CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-48023
|
Anyscale Ray 2.6.3 and 2.8.0 allows /log_proxy SSRF. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
|
https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0
|
2023-11-13T00:00:00
|
2023-11-28T00:00:00
|
2023-11-28T07:30:48.114307
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48536
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.385Z
|
2023-12-15T10:16:54.746Z
|
2023-12-15T10:16:54.746Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48166
|
A directory traversal vulnerability in the SOAP Server integrated in Atos Unify OpenScape Voice V10 before V10R3.26.1 allows a remote attacker to view the contents of arbitrary files in the local file system. An unauthenticated attacker might obtain sensitive files that allow for the compromise of the underlying system.
|
https://networks.unify.com/security/advisories/OBSO-2401-01.pdf
|
2023-11-13T00:00:00
|
2024-01-12T00:00:00
|
2024-01-12T22:28:29.679136
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48371
|
ITPison OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
|
https://www.twcert.org.tw/tw/cp-132-7590-55002-1.html
|
2023-11-16T03:49:45.970Z
|
2023-12-15T04:11:24.574Z
|
2023-12-15T04:11:24.574Z
|
{'Vendor': 'ITPison', 'Product': "OMICARD EDM 's SMS", 'Versions': 'v6.0.1.5'}
|
CVE-2023-48721
| null | null |
2023-11-17T22:29:30.959Z
| null |
2024-01-02T15:34:54.561Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-48234
|
Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq
|
2023-11-13T13:25:18.481Z
|
2023-11-16T22:52:50.866Z
|
2023-11-16T22:52:50.866Z
|
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2109'}
|
CVE-2023-48664
|
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
|
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
|
2023-11-17T06:14:57.041Z
|
2023-12-14T16:08:11.100Z
|
2023-12-14T16:08:11.100Z
|
{'Vendor': 'Dell', 'Product': 'vApp Manager', 'Versions': 'Versions prior to 9.2.4.x'}
|
CVE-2023-48408
|
In ProtocolNetSimFileInfoAdapter() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:09:59.939Z
|
2023-12-08T15:41:36.065Z
|
2023-12-08T15:41:36.065Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48058
|
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/task/run
|
https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20task%20management%20execution%20task%20location.md
|
2023-11-13T00:00:00
|
2023-11-13T00:00:00
|
2023-11-13T16:03:17.038614
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48326
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite Events Manager allows Reflected XSS.This issue affects Events Manager: from n/a through 6.4.5.
|
https://patchstack.com/database/vulnerability/events-manager/wordpress-events-manager-plugin-6-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-14T21:42:18.498Z
|
2023-11-30T11:15:41.035Z
|
2023-11-30T11:15:41.035Z
|
{'Vendor': 'Pixelite', 'Product': 'Events Manager', 'Versions': 'n/a'}
|
CVE-2023-48633
|
Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/after_effects/apsb23-75.html
|
2023-11-16T23:29:25.406Z
|
2023-12-13T13:30:58.490Z
|
2023-12-13T13:30:58.490Z
|
{'Vendor': 'Adobe', 'Product': 'After Effects', 'Versions': '0'}
|
CVE-2023-48263
|
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.708Z
|
2024-01-10T13:08:37.557Z
|
2024-01-10T13:08:37.557Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48799
|
TOTOLINK-X6000R Firmware-V9.4.0cu.852_B20230719 is vulnerable to Command Execution.
|
https://www.notion.so/X6000R-632dd667b4574a2c84b04035d04afb5c?pvs=4
|
2023-11-20T00:00:00
|
2023-12-04T00:00:00
|
2023-12-04T12:16:35.332026
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48849
|
Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering.
|
https://github.com/delsploit/CVE-2023-48849
|
2023-11-20T00:00:00
|
2023-12-06T00:00:00
|
2023-12-06T07:38:50.800026
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48330
|
Cross-Site Request Forgery (CSRF) vulnerability in Mike Strand Bulk Comment Remove allows Cross Site Request Forgery.This issue affects Bulk Comment Remove: from n/a through 2.
