R2-S1, 22.4R3;
* 23.2 versions prior to 23.2R2.
Juniper Networks Junos OS Evolved
* All versions prior to 20.4R3-S8-EVO;
* 21.1 versions 21.1R1-EVO and later;
* 21.2 versions prior to 21.2R3-S6-EVO;
* 21.3 versions prior to 21.3R3-S5-EVO;
* 21.4 versions prior to 21.4R3-S5-EVO;
* 22.1 versions prior to 22.1R3-S4-EVO;
* 22.2 versions prior to 22.2R3-S2-EVO;
* 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
* 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;
* 23.2 versions prior to 23.2R2-EVO.
| https://supportportal.juniper.net/JSA73150 | 2023-09-26T19:30:27.953Z | 2023-10-11T20:08:26.308Z | 2023-10-16T20:20:42.773Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4, 23.2'} |
CVE-2023-44256 | A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request. | https://fortiguard.com/psirt/FG-IR-19-039 | 2023-09-27T12:26:48.751Z | 2023-10-20T09:04:52.906Z | 2023-10-20T09:04:52.906Z | {'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.4.0, 7.2.0, 7.0.2, 6.4.8'} |
CVE-2023-44485 | null | null | 2023-09-29T16:43:03.205Z | 2023-10-31T21:14:37.563Z | 2024-01-02T15:07:42.804Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44190 |
An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016 devices allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. Due to this issue, the router will start forwarding traffic if a valid route is present in forwarding-table, causing a loop and congestion in the downstream layer-2 domain connected to the device.
This issue affects Juniper Networks Junos OS Evolved on PTX10001, PTX10004, PTX10008, and PTX10016:
* All versions prior to 21.4R3-S5-EVO;
* 22.1 versions prior to 22.1R3-S4-EVO;
* 22.2 versions 22.2R1-EVO and later;
* 22.3 versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
* 22.4 versions prior to 22.4R2-S1-EVO, 22.4R3-EVO;
* 23.2 versions prior to 23.2R1-S1-EVO, 23.2R2-EVO.
| https://supportportal.juniper.net/JSA73154 | 2023-09-26T19:30:27.953Z | 2023-10-11T21:04:01.884Z | 2023-10-11T21:11:10.663Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 22.1, 22.2R1-EVO, 22.3, 22.4, 23.2'} |
CVE-2023-44344 | Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/indesign/apsb23-55.html | 2023-09-28T16:25:40.450Z | 2023-11-16T10:11:19.676Z | 2023-11-16T10:11:19.676Z | {'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'} |
CVE-2023-44201 |
An Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Juniper Networks Junos OS and Junos OS Evolved allows a local authenticated attacker to read configuration changes without having the permissions.
When a user with the respective permissions commits a configuration change, a specific file is created. That file is readable even by users with no permissions to access the configuration. This can lead to privilege escalation as the user can read the password hash when a password change is being committed.
This issue affects:
Juniper Networks Junos OS
* All versions prior to 20.4R3-S4;
* 21.1 versions prior to 21.1R3-S4;
* 21.2 versions prior to 21.2R3-S2;
* 21.3 versions prior to 21.3R2-S2, 21.3R3-S1;
* 21.4 versions prior to 21.4R2-S1, 21.4R3.
Juniper Networks Junos OS Evolved
* All versions prior to 20.4R3-S4-EVO;
* 21.1 versions prior to 21.1R3-S2-EVO;
* 21.2 versions prior to 21.2R3-S2-EVO;
* 21.3 versions prior to 21.3R3-S1-EVO;
* 21.4 versions prior to 21.4R2-S2-EVO.
| https://supprtportal.juniper.net/JSA73167 | 2023-09-26T19:30:32.350Z | 2023-10-12T23:06:03.943Z | 2023-10-12T23:06:03.943Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4'} |
CVE-2023-44981 | Authorization Bypass Through User-Controlled Key vulnerability in Apache ZooKeeper. If SASL Quorum Peer authentication is enabled in ZooKeeper (quorum.auth.enableSasl=true), the authorization is done by verifying that the instance part in SASL authentication ID is listed in zoo.cfg server list. The instance part in SASL auth ID is optional and if it's missing, like '[email protected]', the authorization check will be skipped. As a result an arbitrary endpoint could join the cluster and begin propagating counterfeit changes to the leader, essentially giving it complete read-write access to the data tree. Quorum Peer authentication is not enabled by default.
Users are recommended to upgrade to version 3.9.1, 3.8.3, 3.7.2, which fixes the issue.
