CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-48023
Anyscale Ray 2.6.3 and 2.8.0 allows /log_proxy SSRF. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0
2023-11-13T00:00:00
2023-11-28T00:00:00
2023-11-28T07:30:48.114307
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48536
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.385Z
2023-12-15T10:16:54.746Z
2023-12-15T10:16:54.746Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48166
A directory traversal vulnerability in the SOAP Server integrated in Atos Unify OpenScape Voice V10 before V10R3.26.1 allows a remote attacker to view the contents of arbitrary files in the local file system. An unauthenticated attacker might obtain sensitive files that allow for the compromise of the underlying system.
https://networks.unify.com/security/advisories/OBSO-2401-01.pdf
2023-11-13T00:00:00
2024-01-12T00:00:00
2024-01-12T22:28:29.679136
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48371
ITPison OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7590-55002-1.html
2023-11-16T03:49:45.970Z
2023-12-15T04:11:24.574Z
2023-12-15T04:11:24.574Z
{'Vendor': 'ITPison', 'Product': "OMICARD EDM 's SMS", 'Versions': 'v6.0.1.5'}
CVE-2023-48721
null
null
2023-11-17T22:29:30.959Z
null
2024-01-02T15:34:54.561Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-48234
Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq
2023-11-13T13:25:18.481Z
2023-11-16T22:52:50.866Z
2023-11-16T22:52:50.866Z
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2109'}
CVE-2023-48664
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
2023-11-17T06:14:57.041Z
2023-12-14T16:08:11.100Z
2023-12-14T16:08:11.100Z
{'Vendor': 'Dell', 'Product': 'vApp Manager', 'Versions': 'Versions prior to 9.2.4.x'}
CVE-2023-48408
In ProtocolNetSimFileInfoAdapter() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:09:59.939Z
2023-12-08T15:41:36.065Z
2023-12-08T15:41:36.065Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48058
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/task/run
https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20task%20management%20execution%20task%20location.md
2023-11-13T00:00:00
2023-11-13T00:00:00
2023-11-13T16:03:17.038614
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48326
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite Events Manager allows Reflected XSS.This issue affects Events Manager: from n/a through 6.4.5.
https://patchstack.com/database/vulnerability/events-manager/wordpress-events-manager-plugin-6-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-14T21:42:18.498Z
2023-11-30T11:15:41.035Z
2023-11-30T11:15:41.035Z
{'Vendor': 'Pixelite', 'Product': 'Events Manager', 'Versions': 'n/a'}
CVE-2023-48633
Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/after_effects/apsb23-75.html
2023-11-16T23:29:25.406Z
2023-12-13T13:30:58.490Z
2023-12-13T13:30:58.490Z
{'Vendor': 'Adobe', 'Product': 'After Effects', 'Versions': '0'}
CVE-2023-48263
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.708Z
2024-01-10T13:08:37.557Z
2024-01-10T13:08:37.557Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48799
TOTOLINK-X6000R Firmware-V9.4.0cu.852_B20230719 is vulnerable to Command Execution.
https://www.notion.so/X6000R-632dd667b4574a2c84b04035d04afb5c?pvs=4
2023-11-20T00:00:00
2023-12-04T00:00:00
2023-12-04T12:16:35.332026
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48849
Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthenticated attackers to remotely execute arbitrary code due to incorrect filtering.
https://github.com/delsploit/CVE-2023-48849
2023-11-20T00:00:00
2023-12-06T00:00:00
2023-12-06T07:38:50.800026
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48330
Cross-Site Request Forgery (CSRF) vulnerability in Mike Strand Bulk Comment Remove allows Cross Site Request Forgery.This issue affects Bulk Comment Remove: from n/a through 2.
https://patchstack.com/database/vulnerability/bulk-comment-remove/wordpress-bulk-comment-remove-plugin-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-14T21:42:37.032Z
2023-11-30T12:56:25.595Z
2023-11-30T12:56:25.595Z
{'Vendor': 'Mike Strand', 'Product': 'Bulk Comment Remove', 'Versions': 'n/a'}
CVE-2023-48625
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
2023-11-16T23:29:25.404Z
2023-12-13T13:23:10.836Z
2023-12-13T13:23:10.836Z
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
CVE-2023-48449
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:17:00.459Z
2023-12-15T10:17:00.459Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48737
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PT Trijaya Digital Grup TriPay Payment Gateway allows Stored XSS.This issue affects TriPay Payment Gateway: from n/a through 3.2.7.