|
https://patchstack.com/database/vulnerability/bulk-comment-remove/wordpress-bulk-comment-remove-plugin-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-14T21:42:37.032Z
|
2023-11-30T12:56:25.595Z
|
2023-11-30T12:56:25.595Z
|
{'Vendor': 'Mike Strand', 'Product': 'Bulk Comment Remove', 'Versions': 'n/a'}
|
CVE-2023-48625
|
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
|
2023-11-16T23:29:25.404Z
|
2023-12-13T13:23:10.836Z
|
2023-12-13T13:23:10.836Z
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
|
CVE-2023-48449
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.368Z
|
2023-12-15T10:17:00.459Z
|
2023-12-15T10:17:00.459Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48737
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PT Trijaya Digital Grup TriPay Payment Gateway allows Stored XSS.This issue affects TriPay Payment Gateway: from n/a through 3.2.7.
|
https://patchstack.com/database/vulnerability/tripay-payment-gateway/wordpress-tripay-payment-gateway-plugin-3-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-18T22:09:33.697Z
|
2023-11-30T10:32:21.593Z
|
2023-11-30T10:32:21.593Z
|
{'Vendor': 'PT Trijaya Digital Grup', 'Product': 'TriPay Payment Gateway', 'Versions': 'n/a'}
|
CVE-2023-48388
|
Multisuns EasyLog web+ has a vulnerability of using hard-coded credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.
|
https://www.twcert.org.tw/tw/cp-132-7603-b1061-1.html
|
2023-11-16T03:52:23.443Z
|
2023-12-15T08:45:56.850Z
|
2023-12-15T08:45:56.850Z
|
{'Vendor': 'Multisuns', 'Product': 'EasyLog web+', 'Versions': '1.13.2.8'}
|
CVE-2023-48222
|
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. This issue has been addressed in version 4.17.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/rundeck/rundeck/security/advisories/GHSA-phmw-jx86-x666
|
2023-11-13T13:25:18.480Z
|
2023-11-16T21:59:17.837Z
|
2023-11-16T21:59:17.837Z
|
{'Vendor': 'rundeck', 'Product': 'rundeck', 'Versions': '>= 4.12.0, < 4.17.3'}
|
CVE-2023-48808
|
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
|
https://www.notion.so/X6000R-sub_4119A0-9-075ccc78275a4381a65e114eb1fddd6e?pvs=4
|
2023-11-20T00:00:00
|
2023-11-30T00:00:00
|
2023-11-30T17:58:27.878704
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48736
|
In International Color Consortium DemoIccMAX 3e7948b, CIccCLUT::Interp2d in IccTagLut.cpp in libSampleICC.a has an out-of-bounds read.
|
https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58
|
2023-11-18T00:00:00
|
2023-11-18T00:00:00
|
2023-11-18T18:44:57.637534
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48389
|
Multisuns EasyLog web+ has a path traversal vulnerability within its parameter in a specific URL. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.
|
https://www.twcert.org.tw/tw/cp-132-7604-ab0fd-1.html
|
2023-11-16T03:52:23.443Z
|
2023-12-15T08:50:43.096Z
|
2023-12-15T08:50:43.096Z
|
{'Vendor': 'Multisuns', 'Product': 'EasyLog web+', 'Versions': '1.13.2.8'}
|
CVE-2023-48223
|
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt library does not properly prevent JWT algorithm confusion for all public key types. The 'publicKeyPemMatcher' in 'fast-jwt/src/crypto.js' does not properly match all common PEM formats for public keys. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work if the victim application utilizes a public key containing the `BEGIN RSA PUBLIC KEY` header. Applications using the RS256 algorithm, a public key with a `BEGIN RSA PUBLIC KEY` header, and calling the verify function without explicitly providing an algorithm, are vulnerable to this algorithm confusion attack which allows attackers to sign arbitrary payloads which will be accepted by the verifier. Version 3.3.2 contains a patch for this issue. As a workaround, change line 29 of `blob/master/src/crypto.js` to include a regular expression.
