CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-49824
Cross-Site Request Forgery (CSRF) vulnerability in PixelYourSite Product Catalog Feed by PixelYourSite.This issue affects Product Catalog Feed by PixelYourSite: from n/a through 2.1.1.
https://patchstack.com/database/vulnerability/product-catalog-feed/wordpress-product-catalog-feed-by-pixelyoursite-plugin-2-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T15:27:45.874Z
2023-12-17T10:35:19.743Z
2023-12-17T10:35:19.743Z
{'Vendor': 'PixelYourSite', 'Product': 'Product Catalog Feed by PixelYourSite', 'Versions': 'n/a'}
CVE-2023-49961
WALLIX Bastion 7.x, 8.x, 9.x and 10.x and WALLIX Access Manager 3.x and 4.x have Incorrect Access Control which can lead to sensitive data exposure.
https://www.wallix.com/support/alerts/
2023-12-03T00:00:00
2024-01-08T00:00:00
2024-01-08T20:16:33.575838
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49062
Katran could disclose non-initialized kernel memory as part of an IP header. The issue was present for IPv4 encapsulation and ICMP (v4) Too Big packet generation. After a bpf_xdp_adjust_head call, Katran code didn’t initialize the Identification field for the IPv4 header, resulting in writing content of kernel memory in that field of IP header. The issue affected all Katran versions prior to commit 6a03106ac1eab39d0303662963589ecb2374c97f
https://www.facebook.com/security/advisories/cve-2023-49062
2023-11-20T19:59:38.627Z
2023-11-28T15:45:42.674Z
2023-11-28T15:45:42.674Z
{'Vendor': 'Facebook', 'Product': 'Katran', 'Versions': '0'}
CVE-2023-49598
Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product.
https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/
2023-12-07T02:39:42.967Z
2023-12-26T07:21:02.611Z
2023-12-26T07:21:02.611Z
{'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'}
CVE-2023-49432
Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'deviceList' parameter at /goform/setMacFilterCfg.
https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T16:03:49.671124
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49259
The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time.
https://cert.pl/en/posts/2024/01/CVE-2023-49253/
2023-11-24T11:53:46.294Z
2024-01-12T14:25:12.037Z
2024-01-12T14:25:12.037Z
{'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'}
CVE-2023-49170
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in captainform Forms by CaptainForm – Form Builder for WordPress allows Reflected XSS.This issue affects Forms by CaptainForm – Form Builder for WordPress: from n/a through 2.5.3.
https://patchstack.com/database/vulnerability/captainform/wordpress-forms-by-captainform-form-builder-for-wordpress-plugin-2-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.489Z
2023-12-15T14:10:52.014Z
2023-12-15T14:10:52.014Z
{'Vendor': 'captainform', 'Product': 'Forms by CaptainForm – Form Builder for WordPress', 'Versions': 'n/a'}
CVE-2023-49465
Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function at motion.cc.
https://github.com/strukturag/libde265/issues/435
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-30T21:06:23.977788
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49936
An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1.
https://www.schedmd.com/security-archive.php
2023-12-03T00:00:00
2023-12-14T00:00:00
2024-01-03T03:06:33.349975
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49166
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Magic Logix MSync.This issue affects MSync: from n/a through 1.0.0.
https://patchstack.com/database/vulnerability/msync/wordpress-msync-plugin-1-0-0-sql-injection-vulnerability?_s_id=cve
2023-11-22T23:36:04.379Z
2023-12-20T17:35:29.992Z
2023-12-20T17:35:29.992Z
{'Vendor': 'Magic Logix', 'Product': 'MSync', 'Versions': 'n/a'}
CVE-2023-49920
Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent. Users are advised to upgrade to version 2.8.0 or later which is not affected
https://github.com/apache/airflow/pull/36026
2023-12-02T15:33:40.610Z
2023-12-21T09:27:09.651Z
2023-12-21T09:27:09.651Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '2.7.0'}
CVE-2023-49189
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Getsocial, S.A. Social Share Buttons & Analytics Plugin – GetSocial.Io allows Stored XSS.This issue affects Social Share Buttons & Analytics Plugin – GetSocial.Io: from n/a through 4.3.12.
