CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-49460 | libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::decode_uncompressed_image. | https://github.com/strukturag/libheif/issues/1046 | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T19:37:00.837400 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49030 | SQL Injection vulnerability in32ns KLive v.2019-1-19 and before allows a remote attacker to obtain sensitive information via a crafted script to the web/user.php component. | https://github.com/Chiaki2333/vulnerability/blob/main/32ns-KLive-SQL-user.php.md | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T20:42:23.251964 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49933 | An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. | https://www.schedmd.com/security-archive.php | 2023-12-03T00:00:00 | 2023-12-14T00:00:00 | 2024-01-03T03:06:30.481088 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49175 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kreativo Pro KP Fastest Tawk.To Chat allows Stored XSS.This issue affects KP Fastest Tawk.To Chat: from n/a through 1.1.1.
| https://patchstack.com/database/vulnerability/kp-fastest-tawk-to-chat/wordpress-kp-fastest-tawk-to-chat-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.490Z | 2023-12-15T14:17:51.518Z | 2023-12-15T14:17:51.518Z | {'Vendor': 'Kreativo Pro', 'Product': 'KP Fastest Tawk.to Chat', 'Versions': 'n/a'} |
CVE-2023-49163 | Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.5.
| https://patchstack.com/database/vulnerability/teachpress/wordpress-teachpress-plugin-9-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-18T22:17:30.642Z | 2023-12-18T22:17:30.642Z | {'Vendor': 'Michael Winkler', 'Product': 'teachPress', 'Versions': 'n/a'} |
CVE-2023-49860 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weDevs WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts allows Stored XSS.This issue affects WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts: from n/a through 2.6.7.
| https://patchstack.com/database/vulnerability/wedevs-project-manager/wordpress-wp-project-manager-plugin-2-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T17:13:03.352Z | 2023-12-14T16:18:45.716Z | 2023-12-14T16:18:45.716Z | {'Vendor': 'weDevs', 'Product': 'WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts', 'Versions': 'n/a'} |
CVE-2023-49708 | SQLi vulnerability in Starshop component for Joomla. | https://extensions.joomla.org/extension/starshop/ | 2023-11-30T04:31:32.258Z | 2023-12-14T08:51:59.913Z | 2023-12-14T08:51:59.913Z | {'Vendor': 'Joomstar.com', 'Product': 'Starshop component for Joomla', 'Versions': '1.0.0-1.0.9'} |
CVE-2023-49773 | Deserialization of Untrusted Data vulnerability in Tim Brattberg BCorp Shortcodes.This issue affects BCorp Shortcodes: from n/a through 0.23.
| https://patchstack.com/database/vulnerability/bcorp-shortcodes/wordpress-bcorp-shortcodes-plugin-0-23-unauthenticated-php-object-injection-vulnerability?_s_id=cve | 2023-11-30T13:22:54.825Z | 2023-12-20T15:31:11.337Z | 2023-12-20T15:31:11.337Z | {'Vendor': 'Tim Brattberg', 'Product': 'BCorp Shortcodes', 'Versions': 'n/a'} |
CVE-2023-49289 | Ajax.NET Professional (AjaxPro) is an AJAX framework for Microsoft ASP.NET which will create proxy JavaScript classes that are used on client-side to invoke methods on the web server. Affected versions of this package are vulnerable cross site scripting attacks. Releases before version 21.12.22.1 are affected. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-8v6j-gc74-fmpp | 2023-11-24T16:45:24.313Z | 2023-12-04T23:53:08.245Z | 2023-12-04T23:53:08.245Z | {'Vendor': 'michaelschwarz', 'Product': 'Ajax.NET-Professional', 'Versions': '< 21.12.22.1'} |
CVE-2023-49374 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/slide/update. | https://github.com/li-yu320/cms/blob/main/There%20is%20CSRF%20in%20the%20rotation%20image%20editing%20section.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:28:14.379783 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49677 | Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cmbQual' parameter of the Employer/InsertJob.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/pollini/ | 2023-11-29T17:48:17.254Z | 2023-12-21T22:57:02.575Z | 2023-12-21T22:57:02.575Z | {'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'} |
CVE-2023-49948 | Forgejo before 1.20.5-1 allows remote attackers to test for the existence of private user accounts by appending .rss (or another extension) to a URL. | https://forgejo.org/2023-11-release-v1-20-5-1/ | 2023-12-03T00:00:00 | 2023-12-03T00:00:00 | 2023-12-03T18:55:21.655234 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49765 | Authorization Bypass Through User-Controlled Key vulnerability in Blaz K. Rate my Post – WP Rating System.This issue affects Rate my Post – WP Rating System: from n/a through 3.4.1.
