CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-48597
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.400Z
2023-12-15T10:15:43.195Z
2023-12-15T10:15:43.195Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48714
Silverstripe Framework is the framework that forms the base of the Silverstripe content management system. Prior to versions 4.13.39 and 5.1.11, if a user should not be able to see a record, but that record can be added to a `GridField` using the `GridFieldAddExistingAutocompleter` component, the record's title can be accessed by that user. Versions 4.13.39 and 5.1.11 contain a fix for this issue.
https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-qm2j-qvq3-j29v
2023-11-17T19:43:37.555Z
2024-01-23T13:49:27.350Z
2024-01-23T13:49:27.350Z
{'Vendor': 'silverstripe', 'Product': 'silverstripe-framework', 'Versions': '< 4.13.39, >= 5.0.0, < 5.1.11'}
CVE-2023-48344
In video decoder, there is a possible out of bounds read due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.390Z
2024-01-18T02:44:50.572Z
2024-01-18T02:44:50.572Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-48651
Concrete CMS 9 before 9.2.3 is vulnerable to Cross Site Request Forgery (CSRF) at /ccm/system/dialogs/file/delete/1/submit.
https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes
2023-11-17T00:00:00
2023-12-25T00:00:00
2023-12-25T18:49:59.837689
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48201
Cross Site Scripting (XSS) vulnerability in Sunlight CMS v.8.0.1, allows remote authenticated attackers to execute arbitrary code and escalate privileges via a crafted script to the Content text editor component.
https://mechaneus.github.io/CVE-2023-48201.html
2023-11-13T00:00:00
2024-01-27T00:00:00
2024-01-27T05:26:54.006180
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48094
A cross-site scripting (XSS) vulnerability in CesiumJS v1.111 allows attackers to execute arbitrary code in the context of the victim's browser via sending a crafted payload to /container_files/public_html/doc/index.html. NOTE: the vendor’s position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product.
https://gist.github.com/cd80/33ab71cc49c42feb55de3e574753320f
2023-11-13T00:00:00
2023-11-14T00:00:00
2023-12-06T20:41:48.962324
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48581
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.394Z
2023-12-15T10:17:40.202Z
2023-12-15T10:17:40.202Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48352
In phasecheckserver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.391Z
2024-01-18T02:44:52.558Z
2024-01-18T02:44:52.558Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
CVE-2023-48702
Jellyfin is a system for managing and streaming media. Prior to version 10.8.13, the `/System/MediaEncoder/Path` endpoint executes an arbitrary file using `ProcessStartInfo` via the `ValidateVersion` function. A malicious administrator can setup a network share and supply a UNC path to `/System/MediaEncoder/Path` which points to an executable on the network share, causing Jellyfin server to run the executable in the local context. The endpoint was removed in version 10.8.13.
https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/
2023-11-17T19:43:37.554Z
2023-12-13T20:53:28.786Z
2023-12-13T20:53:28.786Z
{'Vendor': 'jellyfin', 'Product': 'jellyfin', 'Versions': '< 10.8.13'}
CVE-2023-48217
Statamic is a flat-first, Laravel + Git powered CMS designed for building websites. In affected versions certain additional PHP files crafted to look like images may be uploaded regardless of mime type validation rules. This affects front-end forms using the "Forms" feature, and asset upload fields in the control panel. Malicious users could leverage this vulnerability to upload and execute code. This issue has been patched in versions 3.4.14 and 4.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/statamic/cms/security/advisories/GHSA-2r53-9295-3m86
2023-11-13T13:25:18.479Z
2023-11-14T21:38:37.590Z
2023-11-14T21:38:37.590Z
{'Vendor': 'statamic', 'Product': 'cms', 'Versions': '>= 4.0.0, < 4.34.0, < 3.4.14'}
CVE-2023-48493
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.375Z
2023-12-15T10:16:11.928Z
2023-12-15T10:16:11.928Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48539
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.386Z
2023-12-15T10:17:07.545Z
2023-12-15T10:17:07.545Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48755
Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.4.