https://patchstack.com/database/vulnerability/wp-share-buttons-analytics-by-getsocial/wordpress-social-share-buttons-analytics-plugin-getsocial-io-plugin-4-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:56.848Z
2023-12-15T15:08:01.376Z
2023-12-15T15:08:01.376Z
{'Vendor': 'Getsocial, S.A.', 'Product': 'Social Share Buttons & Analytics Plugin – GetSocial.io', 'Versions': 'n/a'}
CVE-2023-49131
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:53:05.160Z
2024-01-09T10:00:05.693Z
2024-01-09T10:00:05.693Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49424
Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter at /goform/SetVirtualServerCfg.
https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T13:57:37.606208
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49799
`nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example `\nhttps://whatever.com` which has a leading newline. According to the fetch specification, before a fetch is made the URL is normalized. "To normalize a byte sequence potentialValue, remove any leading and trailing HTTP whitespace bytes from potentialValue.". This means the final request will be normalized to `https://whatever.com` bypassing the check and nuxt-api-party will send a request outside of the whitelist. This could allow us to leak credentials or perform Server-Side Request Forgery (SSRF). This vulnerability has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should revert to the previous method of detecting absolute URLs.
https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv
2023-11-30T13:39:50.864Z
2023-12-08T23:45:18.581Z
2023-12-08T23:45:18.581Z
{'Vendor': 'johannschopplich', 'Product': 'nuxt-api-party', 'Versions': '< 0.22.1'}
CVE-2023-49633
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/zimerman/
2023-11-28T15:05:55.678Z
2024-01-04T13:53:59.309Z
2024-01-04T13:53:59.309Z
{'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'}
CVE-2023-49776
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hakan Demiray Sayfa Sayac.This issue affects Sayfa Sayac: from n/a through 2.6.
https://patchstack.com/database/vulnerability/sayfa-sayac/wordpress-sayfa-sayac-plugin-2-6-unauthenticated-sql-injection-vulnerability?_s_id=cve
2023-11-30T13:22:54.826Z
2023-12-20T15:35:57.714Z
2023-12-20T15:35:57.714Z
{'Vendor': 'Hakan Demiray', 'Product': 'Sayfa Sayac', 'Versions': 'n/a'}
CVE-2023-49371
RuoYi up to v4.6 was discovered to contain a SQL injection vulnerability via /system/dept/edit.
https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md
2023-11-27T00:00:00
2023-12-01T00:00:00
2023-12-06T12:25:09.975077
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49058
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
https://me.sap.com/notes/3363690
2023-11-20T11:31:43.313Z
2023-12-12T01:01:07.964Z
2023-12-12T01:01:07.964Z
{'Vendor': 'SAP_SE', 'Product': 'SAP Master Data Governance', 'Versions': 'MDG_FND 731, MDG_FND 732, MDG_FND 746, MDG_FND 747, MDG_FND 748, MDG_FND 749, MDG_FND 752, MDG_FND 800, MDG_FND 802, MDG_FND 803, MDG_FND 804, MDG_FND 805, MDG_FND 806, MDG_FND 807, MDG_FND 808, SAP_BS_FND 702'}
CVE-2023-49408
Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the function set_device_name.
https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T17:39:59.330694
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49625
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/zimerman/
2023-11-28T15:05:55.677Z
2024-01-04T13:52:28.723Z
2024-01-04T13:52:28.723Z
{'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'}
CVE-2023-49760
Cross-Site Request Forgery (CSRF) vulnerability in Giannopoulos Kostas WPsoonOnlinePage.This issue affects WPsoonOnlinePage: from n/a through 1.9.
https://patchstack.com/database/vulnerability/wp-soononline-page/wordpress-wpsoononlinepage-plugin-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:27.402Z
2023-12-18T22:21:56.262Z
2023-12-18T22:21:56.262Z
{'Vendor': 'Giannopoulos Kostas', 'Product': 'WPsoonOnlinePage', 'Versions': 'n/a'}
CVE-2023-49828
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo allows Stored XSS.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 6.4.2.