| https://patchstack.com/database/vulnerability/rate-my-post/wordpress-rate-my-post-wp-rating-system-plugin-3-4-1-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-11-30T13:22:27.402Z | 2023-12-21T18:29:59.743Z | 2023-12-21T18:29:59.743Z | {'Vendor': 'Blaz K.', 'Product': 'Rate my Post – WP Rating System', 'Versions': 'n/a'} |
CVE-2023-49620 | Before DolphinScheduler version 3.1.0, the login user could delete UDF function in the resource center unauthorized (which almost used in sql task), with unauthorized access vulnerability (IDOR), but after version 3.1.0 we fixed this issue. We mark this cve as moderate level because it still requires user login to operate, please upgrade to version 3.1.0 to avoid this vulnerability | https://github.com/apache/dolphinscheduler/pull/10307 | 2023-11-28T07:30:24.598Z | 2023-11-30T08:17:01.765Z | 2023-11-30T08:17:01.765Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '2.0.0'} |
CVE-2023-49270 | Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_in_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
| https://fluidattacks.com/advisories/lang/ | 2023-11-24T16:25:53.193Z | 2023-12-20T19:21:34.658Z | 2023-12-20T19:21:34.658Z | {'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'} |
CVE-2023-49159 | Server-Side Request Forgery (SSRF) vulnerability in Elegant Digital Solutions CommentLuv.This issue affects CommentLuv: from n/a through 3.0.4.
| https://patchstack.com/database/vulnerability/commentluv/wordpress-commentluv-plugin-3-0-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-15T15:35:39.547Z | 2023-12-15T15:35:39.547Z | {'Vendor': 'Elegant Digital Solutions', 'Product': 'CommentLuv', 'Versions': 'n/a'} |
CVE-2023-49084 | Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server. | https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp | 2023-11-21T18:57:30.428Z | 2023-12-21T23:04:44.219Z | 2023-12-21T23:04:44.219Z | {'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '= 1.2.25'} |
CVE-2023-49657 | A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS.
For 2.X versions, users should change their config to include:
TALISMAN_CONFIG = {
"content_security_policy": {
"base-uri": ["'self'"],
"default-src": ["'self'"],
"img-src": ["'self'", "blob:", "data:"],
"worker-src": ["'self'", "blob:"],
"connect-src": [
"'self'",
" https://api.mapbox.com" https://api.mapbox.com" ;,
" https://events.mapbox.com" https://events.mapbox.com" ;,
],
"object-src": "'none'",
"style-src": [
"'self'",
"'unsafe-inline'",
],
"script-src": ["'self'", "'strict-dynamic'"],
},
"content_security_policy_nonce_in": ["script-src"],
"force_https": False,
"session_cookie_secure": False,
}
| https://lists.apache.org/thread/wjyvz8om9nwd396lh0bt156mtwjxpsvx | 2023-11-28T21:39:07.846Z | 2024-01-23T15:06:59.901Z | 2024-01-23T15:06:59.901Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0'} |
CVE-2023-49342 | Temporary data passed between application components by Budgie Extras Clockworks applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49342 | 2023-11-27T03:17:52.865Z | 2023-12-14T21:29:39.869Z | 2023-12-14T21:29:39.869Z | {'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'} |
CVE-2023-49179 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Event post allows Stored XSS.This issue affects Event post: from n/a through 5.8.6.
| https://patchstack.com/database/vulnerability/event-post/wordpress-event-post-plugin-5-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:35.546Z | 2023-12-15T14:45:17.613Z | 2023-12-15T14:45:17.613Z | {'Vendor': 'N.O.U.S. Open Useful and Simple', 'Product': 'Event post', 'Versions': 'n/a'} |
CVE-2023-49745 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Stored XSS.This issue affects Spiffy Calendar: from n/a through 4.9.5.
| https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:21:40.736Z | 2023-12-14T14:34:36.404Z | 2023-12-14T14:34:36.404Z | {'Vendor': 'Spiffy Plugins', 'Product': 'Spiffy Calendar', 'Versions': 'n/a'} |
CVE-2023-49180 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ternstyle LLC Automatic Youtube Video Posts Plugin allows Stored XSS.This issue affects Automatic Youtube Video Posts Plugin: from n/a through 5.2.2.