https://patchstack.com/database/vulnerability/teachpress/wordpress-teachpress-plugin-9-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-18T22:10:05.377Z
2023-12-18T15:50:59.119Z
2023-12-18T15:50:59.119Z
{'Vendor': 'Michael Winkler', 'Product': 'teachPress', 'Versions': 'n/a'}
CVE-2023-48305
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35p6-4992-w5fr
2023-11-14T17:41:15.572Z
2023-11-21T22:17:36.124Z
2023-11-21T22:17:36.124Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.11, >= 26.0.0, < 26.0.6, >= 27.0.0, < 27.1.0'}
CVE-2023-48610
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.402Z
2023-12-15T10:15:48.067Z
2023-12-15T10:15:48.067Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48240
XWiki Platform is a generic wiki platform. The rendered diff in XWiki embeds images to be able to compare the contents and not display a difference for an actually unchanged image. For this, XWiki requests all embedded images on the server side. These requests are also sent for images from other domains and include all cookies that were sent in the original request to ensure that images with restricted view right can be compared. Starting in version 11.10.1 and prior to versions 14.10.15, 15.5.1, and 15.6, this allows an attacker to steal login and session cookies that allow impersonating the current user who views the diff. The attack can be triggered with an image that references the rendered diff, thus making it easy to trigger. Apart from stealing login cookies, this also allows server-side request forgery (the result of any successful request is returned in the image's source) and viewing protected content as once a resource is cached, it is returned for all users. As only successful requests are cached, the cache will be filled by the first user who is allowed to access the resource. This has been patched in XWiki 14.10.15, 15.5.1 and 15.6. The rendered diff now only downloads images from trusted domains. Further, cookies are only sent when the image's domain is the same the requested domain. The cache has been changed to be specific for each user. As a workaround, the image embedding feature can be disabled by deleting `xwiki-platform-diff-xml-<version>.jar` in `WEB-INF/lib/`.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7rfg-6273-f5wp
2023-11-13T13:25:18.482Z
2023-11-20T17:48:03.447Z
2023-11-20T17:48:03.447Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 11.10.1, < 14.10.15, >= 15.0-rc-1, < 15.5.1, >= 15.6-rc-1, < 15.6'}
CVE-2023-48407
there is a possible DCK won't be deleted after factory reset due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:09:59.939Z
2023-12-08T15:41:25.931Z
2023-12-08T15:41:25.931Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48811
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function that when passed to the CsteSystem function creates a command execution vulnerability.
https://www.notion.so/X6000R-sub_4119A0-8-2332305e3d8044c09f093404a8ae59f4?pvs=4
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T17:52:08.301829
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48542
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.387Z
2023-12-15T10:16:49.768Z
2023-12-15T10:16:49.768Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48450
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:16:06.385Z
2023-12-15T10:16:06.385Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48515
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.384Z
2023-12-15T10:17:20.715Z
2023-12-15T10:17:20.715Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48796
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler. The information exposed to unauthorized actors may include sensitive data such as database credentials. Users who can't upgrade to the fixed version can also set environment variable `MANAGEMENT_ENDPOINTS_WEB_EXPOSURE_INCLUDE=health,metrics,prometheus` to workaround this, or add the following section in the `application.yaml` file ``` management:   endpoints:     web:       exposure:         include: health,metrics,prometheus ``` This issue affects Apache DolphinScheduler: from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2, which fixes the issue.
https://lists.apache.org/thread/ffrmkcwgr2lcz0f5nnnyswhpn3fytsvo
2023-11-20T03:53:27.700Z
2023-11-24T07:56:43.542Z
2023-11-24T07:56:43.542Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '3.0.0'}
CVE-2023-48329
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard Fast Custom Social Share by CodeBard allows Stored XSS.This issue affects Fast Custom Social Share by CodeBard: from n/a through 1.1.1.