https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woopayments-plugin-6-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T15:27:45.875Z
2023-12-14T14:29:47.110Z
2023-12-14T14:29:47.110Z
{'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'}
CVE-2023-49081
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2
2023-11-21T18:57:30.428Z
2023-11-30T06:56:26.348Z
2023-11-30T06:56:26.348Z
{'Vendor': 'aio-libs', 'Product': 'aiohttp', 'Versions': '< 3.9.0'}
CVE-2023-49594
An information disclosure vulnerability exists in the challenge functionality of instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. A specially crafted HTTP request can lead to a disclosure of sensitive information. A user logging into Keycloak using DuoUniversalKeycloakAuthenticator plugin triggers this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1907
2023-12-15T16:08:15.594Z
2023-12-23T20:04:48.013Z
2024-01-17T20:25:57.458Z
{'Vendor': 'instipod', 'Product': 'DuoUniversalKeycloakAuthenticator', 'Versions': '1.0.7'}
CVE-2023-49347
Temporary data passed between application components by Budgie Extras Windows Previews could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may read private information from windows, present false information to users, or deny access to the application.
https://ubuntu.com/security/notices/USN-6556-1
2023-11-27T03:17:52.866Z
2023-12-14T21:31:32.489Z
2023-12-14T21:31:32.489Z
{'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'}
CVE-2023-49652
Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1.
https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-2835
2023-11-28T21:18:14.327Z
2023-11-29T13:45:09.576Z
2023-11-29T13:52:09.792Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Google Compute Engine Plugin', 'Versions': '4.551.v5a_4dc98f6962, 4.3.17.1'}
CVE-2023-49486
JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the model management department.
https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20model%20management%20department.md
2023-11-27T00:00:00
2023-12-08T00:00:00
2023-12-08T15:08:59.259411
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49469
Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function.
https://github.com/shaarli/Shaarli/issues/2038
2023-11-27T00:00:00
2023-12-28T00:00:00
2023-12-28T05:56:12.495094
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49740
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seraphinite Solutions Seraphinite Accelerator allows Reflected XSS.This issue affects Seraphinite Accelerator: from n/a through 2.20.28.
https://patchstack.com/database/vulnerability/seraphinite-accelerator/wordpress-seraphinite-accelerator-plugin-2-20-28-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:21:40.735Z
2023-12-14T14:40:36.861Z
2023-12-14T14:40:36.861Z
{'Vendor': 'Seraphinite Solutions', 'Product': 'Seraphinite Accelerator', 'Versions': 'n/a'}
CVE-2023-49255
The router console is accessible without authentication at "data" field, and while a user needs to be logged in in order to modify the configuration, the session state is shared. If any other user is currently logged in, the anonymous user can execute commands in the context of the authenticated one. If the logged in user has administrative privileges, it is possible to use webadmin service configuration commands to create a new admin user with a chosen password.
https://cert.pl/en/posts/2024/01/CVE-2023-49253/
2023-11-24T11:53:46.294Z
2024-01-12T14:23:53.922Z
2024-01-12T14:23:53.922Z
{'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'}
CVE-2023-49490
XunRuiCMS v4.5.5 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /admin.php.
https://github.com/dayrui/xunruicms/issues/2
2023-11-27T00:00:00
2023-12-11T00:00:00
2023-12-11T20:31:57.119689
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49185
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder WP & WooCommerce Search allows Reflected XSS.This issue affects Doofinder WP & WooCommerce Search: from n/a through 2.1.7.
https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-wp-woocommerce-search-plugin-2-0-33-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:35.546Z
2023-12-15T14:59:27.925Z
2023-12-15T14:59:27.925Z
{'Vendor': 'Doofinder', 'Product': 'Doofinder WP & WooCommerce Search', 'Versions': 'n/a'}
CVE-2023-49243
Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.175Z
2023-12-06T08:56:24.442Z
2023-12-06T08:56:24.442Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-49097
ZITADEL is an identity infrastructure system. ZITADEL uses the notification triggering requests Forwarded or X-Forwarded-Host header to build the button link sent in emails for confirming a password reset with the emailed code. If this header is overwritten and a user clicks the link to a malicious site in the email, the secret code can be retrieved and used to reset the users password and take over his account. Accounts with MFA or Passwordless enabled can not be taken over by this attack. This issue has been patched in versions 2.41.6, 2.40.10 and 2.39.9.