https://patchstack.com/database/vulnerability/tripay-payment-gateway/wordpress-tripay-payment-gateway-plugin-3-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-18T22:09:33.697Z
2023-11-30T10:32:21.593Z
2023-11-30T10:32:21.593Z
{'Vendor': 'PT Trijaya Digital Grup', 'Product': 'TriPay Payment Gateway', 'Versions': 'n/a'}
CVE-2023-48388
Multisuns EasyLog web+ has a vulnerability of using hard-coded credentials. An remote attacker can exploit this vulnerability to access the system to perform arbitrary system operations or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7603-b1061-1.html
2023-11-16T03:52:23.443Z
2023-12-15T08:45:56.850Z
2023-12-15T08:45:56.850Z
{'Vendor': 'Multisuns', 'Product': 'EasyLog web+', 'Versions': '1.13.2.8'}
CVE-2023-48222
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. This issue has been addressed in version 4.17.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/rundeck/rundeck/security/advisories/GHSA-phmw-jx86-x666
2023-11-13T13:25:18.480Z
2023-11-16T21:59:17.837Z
2023-11-16T21:59:17.837Z
{'Vendor': 'rundeck', 'Product': 'rundeck', 'Versions': '>= 4.12.0, < 4.17.3'}
CVE-2023-48808
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
https://www.notion.so/X6000R-sub_4119A0-9-075ccc78275a4381a65e114eb1fddd6e?pvs=4
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T17:58:27.878704
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48736
In International Color Consortium DemoIccMAX 3e7948b, CIccCLUT::Interp2d in IccTagLut.cpp in libSampleICC.a has an out-of-bounds read.
https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58
2023-11-18T00:00:00
2023-11-18T00:00:00
2023-11-18T18:44:57.637534
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48389
Multisuns EasyLog web+ has a path traversal vulnerability within its parameter in a specific URL. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.
https://www.twcert.org.tw/tw/cp-132-7604-ab0fd-1.html
2023-11-16T03:52:23.443Z
2023-12-15T08:50:43.096Z
2023-12-15T08:50:43.096Z
{'Vendor': 'Multisuns', 'Product': 'EasyLog web+', 'Versions': '1.13.2.8'}
CVE-2023-48223
fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to version 3.3.2, the fast-jwt library does not properly prevent JWT algorithm confusion for all public key types. The 'publicKeyPemMatcher' in 'fast-jwt/src/crypto.js' does not properly match all common PEM formats for public keys. To exploit this vulnerability, an attacker needs to craft a malicious JWT token containing the HS256 algorithm, signed with the public RSA key of the victim application. This attack will only work if the victim application utilizes a public key containing the `BEGIN RSA PUBLIC KEY` header. Applications using the RS256 algorithm, a public key with a `BEGIN RSA PUBLIC KEY` header, and calling the verify function without explicitly providing an algorithm, are vulnerable to this algorithm confusion attack which allows attackers to sign arbitrary payloads which will be accepted by the verifier. Version 3.3.2 contains a patch for this issue. As a workaround, change line 29 of `blob/master/src/crypto.js` to include a regular expression.
https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg
2023-11-13T13:25:18.480Z
2023-11-20T17:39:56.816Z
2023-11-20T17:39:56.816Z
{'Vendor': 'nearform', 'Product': 'fast-jwt', 'Versions': '< 3.3.2'}
CVE-2023-48448
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:17:09.087Z
2023-12-15T10:17:09.087Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48331
Cross-Site Request Forgery (CSRF) vulnerability in Stormhill Media MyBookTable Bookstore by Stormhill Media allows Cross Site Request Forgery.This issue affects MyBookTable Bookstore by Stormhill Media: from n/a through 3.3.4.