https://patchstack.com/database/vulnerability/fast-custom-social-share-by-codebard/wordpress-fast-custom-social-share-by-codebard-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-14T21:42:37.031Z
2023-11-30T11:12:57.458Z
2023-11-30T11:12:57.458Z
{'Vendor': 'CodeBard', 'Product': 'Fast Custom Social Share by CodeBard', 'Versions': 'n/a'}
CVE-2023-48283
Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Testimonials Showcase allows Cross Site Request Forgery.This issue affects Simple Testimonials Showcase: from n/a through 1.1.5.
https://patchstack.com/database/vulnerability/simple-testimonials-showcase/wordpress-simple-testimonials-showcase-plugin-1-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-13T23:43:33.533Z
2023-11-30T13:04:48.707Z
2023-11-30T13:04:48.707Z
{'Vendor': 'PressTigers', 'Product': 'Simple Testimonials Showcase', 'Versions': 'n/a'}
CVE-2023-48016
Restaurant Table Booking System V1.0 is vulnerable to SQL Injection in rtbs/admin/index.php via the username parameter.
https://github.com/Serhatcck/cves/blob/main/CVE-2023-48016-restaurant-table-booking-system-SQLInjection.md
2023-11-13T00:00:00
2023-12-01T00:00:00
2023-12-01T02:38:56.944617
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48446
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:15:48.848Z
2023-12-15T10:15:48.848Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48503
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.377Z
2023-12-15T10:17:48.582Z
2023-12-15T10:17:48.582Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48780
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EnigmaWeb WP Catalogue allows Stored XSS.This issue affects WP Catalogue: from n/a through 1.7.6.
https://patchstack.com/database/vulnerability/wp-catalogue/wordpress-wp-catalogue-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-18T22:46:38.038Z
2023-12-14T16:57:13.066Z
2023-12-14T16:57:13.066Z
{'Vendor': 'EnigmaWeb', 'Product': 'WP Catalogue', 'Versions': 'n/a'}
CVE-2023-48295
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. Affected versions are subject to a cross site scripting (XSS) vulnerability in the device group popups. This issue has been addressed in commit `faf66035ea` which has been included in release version 23.11.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/librenms/librenms/security/advisories/GHSA-8phr-637g-pxrg
2023-11-14T17:41:15.570Z
2023-11-17T21:06:07.575Z
2023-11-17T21:06:07.575Z
{'Vendor': 'librenms', 'Product': 'librenms', 'Versions': '< 23.11.0'}
CVE-2023-48411
In SignalStrengthAdapter::FillGsmSignalStrength() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:09:59.939Z
2023-12-08T15:44:08.748Z
2023-12-08T15:44:08.748Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48554
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.389Z
2023-12-15T10:15:51.935Z
2023-12-15T10:15:51.935Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48104
Alinto SOGo before 5.9.1 is vulnerable to HTML Injection.
https://github.com/Alinto/sogo/commit/7481ccf37087c3f456d7e5a844da01d0f8883098
2023-11-13T00:00:00
2024-01-16T00:00:00
2024-01-17T18:25:38.961169
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48807
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
https://www.notion.so/X6000R-sub_4119A0-3-1e21686eebf94cee8a7819d1d7aa29b9?pvs=4
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T17:59:48.976794
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48387
TAIWAN-CA(TWCA) JCICSecurityTool's Registry-related functions have insufficient filtering for special characters. An unauthenticated remote attacker can inject malicious script into a webpage to perform XSS (Stored Cross-Site Scripting) attack.