| https://patchstack.com/database/vulnerability/automatic-youtube-video-posts/wordpress-automatic-youtube-video-posts-plugin-plugin-5-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:35.546Z | 2023-12-15T14:47:32.658Z | 2023-12-15T14:47:32.658Z | {'Vendor': 'Ternstyle LLC', 'Product': 'Automatic Youtube Video Posts Plugin', 'Versions': 'n/a'} |
CVE-2023-49246 | Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.175Z | 2023-12-06T09:01:24.648Z | 2023-12-06T09:01:24.648Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.0'} |
CVE-2023-49587 | SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network.
| https://me.sap.com/notes/3395306 | 2023-11-27T18:45:03.234Z | 2023-12-12T01:35:53.057Z | 2023-12-12T01:35:53.057Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Solution Manager', 'Versions': '720'} |
CVE-2023-49568 | A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients.
Applications using only the in-memory filesystem supported by go-git are not affected by this vulnerability.
This is a go-git implementation issue and does not affect the upstream git cli.
| https://github.com/go-git/go-git/security/advisories/GHSA-mw99-9chc-xw7r | 2023-11-27T14:21:51.157Z | 2024-01-12T10:36:12.727Z | 2024-01-12T10:36:12.727Z | {'Vendor': 'go-git', 'Product': 'go-git', 'Versions': '5.11.0'} |
CVE-2023-49092 | RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer. | https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr | 2023-11-21T18:57:30.429Z | 2023-11-28T20:57:06.739Z | 2023-12-14T22:50:31.056Z | {'Vendor': 'RustCrypto', 'Product': 'RSA', 'Versions': '<= 0.9.5'} |
CVE-2023-49991 | Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow via the function CountVowelPosition at synthdata.c. | https://github.com/espeak-ng/espeak-ng/issues/1825 | 2023-12-04T00:00:00 | 2023-12-12T00:00:00 | 2024-01-19T04:06:55.307132 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49143 | Denial-of-service (DoS) vulnerability exists in rfe service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur. | https://www.electronics.jtekt.co.jp/en/topics/202312116562/ | 2023-11-30T05:55:32.224Z | 2023-12-12T09:16:20.067Z | 2023-12-12T09:16:20.067Z | {'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'GC-A22W-CW', 'Versions': 'all versions'} |
CVE-2023-49840 | Cross-Site Request Forgery (CSRF) vulnerability in Palscode Multi Currency For WooCommerce.This issue affects Multi Currency For WooCommerce: from n/a through 1.5.5.
| https://patchstack.com/database/vulnerability/wc-multi-currency/wordpress-multi-currency-for-woocommerce-plugin-1-5-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T17:12:29.822Z | 2023-12-18T14:46:27.970Z | 2023-12-18T14:46:27.970Z | {'Vendor': 'Palscode', 'Product': 'Multi Currency For WooCommerce', 'Versions': 'n/a'} |
CVE-2023-49006 | Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo version 3.4.3 allows a remote attacker to obtain sensitive information via a crafted page in the XML.php file. | https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/ | 2023-11-20T00:00:00 | 2023-12-19T00:00:00 | 2023-12-19T09:18:50.400933 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49285 | Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9 | 2023-11-24T16:45:24.312Z | 2023-12-04T22:56:55.105Z | 2023-12-04T22:56:55.105Z | {'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '>= 2.2, < 6.5'} |
CVE-2023-49790 | The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv | 2023-11-30T13:39:50.863Z | 2023-12-22T16:19:28.440Z | 2023-12-22T16:19:28.440Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 4.9.2'} |
CVE-2023-49378 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/form/save. | https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:34:54.651989 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49682 | null | null | 2023-11-29T17:48:17.255Z | 2023-12-21T23:07:19.614Z | 2024-01-02T19:55:40.139Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49397 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/updateStatus. | https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:51:34.316301 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49102 | NZBGet 21.1 allows authenticated remote code execution because the unarchive programs (7za and unrar) preserve executable file permissions. An attacker with the Control capability can execute a file by setting the value of SevenZipCommand or UnrarCmd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://nzbget.net/download | 2023-11-21T00:00:00 | 2023-11-22T00:00:00 | 2023-11-22T21:25:58.043504 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49552 | An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file. | https://github.com/cesanta/mjs/issues/256 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T22:36:40.168982 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49801 | Lif Auth Server is a server for validating logins, managing information, and account recovery for Lif Accounts. The issue relates to the `get_pfp` and `get_banner` routes on Auth Server. The issue is that there is no check to ensure that the file that Auth Server is receiving through these URLs is correct. This could allow an attacker access to files they shouldn't have access to. This issue has been patched in version 1.4.0. | https://github.com/Lif-Platforms/Lif-Auth-Server/security/advisories/GHSA-3v77-pvqq-qg3f | 2023-11-30T13:39:50.864Z | 2024-01-12T21:08:06.057Z | 2024-01-12T21:08:06.057Z | {'Vendor': 'Lif-Platforms', 'Product': 'Lif-Auth-Server', 'Versions': '>= 1.3.2, < 1.4.0'} |