https://github.com/zitadel/zitadel/security/advisories/GHSA-2wmj-46rj-qm2w
2023-11-21T18:57:30.430Z
2023-11-30T04:45:49.675Z
2023-11-30T04:45:49.675Z
{'Vendor': 'zitadel', 'Product': 'zitadel', 'Versions': '>= 2.39.0, < 2.39.9, >= 2.40.0, < 2.40.10, >= 2.41.0, < 2.41.6'}
CVE-2023-49994
Espeak-ng 1.52-dev was discovered to contain a Floating Point Exception via the function PeaksToHarmspect at wavegen.c.
https://github.com/espeak-ng/espeak-ng/issues/1823
2023-12-04T00:00:00
2023-12-12T00:00:00
2024-01-19T04:06:53.748161
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49078
raptor-web is a CMS for game server communities that can be used to host information and keep track of players. In version 0.4.4 of raptor-web, it is possible to craft a malicious URL that will result in a reflected cross-site scripting vulnerability. A user controlled URL parameter is loaded into an internal template that has autoescape disabled. This is a cross-site scripting vulnerability that affects all deployments of `raptor-web` on version `0.4.4`. Any victim who clicks on a malicious crafted link will be affected. This issue has been patched 0.4.4.1.
https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq
2023-11-21T18:57:30.427Z
2023-11-28T18:15:24.447Z
2023-11-28T18:15:24.447Z
{'Vendor': 'zediious', 'Product': 'raptor-web', 'Versions': '< 0.4.4.1'}
CVE-2023-49428
Tenda AX12 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'mac' parameter at /goform/SetOnlineDevName.
https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T14:49:21.963460
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49701
Memory Corruption in SIM management while USIMPhase2init
https://www.asrmicro.com/en/goods/psirt?cid=31
2023-11-30T01:28:05.185Z
2023-11-30T07:15:14.820Z
2023-11-30T07:15:14.820Z
{'Vendor': 'ASR', 'Product': 'Falcon', 'Versions': '0'}
CVE-2023-49351
A stack-based buffer overflow vulnerability in /bin/webs binary in Edimax BR6478AC V2 firmware veraion v1.23 allows attackers to overwrite other values located on the stack due to an incorrect use of the strcpy() function.
https://github.com/countfatcode/temp/blob/main/formUSBAccount/formUSBAccount.md
2023-11-27T00:00:00
2024-01-16T00:00:00
2024-01-16T18:41:52.699858
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49214
Usedesk before 1.7.57 allows chat template injection.
https://usedesk.ru/updates_september23
2023-11-23T00:00:00
2023-11-23T00:00:00
2023-11-23T22:01:29.626227
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49003
An issue in simplemobiletools Simple Dialer 5.18.1 allows an attacker to bypass intended access restrictions via interaction with com.simplemobiletools.dialer.activities.DialerActivity.
https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md
2023-11-20T00:00:00
2023-12-27T00:00:00
2023-12-27T21:21:55.561596
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49146
DOMSanitizer (aka dom-sanitizer) before 1.0.7 allows XSS via an SVG document because of mishandling of comments and greedy regular expressions.
https://github.com/rhukster/dom-sanitizer/commit/c2a98f27ad742668b254282ccc5581871d0fb601
2023-11-22T00:00:00
2023-11-22T00:00:00
2023-11-22T21:45:04.084202
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49795
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a server-side request forgery vulnerability in `file.py`. This can lead to limited information disclosure. Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.
https://github.com/mindsdb/mindsdb/security/advisories/GHSA-34mr-6q8x-g9r6
2023-11-30T13:39:50.863Z
2023-12-11T19:01:00.946Z
2023-12-11T20:38:42.859Z
{'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.11.4.1'}
CVE-2023-49280
XWiki Change Request is an XWiki application allowing to request changes on a wiki without publishing directly the changes. Change request allows to edit any page by default, and the changes are then exported in an XML file that anyone can download. So it's possible for an attacker to obtain password hash of users by performing an edit on the user profiles and then downloading the XML file that has been created. This is also true for any document that might contain password field and that a user can view. This vulnerability impacts all version of Change Request, but the impact depends on the rights that has been set on the wiki since it requires for the user to have the Change request right (allowed by default) and view rights on the page to target. This issue cannot be easily exploited in an automated way. The patch consists in denying to users the right of editing pages that contains a password field with change request. It means that already existing change request for those pages won't be removed by the patch, administrators needs to take care of it. The patch is provided in Change Request 1.10, administrators should upgrade immediately. It's possible to workaround the vulnerability by denying manually the Change request right on some spaces, such as XWiki space which will include any user profile by default.