|
https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg
|
2023-11-13T13:25:18.480Z
|
2023-11-20T17:39:56.816Z
|
2023-11-20T17:39:56.816Z
|
{'Vendor': 'nearform', 'Product': 'fast-jwt', 'Versions': '< 3.3.2'}
|
CVE-2023-48448
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.368Z
|
2023-12-15T10:17:09.087Z
|
2023-12-15T10:17:09.087Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48331
|
Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore by Stormhill Media allows Cross Site Request Forgery.This issue affects MyBookTable Bookstore by Stormhill Media: from n/a through 3.3.4.
|
https://patchstack.com/database/vulnerability/mybooktable/wordpress-mybooktable-bookstore-by-stormhill-media-plugin-3-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-14T21:42:37.032Z
|
2023-11-30T12:54:27.072Z
|
2023-11-30T12:54:27.072Z
|
{'Vendor': 'Stormhill Media', 'Product': 'MyBookTable Bookstore by Stormhill Media', 'Versions': 'n/a'}
|
CVE-2023-48624
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.404Z
|
2023-12-15T10:17:39.428Z
|
2023-12-15T10:17:39.428Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48848
|
An arbitrary file read vulnerability in ureport v2.2.9 allows a remote attacker to arbitrarily read files on the server by inserting a crafted path.
|
https://github.com/h00klod0er/ureport2-vuln/
|
2023-11-20T00:00:00
|
2023-11-28T00:00:00
|
2023-11-28T17:08:11.566136
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48327
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WC Vendors WC Vendors – WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors.This issue affects WC Vendors – WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors: from n/a through 2.4.7.
|
https://patchstack.com/database/vulnerability/wc-vendors/wordpress-wc-vendors-marketplace-plugin-2-4-7-sql-injection-vulnerability?_s_id=cve
|
2023-11-14T21:42:37.030Z
|
2023-12-19T20:50:26.628Z
|
2023-12-19T20:50:26.628Z
|
{'Vendor': 'WC Vendors', 'Product': 'WC Vendors – WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors', 'Versions': 'n/a'}
|
CVE-2023-48632
|
Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/after_effects/apsb23-75.html
|
2023-11-16T23:29:25.406Z
|
2023-12-13T13:30:56.162Z
|
2023-12-13T13:30:56.162Z
|
{'Vendor': 'Adobe', 'Product': 'After Effects', 'Versions': '0'}
|
CVE-2023-48262
|
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.708Z
|
2024-01-10T13:08:03.996Z
|
2024-01-10T13:08:03.996Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48409
|
In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/mali_kbase_core_linux.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:09:59.939Z
|
2023-12-08T15:41:49.022Z
|
2023-12-08T15:41:49.022Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48720
|
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/gilels/
|
2023-11-17T22:29:30.959Z
|
2023-12-21T21:00:42.981Z
|
2023-12-21T21:00:42.981Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Student Result Management System', 'Versions': '1.0'}
|
CVE-2023-48235
|
Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an
overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g
|
2023-11-13T13:25:18.481Z
|
2023-11-16T22:50:57.878Z
|
2023-11-16T22:50:57.878Z
|
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2110'}
|
CVE-2023-48665
|
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
|
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
|
2023-11-17T06:14:57.041Z
|
2023-12-14T16:12:20.442Z
|
2023-12-14T16:12:20.442Z
|
{'Vendor': 'Dell', 'Product': 'vApp Manager,', 'Versions': 'Versions prior to 9.2.4.x'}
|
CVE-2023-48472
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.371Z
|
2023-12-15T10:17:26.142Z
|
2023-12-15T10:17:26.142Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48188
|
SQL injection vulnerability in PrestaShop opartdevis v.4.5.18 thru v.4.6.12 allows a remote attacker to execute arbitrary code via a crafted script to the getModuleTranslation function.
|
https://security.friendsofpresta.org/modules/2023/11/23/opartdevis.html
|
2023-11-13T00:00:00
|
2023-11-27T00:00:00
|
2023-11-27T22:36:39.031055
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48022
|
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
|
https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0
|
2023-11-13T00:00:00
|
2023-11-28T00:00:00
|
2023-11-28T07:25:09.000030
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48864
|
SEMCMS v4.8 was discovered to contain a SQL injection vulnerability via the languageID parameter in /web_inc.php.