CVE-2023-49944 | The Challenge Response feature of BeyondTrust Privilege Management for Windows (PMfW) before 2023-07-14 allows local administrators to bypass this feature by decrypting the shared key, or by locating the decrypted shared key in process memory. The threat is mitigated by the Agent Protection feature. | https://www.beyondtrust.com/security | 2023-12-03T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T08:02:37.880259 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49047 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the devName parameter in the function formSetDeviceName. | https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T16:32:24.138149 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49417 | TOTOLink A7000R V9.1.0u.6115_B20201022 has a stack overflow vulnerability via setOpModeCfg. | https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg | 2023-11-27T00:00:00 | 2023-12-11T00:00:00 | 2023-12-11T13:36:23.329638 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49694 |
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
| https://www.tenable.com/security/research/tra-2023-39 | 2023-11-29T22:03:49.958Z | 2023-11-29T22:47:42.597Z | 2023-11-29T22:47:42.597Z | {'Vendor': 'NETGEAR', 'Product': 'NETGEAR ProSAFE Network Management System', 'Versions': '0'} |
CVE-2023-49381 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/div/update. | https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20modification%20point%20of%20the%20custom%20table.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:40:28.834275 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49155 | Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator – easily Button Builder.This issue affects Button Generator – easily Button Builder: from n/a through 2.3.8.
| https://patchstack.com/database/vulnerability/button-generation/wordpress-button-generator-easily-button-builder-plugin-2-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-22T23:35:38.290Z | 2023-12-18T22:13:32.221Z | 2023-12-18T22:13:32.221Z | {'Vendor': 'Wow-Company', 'Product': 'Button Generator – easily Button Builder', 'Versions': 'n/a'} |
CVE-2023-49769 | Cross-Site Request Forgery (CSRF) vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.4.
| https://patchstack.com/database/vulnerability/integrate-google-drive/wordpress-integrate-google-drive-plugin-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:22:54.825Z | 2023-12-17T09:58:31.416Z | 2023-12-17T09:58:31.416Z | {'Vendor': 'SoftLab', 'Product': 'Integrate Google Drive', 'Versions': 'n/a'} |
CVE-2023-49293 | Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in [email protected], [email protected], and [email protected]. There are no known workarounds for this vulnerability. | https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97 | 2023-11-24T16:45:24.313Z | 2023-12-04T23:03:30.752Z | 2023-12-04T23:03:30.752Z | {'Vendor': 'vitejs', 'Product': 'vite', 'Versions': '>=4.4.0, < 4.4.12, = 4.5.0, >=5.0.0, < 5.0.5'} |
CVE-2023-49786 | Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6. | https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq | 2023-11-30T13:39:50.862Z | 2023-12-14T19:47:46.306Z | 2023-12-14T19:47:46.306Z | {'Vendor': 'asterisk', 'Product': 'asterisk', 'Versions': '< 18.20.1, >= 19.0.0, < 20.5.1, = 21.0.0, < 18.9-cert6'} |
CVE-2023-49292 | ecies is an Elliptic Curve Integrated Encryption Scheme for secp256k1 in Golang. If funcations Encapsulate(), Decapsulate() and ECDH() could be called by an attacker, they could recover any private key that interacts with it. This vulnerability was patched in 2.0.8. Users are advised to upgrade. | https://github.com/ecies/go/security/advisories/GHSA-8j98-cjfr-qx3h | 2023-11-24T16:45:24.313Z | 2023-12-04T23:12:03.059Z | 2023-12-04T23:12:03.059Z | {'Vendor': 'ecies', 'Product': 'go', 'Versions': '< 2.0.8'} |
CVE-2023-49787 | null | null | 2023-11-30T13:39:50.862Z | null | 2023-12-07T17:59:41.227Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49695 | OS command injection vulnerability in WRC-X3000GSN v1.0.2, WRC-X3000GS v1.0.24 and earlier, and WRC-X3000GSA v1.0.24 and earlier allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command by sending a specially crafted request to the product. | https://www.elecom.co.jp/news/security/20231212-01/ | 2023-11-30T01:25:31.380Z | 2023-12-12T08:58:47.925Z | 2023-12-12T08:58:47.925Z | {'Vendor': 'ELECOM CO.,LTD.', 'Product': 'WRC-X3000GSN', 'Versions': 'v1.0.2'} |