https://github.com/xwiki-contrib/application-changerequest/security/advisories/GHSA-2fr7-cc7p-p45q
2023-11-24T16:45:24.311Z
2023-12-04T22:33:59.292Z
2023-12-04T22:33:59.292Z
{'Vendor': 'xwiki-contrib', 'Product': 'application-changerequest', 'Versions': '>= 0.1, < 1.10'}
CVE-2023-49404
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formAdvancedSetListSet.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setAdvancedSetList/w30e_setAdvancedSetList.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T17:30:46.319323
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49957
An issue was discovered in Dalmann OCPP.Core before 1.3.0 for OCPP (Open Charge Point Protocol) for electric vehicles. It permits multiple transactions with the same connectorId and idTag, contrary to the expected ConcurrentTx status. This could result in critical transaction management and billing errors. NOTE: the vendor's perspective is "Imagine you've got two cars in your family and want to charge both in parallel on the same account/token? Why should that be rejected?"
https://github.com/dallmann-consulting/OCPP.Core/issues/35
2023-12-03T00:00:00
2023-12-07T00:00:00
2023-12-07T12:59:06.071445
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49812
Authorization Bypass Through User-Controlled Key vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005.
https://patchstack.com/database/vulnerability/wp-photo-album-plus/wordpress-wp-photo-album-plus-plugin-8-5-02-005-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-11-30T14:51:04.753Z
2023-12-19T20:55:34.805Z
2023-12-19T20:55:34.805Z
{'Vendor': 'J.N. Breetvelt a.k.a. OpaJaap', 'Product': 'WP Photo Album Plus', 'Versions': 'n/a'}
CVE-2023-49238
In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in.
https://security.gradle.com
2023-11-24T00:00:00
2024-01-09T00:00:00
2024-01-09T01:40:13.981561
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49687
null
null
2023-11-29T17:48:17.255Z
2023-12-21T23:20:14.194Z
2024-01-02T19:59:58.279Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49042
Heap Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the schedStartTime parameter or the schedEndTime parameter in the function setSchedWifi.
https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/setSchedWifi.md
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T16:43:09.070379
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49107
Generation of Error Message Containing Sensitive Information vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent modules).This issue affects Hitachi Device Manager: before 8.8.5-04.
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-101/index.html
2023-11-22T02:40:01.035Z
2024-01-16T00:59:46.297Z
2024-01-16T00:59:46.297Z
{'Vendor': 'Hitachi', 'Product': 'Hitachi Device Manager', 'Versions': '0'}
CVE-2023-49557
An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component.
https://github.com/yasm/yasm/issues/253
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T23:35:09.402961
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49804
Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, when a user changes their login password in Uptime Kuma, a previously logged-in user retains access without being logged out. This behavior persists consistently, even after system restarts or browser restarts. This vulnerability allows unauthorized access to user accounts, compromising the security of sensitive information. The same vulnerability was partially fixed in CVE-2023-44400, but logging existing users out of their accounts was forgotten. To mitigate the risks associated with this vulnerability, the maintainers made the server emit a `refresh` event (clients handle this by reloading) and then disconnecting all clients except the one initiating the password change. It is recommended to update Uptime Kuma to version 1.23.9.
https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3
2023-11-30T13:39:50.865Z
2023-12-11T22:32:32.869Z
2023-12-11T22:32:32.869Z
{'Vendor': 'louislam', 'Product': 'uptime-kuma', 'Versions': '< 1.23.9'}
CVE-2023-49691
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V8.0), SCALANCE M804PB (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (All versions < V8.0), SCALANCE M874-2 (All versions < V8.0), SCALANCE M874-3 (All versions < V8.0), SCALANCE M876-3 (EVDO) (All versions < V8.0), SCALANCE M876-3 (ROK) (All versions < V8.0), SCALANCE M876-4 (All versions < V8.0), SCALANCE M876-4 (EU) (All versions < V8.0), SCALANCE M876-4 (NAM) (All versions < V8.0), SCALANCE MUM853-1 (EU) (All versions < V8.0), SCALANCE MUM856-1 (EU) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (All versions < V8.0), SCALANCE S615 (All versions < V8.0), SCALANCE S615 EEC (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update.
