CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-48685
|
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'psd' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/barenboim/
|
2023-11-17T17:00:26.198Z
|
2023-12-21T20:11:22.062Z
|
2023-12-21T20:11:22.062Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Railway Reservation System', 'Versions': '1.0'}
|
CVE-2023-48056
|
PyPinkSign v0.5.1 uses a non-random or static IV for Cipher Block Chaining (CBC) mode in AES encryption. This vulnerability can lead to the disclosure of information and communications.
|
http://bandoche.com
|
2023-11-13T00:00:00
|
2023-11-16T00:00:00
|
2023-11-16T17:16:52.226214
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48406
|
there is a possible permanent DoS or way for the modem to boot unverified firmware due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:08:52.676Z
|
2023-12-08T15:41:14.448Z
|
2023-12-08T15:41:14.448Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48810
|
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
|
https://www.notion.so/X6000R-sub_4119A0-7-d5387bf8d16846c2b4f19b15a808aa4c?pvs=4
|
2023-11-20T00:00:00
|
2023-11-30T00:00:00
|
2023-11-30T17:53:59.304014
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48543
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.387Z
|
2023-12-15T10:17:30.159Z
|
2023-12-15T10:17:30.159Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48754
|
Cross-Site Request Forgery (CSRF) vulnerability in Wap Nepal Delete Post Revisions In WordPress allows Cross Site Request Forgery.This issue affects Delete Post Revisions In WordPress: from n/a through 4.6.
|
https://patchstack.com/database/vulnerability/delete-post-revisions-on-single-click/wordpress-delete-post-revisions-in-wordpress-plugin-4-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-18T22:10:05.376Z
|
2023-11-30T16:02:53.544Z
|
2023-11-30T16:02:53.544Z
|
{'Vendor': 'Wap Nepal', 'Product': 'Delete Post Revisions In WordPress', 'Versions': 'n/a'}
|
CVE-2023-48304
|
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8jwv-c8c8-9fr3
|
2023-11-14T17:41:15.571Z
|
2023-11-21T22:06:00.484Z
|
2023-11-21T22:06:00.484Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.11, >= 26.0.0, < 26.0.6, >= 27.0.0, < 27.1.0, >= 22.0.0, < 22.2.10.16, >= 23.0.0, < 23.0.12.11, >= 24.0.0, < 24.0.12.7'}
|
CVE-2023-48611
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.402Z
|
2023-12-15T10:16:04.073Z
|
2023-12-15T10:16:04.073Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48241
|
XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 14.10.15, 15.5.1, and 15.6RC1, the Solr-based search suggestion provider that also duplicates as generic JavaScript API for search results in XWiki exposes the content of all documents of all wikis to anybody who has access to it, by default it is public. This exposes all information stored in the wiki (but not some protected information like password hashes). While there is a right check normally, the right check can be circumvented by explicitly requesting fields from Solr that don't include the data for the right check. This has been fixed in XWiki 15.6RC1, 15.5.1 and 14.10.15 by not listing documents whose rights cannot be checked. No known workarounds are available.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7fqr-97j7-jgf4
|
2023-11-13T13:25:18.482Z
|
2023-11-20T17:58:54.651Z
|
2023-11-20T17:58:54.651Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 6.3-milestone-2, < 14.10.15, >= 15.0-rc-1, < 15.5.1'}
|
CVE-2023-48492
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.375Z
|
2023-12-15T10:15:26.300Z
|
2023-12-15T10:15:26.300Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48538
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.386Z
|
2023-12-15T10:17:47.060Z
|
2023-12-15T10:17:47.060Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48353
|
In vsp driver, there is a possible use after free due to a logic error. This could lead to local denial of service with System execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.391Z
|
2024-01-18T02:44:52.799Z
|
2024-01-18T02:44:52.799Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
|
CVE-2023-48646
|
Zoho ManageEngine RecoveryManager Plus before 6070 allows admin users to execute arbitrary commands via proxy settings.
|
https://www.manageengine.com/ad-recovery-manager/advisory/CVE-2023-48646.html
|
2023-11-17T00:00:00
|
2023-11-22T00:00:00
|
2023-11-22T17:45:08.635466
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48580
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.393Z
|
2023-12-15T10:16:21.139Z
|
2023-12-15T10:16:21.139Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48715
|
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 or Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue.