CVE-2023-49380 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/friend_link/delete. | https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20friendship%20link.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:39:06.827271 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49103 | An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure. | https://owncloud.org/security | 2023-11-21T00:00:00 | 2023-11-21T00:00:00 | 2023-12-05T00:07:02.851685 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49553 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file. | https://github.com/cesanta/mjs/issues/253 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T22:41:23.950955 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49800 | `nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send many options directly to `ofetch`. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can construct a URL known to not fetch successfully, then set the retry attempts to a high value, this will cause a stack overflow as ofetch error handling works recursively resulting in a denial of service. This issue has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should limit ofetch options. | https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h | 2023-11-30T13:39:50.864Z | 2023-12-08T23:41:55.206Z | 2023-12-08T23:41:55.206Z | {'Vendor': 'johannschopplich', 'Product': 'nuxt-api-party', 'Versions': '< 0.22.1'} |
CVE-2023-49046 | Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the devName parameter in the function formAddMacfilterRule. | https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T15:16:03.165667 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49379 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the component /admin/friend_link/save. | https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20new%20location%20of%20the%20friendship%20link.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:36:12.047751 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49683 | null | null | 2023-11-29T17:48:17.255Z | 2023-12-21T23:08:32.403Z | 2024-01-02T19:56:23.630Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49396 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/save. | https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:50:17.701505 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49816 | Cross-Site Request Forgery (CSRF) vulnerability in Innovative Solutions Fix My Feed RSS Repair.This issue affects Fix My Feed RSS Repair: from n/a through 1.4.
| https://patchstack.com/database/vulnerability/fix-my-feed-rss-repair/wordpress-fix-my-feed-rss-repair-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T14:51:04.753Z | 2023-12-17T10:28:50.478Z | 2023-12-17T10:28:50.478Z | {'Vendor': 'Innovative Solutions', 'Product': 'Fix My Feed RSS Repair', 'Versions': 'n/a'} |
CVE-2023-49284 | fish is a smart and user-friendly command line shell for macOS, Linux, and the rest of the family. fish shell uses certain Unicode non-characters internally for marking wildcards and expansions. It will incorrectly allow these markers to be read on command substitution output, rather than transforming them into a safe internal representation. While this may cause unexpected behavior with direct input (for example, echo \UFDD2HOME has the same output as echo $HOME), this may become a minor security problem if the output is being fed from an external program into a command substitution where this output may not be expected. This design flaw was introduced in very early versions of fish, predating the version control system, and is thought to be present in every version of fish released in the last 15 years or more, although with different characters. Code execution does not appear to be possible, but denial of service (through large brace expansion) or information disclosure (such as variable expansion) is potentially possible under certain circumstances. fish shell 3.6.2 has been released to correct this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/fish-shell/fish-shell/security/advisories/GHSA-2j9r-pm96-wp4f | 2023-11-24T16:45:24.312Z | 2023-12-04T23:46:35.567Z | 2023-12-04T23:46:35.567Z | {'Vendor': 'fish-shell', 'Product': 'fish-shell', 'Versions': '< 3.6.2'} |
CVE-2023-49791 | Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr | 2023-11-30T13:39:50.863Z | 2023-12-22T16:26:28.076Z | 2023-12-22T16:26:28.076Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 23.0.0, < 23.0.12.13, >= 24.0.0, < 24.0.12.9, >= 25.0.0, < 25.0.13.4, >= 26.0.0, < 26.0.9, >= 27.0.0, < 27.1.4'} |
CVE-2023-49142 |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer. | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md | 2023-11-28T02:07:56.536Z | 2024-01-02T07:24:22.879Z | 2024-01-02T07:24:22.879Z | {'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'} |
CVE-2023-49841 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FancyThemes Optin Forms – Simple List Building Plugin for WordPress allows Stored XSS.This issue affects Optin Forms – Simple List Building Plugin for WordPress: from n/a through 1.3.3.