https://patchstack.com/database/vulnerability/mybooktable/wordpress-mybooktable-bookstore-by-stormhill-media-plugin-3-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-14T21:42:37.032Z
2023-11-30T12:54:27.072Z
2023-11-30T12:54:27.072Z
{'Vendor': 'Stormhill Media', 'Product': 'MyBookTable Bookstore by Stormhill Media', 'Versions': 'n/a'}
CVE-2023-48624
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.404Z
2023-12-15T10:17:39.428Z
2023-12-15T10:17:39.428Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48848
An arbitrary file read vulnerability in ureport v2.2.9 allows a remote attacker to arbitrarily read files on the server by inserting a crafted path.
https://github.com/h00klod0er/ureport2-vuln/
2023-11-20T00:00:00
2023-11-28T00:00:00
2023-11-28T17:08:11.566136
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48327
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WC Vendors WC Vendors – WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors.This issue affects WC Vendors – WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors: from n/a through 2.4.7.
https://patchstack.com/database/vulnerability/wc-vendors/wordpress-wc-vendors-marketplace-plugin-2-4-7-sql-injection-vulnerability?_s_id=cve
2023-11-14T21:42:37.030Z
2023-12-19T20:50:26.628Z
2023-12-19T20:50:26.628Z
{'Vendor': 'WC Vendors', 'Product': 'WC Vendors – WooCommerce Multi-Vendor, WooCommerce Marketplace, Product Vendors', 'Versions': 'n/a'}
CVE-2023-48632
Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/after_effects/apsb23-75.html
2023-11-16T23:29:25.406Z
2023-12-13T13:30:56.162Z
2023-12-13T13:30:56.162Z
{'Vendor': 'Adobe', 'Product': 'After Effects', 'Versions': '0'}
CVE-2023-48262
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.708Z
2024-01-10T13:08:03.996Z
2024-01-10T13:08:03.996Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48409
In gpu_pixel_handle_buffer_liveness_update_ioctl of private/google-modules/gpu/mali_kbase/mali_kbase_core_linux.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:09:59.939Z
2023-12-08T15:41:49.022Z
2023-12-08T15:41:49.022Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48720
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/gilels/
2023-11-17T22:29:30.959Z
2023-12-21T21:00:42.981Z
2023-12-21T21:00:42.981Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Student Result Management System', 'Versions': '1.0'}
CVE-2023-48235
Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g
2023-11-13T13:25:18.481Z
2023-11-16T22:50:57.878Z
2023-11-16T22:50:57.878Z
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2110'}
CVE-2023-48665
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
2023-11-17T06:14:57.041Z
2023-12-14T16:12:20.442Z
2023-12-14T16:12:20.442Z
{'Vendor': 'Dell', 'Product': 'vApp Manager,', 'Versions': 'Versions prior to 9.2.4.x'}
CVE-2023-48472
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.371Z
2023-12-15T10:17:26.142Z
2023-12-15T10:17:26.142Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48188
SQL injection vulnerability in PrestaShop opartdevis v.4.5.18 thru v.4.6.12 allows a remote attacker to execute arbitrary code via a crafted script to the getModuleTranslation function.
https://security.friendsofpresta.org/modules/2023/11/23/opartdevis.html
2023-11-13T00:00:00
2023-11-27T00:00:00
2023-11-27T22:36:39.031055
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48022
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0
2023-11-13T00:00:00
2023-11-28T00:00:00
2023-11-28T07:25:09.000030
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48864
SEMCMS v4.8 was discovered to contain a SQL injection vulnerability via the languageID parameter in /web_inc.php.
https://gitee.com/NoBlake/cve-2023-48864
2023-11-20T00:00:00
2024-01-10T00:00:00
2024-01-10T07:41:51.395515
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48537
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.386Z
2023-12-15T10:17:23.062Z
2023-12-15T10:17:23.062Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48425
U-Boot vulnerability resulting in persistent Code Execution 
https://source.android.com/docs/security/bulletin/chromecast/2023-12-01
2023-11-16T16:28:09.702Z
2023-12-11T05:15:59.638Z
2023-12-11T05:15:59.638Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'}
CVE-2023-48130
An issue in GINZA CAFE mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/GINZA%20CAFE.md
2023-11-13T00:00:00
2024-01-26T00:00:00
2024-01-26T07:04:47.064534
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48560
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.390Z
2023-12-15T10:15:31.810Z
2023-12-15T10:15:31.810Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48833
A lack of rate limiting in pjActionAJaxSend in Time Slots Booking Calendar 4.0 allows attackers to cause resource exhaustion.