|
https://gitee.com/NoBlake/cve-2023-48864
|
2023-11-20T00:00:00
|
2024-01-10T00:00:00
|
2024-01-10T07:41:51.395515
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48537
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.386Z
|
2023-12-15T10:17:23.062Z
|
2023-12-15T10:17:23.062Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48425
|
U-Boot vulnerability resulting in persistent Code Execution
|
https://source.android.com/docs/security/bulletin/chromecast/2023-12-01
|
2023-11-16T16:28:09.702Z
|
2023-12-11T05:15:59.638Z
|
2023-12-11T05:15:59.638Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'}
|
CVE-2023-48130
|
An issue in GINZA CAFE mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
https://github.com/syz913/CVE-reports/blob/main/GINZA%20CAFE.md
|
2023-11-13T00:00:00
|
2024-01-26T00:00:00
|
2024-01-26T07:04:47.064534
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48560
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.390Z
|
2023-12-15T10:15:31.810Z
|
2023-12-15T10:15:31.810Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48833
|
A lack of rate limiting in pjActionAJaxSend in Time Slots Booking Calendar 4.0 allows attackers to cause resource exhaustion.
|
https://www.phpjabbers.com/time-slots-booking-calendar/
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:42:21.313343
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48649
|
Concrete CMS before 8.5.13 and 9.x before 9.2.2 allows stored XSS on the Admin page via an uploaded file name.
|
https://www.concretecms.org/about/project-news/security/2023-11-09-security-blog-about-updated-cves-and-new-release
|
2023-11-17T00:00:00
|
2023-11-17T00:00:00
|
2023-11-17T03:45:15.000117
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48219
|
TinyMCE is an open source rich text editor. A mutation cross-site scripting (mXSS) vulnerability was discovered in TinyMCE’s core undo/redo functionality and other APIs and plugins. Text nodes within specific parents are not escaped upon serialization according to the HTML standard. If such text nodes contain a special character reserved as an internal marker, they can be combined with other HTML patterns to form malicious snippets. These snippets pass the initial sanitisation layer when the content is parsed into the editor body, but can trigger XSS when the special internal marker is removed from the content and re-parsed. his vulnerability has been patched in TinyMCE versions 6.7.3 and 5.10.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/tinymce/tinymce/security/advisories/GHSA-v626-r774-j7f8
|
2023-11-13T13:25:18.479Z
|
2023-11-15T18:59:03.776Z
|
2023-11-15T18:59:03.776Z
|
{'Vendor': 'tinymce', 'Product': 'tinymce', 'Versions': '>= 6.0.0 < 6.7.3, < 5.10.9'}
|
CVE-2023-48433
|
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the login_action.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/ma/
|
2023-11-16T21:15:35.614Z
|
2023-12-20T20:28:11.596Z
|
2023-12-20T20:28:11.596Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Voting System Project', 'Versions': '1.0'}
|
CVE-2023-48063
|
An issue was discovered in dreamer_cms 4.1.3. There is a CSRF vulnerability that can delete a theme project via /admin/category/delete.
|
https://github.com/CP1379767017/cms/blob/dreamcms_vul/There%20is%20a%20CSRF%20vulnerability%20at%20th%20menu%20management%20location.md
|
2023-11-13T00:00:00
|
2023-11-13T00:00:00
|
2023-11-13T16:11:38.875242
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48599
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.400Z
|
2023-12-15T10:15:23.981Z
|
2023-12-15T10:15:23.981Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48825
|
Availability Booking Calendar 5.0 is vulnerable to Multiple HTML Injection issues via SMS API Key or Default Country Code.
|
http://packetstormsecurity.com/files/176033
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:25:59.572645
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48576
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.392Z
|
2023-12-15T10:16:51.310Z
|
2023-12-15T10:16:51.310Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48126
|
An issue in Luxe Beauty Clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
|
https://github.com/syz913/CVE-reports/blob/main/Luxe%20Beauty%20Clinic.md
|
2023-11-13T00:00:00
|
2024-01-26T00:00:00
|
2024-01-26T07:06:48.220905
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48034
|
An issue discovered in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject arbitrary keystrokes via use of weak encryption.