https://www.twcert.org.tw/tw/cp-132-7602-a47a2-1.html
2023-11-16T03:52:23.443Z
2023-12-15T08:40:34.306Z
2023-12-15T08:40:34.306Z
{'Vendor': 'TAIWAN-CA(TWCA)', 'Product': 'JCICSecurityTool', 'Versions': '4.2.3.32'}
CVE-2023-48692
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause remote code execution due to memory overflow vulnerabilities in Azure RTOS NETX Duo. The affected components include processes/functions related to icmp, tcp, snmp, dhcp, nat and ftp in RTOS v6.2.1 and below. The fixes have been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/azure-rtos/netxduo/security/advisories/GHSA-m2rx-243p-9w64
2023-11-17T19:43:37.551Z
2023-12-05T00:24:44.801Z
2023-12-05T00:24:44.801Z
{'Vendor': 'azure-rtos', 'Product': 'netxduo', 'Versions': '< 6.3.0'}
CVE-2023-48738
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Porto Theme Porto Theme - Functionality.This issue affects Porto Theme - Functionality: from n/a before 2.12.1.
https://patchstack.com/database/vulnerability/porto-functionality/wordpress-porto-theme-functionality-plugin-2-11-1-unauthenticated-sql-injection-vulnerability?_s_id=cve
2023-11-18T22:09:33.697Z
2023-12-19T20:47:07.931Z
2023-12-19T20:47:07.931Z
{'Vendor': 'Porto Theme', 'Product': 'Porto Theme - Functionality', 'Versions': 'n/a'}
CVE-2023-48469
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.370Z
2023-12-15T10:15:59.243Z
2023-12-15T10:15:59.243Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48193
Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function.
https://github.com/jumpserver/jumpserver
2023-11-13T00:00:00
2023-11-28T00:00:00
2023-11-28T20:31:22.418377
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48039
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leak in gf_mpd_parse_string media_tools/mpd.c:75.
https://github.com/gpac/gpac/issues/2679
2023-11-13T00:00:00
2023-11-20T00:00:00
2023-11-20T14:55:03.572864
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48486
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.374Z
2023-12-15T10:16:08.112Z
2023-12-15T10:16:08.112Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48255
The vulnerability allows an unauthenticated remote attacker to send malicious network requests containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned log.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.705Z
2024-01-10T13:03:32.151Z
2024-01-10T13:03:32.151Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48605
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.401Z
2023-12-15T10:17:12.449Z
2023-12-15T10:17:12.449Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48310
TestingPlatform is a testing platform for Internet Security Standards. Prior to version 2.1.1, user input is not filtered correctly. Nmap options are accepted. In this particular case, the option to create log files is accepted in addition to a host name (and even without). A log file is created at the location specified. These files are created as root. If the file exists, the existing file is being rendered useless. This can result in denial of service. Additionally, input for scanning can be any CIDR blocks passed to nmap. An attacker can scan 0.0.0.0/0 or even local networks. Version 2.1.1 contains a patch for this issue.
https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
2023-11-14T17:41:15.572Z
2023-11-20T23:07:13.720Z
2023-11-21T22:35:52.959Z
{'Vendor': 'NC3-LU', 'Product': 'TestingPlatform', 'Versions': '< 2.1.1'}
CVE-2023-48594
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.398Z
2023-12-15T10:15:37.500Z
2023-12-15T10:15:37.500Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48828
Time Slots Booking Calendar 4.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) issues via the name, plugin_sms_api_key, plugin_sms_country_code, calendar_id, title, country name, or customer_name parameter.
https://www.phpjabbers.com/time-slots-booking-calendar/
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:34:43.340772
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48652
Concrete CMS 9 before 9.2.3 is vulnerable to Cross Site Request Forgery (CSRF) via /ccm/system/dialogs/logs/delete_all/submit. An attacker can force an admin user to delete server report logs on a web application to which they are currently authenticated.
https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes
2023-11-17T00:00:00
2023-12-25T00:00:00
2023-12-25T07:15:20.706972
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48202
Cross-Site Scripting (XSS) vulnerability in Sunlight CMS 8.0.1 allows an authenticated low-privileged user to escalate privileges via a crafted SVG file in the File Manager component.