Alternately ensure the ensemble election/quorum communication is protected by a firewall as this will mitigate the issue.
See the documentation for more details on correct cluster administration.
| https://lists.apache.org/thread/wf0yrk84dg1942z1o74kd8nycg6pgm5b | 2023-10-02T08:44:58.183Z | 2023-10-11T11:55:47.925Z | 2023-10-11T11:55:47.925Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache ZooKeeper', 'Versions': '3.9.0, 3.8.0, 3.7.0, 0'} |
CVE-2023-44128 | he vulnerability is to delete arbitrary files in LGInstallService ("com.lge.lginstallservies") app. The app contains the exported "com.lge.lginstallservies.InstallService" service that exposes an AIDL interface. All its "installPackage*" methods are finally calling the "installPackageVerify()" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted. | https://lgsecurity.lge.com/bulletins/mobile#updateDetails | 2023-09-26T05:57:13.719Z | 2023-09-27T14:08:51.040Z | 2023-09-27T14:13:34.358Z | {'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 4'} |
CVE-2023-44082 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-09-25T08:18:20.817Z | 2023-10-10T10:21:32.863Z | 2023-10-10T10:21:32.863Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'} |
CVE-2023-44129 | The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set. | https://lgsecurity.lge.com/bulletins/mobile#updateDetails | 2023-09-26T05:57:13.719Z | 2023-09-27T14:10:56.347Z | 2023-09-27T14:10:56.347Z | {'Vendor': 'LG Electronics', 'Product': 'LG V60 Thin Q 5G(LMV600VM)', 'Versions': 'Android 12'} |
CVE-2023-44083 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-09-25T08:18:20.817Z | 2023-10-10T10:21:34.659Z | 2023-10-10T10:21:34.659Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'} |
CVE-2023-44345 | Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/indesign/apsb23-55.html | 2023-09-28T16:25:40.450Z | 2023-11-16T10:11:20.455Z | 2023-11-16T10:11:20.455Z | {'Vendor': 'Adobe', 'Product': 'InDesign Desktop', 'Versions': '0'} |
CVE-2023-44484 | Online Blood Donation Management System v1.0 is vulnerable to a Stored Cross-Site Scripting vulnerability. The 'firstName' parameter of the users/register.php resource is copied into the users/member.php document as plain text between tags. Any input is echoed unmodified in the users/member.php response. | https://fluidattacks.com/advisories/carpenter/ | 2023-09-29T16:43:03.204Z | 2023-10-31T21:09:22.667Z | 2024-01-02T15:12:37.655Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Blood Donation Management System', 'Versions': '1.0'} |
CVE-2023-44191 |
An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).
On all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured, a specific DHCP packet will cause PFE hogging which will lead to dropping of socket connections.
This issue affects:
Juniper Networks Junos OS on QFX5000 Series and EX4000 Series
* 21.1 versions prior to 21.1R3-S5;
* 21.2 versions prior to 21.2R3-S5;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S4;
* 22.1 versions prior to 22.1R3-S3;
* 22.2 versions prior to 22.2R3-S1;
* 22.3 versions prior to 22.3R2-S2, 22.3R3;
* 22.4 versions prior to 22.4R2.
This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1
| https://supportportal.juniper.net/JSA73155 | 2023-09-26T19:30:27.953Z | 2023-10-12T23:03:20.746Z | 2023-10-12T23:03:20.746Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '0, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'} |
CVE-2023-44257 | Cross-Site Request Forgery (CSRF) vulnerability in Hometory Mang Board WP plugin <= 1.7.6 versions. | https://patchstack.com/database/vulnerability/mangboard/wordpress-mang-board-wp-plugin-1-7-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T12:39:26.099Z | 2023-10-10T08:56:36.819Z | 2023-10-10T08:56:36.819Z | {'Vendor': 'Hometory', 'Product': 'Mang Board WP', 'Versions': 'n/a'} |
CVE-2023-44168 | null | null | 2023-09-26T15:21:50.714Z | 2023-09-28T21:55:31.951Z | 2024-01-02T21:52:13.275Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-44187 | An Exposure of Sensitive Information vulnerability in the 'file copy' command of Junos OS Evolved allows a local, authenticated attacker with shell access to view passwords supplied on the CLI command-line. These credentials can then be used to provide unauthorized access to the remote system.