https://www.phpjabbers.com/time-slots-booking-calendar/
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:42:21.313343
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48649
Concrete CMS before 8.5.13 and 9.x before 9.2.2 allows stored XSS on the Admin page via an uploaded file name.
https://www.concretecms.org/about/project-news/security/2023-11-09-security-blog-about-updated-cves-and-new-release
2023-11-17T00:00:00
2023-11-17T00:00:00
2023-11-17T03:45:15.000117
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48219
TinyMCE is an open source rich text editor. A mutation cross-site scripting (mXSS) vulnerability was discovered in TinyMCE’s core undo/redo functionality and other APIs and plugins. Text nodes within specific parents are not escaped upon serialization according to the HTML standard. If such text nodes contain a special character reserved as an internal marker, they can be combined with other HTML patterns to form malicious snippets. These snippets pass the initial sanitisation layer when the content is parsed into the editor body, but can trigger XSS when the special internal marker is removed from the content and re-parsed. his vulnerability has been patched in TinyMCE versions 6.7.3 and 5.10.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/tinymce/tinymce/security/advisories/GHSA-v626-r774-j7f8
2023-11-13T13:25:18.479Z
2023-11-15T18:59:03.776Z
2023-11-15T18:59:03.776Z
{'Vendor': 'tinymce', 'Product': 'tinymce', 'Versions': '>= 6.0.0 < 6.7.3, < 5.10.9'}
CVE-2023-48433
Online Voting System Project v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'username' parameter of the login_action.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/ma/
2023-11-16T21:15:35.614Z
2023-12-20T20:28:11.596Z
2023-12-20T20:28:11.596Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Voting System Project', 'Versions': '1.0'}
CVE-2023-48063
An issue was discovered in dreamer_cms 4.1.3. There is a CSRF vulnerability that can delete a theme project via /admin/category/delete.
https://github.com/CP1379767017/cms/blob/dreamcms_vul/There%20is%20a%20CSRF%20vulnerability%20at%20th%20menu%20management%20location.md
2023-11-13T00:00:00
2023-11-13T00:00:00
2023-11-13T16:11:38.875242
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48599
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.400Z
2023-12-15T10:15:23.981Z
2023-12-15T10:15:23.981Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48825
Availability Booking Calendar 5.0 is vulnerable to Multiple HTML Injection issues via SMS API Key or Default Country Code.
http://packetstormsecurity.com/files/176033
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:25:59.572645
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48576
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.392Z
2023-12-15T10:16:51.310Z
2023-12-15T10:16:51.310Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48126
An issue in Luxe Beauty Clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
https://github.com/syz913/CVE-reports/blob/main/Luxe%20Beauty%20Clinic.md
2023-11-13T00:00:00
2024-01-26T00:00:00
2024-01-26T07:06:48.220905
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48034
An issue discovered in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject arbitrary keystrokes via use of weak encryption.
https://github.com/aprkr/CVE-2023-48034
2023-11-13T00:00:00
2023-11-27T00:00:00
2023-11-27T20:47:40.277465
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48464
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.370Z
2023-12-15T10:17:27.656Z
2023-12-15T10:17:27.656Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48521
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.384Z
2023-12-15T10:16:29.529Z
2023-12-15T10:16:29.529Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48608
Adobe Experience Manager versions 6.5.18 and earlier are affected by an Improper Input Validation vulnerability. A low-privileged attacker could leverage this vulnerability to achieve a low-integrity impact within the application. Exploitation of this issue requires user interaction.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.401Z
2023-12-15T10:16:48.261Z
2023-12-15T10:16:48.261Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48258
The vulnerability allows a remote attacker to delete arbitrary files on the file system via a crafted URL or HTTP request through a victim’s session.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.706Z
2024-01-10T13:05:08.294Z
2024-01-10T13:05:08.294Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48690
null
null
2023-11-17T17:00:26.199Z
2023-12-21T20:47:21.255Z
2024-01-02T14:41:11.622Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-48805
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function when passed to the CsteSystem function creates a command execution vulnerability.
