CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-49460
libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::decode_uncompressed_image.
https://github.com/strukturag/libheif/issues/1046
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T19:37:00.837400
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49030
SQL Injection vulnerability in32ns KLive v.2019-1-19 and before allows a remote attacker to obtain sensitive information via a crafted script to the web/user.php component.
https://github.com/Chiaki2333/vulnerability/blob/main/32ns-KLive-SQL-user.php.md
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T20:42:23.251964
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49933
An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. There is Improper Enforcement of Message Integrity During Transmission in a Communication Channel. This allows attackers to modify RPC traffic in a way that bypasses message hash checks. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
https://www.schedmd.com/security-archive.php
2023-12-03T00:00:00
2023-12-14T00:00:00
2024-01-03T03:06:30.481088
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49175
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kreativo Pro KP Fastest Tawk.To Chat allows Stored XSS.This issue affects KP Fastest Tawk.To Chat: from n/a through 1.1.1.
https://patchstack.com/database/vulnerability/kp-fastest-tawk-to-chat/wordpress-kp-fastest-tawk-to-chat-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.490Z
2023-12-15T14:17:51.518Z
2023-12-15T14:17:51.518Z
{'Vendor': 'Kreativo Pro', 'Product': 'KP Fastest Tawk.to Chat', 'Versions': 'n/a'}
CVE-2023-49163
Cross-Site Request Forgery (CSRF) vulnerability in Michael Winkler teachPress.This issue affects teachPress: from n/a through 9.0.5.
https://patchstack.com/database/vulnerability/teachpress/wordpress-teachpress-plugin-9-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-18T22:17:30.642Z
2023-12-18T22:17:30.642Z
{'Vendor': 'Michael Winkler', 'Product': 'teachPress', 'Versions': 'n/a'}
CVE-2023-49860
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weDevs WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts allows Stored XSS.This issue affects WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts: from n/a through 2.6.7.
https://patchstack.com/database/vulnerability/wedevs-project-manager/wordpress-wp-project-manager-plugin-2-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T17:13:03.352Z
2023-12-14T16:18:45.716Z
2023-12-14T16:18:45.716Z
{'Vendor': 'weDevs', 'Product': 'WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts', 'Versions': 'n/a'}
CVE-2023-49708
SQLi vulnerability in Starshop component for Joomla.
https://extensions.joomla.org/extension/starshop/
2023-11-30T04:31:32.258Z
2023-12-14T08:51:59.913Z
2023-12-14T08:51:59.913Z
{'Vendor': 'Joomstar.com', 'Product': 'Starshop component for Joomla', 'Versions': '1.0.0-1.0.9'}
CVE-2023-49773
Deserialization of Untrusted Data vulnerability in Tim Brattberg BCorp Shortcodes.This issue affects BCorp Shortcodes: from n/a through 0.23.
https://patchstack.com/database/vulnerability/bcorp-shortcodes/wordpress-bcorp-shortcodes-plugin-0-23-unauthenticated-php-object-injection-vulnerability?_s_id=cve
2023-11-30T13:22:54.825Z
2023-12-20T15:31:11.337Z
2023-12-20T15:31:11.337Z
{'Vendor': 'Tim Brattberg', 'Product': 'BCorp Shortcodes', 'Versions': 'n/a'}
CVE-2023-49289
Ajax.NET Professional (AjaxPro) is an AJAX framework for Microsoft ASP.NET which will create proxy JavaScript classes that are used on client-side to invoke methods on the web server. Affected versions of this package are vulnerable cross site scripting attacks. Releases before version 21.12.22.1 are affected. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-8v6j-gc74-fmpp
2023-11-24T16:45:24.313Z
2023-12-04T23:53:08.245Z
2023-12-04T23:53:08.245Z
{'Vendor': 'michaelschwarz', 'Product': 'Ajax.NET-Professional', 'Versions': '< 21.12.22.1'}
CVE-2023-49374
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/slide/update.
https://github.com/li-yu320/cms/blob/main/There%20is%20CSRF%20in%20the%20rotation%20image%20editing%20section.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:28:14.379783
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49677
Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cmbQual' parameter of the Employer/InsertJob.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/pollini/
2023-11-29T17:48:17.254Z
2023-12-21T22:57:02.575Z
2023-12-21T22:57:02.575Z
{'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'}
CVE-2023-49948
Forgejo before 1.20.5-1 allows remote attackers to test for the existence of private user accounts by appending .rss (or another extension) to a URL.
https://forgejo.org/2023-11-release-v1-20-5-1/
2023-12-03T00:00:00
2023-12-03T00:00:00
2023-12-03T18:55:21.655234
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49765
Authorization Bypass Through User-Controlled Key vulnerability in Blaz K. Rate my Post – WP Rating System.This issue affects Rate my Post – WP Rating System: from n/a through 3.4.1.