|
https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68
|
2023-11-17T19:43:37.555Z
|
2023-12-11T18:40:10.936Z
|
2023-12-11T18:40:10.936Z
|
{'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': '< 15.2.99.103, >= 15.2, < 15.2-4, < 15.1-8'}
|
CVE-2023-48345
|
In video decoder, there is a possible out of bounds read due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.390Z
|
2024-01-18T02:44:50.813Z
|
2024-01-18T02:44:50.813Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
|
CVE-2023-48650
|
Concrete CMS before 8.5.14 and 9 before 9.2.3 is vulnerable to an admin adding a stored XSS payload via the Layout Preset name.
|
https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes
|
2023-11-17T00:00:00
|
2023-12-25T00:00:00
|
2023-12-25T18:55:37.249636
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48200
|
Cross Site Scripting vulnerability in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the equipment description component within /equipment/ component.
|
https://github.com/grocy/grocy
|
2023-11-13T00:00:00
|
2023-11-15T00:00:00
|
2023-11-15T22:18:34.096950
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48129
|
An issue in kimono-oldnew mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
https://github.com/syz913/CVE-reports/blob/main/kimono-oldnew.md
|
2023-11-13T00:00:00
|
2024-01-26T00:00:00
|
2024-01-26T07:12:00.649903
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48579
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.393Z
|
2023-12-15T10:16:45.184Z
|
2023-12-15T10:16:45.184Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48596
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.399Z
|
2023-12-15T10:16:34.852Z
|
2023-12-15T10:16:34.852Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48312
|
capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.
|
https://github.com/projectcapsule/capsule-proxy/security/advisories/GHSA-fpvw-6m5v-hqfp
|
2023-11-14T17:41:15.573Z
|
2023-11-24T17:12:39.652Z
|
2023-11-24T17:12:39.652Z
|
{'Vendor': 'projectcapsule', 'Product': 'capsule-proxy', 'Versions': '< 0.4.6'}
|
CVE-2023-48742
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LicenseManager License Manager for WooCommerce license-manager-for-woocommerce allows SQL Injection.This issue affects License Manager for WooCommerce: from n/a through 2.2.10.
|
https://patchstack.com/database/vulnerability/license-manager-for-woocommerce/wordpress-license-manager-for-woocommerce-plugin-2-2-10-sql-injection-vulnerability?_s_id=cve
|
2023-11-18T22:09:33.698Z
|
2023-11-30T14:07:09.841Z
|
2023-11-30T14:07:09.841Z
|
{'Vendor': 'LicenseManager', 'Product': 'License Manager for WooCommerce', 'Versions': 'n/a'}
|
CVE-2023-48257
|
The vulnerability allows a remote attacker to access sensitive data inside exported packages or obtain up to Remote Code Execution (RCE) with root privileges on the device. The vulnerability can be exploited directly by authenticated users, via crafted HTTP requests, or indirectly by unauthenticated users, by accessing already-exported backup packages, or crafting an import package and inducing an authenticated victim into sending the HTTP upload request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.705Z
|
2024-01-10T13:04:36.606Z
|
2024-01-10T13:04:36.606Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48607
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.401Z
|
2023-12-15T10:17:50.094Z
|
2023-12-15T10:17:50.094Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48484
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.373Z
|
2023-12-15T10:15:34.109Z
|
2023-12-15T10:15:34.109Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48109
|
Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow via the deviceId parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack
|
http://tjr181.com/index.php/archives/13/
|
2023-11-13T00:00:00
|
2023-11-20T00:00:00
|
2023-11-20T20:03:06.647776
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48559
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.390Z
|
2023-12-15T10:17:14.739Z
|
2023-12-15T10:17:14.739Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48670
|
Dell SupportAssist for Home PCs version 3.14.1 and prior versions contain a privilege escalation vulnerability in the installer. A local low privileged authenticated attacker may potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with elevated privileges.
|
https://www.dell.com/support/kbdoc/en-us/000220677/dsa-2023-468-security-update-for-dell-supportassist-for-home-pcs-installer-file-local-privilege-escalation-vulnerability
|
2023-11-17T06:17:23.508Z
|
2023-12-22T15:57:51.883Z
|
2023-12-22T15:57:51.883Z
|
{'Vendor': 'Dell', 'Product': 'SupportAssist Client Consumer', 'Versions': '3.14.2.45116'}
|
CVE-2023-48365
|
Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, and November 2021 Patch 17. NOTE: this issue exists because of an incomplete fix for CVE-2023-41265.