This issue affects Juniper Networks Junos OS Evolved:
* All versions prior to 20.4R3-S7-EVO;
* 21.1 versions 21.1R1-EVO and later;
* 21.2 versions prior to 21.2R3-S5-EVO;
* 21.3 versions prior to 21.3R3-S4-EVO;
* 21.4 versions prior to 21.4R3-S4-EVO;
* 22.1 versions prior to 22.1R3-S2-EVO;
* 22.2 versions prior to 22.2R2-EVO.
| https://supportportal.juniper.net/JSA73151 | 2023-09-26T19:30:27.953Z | 2023-10-11T20:37:23.379Z | 2023-10-11T21:09:50.294Z | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': '0, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2'} |
CVE-2023-44304 |
Dell DM5500 contains a privilege escalation vulnerability in the appliance. A remote attacker with low privileges could potentially exploit this vulnerability to escape the restricted shell and gain root access to the appliance.
| https://www.dell.com/support/kbdoc/en-us/000220107/dsa-2023-425-security-update-for-dell-powerprotect-data-manager-dm5500-appliance-for-multiple-vulnerabilities | 2023-09-28T09:44:52.816Z | 2023-12-04T08:19:09.994Z | 2023-12-18T06:01:54.513Z | {'Vendor': 'Dell', 'Product': 'Dell PowerProtect Data Manager DM5500 Appliance', 'Versions': 'DM5500 5.14 and below'} |
CVE-2023-44241 | Cross-Site Request Forgery (CSRF) vulnerability in Keap Keap Landing Pages plugin <= 1.4.2 versions. | https://patchstack.com/database/vulnerability/infusionsoft-landing-pages/wordpress-keap-landing-pages-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-27T07:57:52.428Z | 2023-10-10T13:56:08.611Z | 2023-10-10T13:56:08.611Z | {'Vendor': 'Keap', 'Product': 'Keap Landing Pages', 'Versions': 'n/a'} |
CVE-2023-44095 | Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash. | https://consumer.huawei.com/en/support/bulletin/2023/10/ | 2023-09-25T09:11:04.623Z | 2023-10-11T11:44:10.955Z | 2023-10-11T11:44:10.955Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.0.1'} |
CVE-2023-44996 | Cross-Site Request Forgery (CSRF) vulnerability in Naresh Parmar Post View Count plugin <= 1.8.2 versions. | https://patchstack.com/database/vulnerability/wp-simple-post-view/wordpress-post-view-count-plugin-1-8-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-02T09:38:28.135Z | 2023-10-10T15:50:17.715Z | 2023-10-10T15:50:17.715Z | {'Vendor': 'Naresh Parmar', 'Product': 'Post View Count', 'Versions': 'n/a'} |
CVE-2023-44353 | Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html | 2023-09-28T16:25:40.452Z | 2023-11-17T13:31:31.132Z | 2023-11-17T13:31:31.132Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-44216 | PVRIC (PowerVR Image Compression) on Imagination 2018 and later GPU devices offers software-transparent compression that enables cross-origin pixel-stealing attacks against feTurbulence and feBlend in the SVG Filter specification, aka a GPU.zip issue. For example, attackers can sometimes accurately determine text contained on a web page from one origin if they control a resource from a different origin. | https://www.hertzbleed.com/gpu.zip/ | 2023-09-26T00:00:00 | 2023-09-26T00:00:00 | 2023-10-03T04:46:57.617853 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44001 | An issue in Ailand clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. | https://github.com/syz913/CVE-reports/blob/main/CVE-2023-44001.md | 2023-09-25T00:00:00 | 2024-01-24T00:00:00 | 2024-01-24T09:40:36.640157 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44144 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dreamfox Payment gateway per Product for WooCommerce plugin <= 3.2.7 versions. | https://patchstack.com/database/vulnerability/woocommerce-product-payments/wordpress-payment-gateway-per-product-for-woocommerce-plugin-3-2-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-26T07:47:31.220Z | 2023-10-02T09:43:00.906Z | 2023-10-02T09:43:00.906Z | {'Vendor': 'Dreamfox', 'Product': 'Payment gateway per Product for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-44847 | An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code via the admin_ Weixin.php component. | https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502 | 2023-10-02T00:00:00 | 2023-10-10T00:00:00 | 2023-10-10T00:36:35.028951 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-44328 | Adobe Bridge versions 13.0.4 (and earlier) and 14.0.0 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/bridge/apsb23-57.html | 2023-09-28T16:25:40.448Z | 2023-11-16T14:32:44.846Z | 2023-12-04T15:48:44.521Z | {'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.