https://patchstack.com/database/vulnerability/rate-my-post/wordpress-rate-my-post-wp-rating-system-plugin-3-4-1-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-11-30T13:22:27.402Z
2023-12-21T18:29:59.743Z
2023-12-21T18:29:59.743Z
{'Vendor': 'Blaz K.', 'Product': 'Rate my Post – WP Rating System', 'Versions': 'n/a'}
CVE-2023-49620
Before DolphinScheduler version 3.1.0, the login user could delete UDF function in the resource center unauthorized (which almost used in sql task), with unauthorized access vulnerability (IDOR), but after version 3.1.0 we fixed this issue. We mark this cve as moderate level because it still requires user login to operate, please upgrade to version 3.1.0 to avoid this vulnerability
https://github.com/apache/dolphinscheduler/pull/10307
2023-11-28T07:30:24.598Z
2023-11-30T08:17:01.765Z
2023-11-30T08:17:01.765Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '2.0.0'}
CVE-2023-49270
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_in_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
https://fluidattacks.com/advisories/lang/
2023-11-24T16:25:53.193Z
2023-12-20T19:21:34.658Z
2023-12-20T19:21:34.658Z
{'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'}
CVE-2023-49159
Server-Side Request Forgery (SSRF) vulnerability in Elegant Digital Solutions CommentLuv.This issue affects CommentLuv: from n/a through 3.0.4.
https://patchstack.com/database/vulnerability/commentluv/wordpress-commentluv-plugin-3-0-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-15T15:35:39.547Z
2023-12-15T15:35:39.547Z
{'Vendor': 'Elegant Digital Solutions', 'Product': 'CommentLuv', 'Versions': 'n/a'}
CVE-2023-49084
Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). While using the detected SQL Injection and insufficient processing of the include file path, it is possible to execute arbitrary code on the server. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `link.php`. Impact of the vulnerability execution of arbitrary code on the server.
https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp
2023-11-21T18:57:30.428Z
2023-12-21T23:04:44.219Z
2023-12-21T23:04:44.219Z
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '= 1.2.25'}
CVE-2023-49657
A stored cross-site scripting (XSS) vulnerability exists in Apache Superset before 3.0.3. An authenticated attacker with create/update permissions on charts or dashboards could store a script or add a specific HTML snippet that would act as a stored XSS. For 2.X versions, users should change their config to include: TALISMAN_CONFIG = {     "content_security_policy": {         "base-uri": ["'self'"],         "default-src": ["'self'"],         "img-src": ["'self'", "blob:", "data:"],         "worker-src": ["'self'", "blob:"],         "connect-src": [             "'self'",             " https://api.mapbox.com" https://api.mapbox.com" ;,             " https://events.mapbox.com" https://events.mapbox.com" ;,         ],         "object-src": "'none'",         "style-src": [             "'self'",             "'unsafe-inline'",         ],         "script-src": ["'self'", "'strict-dynamic'"],     },     "content_security_policy_nonce_in": ["script-src"],     "force_https": False,     "session_cookie_secure": False, }
https://lists.apache.org/thread/wjyvz8om9nwd396lh0bt156mtwjxpsvx
2023-11-28T21:39:07.846Z
2024-01-23T15:06:59.901Z
2024-01-23T15:06:59.901Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0'}
CVE-2023-49342
Temporary data passed between application components by Budgie Extras Clockworks applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49342
2023-11-27T03:17:52.865Z
2023-12-14T21:29:39.869Z
2023-12-14T21:29:39.869Z
{'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'}
CVE-2023-49179
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Event post allows Stored XSS.This issue affects Event post: from n/a through 5.8.6.
https://patchstack.com/database/vulnerability/event-post/wordpress-event-post-plugin-5-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:35.546Z
2023-12-15T14:45:17.613Z
2023-12-15T14:45:17.613Z
{'Vendor': 'N.O.U.S. Open Useful and Simple', 'Product': 'Event post', 'Versions': 'n/a'}
CVE-2023-49745
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Stored XSS.This issue affects Spiffy Calendar: from n/a through 4.9.5.
https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:21:40.736Z
2023-12-14T14:34:36.404Z
2023-12-14T14:34:36.404Z
{'Vendor': 'Spiffy Plugins', 'Product': 'Spiffy Calendar', 'Versions': 'n/a'}
CVE-2023-49180
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ternstyle LLC Automatic Youtube Video Posts Plugin allows Stored XSS.This issue affects Automatic Youtube Video Posts Plugin: from n/a through 5.2.2.