https://mechaneus.github.io/CVE-2023-48202.html
2023-11-13T00:00:00
2024-01-27T00:00:00
2024-01-27T05:38:21.434108
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48717
null
null
2023-11-17T22:29:30.959Z
2023-12-21T20:56:36.253Z
2024-01-02T15:30:06.226Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-48347
In video decoder, there is a possible out of bounds read due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.390Z
2024-01-18T02:44:51.306Z
2024-01-18T02:44:51.306Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-48428
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The radius configuration mechanism of affected products does not correctly check uploaded certificates. A malicious admin could upload a crafted certificate resulting in a denial-of-service condition or potentially issue commands on system level.
https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf
2023-11-16T16:30:40.849Z
2023-12-12T11:27:19.590Z
2023-12-12T11:27:19.590Z
{'Vendor': 'Siemens', 'Product': 'SINEC INS', 'Versions': 'All versions < V1.0 SP2 Update 2'}
CVE-2023-48078
SQL Injection vulnerability in add.php in Simple CRUD Functionality v1.0 allows attackers to run arbitrary SQL commands via the 'title' parameter.
https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC
2023-11-13T00:00:00
2023-11-16T00:00:00
2023-11-16T23:20:37.345159
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48582
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.394Z
2023-12-15T10:15:27.037Z
2023-12-15T10:15:27.037Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48351
In video decoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.391Z
2024-01-18T02:44:52.310Z
2024-01-18T02:44:52.310Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-48701
Statamic CMS is a Laravel and Git powered content management system (CMS). Prior to versions 3.4.15 an 4.36.0, HTML files crafted to look like images may be uploaded regardless of mime validation. This is only applicable on front-end forms using the "Forms" feature containing an assets field, or within the control panel which requires authentication. This issue has been patched on 3.4.15 and 4.36.0.
https://github.com/statamic/cms/security/advisories/GHSA-8jjh-j3c2-cjcv
2023-11-17T19:43:37.554Z
2023-11-21T22:34:11.043Z
2023-11-21T22:34:11.043Z
{'Vendor': 'statamic', 'Product': 'cms', 'Versions': '< 3.4.15 , >= 4.0.0, < 4.36.0'}
CVE-2023-48886
A deserialization vulnerability in NettyRpc v1.2 allows attackers to execute arbitrary commands via sending a crafted RPC request.
https://github.com/luxiaoxun/NettyRpc
2023-11-20T00:00:00
2023-12-01T00:00:00
2023-12-01T22:26:57.648054
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48185
Directory Traversal vulnerability in TerraMaster v.s1.0 through v.2.295 allows a remote attacker to obtain sensitive information via a crafted GET request.
https://forum.terra-master.com/cn/viewtopic.php?f=100&t=3842&p=17623#p17623
2023-11-13T00:00:00
2023-11-17T00:00:00
2023-11-17T17:38:29.736891
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48490
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.374Z
2023-12-15T10:17:18.636Z
2023-12-15T10:17:18.636Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48613
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.402Z
2023-12-15T10:17:25.366Z
2023-12-15T10:17:25.366Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48243
The vulnerability allows a remote attacker to upload arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request. By abusing this vulnerability, it is possible to obtain remote code execution (RCE) with root privileges on the device.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.702Z
2024-01-10T10:36:56.971Z
2024-01-10T10:36:56.971Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48756
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetBlocks For Elementor allows Reflected XSS.This issue affects JetBlocks For Elementor: from n/a through 1.3.8.