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf
2023-11-29T17:51:25.463Z
2023-12-12T11:27:24.588Z
2023-12-12T11:27:24.588Z
{'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions < V8.0'}
CVE-2023-49853
Cross-Site Request Forgery (CSRF) vulnerability in PayTR Ödeme ve Elektronik Para Kuruluşu A.Ş. PayTR Taksit Tablosu – WooCommerce.This issue affects PayTR Taksit Tablosu – WooCommerce: from n/a through 1.3.1.
https://patchstack.com/database/vulnerability/paytr-taksit-tablosu-woocommerce/wordpress-paytr-taksit-tablosu-woocommerce-plugin-1-3-1-broken-authentication-vulnerability?_s_id=cve
2023-11-30T17:13:03.350Z
2023-12-18T14:33:57.484Z
2023-12-18T14:33:57.484Z
{'Vendor': 'PayTR Ödeme ve Elektronik Para Kuruluşu A.Ş.', 'Product': 'PayTR Taksit Tablosu – WooCommerce', 'Versions': 'n/a'}
CVE-2023-49150
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Crypto Converter Widget allows Stored XSS.This issue affects Crypto Converter Widget: from n/a through 1.8.1.
https://patchstack.com/database/vulnerability/crypto-converter-widget/wordpress-crypto-converter-widget-plugin-1-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:35:38.289Z
2023-12-14T17:04:07.003Z
2023-12-14T17:04:07.003Z
{'Vendor': 'CurrencyRate.today', 'Product': 'Crypto Converter Widget', 'Versions': 'n/a'}
CVE-2023-49279
Umbraco is an ASP.NET content management system (CMS). Starting in version 7.0.0 and prior to versions 7.15.11, 8.18.9, 10.7.0, 11.5.0, and 12.2.0, a user with access to the backoffice can upload SVG files that include scripts. If the user can trick another user to load the media directly in a browser, the scripts can be executed. Versions 7.15.11, 8.18.9, 10.7.0, 11.5.0, and 12.2.0 contain a patch for this issue. Some workarounds are available. Implement the server side file validation or serve all media from an different host (e.g cdn) than where Umbraco is hosted.
https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-6xmx-85x3-4cv2
2023-11-24T16:45:24.311Z
2023-12-12T19:35:05.931Z
2023-12-12T19:35:05.931Z
{'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 7.0.0, < 7.15.11, >= 8.0.0, < 8.18.9, >= 9.0.0-rc001, < 10.7.0, >= 11.0.0-rc1, < 11.5.0, >= 12.0.0-rc1, < 12.2.0'}
CVE-2023-49783
Silverstripe Admin provides a basic management interface for the Silverstripe Framework. In versions on the 1.x branch prior to 1.13.19 and on the 2.x branch prior to 2.1.8, users who don't have edit or delete permissions for records exposed in a `ModelAdmin` can still edit or delete records using the CSV import form, provided they have create permissions. The likelihood of a user having create permissions but not having edit or delete permissions is low, but it is possible. Note that this doesn't affect any `ModelAdmin` which has had the import form disabled via the `showImportForm` public property. Versions 1.13.19 and 2.1.8 contain a patch for the issue. Those who have a custom implementation of `BulkLoader` should update their implementations to respect permissions when the return value of `getCheckPermissions()` is true. Those who use any `BulkLoader` in their own project logic, or maintain a module which uses it, should consider passing `true` to `setCheckPermissions()` if the data is provided by users.