| https://patchstack.com/database/vulnerability/optin-forms/wordpress-optin-forms-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T17:12:29.822Z | 2023-12-14T15:56:47.509Z | 2023-12-14T15:56:47.509Z | {'Vendor': 'FancyThemes', 'Product': 'Optin Forms – Simple List Building Plugin for WordPress', 'Versions': 'n/a'} |
CVE-2023-49007 | In Netgear Orbi RBR750 firmware before V7.2.6.21, there is a stack-based buffer overflow in /usr/sbin/httpd. | https://github.com/5erua/netgear_orbi_overflow_vulnerability/blob/main/README.md | 2023-11-20T00:00:00 | 2023-12-08T00:00:00 | 2023-12-08T13:54:54.136734 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49210 | The openssl (aka node-openssl) NPM package through 2.0.0 was characterized as "a nonsense wrapper with no real purpose" by its author, and accepts an opts argument that contains a verb field (used for command execution). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e | 2023-11-23T00:00:00 | 2023-11-23T00:00:00 | 2023-11-23T19:49:23.647279 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49355 | decToString in decNumber/decNumber.c in jq 88f01a7 has a one-byte out-of-bounds write via the " []-1.2e-1111111111" input. NOTE: this is not the same as CVE-2023-50246. The CVE-2023-50246 71c2ab5 reference mentions -10E-1000010001, which is not in normalized scientific notation. | https://github.com/jqlang/jq/tree/88f01a741c8d63c4d1b5bc3ef61520c6eb93edaa | 2023-11-27T00:00:00 | 2023-12-11T00:00:00 | 2023-12-20T08:22:51.735803 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49569 | A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved.
Applications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using "Plain" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS or in-memory filesystems are not affected by this issue.
This is a go-git implementation issue and does not affect the upstream git cli.
| https://github.com/go-git/go-git/security/advisories/GHSA-449p-3h89-pw88 | 2023-11-27T14:21:51.157Z | 2024-01-12T10:41:00.201Z | 2024-01-12T10:41:00.201Z | {'Vendor': 'go-git', 'Product': 'go-git', 'Versions': '5.11.0'} |
CVE-2023-49093 | HtmlUnit is a GUI-less browser for Java programs. HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. This vulnerability has been patched in version 3.9.0 | https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7 | 2023-11-21T18:57:30.429Z | 2023-12-04T04:47:27.145Z | 2023-12-04T04:47:27.145Z | {'Vendor': 'HtmlUnit', 'Product': 'htmlunit', 'Versions': '< 3.9.0'} |
CVE-2023-49990 | Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c. | https://github.com/espeak-ng/espeak-ng/issues/1824 | 2023-12-04T00:00:00 | 2023-12-12T00:00:00 | 2024-01-19T04:06:56.787913 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49247 | Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.176Z | 2023-12-06T08:32:36.621Z | 2023-12-06T08:32:36.621Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-49752 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spoon themes Adifier - Classified Ads WordPress Theme.This issue affects Adifier - Classified Ads WordPress Theme: from n/a before 3.1.4.
| https://patchstack.com/database/vulnerability/adifier/wordpress-adifier-classified-ads-wordpress-theme-theme-3-9-3-sql-injection-vulnerability?_s_id=cve | 2023-11-30T13:22:02.831Z | 2023-12-20T17:38:01.072Z | 2023-12-20T17:38:01.072Z | {'Vendor': 'Spoon themes', 'Product': 'Adifier - Classified Ads WordPress Theme', 'Versions': 'n/a'} |
CVE-2023-49181 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Event Manager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce allows Stored XSS.This issue affects WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce: from n/a through 3.1.40.
| https://patchstack.com/database/vulnerability/wp-event-manager/wordpress-wp-event-manager-plugin-3-1-39-cross-site-scripting-xss-vulnerability-2?_s_id=cve | 2023-11-22T23:36:35.546Z | 2023-12-15T14:49:51.927Z | 2023-12-15T14:49:51.927Z | {'Vendor': 'WP Event Manager', 'Product': 'WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce', 'Versions': 'n/a'} |
CVE-2023-49494 | DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component select_media_post_wangEditor.php. | http://dedecms.com | 2023-11-27T00:00:00 | 2023-12-11T00:00:00 | 2023-12-11T20:36:07.330624 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49251 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application allows an attacker to add their own login credentials to the device. This allows an attacker to remotely login as root and take control of the device even after the affected device is fully set up. | https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | 2023-11-24T11:41:23.260Z | 2024-01-09T10:00:08.834Z | 2024-01-09T10:00:08.834Z | {'Vendor': 'Siemens', 'Product': 'SIMATIC CN 4100', 'Versions': 'All versions < V2.7'} |
CVE-2023-49744 | Cross-Site Request Forgery (CSRF) vulnerability in Gift Up Gift Up Gift Cards for WordPress and WooCommerce.This issue affects Gift Up Gift Cards for WordPress and WooCommerce: from n/a through 2.21.3.