https://patchstack.com/database/vulnerability/automatic-youtube-video-posts/wordpress-automatic-youtube-video-posts-plugin-plugin-5-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:35.546Z
2023-12-15T14:47:32.658Z
2023-12-15T14:47:32.658Z
{'Vendor': 'Ternstyle LLC', 'Product': 'Automatic Youtube Video Posts Plugin', 'Versions': 'n/a'}
CVE-2023-49246
Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.175Z
2023-12-06T09:01:24.648Z
2023-12-06T09:01:24.648Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.0'}
CVE-2023-49587
SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network.
https://me.sap.com/notes/3395306
2023-11-27T18:45:03.234Z
2023-12-12T01:35:53.057Z
2023-12-12T01:35:53.057Z
{'Vendor': 'SAP_SE', 'Product': 'SAP Solution Manager', 'Versions': '720'}
CVE-2023-49568
A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Applications using only the in-memory filesystem supported by go-git are not affected by this vulnerability. This is a go-git implementation issue and does not affect the upstream git cli.
https://github.com/go-git/go-git/security/advisories/GHSA-mw99-9chc-xw7r
2023-11-27T14:21:51.157Z
2024-01-12T10:36:12.727Z
2024-01-12T10:36:12.727Z
{'Vendor': 'go-git', 'Product': 'go-git', 'Versions': '5.11.0'}
CVE-2023-49092
RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a non-constant-time implementation, information about the private key is leaked through timing information which is observable over the network. An attacker may be able to use that information to recover the key. There is currently no fix available. As a workaround, avoid using the RSA crate in settings where attackers are able to observe timing information, e.g. local use on a non-compromised computer.
https://github.com/RustCrypto/RSA/security/advisories/GHSA-c38w-74pg-36hr
2023-11-21T18:57:30.429Z
2023-11-28T20:57:06.739Z
2023-12-14T22:50:31.056Z
{'Vendor': 'RustCrypto', 'Product': 'RSA', 'Versions': '<= 0.9.5'}
CVE-2023-49991
Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow via the function CountVowelPosition at synthdata.c.
https://github.com/espeak-ng/espeak-ng/issues/1825
2023-12-04T00:00:00
2023-12-12T00:00:00
2024-01-19T04:06:55.307132
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49143
Denial-of-service (DoS) vulnerability exists in rfe service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur.
https://www.electronics.jtekt.co.jp/en/topics/202312116562/
2023-11-30T05:55:32.224Z
2023-12-12T09:16:20.067Z
2023-12-12T09:16:20.067Z
{'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'GC-A22W-CW', 'Versions': 'all versions'}
CVE-2023-49840
Cross-Site Request Forgery (CSRF) vulnerability in Palscode Multi Currency For WooCommerce.This issue affects Multi Currency For WooCommerce: from n/a through 1.5.5.
https://patchstack.com/database/vulnerability/wc-multi-currency/wordpress-multi-currency-for-woocommerce-plugin-1-5-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T17:12:29.822Z
2023-12-18T14:46:27.970Z
2023-12-18T14:46:27.970Z
{'Vendor': 'Palscode', 'Product': 'Multi Currency For WooCommerce', 'Versions': 'n/a'}
CVE-2023-49006
Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo version 3.4.3 allows a remote attacker to obtain sensitive information via a crafted page in the XML.php file.
https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/
2023-11-20T00:00:00
2023-12-19T00:00:00
2023-12-19T09:18:50.400933
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49285
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9
2023-11-24T16:45:24.312Z
2023-12-04T22:56:55.105Z
2023-12-04T22:56:55.105Z
{'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '>= 2.2, < 6.5'}
CVE-2023-49790
The Nextcloud iOS Files app allows users of iOS to interact with Nextcloud, a self-hosted productivity platform. Prior to version 4.9.2, the application can be used without providing the 4 digit PIN code. Nextcloud iOS Files app should be upgraded to 4.9.2 to receive the patch. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-j8g7-88vv-rggv
2023-11-30T13:39:50.863Z
2023-12-22T16:19:28.440Z
2023-12-22T16:19:28.440Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 4.9.2'}
CVE-2023-49378
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/form/save.
https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:34:54.651989
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49682
null
null
2023-11-29T17:48:17.255Z
2023-12-21T23:07:19.614Z
2024-01-02T19:55:40.139Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49397
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/updateStatus.
https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:51:34.316301
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49102
NZBGet 21.1 allows authenticated remote code execution because the unarchive programs (7za and unrar) preserve executable file permissions. An attacker with the Control capability can execute a file by setting the value of SevenZipCommand or UnrarCmd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://nzbget.net/download
2023-11-21T00:00:00
2023-11-22T00:00:00
2023-11-22T21:25:58.043504
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49552
An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file.