https://github.com/silverstripe/silverstripe-admin/security/advisories/GHSA-j3m6-gvm8-mhvw
2023-11-30T13:39:50.861Z
2024-01-23T13:54:51.301Z
2024-01-23T13:54:51.301Z
{'Vendor': 'silverstripe', 'Product': 'silverstripe-admin', 'Versions': '>= 1.0.0, < 1.13.19, >= 2.0.0, < 2.1.8'}
CVE-2023-49296
The Arduino Create Agent allows users to use the Arduino Create applications to upload code to any USB connected Arduino board directly from the browser. A vulnerability in versions prior to 1.3.6 affects the endpoint `/certificate.crt` and the way the web interface of the ArduinoCreateAgent handles custom error messages. An attacker that is able to persuade a victim into clicking on a malicious link can perform a Reflected Cross-Site Scripting attack on the web interface of the create agent, which would allow the attacker to execute arbitrary browser client side code. Version 1.3.6 contains a fix for the issue.
https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-j5hc-wx84-844h
2023-11-24T16:45:24.314Z
2023-12-13T19:54:34.638Z
2023-12-13T19:54:34.638Z
{'Vendor': 'arduino', 'Product': 'arduino-create-agent', 'Versions': '< 1.3.6'}
CVE-2023-49622
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/zimerman/
2023-11-28T15:05:55.676Z
2024-01-04T13:50:27.318Z
2024-01-04T13:50:27.318Z
{'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'}
CVE-2023-49272
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'children' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
https://fluidattacks.com/advisories/lang/
2023-11-24T16:25:53.193Z
2023-12-20T19:25:08.511Z
2023-12-20T19:25:08.511Z
{'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'}
CVE-2023-49788
Collabora Online is a collaborative online office suite based on LibreOffice technology. Unlike a standalone dedicated Collabora Online server, the Built-in CODE Server (richdocumentscode) is run without chroot sandboxing. Vulnerable versions of the richdocumentscode app can be susceptible to attack via modified client->server commands to overwrite files outside the sub directory the server has provided for the transient session. Files which can be accessed are limited to those that the server process has access to. The bug was fixed in Collabora Online - Built-in CODE Server (richdocumentscode) release 23.5.602. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/CollaboraOnline/online/security/advisories/GHSA-3r69-xvf7-v94j
2023-11-30T13:39:50.862Z
2023-12-08T20:02:07.086Z
2023-12-08T20:02:07.086Z
{'Vendor': 'CollaboraOnline', 'Product': 'online', 'Versions': '< 23.5.602'}
CVE-2023-49767
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Stored XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
https://patchstack.com/database/vulnerability/biteship/wordpress-biteship-plugin-2-2-22-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:22:27.403Z
2023-12-15T15:19:37.348Z
2023-12-15T15:19:37.348Z
{'Vendor': 'Biteship', 'Product': 'Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo', 'Versions': 'n/a'}
CVE-2023-49337
Concrete CMS before 9.2.3 allows Stored XSS on the Admin Dashboard via /dashboard/system/basics/name. (8.5 and earlier are unaffected.)
https://hackerone.com/reports/2232594
2023-11-27T00:00:00
2023-12-25T00:00:00
2023-12-25T18:56:22.178026
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49225
A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section.
https://support.ruckuswireless.com/security_bulletins/323
2023-11-24T00:19:52.591Z
2023-12-07T06:22:32.328Z
2023-12-07T06:22:32.328Z
{'Vendor': 'CommScope, Inc.', 'Product': 'ZoneDirector', 'Versions': '10.5.1 and earlier '}
CVE-2023-49819
Deserialization of Untrusted Data vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
https://patchstack.com/database/vulnerability/structured-content/wordpress-structured-content-json-ld-wpsc-plugin-1-5-3-php-object-injection-vulnerability?_s_id=cve
2023-11-30T14:51:04.753Z
2023-12-18T23:35:58.076Z
2023-12-18T23:35:58.076Z
{'Vendor': 'Gordon Böhme, Antonio Leutsch', 'Product': 'Structured Content (JSON-LD) #wpsc', 'Versions': 'n/a'}
CVE-2023-49376
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/delete.
https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:31:20.863097
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49321
Certain WithSecure products allow a Denial of Service because scanning a crafted file takes a long time, and causes the scanner to hang. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1.
https://www.withsecure.com/en/support/security-advisories/cve-2023-49321
2023-11-26T00:00:00
2023-11-26T00:00:00
2023-11-28T18:43:53.336684
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49771
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Raschendorfer Smart External Link Click Monitor [Link Log] allows Reflected XSS.This issue affects Smart External Link Click Monitor [Link Log]: from n/a through 5.0.2.