https://www.notion.so/X6000R-sub_4119A0-2-6a912e23617244409ae8c5837d4288b4?pvs=4
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T18:02:32.911500
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48556
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.389Z
2023-12-15T10:16:22.671Z
2023-12-15T10:16:22.671Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48106
Buffer Overflow vulnerability in zlib-ng minizip-ng v.4.0.2 allows an attacker to execute arbitrary code via a crafted file to the mz_path_resolve function in the mz_os.c file.
https://github.com/zlib-ng/minizip-ng/issues/740
2023-11-13T00:00:00
2023-11-22T00:00:00
2023-11-22T17:30:20.679633
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48413
In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:09:59.939Z
2023-12-08T15:44:38.268Z
2023-12-08T15:44:38.268Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48940
A stored cross-site scripting (XSS) vulnerability in /admin.php of DaiCuo v2.5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
http://daicuo.com
2023-11-20T00:00:00
2023-12-06T00:00:00
2023-12-06T01:25:47.007910
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48297
Discourse is a platform for community discussion. The message serializer uses the full list of expanded chat mentions (@all and @here) which can lead to a very long array of users. This issue was patched in versions 3.1.4 and beta 3.2.0.beta5.
https://github.com/discourse/discourse/security/advisories/GHSA-hf2v-r5xm-8p37
2023-11-14T17:41:15.570Z
2024-01-12T20:35:02.394Z
2024-01-12T20:35:02.394Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.4, >= 3.2.0beta1, < 3.2.0.beta4'}
CVE-2023-48628
Adobe Substance 3D Sampler versions 4.2.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d-sampler/apsb23-74.html
2023-11-16T23:29:25.405Z
2023-12-13T13:23:09.310Z
2023-12-13T13:23:09.310Z
{'Vendor': 'Adobe', 'Product': 'Substance3D - Sampler', 'Versions': '0'}
CVE-2023-48278
Cross-Site Request Forgery (CSRF) vulnerability in Nitin Rathod WP Forms Puzzle Captcha allows Stored XSS.This issue affects WP Forms Puzzle Captcha: from n/a through 4.1.
https://patchstack.com/database/vulnerability/wp-forms-puzzle-captcha/wordpress-wp-forms-puzzle-captcha-plugin-4-1-csrf-to-xss-vulnerability?_s_id=cve
2023-11-13T17:33:51.625Z
2023-11-30T16:08:50.313Z
2023-11-30T16:08:50.313Z
{'Vendor': 'Nitin Rathod', 'Product': 'WP Forms Puzzle Captcha', 'Versions': 'n/a'}
CVE-2023-48782
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters
https://fortiguard.com/psirt/FG-IR-23-450
2023-11-19T19:58:38.554Z
2023-12-13T06:37:42.217Z
2023-12-13T06:37:42.217Z
{'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0'}
CVE-2023-48501
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.376Z
2023-12-15T10:17:51.632Z
2023-12-15T10:17:51.632Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48014
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
https://github.com/gpac/gpac/issues/2613
2023-11-13T00:00:00
2023-11-15T00:00:00
2023-11-15T18:59:21.849129
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48444
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:16:31.047Z
2023-12-15T10:16:31.047Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48281
Cross-Site Request Forgery (CSRF) vulnerability in Super Blog Me Broken Link Checker for YouTube allows Cross Site Request Forgery.This issue affects Broken Link Checker for YouTube: from n/a through 1.3.
https://patchstack.com/database/vulnerability/broken-link-checker-for-youtube/wordpress-broken-link-checker-for-youtube-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-13T23:43:33.533Z
2023-11-30T13:09:34.941Z
2023-11-30T13:09:34.941Z
{'Vendor': 'Super Blog Me', 'Product': 'Broken Link Checker for YouTube', 'Versions': 'n/a'}
CVE-2023-48517
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.384Z
2023-12-15T10:17:17.817Z
2023-12-15T10:17:17.817Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48452
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.368Z
2023-12-15T10:17:34.841Z
2023-12-15T10:17:34.841Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48686
null
null
2023-11-17T17:00:26.199Z
2023-12-21T20:40:48.798Z
2024-01-02T14:40:18.471Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-48393
Kaifa Technology WebITR is an online attendance system. A remote attacker with regular user privilege can obtain partial sensitive system information from error message.