|
https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510
|
2023-11-15T00:00:00
|
2023-11-15T00:00:00
|
2023-11-15T21:15:52.732093
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48627
|
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
|
2023-11-16T23:29:25.404Z
|
2023-12-13T13:23:10.074Z
|
2023-12-13T13:23:10.074Z
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
|
CVE-2023-48762
|
Cross-Site Request Forgery (CSRF) vulnerability in Crocoblock JetElements For Elementor.This issue affects JetElements For Elementor: from n/a through 2.6.13.
|
https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-18T22:10:24.153Z
|
2023-12-18T16:16:41.450Z
|
2023-12-18T16:16:41.450Z
|
{'Vendor': 'Crocoblock', 'Product': 'JetElements For Elementor', 'Versions': 'n/a'}
|
CVE-2023-48298
|
ClickHouse® is an open-source column-oriented database management system that allows generating analytical data reports in real-time. This vulnerability is an integer underflow resulting in crash due to stack buffer overflow in decompression of FPC codec. It can be triggered and exploited by an unauthenticated attacker. The vulnerability is very similar to CVE-2023-47118 with how the vulnerable function can be exploited.
|
https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-qw9f-qv29-8938
|
2023-11-14T17:41:15.571Z
|
2023-12-21T23:07:43.901Z
|
2023-12-21T23:07:43.901Z
|
{'Vendor': 'ClickHouse', 'Product': 'ClickHouse', 'Versions': '<= 23.10.2.14'}
|
CVE-2023-48518
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.384Z
|
2023-12-15T10:17:08.335Z
|
2023-12-15T10:17:08.335Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48631
|
@adobe/css-tools versions 4.3.1 and earlier are affected by an Improper Input Validation vulnerability that could result in a denial of service while attempting to parse CSS.
|
https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2
|
2023-11-16T23:29:25.406Z
|
2023-12-14T13:09:22.993Z
|
2023-12-14T13:09:22.993Z
|
{'Vendor': 'Adobe', 'Product': 'Not a product', 'Versions': '0'}
|
CVE-2023-48261
|
The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.706Z
|
2024-01-10T13:07:22.893Z
|
2024-01-10T13:07:22.893Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48236
|
Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger
than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5
|
2023-11-13T13:25:18.482Z
|
2023-11-16T22:47:53.519Z
|
2023-11-16T22:47:53.519Z
|
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2111'}
|
CVE-2023-48373
|
ITPison OMICARD EDM has a path traversal vulnerability within its parameter “FileName” in a specific function. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.
|
https://www.twcert.org.tw/tw/cp-132-7592-998bf-1.html
|
2023-11-16T03:49:45.971Z
|
2023-12-15T04:27:26.842Z
|
2023-12-15T04:27:54.223Z
|
{'Vendor': 'ITPison', 'Product': "OMICARD EDM 's SMS", 'Versions': 'v6.0.1.5'}
|
CVE-2023-48689
|
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'byname' parameter of the train.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/barenboim/
|
2023-11-17T17:00:26.199Z
|
2023-12-21T20:46:46.616Z
|
2023-12-21T20:46:46.616Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Railway Reservation System', 'Versions': '1.0'}
|
CVE-2023-48723
| null | null |
2023-11-17T22:29:30.960Z
|
2023-12-21T21:09:34.912Z
|
2024-01-02T15:41:58.721Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-48534
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.385Z
|
2023-12-15T10:15:56.937Z
|
2023-12-15T10:15:56.937Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48471
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.371Z
|
2023-12-15T10:17:06.003Z
|
2023-12-15T10:17:06.003Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48021
|
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/task/update.
|
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20CSRF%20in%20the%20task%20management%20editing%20task%20area.md
|
2023-11-13T00:00:00
|
2023-11-14T00:00:00
|
2023-11-14T14:41:38.602248
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48308
|
Nextcloud/Cloud is a calendar app for Nextcloud. An attacker can gain access to stacktrace and internal paths of the server when generating an exception while editing a calendar appointment. It is recommended that the Nextcloud Calendar app is upgraded to 4.5.3
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fv3c-qvjr-5rv8
|
2023-11-14T17:41:15.572Z
|
2023-12-21T23:12:45.538Z
|
2023-12-21T23:12:45.538Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 3.0.0, < 4.5.3'}
|
CVE-2023-48830
|
Shuttle Booking Software 2.0 is vulnerable to CSV Injection in the Languages section via an export.