https://github.com/cesanta/mjs/issues/256
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T22:36:40.168982
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49801
Lif Auth Server is a server for validating logins, managing information, and account recovery for Lif Accounts. The issue relates to the `get_pfp` and `get_banner` routes on Auth Server. The issue is that there is no check to ensure that the file that Auth Server is receiving through these URLs is correct. This could allow an attacker access to files they shouldn't have access to. This issue has been patched in version 1.4.0.
https://github.com/Lif-Platforms/Lif-Auth-Server/security/advisories/GHSA-3v77-pvqq-qg3f
2023-11-30T13:39:50.864Z
2024-01-12T21:08:06.057Z
2024-01-12T21:08:06.057Z
{'Vendor': 'Lif-Platforms', 'Product': 'Lif-Auth-Server', 'Versions': '>= 1.3.2, < 1.4.0'}
CVE-2023-49944
The Challenge Response feature of BeyondTrust Privilege Management for Windows (PMfW) before 2023-07-14 allows local administrators to bypass this feature by decrypting the shared key, or by locating the decrypted shared key in process memory. The threat is mitigated by the Agent Protection feature.
https://www.beyondtrust.com/security
2023-12-03T00:00:00
2023-12-25T00:00:00
2023-12-25T08:02:37.880259
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49047
Tenda AX1803 v1.0.0.1 contains a stack overflow via the devName parameter in the function formSetDeviceName.
https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T16:32:24.138149
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49417
TOTOLink A7000R V9.1.0u.6115_B20201022 has a stack overflow vulnerability via setOpModeCfg.
https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg
2023-11-27T00:00:00
2023-12-11T00:00:00
2023-12-11T13:36:23.329638
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49694
A low-privileged OS user with access to a Windows host where NETGEAR ProSAFE Network Management System is installed can create arbitrary JSP files in a Tomcat web application directory. The user can then execute the JSP files under the security context of SYSTEM.
https://www.tenable.com/security/research/tra-2023-39
2023-11-29T22:03:49.958Z
2023-11-29T22:47:42.597Z
2023-11-29T22:47:42.597Z
{'Vendor': 'NETGEAR', 'Product': 'NETGEAR ProSAFE Network Management System', 'Versions': '0'}
CVE-2023-49381
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/div/update.
https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20modification%20point%20of%20the%20custom%20table.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:40:28.834275
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49155
Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator – easily Button Builder.This issue affects Button Generator – easily Button Builder: from n/a through 2.3.8.
https://patchstack.com/database/vulnerability/button-generation/wordpress-button-generator-easily-button-builder-plugin-2-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-22T23:35:38.290Z
2023-12-18T22:13:32.221Z
2023-12-18T22:13:32.221Z
{'Vendor': 'Wow-Company', 'Product': 'Button Generator – easily Button Builder', 'Versions': 'n/a'}
CVE-2023-49769
Cross-Site Request Forgery (CSRF) vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.4.
https://patchstack.com/database/vulnerability/integrate-google-drive/wordpress-integrate-google-drive-plugin-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:54.825Z
2023-12-17T09:58:31.416Z
2023-12-17T09:58:31.416Z
{'Vendor': 'SoftLab', 'Product': 'Integrate Google Drive', 'Versions': 'n/a'}
CVE-2023-49293
Vite is a website frontend framework. When Vite's HTML transformation is invoked manually via `server.transformIndexHtml`, the original request URL is passed in unmodified, and the `html` being transformed contains inline module scripts (`<script type="module">...</script>`), it is possible to inject arbitrary HTML into the transformed output by supplying a malicious URL query string to `server.transformIndexHtml`. Only apps using `appType: 'custom'` and using the default Vite HTML middleware are affected. The HTML entry must also contain an inline script. The attack requires a user to click on a malicious URL while running the dev server. Restricted files aren't exposed to the attacker. This issue has been addressed in [email protected], [email protected], and [email protected]. There are no known workarounds for this vulnerability.
https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97
2023-11-24T16:45:24.313Z
2023-12-04T23:03:30.752Z
2023-12-04T23:03:30.752Z
{'Vendor': 'vitejs', 'Product': 'vite', 'Versions': '>=4.4.0, < 4.4.12, = 4.5.0, >=5.0.0, < 5.0.5'}
CVE-2023-49786
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable Asterisk servers for calls that rely on DTLS-SRTP. Commit d7d7764cb07c8a1872804321302ef93bf62cba05 contains a fix, which is part of versions 18.20.1, 20.5.1, 21.0.1, amd 18.9-cert6.
https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq
2023-11-30T13:39:50.862Z
2023-12-14T19:47:46.306Z
2023-12-14T19:47:46.306Z
{'Vendor': 'asterisk', 'Product': 'asterisk', 'Versions': '< 18.20.1, >= 19.0.0, < 20.5.1, = 21.0.0, < 18.9-cert6'}
CVE-2023-49292
ecies is an Elliptic Curve Integrated Encryption Scheme for secp256k1 in Golang. If funcations Encapsulate(), Decapsulate() and ECDH() could be called by an attacker, they could recover any private key that interacts with it. This vulnerability was patched in 2.0.8. Users are advised to upgrade.