https://patchstack.com/database/vulnerability/jet-blocks/wordpress-jetblocks-for-elementor-plugin-1-3-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-18T22:10:05.377Z
2023-12-14T16:40:35.982Z
2023-12-14T16:40:35.982Z
{'Vendor': 'Crocoblock', 'Product': 'JetBlocks For Elementor', 'Versions': 'n/a'}
CVE-2023-48306
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f69-f9jg-4x3v
2023-11-14T17:41:15.572Z
2023-11-21T22:20:28.083Z
2023-11-21T22:20:28.083Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 22.0.0, < 22.2.10.16, >= 23.0.0, < 23.0.12.11, >= 24.0.0, < 24.0.12.7, >= 25.0.0, < 25.0.11, >= 26.0.0, < 26.0.6, >= 27.0.0, < 27.1.0'}
CVE-2023-48111
Tenda AX1803 v1.0.0.1 was discovered to contain a stack overflow via the time parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack
http://tjr181.com/index.php/archives/13/
2023-11-13T00:00:00
2023-11-20T00:00:00
2023-11-20T20:01:38.997832
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48541
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.387Z
2023-12-15T10:16:25.759Z
2023-12-15T10:16:25.759Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48812
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function that when passed to the CsteSystem function creates a command execution vulnerability.
https://www.notion.so/X6000R-sub_4119A0-10-82467d98d07c45a59ec3729ec712cb57?pvs=4
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T17:47:56.926328
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48054
Missing SSL certificate validation in localstack v2.3.2 allows attackers to eavesdrop on communications between the host and server via a man-in-the-middle attack.
https://gxx777.github.io/localstack_v_2.3.2_Cryptographic_API_Misuse_Vulnerability.md
2023-11-13T00:00:00
2023-11-16T00:00:00
2023-11-16T17:16:48.925694
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48404
In ProtocolMiscCarrierConfigSimInfoIndAdapter of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:08:52.675Z
2023-12-08T15:40:50.008Z
2023-12-08T15:40:50.008Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48687
Railway Reservation System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'from' parameter of the reservation.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/barenboim/
2023-11-17T17:00:26.199Z
2023-12-21T20:42:58.832Z
2023-12-21T20:42:58.832Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Railway Reservation System', 'Versions': '1.0'}
CVE-2023-48668
Dell PowerProtect DD, versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110 on DDMC contain an OS command injection vulnerability in an admin operation. A local high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the managed system application's underlying OS with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker on a managed system of DDMC.
https://www.dell.com/support/kbdoc/en-us/000220264/dsa-2023-412-dell-technologies-powerprotect-security-update-for-multiple-security-vulnerabilities
2023-11-17T06:14:57.042Z
2023-12-14T15:45:20.763Z
2023-12-14T15:45:20.763Z
{'Vendor': 'Dell', 'Product': ' PowerProtect DD', 'Versions': 'Versions prior to 7.13.0.10, LTS 7.7.5.25, LTS 7.10.1.15, 6.2.1.110'}
CVE-2023-48392
Kaifa Technology WebITR is an online attendance system, it has a vulnerability in using hard-coded encryption key. An unauthenticated remote attacker can generate valid token parameter and exploit this vulnerability to access system with arbitrary user account, including administrator’s account, to execute login account’s permissions, and obtain relevant information.
https://www.twcert.org.tw/tw/cp-132-7622-57e5f-1.html
2023-11-16T04:08:17.028Z
2023-12-15T09:20:19.843Z
2024-01-17T07:23:16.501Z
{'Vendor': 'Kaifa Technology', 'Product': 'WebITR', 'Versions': '2_1_0_19'}
CVE-2023-48238
joaquimserafim/json-web-token is a javascript library use to interact with JSON Web Tokens (JWT) which are a compact URL-safe means of representing claims to be transferred between two parties. Affected versions of the json-web-token library are vulnerable to a JWT algorithm confusion attack. On line 86 of the 'index.js' file, the algorithm to use for verifying the signature of the JWT token is taken from the JWT token, which at that point is still unverified and thus shouldn't be trusted. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work against this library is the RS256 algorithm is in use, however it is a best practice to use that algorithm.