|
https://www.phpjabbers.com/shuttle-booking-software/
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:36:53.476364
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48133
|
An issue in angel coffee mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
https://github.com/syz913/CVE-reports/blob/main/angel%20coffee.md
|
2023-11-13T00:00:00
|
2024-01-26T00:00:00
|
2024-01-26T06:56:25.809952
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48563
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.390Z
|
2023-12-15T10:17:21.517Z
|
2023-12-15T10:17:21.517Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48575
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.392Z
|
2023-12-15T10:17:40.959Z
|
2023-12-15T10:17:40.959Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48826
|
Time Slots Booking Calendar 4.0 is vulnerable to CSV Injection via the unique ID field of the Reservations List.
|
https://www.phpjabbers.com/time-slots-booking-calendar/
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:28:18.189876
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48963
|
Tenda i6 V1.0.0.8(3856) is vulnerable to Buffer Overflow via /goform/wifiSSIDget.
|
https://github.com/daodaoshao/vul_tenda_i6_1
|
2023-11-20T00:00:00
|
2023-11-30T00:00:00
|
2023-11-30T13:19:25.557403
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48430
|
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The REST API of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the API. The server will automatically restart.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf
|
2023-11-16T16:30:40.849Z
|
2023-12-12T11:27:22.091Z
|
2023-12-12T11:27:22.091Z
|
{'Vendor': 'Siemens', 'Product': 'SINEC INS', 'Versions': 'All versions < V1.0 SP2 Update 2'}
|
CVE-2023-48060
|
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/task/add
|
https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20location%20where%20task%20management%20adds%20tasks.md
|
2023-11-13T00:00:00
|
2023-11-13T00:00:00
|
2023-11-13T16:07:49.981900
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48349
|
In video decoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.391Z
|
2024-01-18T02:44:51.800Z
|
2024-01-18T02:44:51.800Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
|
CVE-2023-48719
| null | null |
2023-11-17T22:29:30.959Z
|
2023-12-21T20:59:43.778Z
|
2024-01-02T15:31:22.094Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-48172
|
A Cross Site Scripting (XSS) vulnerability in Shuttle Booking Software 2.0 allows a remote attacker to inject JavaScript via the name, description, title, or address parameter to index.php.
|
https://www.phpjabbers.com/shuttle-booking-software/
|
2023-11-13T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:05:54.644695
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48488
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.374Z
|
2023-12-15T10:17:38.677Z
|
2023-12-15T10:17:38.677Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48522
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.384Z
|
2023-12-15T10:17:54.697Z
|
2023-12-15T10:17:54.697Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48467
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.370Z
|
2023-12-15T10:16:26.533Z
|
2023-12-15T10:16:26.533Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48489
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.374Z
|
2023-12-15T10:16:36.387Z
|
2023-12-15T10:16:36.387Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48523
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.384Z
|
2023-12-15T10:15:23.123Z
|
2023-12-15T10:15:23.123Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48466
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.370Z
|
2023-12-15T10:15:39.044Z
|
2023-12-15T10:15:39.044Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48348
|
In video decoder, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.390Z
|
2024-01-18T02:44:51.548Z
|
2024-01-18T02:44:51.548Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
|
CVE-2023-48718
|
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'class_name' parameter of the add_students.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/gilels/
|
2023-11-17T22:29:30.959Z
|
2023-12-21T20:57:24.817Z
|
2023-12-21T20:57:24.817Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Student Result Management System', 'Versions': '1.0'}
|
CVE-2023-48574
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.392Z
|
2023-12-15T10:16:11.143Z
|
2023-12-15T10:16:11.143Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48124
|
Cross Site Scripting in SUP Online Shopping v.1.0 allows a remote attacker to execute arbitrary code via the Name, Email and Address parameters in the Register New Account component.
|
https://www.sourcecodester.com/
|
2023-11-13T00:00:00
|
2023-11-21T00:00:00
|
2023-11-21T14:22:01.371121
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48827
|
Time Slots Booking Calendar 4.0 is vulnerable to Multiple HTML Injection issues via the name, plugin_sms_api_key, plugin_sms_country_code, calendar_id, title, country name, or customer_name parameter.