https://github.com/ecies/go/security/advisories/GHSA-8j98-cjfr-qx3h
2023-11-24T16:45:24.313Z
2023-12-04T23:12:03.059Z
2023-12-04T23:12:03.059Z
{'Vendor': 'ecies', 'Product': 'go', 'Versions': '< 2.0.8'}
CVE-2023-49787
null
null
2023-11-30T13:39:50.862Z
null
2023-12-07T17:59:41.227Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49695
OS command injection vulnerability in WRC-X3000GSN v1.0.2, WRC-X3000GS v1.0.24 and earlier, and WRC-X3000GSA v1.0.24 and earlier allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command by sending a specially crafted request to the product.
https://www.elecom.co.jp/news/security/20231212-01/
2023-11-30T01:25:31.380Z
2023-12-12T08:58:47.925Z
2023-12-12T08:58:47.925Z
{'Vendor': 'ELECOM CO.,LTD.', 'Product': 'WRC-X3000GSN', 'Versions': 'v1.0.2'}
CVE-2023-49380
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/friend_link/delete.
https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20friendship%20link.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:39:06.827271
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49103
An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.
https://owncloud.org/security
2023-11-21T00:00:00
2023-11-21T00:00:00
2023-12-05T00:07:02.851685
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49553
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file.
https://github.com/cesanta/mjs/issues/253
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T22:41:23.950955
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49800
`nuxt-api-party` is an open source module to proxy API requests. The library allows the user to send many options directly to `ofetch`. There is no filter on which options are available. We can abuse the retry logic to cause the server to crash from a stack overflow. fetchOptions are obtained directly from the request body. A malicious user can construct a URL known to not fetch successfully, then set the retry attempts to a high value, this will cause a stack overflow as ofetch error handling works recursively resulting in a denial of service. This issue has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should limit ofetch options.
https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h
2023-11-30T13:39:50.864Z
2023-12-08T23:41:55.206Z
2023-12-08T23:41:55.206Z
{'Vendor': 'johannschopplich', 'Product': 'nuxt-api-party', 'Versions': '< 0.22.1'}
CVE-2023-49046
Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the devName parameter in the function formAddMacfilterRule.
https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T15:16:03.165667
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49379
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via the component /admin/friend_link/save.
https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20new%20location%20of%20the%20friendship%20link.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:36:12.047751
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49683
null
null
2023-11-29T17:48:17.255Z
2023-12-21T23:08:32.403Z
2024-01-02T19:56:23.630Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49396
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/save.
https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:50:17.701505
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49816
Cross-Site Request Forgery (CSRF) vulnerability in Innovative Solutions Fix My Feed RSS Repair.This issue affects Fix My Feed RSS Repair: from n/a through 1.4.
https://patchstack.com/database/vulnerability/fix-my-feed-rss-repair/wordpress-fix-my-feed-rss-repair-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T14:51:04.753Z
2023-12-17T10:28:50.478Z
2023-12-17T10:28:50.478Z
{'Vendor': 'Innovative Solutions', 'Product': 'Fix My Feed RSS Repair', 'Versions': 'n/a'}
CVE-2023-49284
fish is a smart and user-friendly command line shell for macOS, Linux, and the rest of the family. fish shell uses certain Unicode non-characters internally for marking wildcards and expansions. It will incorrectly allow these markers to be read on command substitution output, rather than transforming them into a safe internal representation. While this may cause unexpected behavior with direct input (for example, echo \UFDD2HOME has the same output as echo $HOME), this may become a minor security problem if the output is being fed from an external program into a command substitution where this output may not be expected. This design flaw was introduced in very early versions of fish, predating the version control system, and is thought to be present in every version of fish released in the last 15 years or more, although with different characters. Code execution does not appear to be possible, but denial of service (through large brace expansion) or information disclosure (such as variable expansion) is potentially possible under certain circumstances. fish shell 3.6.2 has been released to correct this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/fish-shell/fish-shell/security/advisories/GHSA-2j9r-pm96-wp4f
2023-11-24T16:45:24.312Z
2023-12-04T23:46:35.567Z
2023-12-04T23:46:35.567Z
{'Vendor': 'fish-shell', 'Product': 'fish-shell', 'Versions': '< 3.6.2'}
CVE-2023-49791
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when an attacker manages to get access to an active session of another user via another way, they could delete and modify workflows by sending calls directly to the API bypassing the password confirmation shown in the UI. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3f8p-6qww-2prr
2023-11-30T13:39:50.863Z
2023-12-22T16:26:28.076Z
2023-12-22T16:26:28.076Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 23.0.0, < 23.0.12.13, >= 24.0.0, < 24.0.12.9, >= 25.0.0, < 25.0.13.4, >= 26.0.0, < 26.0.9, >= 27.0.0, < 27.1.4'}
CVE-2023-49142
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia audio crash through modify a released pointer.