|
https://github.com/aprkr/CVE-2023-48034
|
2023-11-13T00:00:00
|
2023-11-27T00:00:00
|
2023-11-27T20:47:40.277465
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48464
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.370Z
|
2023-12-15T10:17:27.656Z
|
2023-12-15T10:17:27.656Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48521
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.384Z
|
2023-12-15T10:16:29.529Z
|
2023-12-15T10:16:29.529Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48608
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by an Improper Input Validation vulnerability. A low-privileged attacker could leverage this vulnerability to achieve a low-integrity impact within the application. Exploitation of this issue requires user interaction.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.401Z
|
2023-12-15T10:16:48.261Z
|
2023-12-15T10:16:48.261Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48258
|
The vulnerability allows a remote attacker to delete arbitrary files on the file system via a crafted URL or HTTP
request through a victim’s session.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.706Z
|
2024-01-10T13:05:08.294Z
|
2024-01-10T13:05:08.294Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48690
| null | null |
2023-11-17T17:00:26.199Z
|
2023-12-21T20:47:21.255Z
|
2024-01-02T14:41:11.622Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-48805
|
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
|
https://www.notion.so/X6000R-sub_4119A0-2-6a912e23617244409ae8c5837d4288b4?pvs=4
|
2023-11-20T00:00:00
|
2023-11-30T00:00:00
|
2023-11-30T18:02:32.911500
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48556
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.389Z
|
2023-12-15T10:16:22.671Z
|
2023-12-15T10:16:22.671Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48106
|
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file.
|
https://github.com/zlib-ng/minizip-ng/issues/740
|
2023-11-13T00:00:00
|
2023-11-22T00:00:00
|
2023-11-22T17:30:20.679633
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48413
|
In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:09:59.939Z
|
2023-12-08T15:44:38.268Z
|
2023-12-08T15:44:38.268Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48940
|
A stored cross-site scripting (XSS) vulnerability in /admin.php of DaiCuo v2.5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
|
http://daicuo.com
|
2023-11-20T00:00:00
|
2023-12-06T00:00:00
|
2023-12-06T01:25:47.007910
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48297
|
Discourse is a platform for community discussion. The message serializer uses the full list of expanded chat mentions (@all and @here) which can lead to a very long array of users. This issue was patched in versions 3.1.4 and beta 3.2.0.beta5.
|
https://github.com/discourse/discourse/security/advisories/GHSA-hf2v-r5xm-8p37
|
2023-11-14T17:41:15.570Z
|
2024-01-12T20:35:02.394Z
|
2024-01-12T20:35:02.394Z
|
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.4, >= 3.2.0beta1, < 3.2.0.beta4'}
|
CVE-2023-48628
|
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
|
2023-11-16T23:29:25.405Z
|
2023-12-13T13:23:09.310Z
|
2023-12-13T13:23:09.310Z
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
|
CVE-2023-48278
|
Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha allows Stored XSS.This issue affects WP Forms Puzzle Captcha: from n/a through 4.1.
|
https://patchstack.com/database/vulnerability/wp-forms-puzzle-captcha/wordpress-wp-forms-puzzle-captcha-plugin-4-1-csrf-to-xss-vulnerability?_s_id=cve
|
2023-11-13T17:33:51.625Z
|
2023-11-30T16:08:50.313Z
|
2023-11-30T16:08:50.313Z
|
{'Vendor': 'Nitin Rathod', 'Product': 'WP Forms Puzzle Captcha', 'Versions': 'n/a'}
|
CVE-2023-48782
|
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters
|
https://fortiguard.com/psirt/FG-IR-23-450
|
2023-11-19T19:58:38.554Z
|
2023-12-13T06:37:42.217Z
|
2023-12-13T06:37:42.217Z
|
{'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0'}
|
CVE-2023-48501
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.376Z
|
2023-12-15T10:17:51.632Z
|
2023-12-15T10:17:51.632Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48014
|
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
|
https://github.com/gpac/gpac/issues/2613
|
2023-11-13T00:00:00
|
2023-11-15T00:00:00
|
2023-11-15T18:59:21.849129
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48444
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.368Z
|
2023-12-15T10:16:31.047Z
|
2023-12-15T10:16:31.047Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48281
|
Cross-Site Request Forgery (CSRF) vulnerability in Super Blog Me Broken Link Checker for YouTube allows Cross Site Request Forgery.This issue affects Broken Link Checker for YouTube: from n/a through 1.3.