|
https://www.phpjabbers.com/time-slots-booking-calendar/
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:31:24.433578
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48431
|
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected software does not correctly validate the response received by an UMC server. An attacker can use this to crash the affected software by providing and configuring a malicious UMC server or by manipulating the traffic from a legitimate UMC server (i.e. leveraging CVE-2023-48427).
|
https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf
|
2023-11-16T16:30:40.850Z
|
2023-12-12T11:27:23.326Z
|
2023-12-12T11:27:23.326Z
|
{'Vendor': 'Siemens', 'Product': 'SINEC INS', 'Versions': 'All versions < V1.0 SP2 Update 2'}
|
CVE-2023-48831
|
A lack of rate limiting in pjActionAJaxSend in Availability Booking Calendar 5.0 allows attackers to cause resource exhaustion.
|
https://www.phpjabbers.com/availability-booking-calendar/#sectionDemo
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:40:04.519349
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48132
|
An issue in kosei entertainment esportsstudioLegends mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
https://github.com/syz913/CVE-reports/blob/main/esportsstudioLegends.md
|
2023-11-13T00:00:00
|
2024-01-26T00:00:00
|
2024-01-26T06:50:04.345009
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48562
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.390Z
|
2023-12-15T10:16:38.709Z
|
2023-12-15T10:16:38.709Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48427
|
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected products do not properly validate the certificate of the configured UMC server. This could allow an attacker to intercept credentials that are sent to the UMC server as well as to manipulate responses, potentially allowing an attacker to escalate privileges.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf
|
2023-11-16T16:30:40.849Z
|
2023-12-12T11:27:18.362Z
|
2023-12-12T11:27:18.362Z
|
{'Vendor': 'Siemens', 'Product': 'SINEC INS', 'Versions': 'All versions < V1.0 SP2 Update 2'}
|
CVE-2023-48309
|
NextAuth.js provides authentication for Next.js. `next-auth` applications prior to version 4.24.5 that rely on the default Middleware authorization are affected by a vulnerability. A bad actor could create an empty/mock user, by getting hold of a NextAuth.js-issued JWT from an interrupted OAuth sign-in flow (state, PKCE or nonce). Manually overriding the `next-auth.session-token` cookie value with this non-related JWT would let the user simulate a logged in user, albeit having no user information associated with it. (The only property on this user is an opaque randomly generated string). This vulnerability does not give access to other users' data, neither to resources that require proper authorization via scopes or other means. The created mock user has no information associated with it (ie. no name, email, access_token, etc.) This vulnerability can be exploited by bad actors to peek at logged in user states (e.g. dashboard layout). `next-auth` `v4.24.5` contains a patch for the vulnerability. As a workaround, using a custom authorization callback for Middleware, developers can manually do a basic authentication.
|
https://github.com/nextauthjs/next-auth/security/advisories/GHSA-v64w-49xw-qq89
|
2023-11-14T17:41:15.572Z
|
2023-11-20T18:25:01.896Z
|
2023-11-20T18:25:01.896Z
|
{'Vendor': 'nextauthjs', 'Product': 'next-auth', 'Versions': '< 4.24.5'}
|
CVE-2023-48535
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.385Z
|
2023-12-15T10:15:56.177Z
|
2023-12-15T10:15:56.177Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48866
|
A Cross-Site Scripting (XSS) vulnerability in the recipe preparation component within /api/objects/recipes and note component within /api/objects/shopping_lists/ of Grocy <= 4.0.3 allows attackers to obtain the victim's cookies.
|
https://github.com/grocy/grocy
|
2023-11-20T00:00:00
|
2023-12-04T00:00:00
|
2023-12-04T15:04:03.647544
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48470
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.371Z
|
2023-12-15T10:16:28.057Z
|
2023-12-15T10:16:28.057Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48020
|
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/task/changeStatus.