https://www.twcert.org.tw/tw/cp-132-7623-5660d-1.html
2023-11-16T04:08:17.028Z
2023-12-15T09:22:49.735Z
2024-01-17T07:22:49.481Z
{'Vendor': 'Kaifa Technology', 'Product': 'WebITR', 'Versions': '2_1_0_19'}
CVE-2023-48239
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267
2023-11-13T13:25:18.482Z
2023-11-21T21:02:35.442Z
2023-11-21T21:02:35.442Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.13, >= 26.0.0, < 26.0.8, >= 27.0.0, < 27.1.3, >= 20.0.0, < 20.0.14.16, >= 21.0.0, < 21.0.9.13, >= 22.0.0, < 22.2.10.15, >= 23.0.0, < 23.0.12.12, >= 24.0.0, < 24.0.12.8'}
CVE-2023-48110
Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow via the urls parameter in the function saveParentControlInfo . This vulnerability allows attackers to cause a Denial of Service (DoS) attack
http://tjr181.com/index.php/archives/13/
2023-11-13T00:00:00
2023-11-20T00:00:00
2023-11-20T20:02:28.662400
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48540
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.387Z
2023-12-15T10:16:37.960Z
2023-12-15T10:16:37.960Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48813
Senayan Library Management Systems (Slims) 9 Bulian v9.6.1 is vulnerable to SQL Injection via admin/modules/reporting/customs/fines_report.php.
https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md
2023-11-20T00:00:00
2023-12-01T00:00:00
2023-12-01T15:21:39.368152
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48055
SuperAGI v0.0.13 was discovered to use a hardcoded key for encryption operations. This vulnerability can lead to the disclosure of information and communications.
https://gxx777.github.io/SuperAGI_v0.0.13_Cryptographic_API_Misuse_Vulnerability.md
2023-11-13T00:00:00
2023-11-16T00:00:00
2023-11-16T17:16:50.105745
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48405
there is a possible way for the secure world to write to NS memory due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:08:52.675Z
2023-12-08T15:41:02.058Z
2023-12-08T15:41:02.058Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48612
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.402Z
2023-12-15T10:16:52.086Z
2023-12-15T10:16:52.086Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48242
The vulnerability allows an authenticated remote attacker to download arbitrary files in all paths of the system under the context of the application OS user (“root”) via a crafted HTTP request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.701Z
2024-01-10T10:35:25.216Z
2024-01-10T10:35:25.216Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48307
Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. Starting in version 1.13.0 and prior to version 2.2.8 and 3.3.0, an attacker can use an unprotected endpoint in the Mail app to perform a SSRF attack. Nextcloud Mail app versions 2.2.8 and 3.3.0 contain a patch for this issue. As a workaround, disable the mail app.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4pp4-m8ph-2999
2023-11-14T17:41:15.572Z
2023-11-21T22:22:56.780Z
2023-11-21T22:22:56.780Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 1.13.0, < 2.2.8, >= 3.1.0, < 3.3.0'}
CVE-2023-48887
A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.
https://github.com/fengjiachun/Jupiter
2023-11-20T00:00:00
2023-12-01T00:00:00
2023-12-01T22:30:24.851553
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48491
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.375Z
2023-12-15T10:15:45.494Z
2023-12-15T10:15:45.494Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48350
In video decoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.391Z
2024-01-18T02:44:52.068Z
2024-01-18T02:44:52.068Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-48700
The Nautobot Device Onboarding plugin uses the netmiko and NAPALM libraries to simplify the onboarding process of a new device into Nautobot down to, in many cases, an IP Address and a Location. Starting in version 2.0.0 and prior to version 3.0.0, credentials provided to onboarding task are visible via Job Results from an execution of an Onboarding Task. Version 3.0.0 fixes this issue; no known workarounds are available. Mitigation recommendations include deleting all Job Results for any onboarding task to remove clear text credentials from database entries that were run while on v2.0.X, upgrading to v3.0.0, and rotating any exposed credentials.