|
https://patchstack.com/database/vulnerability/broken-link-checker-for-youtube/wordpress-broken-link-checker-for-youtube-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-13T23:43:33.533Z
|
2023-11-30T13:09:34.941Z
|
2023-11-30T13:09:34.941Z
|
{'Vendor': 'Super Blog Me', 'Product': 'Broken Link Checker for YouTube', 'Versions': 'n/a'}
|
CVE-2023-48517
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.384Z
|
2023-12-15T10:17:17.817Z
|
2023-12-15T10:17:17.817Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48452
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.368Z
|
2023-12-15T10:17:34.841Z
|
2023-12-15T10:17:34.841Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48686
| null | null |
2023-11-17T17:00:26.199Z
|
2023-12-21T20:40:48.798Z
|
2024-01-02T14:40:18.471Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-48393
|
Kaifa Technology WebITR is an online attendance system. A remote attacker with regular user privilege can obtain partial sensitive system information from error message.
|
https://www.twcert.org.tw/tw/cp-132-7623-5660d-1.html
|
2023-11-16T04:08:17.028Z
|
2023-12-15T09:22:49.735Z
|
2024-01-17T07:22:49.481Z
|
{'Vendor': 'Kaifa Technology', 'Product': 'WebITR', 'Versions': '2_1_0_19'}
|
CVE-2023-48239
|
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267
|
2023-11-13T13:25:18.482Z
|
2023-11-21T21:02:35.442Z
|
2023-11-21T21:02:35.442Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.13, >= 26.0.0, < 26.0.8, >= 27.0.0, < 27.1.3, >= 20.0.0, < 20.0.14.16, >= 21.0.0, < 21.0.9.13, >= 22.0.0, < 22.2.10.15, >= 23.0.0, < 23.0.12.12, >= 24.0.0, < 24.0.12.8'}
|
CVE-2023-48110
|
Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow via the urls parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack
|
http://tjr181.com/index.php/archives/13/
|
2023-11-13T00:00:00
|
2023-11-20T00:00:00
|
2023-11-20T20:02:28.662400
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48540
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.387Z
|
2023-12-15T10:16:37.960Z
|
2023-12-15T10:16:37.960Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48813
|
Senayan Library Management Systems (Slims) 9 Bulian v9.6.1 is vulnerable to SQL Injection via admin/modules/reporting/customs/fines_report.php.
|
https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md
|
2023-11-20T00:00:00
|
2023-12-01T00:00:00
|
2023-12-01T15:21:39.368152
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48055
|
SuperAGI v0.0.13 was discovered to use a hardcoded key for encryption operations. This vulnerability can lead to the disclosure of information and communications.
|
https://gxx777.github.io/SuperAGI_v0.0.13_Cryptographic_API_Misuse_Vulnerability.md
|
2023-11-13T00:00:00
|
2023-11-16T00:00:00
|
2023-11-16T17:16:50.105745
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48405
|
there is a possible way for the secure world to write to NS memory due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:08:52.675Z
|
2023-12-08T15:41:02.058Z
|
2023-12-08T15:41:02.058Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48612
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.402Z
|
2023-12-15T10:16:52.086Z
|
2023-12-15T10:16:52.086Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48242
|
The vulnerability allows an authenticated remote attacker to download arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.701Z
|
2024-01-10T10:35:25.216Z
|
2024-01-10T10:35:25.216Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48307
|
Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. Starting in version 1.13.0 and prior to version 2.2.8 and 3.3.0, an attacker can use an unprotected endpoint in the Mail app to perform a SSRF attack. Nextcloud Mail app versions 2.2.8 and 3.3.0 contain a patch for this issue. As a workaround, disable the mail app.