|
https://github.com/moonsabc123/dreamer_cms/blob/main/Enable%20CSRF%20for%20Task%20Management%20Office.md
|
2023-11-13T00:00:00
|
2023-11-14T00:00:00
|
2023-11-14T14:42:50.607914
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48237
|
Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87
|
2023-11-13T13:25:18.482Z
|
2023-11-16T22:45:57.667Z
|
2023-11-16T22:45:57.667Z
|
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2112'}
|
CVE-2023-48667
|
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 contain an OS command injection vulnerability in administrator CLI. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS to bypass security restriction. Exploitation may lead to a system take over by an attacker.
|
https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities
|
2023-11-17T06:14:57.042Z
|
2023-12-14T15:40:07.760Z
|
2023-12-14T15:40:07.760Z
|
{'Vendor': 'Dell', 'Product': 'PowerProtect DD', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110'}
|
CVE-2023-48372
|
ITPison OMICARD EDM 's SMS-related function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify and delete database.
|
https://www.twcert.org.tw/tw/cp-132-7591-07c51-1.html
|
2023-11-16T03:49:45.971Z
|
2023-12-15T04:18:31.142Z
|
2023-12-15T04:18:31.142Z
|
{'Vendor': 'ITPison', 'Product': "OMICARD EDM 's SMS", 'Versions': 'v6.0.1.5'}
|
CVE-2023-48688
| null | null |
2023-11-17T17:00:26.199Z
|
2023-12-21T20:43:53.294Z
|
2024-01-02T14:40:53.810Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-48722
|
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'class_name' parameter of the add_results.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/gilels/
|
2023-11-17T22:29:30.959Z
|
2023-12-21T21:06:15.284Z
|
2023-12-21T21:06:15.284Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Student Result Management System', 'Versions': '1.0'}
|
CVE-2023-48958
|
gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_resolve_url media_tools/mpd.c:4589.
|
https://github.com/gpac/gpac/issues/2689
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T17:23:03.648234
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48630
|
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
|
2023-11-16T23:29:25.405Z
|
2023-12-13T13:23:08.544Z
|
2023-12-13T13:23:08.544Z
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
|
CVE-2023-48260
|
The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.706Z
|
2024-01-10T13:06:48.658Z
|
2024-01-10T13:06:48.658Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48325
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in PluginOps Landing Page Builder – Lead Page – Optin Page – Squeeze Page – WordPress Landing Pages.This issue affects Landing Page Builder – Lead Page – Optin Page – Squeeze Page – WordPress Landing Pages: from n/a through 1.5.1.5.
|
https://patchstack.com/database/vulnerability/page-builder-add/wordpress-landing-page-builder-plugin-1-5-1-5-open-redirection-vulnerability?_s_id=cve
|
2023-11-14T21:42:18.497Z
|
2023-12-07T11:32:44.143Z
|
2023-12-07T11:32:44.143Z
|
{'Vendor': 'PluginOps', 'Product': 'Landing Page Builder – Lead Page – Optin Page – Squeeze Page – WordPress Landing Pages', 'Versions': 'n/a'}
|
CVE-2023-48519
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.384Z
|
2023-12-15T10:16:16.325Z
|
2023-12-15T10:16:16.325Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48626
|
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
|
2023-11-16T23:29:25.404Z
|
2023-12-13T13:23:06.972Z
|
2023-12-13T13:23:06.972Z
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
|
CVE-2023-48333
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pluggabl LLC Booster for WooCommerce.This issue affects Booster for WooCommerce: from n/a through 7.1.1.
|
https://patchstack.com/database/vulnerability/woocommerce-jetpack/wordpress-booster-for-woocommerce-plugin-7-1-1-authenticated-arbitrary-order-information-disclosure-vulnerability?_s_id=cve
|
2023-11-14T21:42:37.033Z
|
2023-11-30T14:17:28.833Z
|
2023-11-30T14:17:28.833Z
|
{'Vendor': 'Pluggabl LLC', 'Product': 'Booster for WooCommerce', 'Versions': 'n/a'}
|
CVE-2023-48299
|
TorchServe is a tool for serving and scaling PyTorch models in production. Starting in version 0.1.0 and prior to version 0.9.0, using the model/workflow management API, there is a chance of uploading potentially harmful archives that contain files that are extracted to any location on the filesystem that is within the process permissions. Leveraging this issue could aid third-party actors in hiding harmful code in open-source/public models, which can be downloaded from the internet, and take advantage of machines running Torchserve. The ZipSlip issue in TorchServe has been fixed by validating the paths of files contained within a zip archive before extracting them. TorchServe release 0.9.0 includes fixes to address the ZipSlip vulnerability.