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md
2023-11-28T02:07:56.536Z
2024-01-02T07:24:22.879Z
2024-01-02T07:24:22.879Z
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'}
CVE-2023-49841
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FancyThemes Optin Forms – Simple List Building Plugin for WordPress allows Stored XSS.This issue affects Optin Forms – Simple List Building Plugin for WordPress: from n/a through 1.3.3.
https://patchstack.com/database/vulnerability/optin-forms/wordpress-optin-forms-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T17:12:29.822Z
2023-12-14T15:56:47.509Z
2023-12-14T15:56:47.509Z
{'Vendor': 'FancyThemes', 'Product': 'Optin Forms – Simple List Building Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-49007
In Netgear Orbi RBR750 firmware before V7.2.6.21, there is a stack-based buffer overflow in /usr/sbin/httpd.
https://github.com/5erua/netgear_orbi_overflow_vulnerability/blob/main/README.md
2023-11-20T00:00:00
2023-12-08T00:00:00
2023-12-08T13:54:54.136734
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49210
The openssl (aka node-openssl) NPM package through 2.0.0 was characterized as "a nonsense wrapper with no real purpose" by its author, and accepts an opts argument that contains a verb field (used for command execution). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e
2023-11-23T00:00:00
2023-11-23T00:00:00
2023-11-23T19:49:23.647279
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49355
decToString in decNumber/decNumber.c in jq 88f01a7 has a one-byte out-of-bounds write via the " []-1.2e-1111111111" input. NOTE: this is not the same as CVE-2023-50246. The CVE-2023-50246 71c2ab5 reference mentions -10E-1000010001, which is not in normalized scientific notation.
https://github.com/jqlang/jq/tree/88f01a741c8d63c4d1b5bc3ef61520c6eb93edaa
2023-11-27T00:00:00
2023-12-11T00:00:00
2023-12-20T08:22:51.735803
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49569
A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved. Applications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using "Plain" versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue. This is a go-git implementation issue and does not affect the upstream git cli.
https://github.com/go-git/go-git/security/advisories/GHSA-449p-3h89-pw88
2023-11-27T14:21:51.157Z
2024-01-12T10:41:00.201Z
2024-01-12T10:41:00.201Z
{'Vendor': 'go-git', 'Product': 'go-git', 'Versions': '5.11.0'}
CVE-2023-49093
HtmlUnit is a GUI-less browser for Java programs. HtmlUnit is vulnerable to Remote Code Execution (RCE) via XSTL, when browsing the attacker’s webpage. This vulnerability has been patched in version 3.9.0
https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7
2023-11-21T18:57:30.429Z
2023-12-04T04:47:27.145Z
2023-12-04T04:47:27.145Z
{'Vendor': 'HtmlUnit', 'Product': 'htmlunit', 'Versions': '< 3.9.0'}
CVE-2023-49990
Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c.
https://github.com/espeak-ng/espeak-ng/issues/1824
2023-12-04T00:00:00
2023-12-12T00:00:00
2024-01-19T04:06:56.787913
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49247
Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.176Z
2023-12-06T08:32:36.621Z
2023-12-06T08:32:36.621Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-49752
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spoon themes Adifier - Classified Ads WordPress Theme.This issue affects Adifier - Classified Ads WordPress Theme: from n/a before 3.1.4.
https://patchstack.com/database/vulnerability/adifier/wordpress-adifier-classified-ads-wordpress-theme-theme-3-9-3-sql-injection-vulnerability?_s_id=cve
2023-11-30T13:22:02.831Z
2023-12-20T17:38:01.072Z
2023-12-20T17:38:01.072Z
{'Vendor': 'Spoon themes', 'Product': 'Adifier - Classified Ads WordPress Theme', 'Versions': 'n/a'}
CVE-2023-49181
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Event Manager WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce allows Stored XSS.This issue affects WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce: from n/a through 3.1.40.
https://patchstack.com/database/vulnerability/wp-event-manager/wordpress-wp-event-manager-plugin-3-1-39-cross-site-scripting-xss-vulnerability-2?_s_id=cve
2023-11-22T23:36:35.546Z
2023-12-15T14:49:51.927Z
2023-12-15T14:49:51.927Z
{'Vendor': 'WP Event Manager', 'Product': 'WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce', 'Versions': 'n/a'}
CVE-2023-49494
DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component select_media_post_wangEditor.php.
http://dedecms.com
2023-11-27T00:00:00
2023-12-11T00:00:00
2023-12-11T20:36:07.330624
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49251
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application allows an attacker to add their own login credentials to the device. This allows an attacker to remotely login as root and take control of the device even after the affected device is fully set up.