https://github.com/nautobot/nautobot-plugin-device-onboarding/security/advisories/GHSA-qf3c-rw9f-jh7v
2023-11-17T19:43:37.553Z
2023-11-21T22:30:58.030Z
2023-11-21T22:30:58.030Z
{'Vendor': 'nautobot', 'Product': 'nautobot-plugin-device-onboarding', 'Versions': '>= 2.0.0, < 3.0.0'}
CVE-2023-48429
A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The Web UI of affected devices does not check the length of parameters in certain conditions. This allows a malicious admin to crash the server by sending a crafted request to the server. The server will automatically restart.
https://cert-portal.siemens.com/productcert/pdf/ssa-077170.pdf
2023-11-16T16:30:40.849Z
2023-12-12T11:27:20.840Z
2023-12-12T11:27:20.840Z
{'Vendor': 'Siemens', 'Product': 'SINEC INS', 'Versions': 'All versions < V1.0 SP2 Update 2'}
CVE-2023-48583
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.394Z
2023-12-15T10:17:29.409Z
2023-12-15T10:17:29.409Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48653
Concrete CMS before 8.5.14 and 9 before 9.2.3 allows Cross Site Request Forgery (CSRF) via ccm/calendar/dialogs/event/delete/submit. An attacker can force an admin to delete events on the site because the event ID is numeric and sequential.
https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes
2023-11-17T00:00:00
2023-12-25T00:00:00
2023-12-25T18:54:02.273142
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48716
Student Result Management System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'class_id' parameter of the add_classes.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/gilels/
2023-11-17T22:29:30.959Z
2023-12-21T20:53:11.923Z
2023-12-21T20:53:11.923Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Student Result Management System', 'Versions': '1.0'}
CVE-2023-48346
In video decoder, there is a possible improper input validation. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.390Z
2024-01-18T02:44:51.067Z
2024-01-18T02:44:51.067Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-48595
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.399Z
2023-12-15T10:17:17.057Z
2023-12-15T10:17:17.057Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48254
The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.705Z
2024-01-10T13:02:51.682Z
2024-01-10T13:02:51.682Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48604
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.401Z
2023-12-15T10:17:53.937Z
2023-12-15T10:17:53.937Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48311
dockerspawner is a tool to spawn JupyterHub single user servers in Docker containers. Users of JupyterHub deployments running DockerSpawner starting with 0.11.0 without specifying `DockerSpawner.allowed_images` configuration allow users to launch _any_ pullable docker image, instead of restricting to only the single configured image, as intended. This issue has been addressed in commit `3ba4b665b` which has been included in dockerspawner release version 13. Users are advised to upgrade. Users unable to upgrade should explicitly set `DockerSpawner.allowed_images` to a non-empty list containing only the default image will result in the intended default behavior.
https://github.com/jupyterhub/dockerspawner/security/advisories/GHSA-hfgr-h3vc-p6c2
2023-11-14T17:41:15.573Z
2023-12-08T20:08:31.736Z
2023-12-08T20:08:31.736Z
{'Vendor': 'jupyterhub', 'Product': 'dockerspawner', 'Versions': '>= 0.11.0, < 13.0'}
CVE-2023-48741
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in QuantumCloud AI ChatBot.This issue affects AI ChatBot: from n/a through 4.7.8.
https://patchstack.com/database/vulnerability/chatbot/wordpress-ai-chatbot-plugin-4-7-8-sql-injection-vulnerability?_s_id=cve
2023-11-18T22:09:33.698Z
2023-12-19T20:43:58.291Z
2023-12-19T20:43:58.291Z
{'Vendor': 'QuantumCloud', 'Product': 'AI ChatBot', 'Versions': 'n/a'}
CVE-2023-48468
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.370Z
2023-12-15T10:17:52.396Z
2023-12-15T10:17:52.396Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48192
An issue in TOTOlink A3700R v.9.1.2u.6134_B20201202 allows a local attacker to execute arbitrary code via the setTracerouteCfg function.
http://totolink.com
2023-11-13T00:00:00
2023-11-20T00:00:00
2023-11-20T21:44:34.300986
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}