|
https://github.com/pytorch/serve/security/advisories/GHSA-m2mj-pr4f-h9jp
|
2023-11-14T17:41:15.571Z
|
2023-11-21T20:55:59.504Z
|
2023-11-21T20:55:59.504Z
|
{'Vendor': 'pytorch', 'Product': 'serve', 'Versions': '>= 0.1.0, < 0.9.0'}
|
CVE-2023-48671
|
Dell vApp Manager, versions prior to 9.2.4.x contain an information disclosure vulnerability. A remote attacker could potentially exploit this vulnerability leading to obtain sensitive information that may aid in further attacks.
|
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
|
2023-11-17T06:17:23.509Z
|
2023-12-14T16:15:29.756Z
|
2023-12-14T16:15:29.756Z
|
{'Vendor': 'Dell', 'Product': 'vApp Manager', 'Versions': 'Versions prior to 9.2.4.x'}
|
CVE-2023-48221
|
wire-avs provides Audio, Visual, and Signaling (AVS) functionality sure the secure messaging software Wire. Prior to versions 9.2.22 and 9.3.5, a remote format string vulnerability could potentially allow an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 9.2.22 & 9.3.5 and is already included on all Wire products. No known workarounds are available.
|
https://github.com/wireapp/wire-avs/security/advisories/GHSA-m4xg-fcr3-w3pq
|
2023-11-13T13:25:18.480Z
|
2023-11-20T17:18:19.030Z
|
2023-11-20T17:18:19.030Z
|
{'Vendor': 'wireapp', 'Product': 'wire-avs', 'Versions': '< 9.2.22, >= 9.3.0, < 9.3.5'}
|
CVE-2023-48558
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.389Z
|
2023-12-15T10:15:46.279Z
|
2023-12-15T10:15:46.279Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48485
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.373Z
|
2023-12-15T10:15:22.258Z
|
2023-12-15T10:15:22.258Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48893
|
SLiMS (aka SENAYAN Library Management System) through 9.6.1 allows admin/modules/reporting/customs/staff_act.php SQL Injection via startDate or untilDate.
|
https://github.com/slims/slims9_bulian/issues/209
|
2023-11-20T00:00:00
|
2023-12-01T00:00:00
|
2023-12-31T00:07:43.474329
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48313
|
Umbraco is an ASP.NET content management system (CMS). Starting in 10.0.0 and prior to versions 10.8.1 and 12.3.4, Umbraco contains a cross-site scripting (XSS) vulnerability enabling attackers to bring malicious content into a website or application. Versions 10.8.1 and 12.3.4 contain a patch for this issue.
|
https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-v98m-398x-269r
|
2023-11-14T17:41:15.573Z
|
2023-12-12T17:23:49.092Z
|
2023-12-12T17:23:49.092Z
|
{'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 10.0.0, < 10.8.1, >= 11.0.0-rc1, < 12.3.4'}
|
CVE-2023-48743
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Menard Simply Exclude allows Reflected XSS.This issue affects Simply Exclude: from n/a through 2.0.6.6.
|
https://patchstack.com/database/vulnerability/simply-exclude/wordpress-simply-exclude-plugin-2-0-6-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-18T22:09:33.698Z
|
2023-11-30T10:29:05.909Z
|
2023-11-30T10:29:05.909Z
|
{'Vendor': 'Paul Menard', 'Product': 'Simply Exclude', 'Versions': 'n/a'}
|
CVE-2023-48256
|
The vulnerability allows a remote attacker to inject arbitrary HTTP response headers or manipulate HTTP response bodies inside a victim’s session via a crafted URL or HTTP request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.705Z
|
2024-01-10T13:04:04.926Z
|
2024-01-10T13:04:04.926Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48606
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.401Z
|
2023-12-15T10:15:25.536Z
|
2023-12-15T10:15:25.536Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48128
|
An issue in UNITED BOXING GYM mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
https://github.com/syz913/CVE-reports/blob/main/UNITED%20BOXING%20GYM.md
|
2023-11-13T00:00:00
|
2024-01-26T00:00:00
|
2024-01-26T07:02:12.168165
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48578
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.393Z
|
2023-12-15T10:16:24.275Z
|
2023-12-15T10:16:24.275Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.