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf
2023-11-24T11:41:23.260Z
2024-01-09T10:00:08.834Z
2024-01-09T10:00:08.834Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC CN 4100', 'Versions': 'All versions < V2.7'}
CVE-2023-49744
Cross-Site Request Forgery (CSRF) vulnerability in Gift Up Gift Up Gift Cards for WordPress and WooCommerce.This issue affects Gift Up Gift Cards for WordPress and WooCommerce: from n/a through 2.21.3.
https://patchstack.com/database/vulnerability/gift-up/wordpress-gift-up-gift-cards-for-wordpress-and-woocommerce-plugin-2-21-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:21:40.736Z
2023-12-15T15:42:15.908Z
2023-12-15T15:42:15.908Z
{'Vendor': 'Gift Up', 'Product': 'Gift Up Gift Cards for WordPress and WooCommerce', 'Versions': 'n/a'}
CVE-2023-49314
Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack.
https://asana.com/pt/download
2023-11-26T00:00:00
2023-11-28T00:00:00
2023-11-28T14:44:31.895910
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49197
Cross-Site Request Forgery (CSRF) vulnerability in Apasionados, Apasionados del Marketing, NetConsulting DoFollow Case by Case.This issue affects DoFollow Case by Case: from n/a through 3.4.2.
https://patchstack.com/database/vulnerability/dofollow-case-by-case/wordpress-dofollow-case-by-case-plugin-3-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-22T23:36:56.849Z
2023-12-15T15:39:22.792Z
2023-12-15T15:39:22.792Z
{'Vendor': 'Apasionados, Apasionados del Marketing, NetConsulting', 'Product': 'DoFollow Case by Case', 'Versions': 'n/a'}
CVE-2023-49178
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mr. Hdwplayer HDW Player Plugin (Video Player & Video Gallery) allows Reflected XSS.This issue affects HDW Player Plugin (Video Player & Video Gallery): from n/a through 5.0.
https://patchstack.com/database/vulnerability/hdw-player-video-player-video-gallery/wordpress-hdw-player-plugin-video-player-video-gallery-plugin-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:35.545Z
2023-12-15T14:40:46.985Z
2023-12-15T14:40:46.985Z
{'Vendor': 'Mr. Hdwplayer', 'Product': 'HDW Player Plugin (Video Player & Video Gallery)', 'Versions': 'n/a'}
CVE-2023-49656
Jenkins MATLAB Plugin 2.11.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193
2023-11-28T21:18:14.328Z
2023-11-29T13:45:12.215Z
2023-11-29T13:45:12.215Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins MATLAB Plugin', 'Versions': '0'}
CVE-2023-49343
Temporary data passed between application components by Budgie Extras Dropby applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-27g2-7x65-3cc5
2023-11-27T03:17:52.865Z
2023-12-14T21:31:00.844Z
2023-12-14T21:31:00.844Z
{'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'}
CVE-2023-49713
Denial-of-service (DoS) vulnerability exists in NetBIOS service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur.
https://www.electronics.jtekt.co.jp/en/topics/202312116562/
2023-11-30T05:55:31.396Z
2023-12-12T09:16:26.932Z
2023-12-12T09:16:26.932Z
{'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'GC-A22W-CW', 'Versions': 'all versions'}
CVE-2023-49085
Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.
https://github.com/Cacti/cacti/security/advisories/GHSA-vr3c-38wh-g855
2023-11-21T18:57:30.428Z
2023-12-22T16:13:13.259Z
2023-12-22T16:13:13.259Z
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'}
CVE-2023-49764
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Younes JFR. Advanced Database Cleaner.This issue affects Advanced Database Cleaner: from n/a through 3.1.2.
https://patchstack.com/database/vulnerability/advanced-database-cleaner/wordpress-advanced-database-cleaner-plugin-3-1-2-sql-injection-vulnerability?_s_id=cve
2023-11-30T13:22:27.402Z
2023-12-19T20:31:05.480Z
2023-12-19T20:31:05.480Z
{'Vendor': 'Younes JFR.', 'Product': 'Advanced Database Cleaner', 'Versions': 'n/a'}
CVE-2023-49621
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf
2023-11-28T10:01:06.679Z
2024-01-09T10:00:11.770Z
2024-01-09T10:00:11.770Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC CN 4100', 'Versions': 'All versions < V2.7'}
CVE-2023-49271
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_out_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
https://fluidattacks.com/advisories/lang/
2023-11-24T16:25:53.193Z
2023-12-20T19:24:15.907Z
2023-12-20T19:24:15.907Z
{'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'}
CVE-2023-49949
Passwork before 6.2.0 allows remote authenticated users to bypass 2FA by sending all one million of the possible 6-digit codes.