| https://patchstack.com/database/vulnerability/gift-up/wordpress-gift-up-gift-cards-for-wordpress-and-woocommerce-plugin-2-21-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:21:40.736Z | 2023-12-15T15:42:15.908Z | 2023-12-15T15:42:15.908Z | {'Vendor': 'Gift Up', 'Product': 'Gift Up Gift Cards for WordPress and WooCommerce', 'Versions': 'n/a'} |
CVE-2023-49314 | Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack. | https://asana.com/pt/download | 2023-11-26T00:00:00 | 2023-11-28T00:00:00 | 2023-11-28T14:44:31.895910 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49197 | Cross-Site Request Forgery (CSRF) vulnerability in Apasionados, Apasionados del Marketing, NetConsulting DoFollow Case by Case.This issue affects DoFollow Case by Case: from n/a through 3.4.2.
| https://patchstack.com/database/vulnerability/dofollow-case-by-case/wordpress-dofollow-case-by-case-plugin-3-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-22T23:36:56.849Z | 2023-12-15T15:39:22.792Z | 2023-12-15T15:39:22.792Z | {'Vendor': 'Apasionados, Apasionados del Marketing, NetConsulting', 'Product': 'DoFollow Case by Case', 'Versions': 'n/a'} |
CVE-2023-49178 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mr. Hdwplayer HDW Player Plugin (Video Player & Video Gallery) allows Reflected XSS.This issue affects HDW Player Plugin (Video Player & Video Gallery): from n/a through 5.0.
| https://patchstack.com/database/vulnerability/hdw-player-video-player-video-gallery/wordpress-hdw-player-plugin-video-player-video-gallery-plugin-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:35.545Z | 2023-12-15T14:40:46.985Z | 2023-12-15T14:40:46.985Z | {'Vendor': 'Mr. Hdwplayer', 'Product': 'HDW Player Plugin (Video Player & Video Gallery)', 'Versions': 'n/a'} |
CVE-2023-49656 | Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193 | 2023-11-28T21:18:14.328Z | 2023-11-29T13:45:12.215Z | 2023-11-29T13:45:12.215Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins MATLAB Plugin', 'Versions': '0'} |
CVE-2023-49343 | Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel. | https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-27g2-7x65-3cc5 | 2023-11-27T03:17:52.865Z | 2023-12-14T21:31:00.844Z | 2023-12-14T21:31:00.844Z | {'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'} |
CVE-2023-49713 | Denial-of-service (DoS) vulnerability exists in NetBIOS service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur. | https://www.electronics.jtekt.co.jp/en/topics/202312116562/ | 2023-11-30T05:55:31.396Z | 2023-12-12T09:16:26.932Z | 2023-12-12T09:16:26.932Z | {'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'GC-A22W-CW', 'Versions': 'all versions'} |
CVE-2023-49085 | Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist. | https://github.com/Cacti/cacti/security/advisories/GHSA-vr3c-38wh-g855 | 2023-11-21T18:57:30.428Z | 2023-12-22T16:13:13.259Z | 2023-12-22T16:13:13.259Z | {'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'} |
CVE-2023-49764 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Younes JFR. Advanced Database Cleaner.This issue affects Advanced Database Cleaner: from n/a through 3.1.2.
| https://patchstack.com/database/vulnerability/advanced-database-cleaner/wordpress-advanced-database-cleaner-plugin-3-1-2-sql-injection-vulnerability?_s_id=cve | 2023-11-30T13:22:27.402Z | 2023-12-19T20:31:05.480Z | 2023-12-19T20:31:05.480Z | {'Vendor': 'Younes JFR.', 'Product': 'Advanced Database Cleaner', 'Versions': 'n/a'} |
CVE-2023-49621 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device. | https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | 2023-11-28T10:01:06.679Z | 2024-01-09T10:00:11.770Z | 2024-01-09T10:00:11.770Z | {'Vendor': 'Siemens', 'Product': 'SIMATIC CN 4100', 'Versions': 'All versions < V2.7'} |
CVE-2023-49271 | Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_out_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
| https://fluidattacks.com/advisories/lang/ | 2023-11-24T16:25:53.193Z | 2023-12-20T19:24:15.907Z | 2023-12-20T19:24:15.907Z | {'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'} |
CVE-2023-49949 | Passwork before 6.2.0 allows remote authenticated users to bypass 2FA by sending all one million of the possible 6-digit codes. | https://passwork.ru/ | 2023-12-03T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T13:54:53.543169 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49363 | Rockoa <2.3.3 is vulnerable to SQL Injection. The problem exists in the indexAction method in reimpAction.php. | https://github.com/wednesdaygogo/Vulnerability-recurrence/blob/main/rockoa%20less%20than%202.3.3%20sql%20injection%20vulnerability.pdf | 2023-11-27T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T17:52:42.571242 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49699 | Memory Corruption in IMS while calling VoLTE Streamingmedia Interface | https://www.asrmicro.com/en/goods/psirt?cid=31 | 2023-11-30T01:28:05.185Z | 2023-11-30T07:04:48.134Z | 2023-11-30T07:04:48.134Z | {'Vendor': 'ASR', 'Product': 'Falcon', 'Versions': '0'} |
CVE-2023-49733 | Improper Restriction of XML External Entity Reference vulnerability in Apache Cocoon.This issue affects Apache Cocoon: from 2.2.0 before 2.3.0.