https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355
2023-11-13T13:25:18.482Z
2023-11-17T21:35:00.111Z
2023-11-17T21:35:00.111Z
{'Vendor': 'joaquimserafim', 'Product': 'json-web-token', 'Versions': '< 3.1.1'}
CVE-2023-48516
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.384Z
2023-12-15T10:16:19.614Z
2023-12-15T10:16:19.614Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48453
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:16:49.019Z
2023-12-15T10:16:49.019Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48003
An open redirect through HTML injection in user messages in Asp.Net Zero before 12.3.0 allows remote attackers to redirect targeted victims to any URL via the '<meta http-equiv="refresh"' in the WebSocket messages.
https://github.com/passtheticket/vulnerability-research/blob/main/aspnetzero_html_injection_via_websockets_messages.md
2023-11-13T00:00:00
2023-12-26T00:00:00
2023-12-26T21:40:37.645702
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
2023-11-20T00:00:00
2023-12-18T00:00:00
2024-01-25T04:06:23.812181
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48500
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.376Z
2023-12-15T10:16:41.741Z
2023-12-15T10:16:41.741Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48445
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:17:10.131Z
2023-12-15T10:17:10.131Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48629
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
2023-11-16T23:29:25.405Z
2023-12-13T13:23:07.761Z
2023-12-13T13:23:07.761Z
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
CVE-2023-48279
Cross-Site Request Forgery (CSRF) vulnerability in Seraphinite Solutions Seraphinite Post .DOCX Source allows Cross Site Request Forgery.This issue affects Seraphinite Post .DOCX Source: from n/a through 2.16.6.
https://patchstack.com/database/vulnerability/seraphinite-post-docx-source/wordpress-seraphinite-post-docx-source-plugin-2-16-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-13T17:33:51.625Z
2023-11-30T13:14:04.226Z
2023-11-30T13:14:04.226Z
{'Vendor': 'Seraphinite Solutions', 'Product': 'Seraphinite Post .DOCX Source', 'Versions': 'n/a'}
CVE-2023-48783
An Authorization Bypass Through User-Controlled Key vulnerability [CWE-639] affecting PortiPortal version 7.2.1 and below, version 7.0.6 and below, version 6.0.14 and below, version 5.3.8 and below may allow a remote authenticated user with at least read-only permissions to access to other organization endpoints via crafted GET requests.
https://fortiguard.com/psirt/FG-IR-23-408
2023-11-19T19:58:38.554Z
2024-01-10T17:51:38.440Z
2024-01-10T17:51:38.440Z
{'Vendor': 'Fortinet', 'Product': 'FortiPortal', 'Versions': '7.2.0, 7.0.0, 6.0.0, 5.3.0'}
CVE-2023-48804
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
https://www.notion.so/X6000R-sub_4119A0-1-e9697e90e8b04e05a6d10c9fb7288750?pvs=4
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T18:03:43.746224
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48557
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.389Z
2023-12-15T10:16:17.838Z
2023-12-15T10:16:17.838Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48107
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_has_slash function in the mz_os.c file.
https://github.com/zlib-ng/minizip-ng/issues/739
2023-11-13T00:00:00
2023-11-22T00:00:00
2023-12-27T04:06:20.707844
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48412
In private_handle_t of mali_gralloc_buffer.h, there is a possible information leak due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:09:59.939Z
2023-12-08T15:44:27.291Z
2023-12-08T15:44:27.291Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48042
Cross Site Scripting (XSS) in Search filters in Prestashop Amazzing filter version up to version 3.2.5, allows remote attackers to inject arbitrary JavaScript code.
https://addons.prestashop.com/en/search-filters/18575-amazzing-filter.html
2023-11-13T00:00:00
2023-11-28T00:00:00
2023-11-30T06:30:51.753345
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48691
Azure RTOS NetX Duo is a TCP/IP network stack designed specifically for deeply embedded real-time and IoT applications. An attacker can cause an out-of-bounds write in Azure RTOS NETX Duo, that could lead to remote code execution. The affected components include process related to IGMP protocol in RTOS v6.2.1 and below. The fix has been included in NetX Duo release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/azure-rtos/netxduo/security/advisories/GHSA-fwmg-rj6g-w99p
2023-11-17T19:43:37.551Z
2023-12-05T00:24:41.913Z
2023-12-05T00:24:41.913Z
{'Vendor': 'azure-rtos', 'Product': 'netxduo', 'Versions': '< 6.3.0'}
CVE-2023-48384
ArmorX Global Technology Corporation ArmorX Spam has insufficient validation for user input within a special function. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify and delete database.