https://passwork.ru/
2023-12-03T00:00:00
2023-12-26T00:00:00
2023-12-26T13:54:53.543169
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49363
Rockoa <2.3.3 is vulnerable to SQL Injection. The problem exists in the indexAction method in reimpAction.php.
https://github.com/wednesdaygogo/Vulnerability-recurrence/blob/main/rockoa%20less%20than%202.3.3%20sql%20injection%20vulnerability.pdf
2023-11-27T00:00:00
2023-12-13T00:00:00
2023-12-13T17:52:42.571242
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49699
Memory Corruption in IMS while calling VoLTE Streamingmedia Interface
https://www.asrmicro.com/en/goods/psirt?cid=31
2023-11-30T01:28:05.185Z
2023-11-30T07:04:48.134Z
2023-11-30T07:04:48.134Z
{'Vendor': 'ASR', 'Product': 'Falcon', 'Versions': '0'}
CVE-2023-49733
Improper Restriction of XML External Entity Reference vulnerability in Apache Cocoon.This issue affects Apache Cocoon: from 2.2.0 before 2.3.0. Users are recommended to upgrade to version 2.3.0, which fixes the issue.
https://lists.apache.org/thread/t87nntzt6dxw354zbqr9k7l7o1x8gq11
2023-11-30T11:07:23.148Z
2023-11-30T11:29:35.188Z
2023-11-30T11:29:45.774Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Cocoon', 'Versions': '2.2.0'}
CVE-2023-49226
An issue was discovered in Peplink Balance Two before 8.4.0. Command injection in the traceroute feature of the administration console allows users with admin privileges to execute arbitrary commands as root.
https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4
2023-11-24T00:00:00
2023-12-25T00:00:00
2023-12-25T07:51:10.561570
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49119
Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:46.701Z
2023-12-26T07:20:58.393Z
2023-12-26T07:20:58.393Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'}
CVE-2023-49549
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file.
https://github.com/cesanta/mjs/issues/251
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T22:18:36.407177
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49375
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/friend_link/update.
https://github.com/cui2shark/cms/blob/main/There%20is%20CSRF%20in%20the%20modification%20of%20the%20friendship%20link.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:33:45.221489
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49230
An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication.
https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4
2023-11-24T00:00:00
2023-12-28T00:00:00
2023-12-28T03:16:06.028392
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49322
Certain WithSecure products allow a Denial of Service because there is an unpack handler crash that can lead to a scanning engine crash. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1.
https://www.withsecure.com/en/support/security-advisories/cve-2023-49322
2023-11-26T00:00:00
2023-11-26T00:00:00
2023-11-28T18:39:36.452985
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49772
Deserialization of Untrusted Data vulnerability in Phpbits Creative Studio Genesis Simple Love.This issue affects Genesis Simple Love: from n/a through 2.0.
https://patchstack.com/database/vulnerability/genesis-simple-love/wordpress-genesis-simple-love-plugin-2-0-unauthenticated-php-object-injection-vulnerability?_s_id=cve
2023-11-30T13:22:54.825Z
2023-12-20T15:21:10.216Z
2023-12-20T15:21:10.216Z
{'Vendor': 'Phpbits Creative Studio', 'Product': 'Genesis Simple Love', 'Versions': 'n/a'}
CVE-2023-49288
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5
2023-11-24T16:45:24.312Z
2023-12-04T22:49:31.317Z
2023-12-04T22:49:31.317Z
{'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '>= 3.5, < 6.0.1'}
CVE-2023-49070
Pre-auth RCE in Apache Ofbiz 18.12.09. It's due to XML-RPC no longer maintained still present. This issue affects Apache OFBiz: before 18.12.10.  Users are recommended to upgrade to version 18.12.10
https://ofbiz.apache.org/download.html
2023-11-21T12:04:43.559Z
2023-12-05T08:05:06.966Z
2023-12-05T08:05:06.966Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OFBiz', 'Versions': '0'}
CVE-2023-49836
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brontobytes Cookie Bar allows Stored XSS.This issue affects Cookie Bar: from n/a through 2.0.
https://patchstack.com/database/vulnerability/cookie-bar/wordpress-cookie-bar-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T17:12:29.821Z
2023-12-14T14:10:01.196Z
2023-12-14T14:10:01.196Z
{'Vendor': 'Brontobytes', 'Product': 'Cookie Bar', 'Versions': 'n/a'}
CVE-2023-49135
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md
2023-11-28T02:07:56.551Z
2024-01-02T07:24:17.361Z
2024-01-02T07:24:17.361Z
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'}