Users are recommended to upgrade to version 2.3.0, which fixes the issue.
| https://lists.apache.org/thread/t87nntzt6dxw354zbqr9k7l7o1x8gq11 | 2023-11-30T11:07:23.148Z | 2023-11-30T11:29:35.188Z | 2023-11-30T11:29:45.774Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Cocoon', 'Versions': '2.2.0'} |
CVE-2023-49226 | An issue was discovered in Peplink Balance Two before 8.4.0. Command injection in the traceroute feature of the administration console allows users with admin privileges to execute arbitrary commands as root. | https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4 | 2023-11-24T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T07:51:10.561570 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49119 | Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:46.701Z | 2023-12-26T07:20:58.393Z | 2023-12-26T07:20:58.393Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'} |
CVE-2023-49549 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file. | https://github.com/cesanta/mjs/issues/251 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T22:18:36.407177 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49375 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/friend_link/update. | https://github.com/cui2shark/cms/blob/main/There%20is%20CSRF%20in%20the%20modification%20of%20the%20friendship%20link.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:33:45.221489 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49230 | An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication. | https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4 | 2023-11-24T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T03:16:06.028392 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49322 | Certain WithSecure products allow a Denial of Service because there is an unpack handler crash that can lead to a scanning engine crash. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1. | https://www.withsecure.com/en/support/security-advisories/cve-2023-49322 | 2023-11-26T00:00:00 | 2023-11-26T00:00:00 | 2023-11-28T18:39:36.452985 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49772 | Deserialization of Untrusted Data vulnerability in Phpbits Creative Studio Genesis Simple Love.This issue affects Genesis Simple Love: from n/a through 2.0.
| https://patchstack.com/database/vulnerability/genesis-simple-love/wordpress-genesis-simple-love-plugin-2-0-unauthenticated-php-object-injection-vulnerability?_s_id=cve | 2023-11-30T13:22:54.825Z | 2023-12-20T15:21:10.216Z | 2023-12-20T15:21:10.216Z | {'Vendor': 'Phpbits Creative Studio', 'Product': 'Genesis Simple Love', 'Versions': 'n/a'} |
CVE-2023-49288 | Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf. | https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5 | 2023-11-24T16:45:24.312Z | 2023-12-04T22:49:31.317Z | 2023-12-04T22:49:31.317Z | {'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '>= 3.5, < 6.0.1'} |
CVE-2023-49070 |
Pre-auth RCE in Apache Ofbiz 18.12.09.
It's due to XML-RPC no longer maintained still present.
This issue affects Apache OFBiz: before 18.12.10.
Users are recommended to upgrade to version 18.12.10
| https://ofbiz.apache.org/download.html | 2023-11-21T12:04:43.559Z | 2023-12-05T08:05:06.966Z | 2023-12-05T08:05:06.966Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache OFBiz', 'Versions': '0'} |
CVE-2023-49836 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brontobytes Cookie Bar allows Stored XSS.This issue affects Cookie Bar: from n/a through 2.0.
| https://patchstack.com/database/vulnerability/cookie-bar/wordpress-cookie-bar-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T17:12:29.821Z | 2023-12-14T14:10:01.196Z | 2023-12-14T14:10:01.196Z | {'Vendor': 'Brontobytes', 'Product': 'Cookie Bar', 'Versions': 'n/a'} |
CVE-2023-49135 |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer. | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md | 2023-11-28T02:07:56.551Z | 2024-01-02T07:24:17.361Z | 2024-01-02T07:24:17.361Z | {'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.