https://www.twcert.org.tw/tw/cp-132-7601-71c94-1.html
2023-11-16T03:52:23.443Z
2023-12-15T08:30:29.753Z
2023-12-15T08:30:29.753Z
{'Vendor': 'ArmorX Global Technology Corporation', 'Product': 'ArmorX Spam ', 'Versions': '8.15.2-2.872.088-1.90.027'}
CVE-2023-48609
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.401Z
2023-12-15T10:15:43.954Z
2023-12-15T10:15:43.954Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48259
The vulnerability allows a remote unauthenticated attacker to read arbitrary content of the results database via a crafted HTTP request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.706Z
2024-01-10T13:05:41.881Z
2024-01-10T13:05:41.881Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48465
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.370Z
2023-12-15T10:16:55.519Z
2023-12-15T10:16:55.519Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48520
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.384Z
2023-12-15T10:16:27.299Z
2023-12-15T10:16:27.299Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48598
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.400Z
2023-12-15T10:16:10.072Z
2023-12-15T10:16:10.072Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48824
BoidCMS 2.0.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) issues via the title, subtitle, footer, or keywords parameter in a page=create action.
http://packetstormsecurity.com/files/176031
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:22:46.358758
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48577
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.393Z
2023-12-15T10:15:44.705Z
2023-12-15T10:15:44.705Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48127
An issue in myGAKUYA mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/myGAKUYA.md
2023-11-13T00:00:00
2024-01-26T00:00:00
2024-01-26T06:30:13.648632
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48648
Concrete CMS before 8.5.13 and 9.x before 9.2.2 allows unauthorized access because directories can be created with insecure permissions. File creation functions (such as the Mkdir() function) gives universal access (0777) to created folders by default. Excessive permissions can be granted when creating a directory with permissions greater than 0755 or when the permissions argument is not specified.
https://www.concretecms.org/about/project-news/security/2023-11-09-security-blog-about-updated-cves-and-new-release
2023-11-17T00:00:00
2023-11-17T00:00:00
2023-11-17T03:45:45.564576
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48218
The Strapi Protected Populate Plugin protects `get` endpoints from revealing too much information. Prior to version 1.3.4, users were able to bypass the field level security. Users who tried to populate something that they didn't have access to could populate those fields anyway. This issue has been patched in version 1.3.4. There are no known workarounds.
https://github.com/strapi-community/strapi-plugin-protected-populate/security/advisories/GHSA-6h67-934r-82g7
2023-11-13T13:25:18.479Z
2023-11-20T17:09:49.274Z
2023-11-20T17:09:49.274Z
{'Vendor': 'strapi-community', 'Product': 'strapi-plugin-protected-populate', 'Versions': '< 1.3.4'}
CVE-2023-48424
U-Boot shell vulnerability resulting in Privilege escalation in a production device
https://source.android.com/docs/security/bulletin/chromecast/2023-12-01
2023-11-16T16:28:09.702Z
2023-12-11T05:13:01.011Z
2023-12-11T05:13:01.011Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'}
CVE-2023-48131
An issue in CHIGASAKI BAKERY mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/CHIGASAKI%20BAKERY.md
2023-11-13T00:00:00
2024-01-26T00:00:00
2024-01-26T06:42:05.223964
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48561
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.390Z
2023-12-15T10:17:06.772Z
2023-12-15T10:17:06.772Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48473
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.371Z
2023-12-15T10:17:46.302Z
2023-12-15T10:17:46.302Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}