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999
|
2023-11-14T17:41:15.572Z
|
2023-11-21T22:22:56.780Z
|
2023-11-21T22:22:56.780Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 1.13.0, < 2.2.8, >= 3.1.0, < 3.3.0'}
|
CVE-2023-48887
|
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
|
https://github.com/fengjiachun/Jupiter
|
2023-11-20T00:00:00
|
2023-12-01T00:00:00
|
2023-12-01T22:30:24.851553
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48491
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.375Z
|
2023-12-15T10:15:45.494Z
|
2023-12-15T10:15:45.494Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48350
|
In video decoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.391Z
|
2024-01-18T02:44:52.068Z
|
2024-01-18T02:44:52.068Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
|
CVE-2023-48700
|
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials.
|
https://github.com/nautobot/nautobot-plugin-device-onboarding/security/advisories/GHSA-qf3c-rw9f-jh7v
|
2023-11-17T19:43:37.553Z
|
2023-11-21T22:30:58.030Z
|
2023-11-21T22:30:58.030Z
|
{'Vendor': 'nautobot', 'Product': 'nautobot-plugin-device-onboarding', 'Versions': '>= 2.0.0, < 3.0.0'}
|
CVE-2023-48429
|
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The Web UI of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the server. The server will automatically restart.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf
|
2023-11-16T16:30:40.849Z
|
2023-12-12T11:27:20.840Z
|
2023-12-12T11:27:20.840Z
|
{'Vendor': 'Siemens', 'Product': 'SINEC INS', 'Versions': 'All versions < V1.0 SP2 Update 2'}
|
CVE-2023-48583
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.394Z
|
2023-12-15T10:17:29.409Z
|
2023-12-15T10:17:29.409Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48653
|
Concrete CMS before 8.5.14 and 9 before 9.2.3 allows Cross Site Request Forgery (CSRF) via ccm/calendar/dialogs/event/delete/submit. An attacker can force an admin to delete events on the site because the event ID is numeric and sequential.
|
https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes
|
2023-11-17T00:00:00
|
2023-12-25T00:00:00
|
2023-12-25T18:54:02.273142
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48716
|
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'class_id' parameter of the add_classes.php resource does not validate the characters received and they are sent unfiltered to the database.
|
https://fluidattacks.com/advisories/gilels/
|
2023-11-17T22:29:30.959Z
|
2023-12-21T20:53:11.923Z
|
2023-12-21T20:53:11.923Z
|
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Student Result Management System', 'Versions': '1.0'}
|
CVE-2023-48346
|
In video decoder, there is a possible improper input validation. This could lead to local denial of service with no additional execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.390Z
|
2024-01-18T02:44:51.067Z
|
2024-01-18T02:44:51.067Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
|
CVE-2023-48595
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.399Z
|
2023-12-15T10:17:17.057Z
|
2023-12-15T10:17:17.057Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48254
|
The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.705Z
|
2024-01-10T13:02:51.682Z
|
2024-01-10T13:02:51.682Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48604
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.401Z
|
2023-12-15T10:17:53.937Z
|
2023-12-15T10:17:53.937Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48311
|
dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior.
|
https://github.com/jupyterhub/dockerspawner/security/advisories/GHSA-hfgr-h3vc-p6c2
|
2023-11-14T17:41:15.573Z
|
2023-12-08T20:08:31.736Z
|
2023-12-08T20:08:31.736Z
|
{'Vendor': 'jupyterhub', 'Product': 'dockerspawner', 'Versions': '>= 0.11.0, < 13.0'}
|
CVE-2023-48741
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in QuantumCloud AI ChatBot.This issue affects AI ChatBot: from n/a through 4.7.8.
|
https://patchstack.com/database/vulnerability/chatbot/wordpress-ai-chatbot-plugin-4-7-8-sql-injection-vulnerability?_s_id=cve
|
2023-11-18T22:09:33.698Z
|
2023-12-19T20:43:58.291Z
|
2023-12-19T20:43:58.291Z
|
{'Vendor': 'QuantumCloud', 'Product': 'AI ChatBot', 'Versions': 'n/a'}
|
CVE-2023-48468
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.370Z
|
2023-12-15T10:17:52.396Z
|
2023-12-15T10:17:52.396Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48192
|
An issue in TOTOlink A3700R v.9.1.2u.6134_B20201202 allows a local attacker to execute arbitrary code via the setTracerouteCfg function.
|
http://totolink.com
|
2023-11-13T00:00:00
|
2023-11-20T00:00:00
|
2023-11-20T21:44:34.300986
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.