https://patchstack.com/database/vulnerability/link-log/wordpress-smart-external-link-click-monitor-link-log-plugin-5-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:22:54.825Z
2023-12-14T15:48:20.519Z
2023-12-14T15:48:20.519Z
{'Vendor': 'Peter Raschendorfer', 'Product': 'Smart External Link Click Monitor [Link Log]', 'Versions': 'n/a'}
CVE-2023-49589
An insufficient entropy vulnerability exists in the userRecoverPass.php recoverPass generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to an arbitrary user password recovery. An attacker can send an HTTP request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1896
2023-12-06T18:41:14.102Z
2024-01-10T15:48:09.137Z
2024-01-10T18:00:10.359Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
CVE-2023-49862
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_gifimage` parameter.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880
2023-11-30T18:43:03.139Z
2024-01-10T15:48:12.383Z
2024-01-10T18:00:08.626Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
CVE-2023-49161
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Guelben Bravo Translate.This issue affects Bravo Translate: from n/a through 1.2.
https://patchstack.com/database/vulnerability/bravo-translate/wordpress-bravo-translate-plugin-1-2-sql-injection-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-20T17:31:32.701Z
2023-12-20T17:31:32.701Z
{'Vendor': 'Guelben', 'Product': 'Bravo Translate', 'Versions': 'n/a'}
CVE-2023-49248
Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.176Z
2023-12-06T08:34:22.774Z
2023-12-06T08:34:22.774Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-49177
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gilles Dumas which template file allows Reflected XSS.This issue affects which template file: from n/a through 4.9.0.
https://patchstack.com/database/vulnerability/which-template-file/wordpress-which-template-file-plugin-4-9-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.490Z
2023-12-15T14:24:30.513Z
2023-12-15T14:24:30.513Z
{'Vendor': 'Gilles Dumas', 'Product': 'which template file', 'Versions': 'n/a'}
CVE-2023-49874
Mattermost fails to check whether a user is a guest when updating the tasks of a private playbook run allowing a guest to update the tasks of a private playbook run if they know the run ID.
https://mattermost.com/security-updates
2023-12-05T08:04:35.043Z
2023-12-12T08:17:53.947Z
2023-12-12T08:17:53.947Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 0, 9.2.2, 8.1.6, 9.0.4, 9.1.3, 7.8.15'}
CVE-2023-49462
libheif v1.17.5 was discovered to contain a segmentation violation via the component /libheif/exif.cc.
https://github.com/strukturag/libheif/issues/1043
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T19:37:20.444292
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49032
An issue in LTB Self Service Password before v.1.5.4 allows a remote attacker to execute arbitrary code and obtain sensitive information via hijack of the SMS verification code function to arbitrary phone.
https://github.com/ltb-project/self-service-password/issues/816
2023-11-20T00:00:00
2023-12-20T00:00:00
2023-12-20T23:47:51.286145
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49823
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 4.6.1.
https://patchstack.com/database/vulnerability/bold-page-builder/wordpress-bold-page-builder-plugin-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T15:27:45.874Z
2023-12-15T15:27:51.918Z
2023-12-15T15:27:51.918Z
{'Vendor': 'BoldThemes', 'Product': 'Bold Page Builder', 'Versions': 'n/a'}
CVE-2023-49435
Tenda AX9 V22.03.01.46 is vulnerable to command injection.
https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-3.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T15:29:45.902726
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49291
tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/tj-actions/branch-names/security/advisories/GHSA-8v8w-v8xg-79rf
2023-11-24T16:45:24.313Z
2023-12-04T23:21:33.367Z
2023-12-04T23:21:33.367Z
{'Vendor': 'tj-actions', 'Product': 'branch-names', 'Versions': '< 7.0.7'}
CVE-2023-49442
Deserialization of Untrusted Data in jeecgFormDemoController in JEECG 4.0 and earlier allows attackers to run arbitrary code via crafted POST request.
https://lemono.fun/thoughts/JEECG-RCE.html
2023-11-27T00:00:00
2024-01-03T00:00:00
2024-01-03T20:24:49.667637
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49157
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andreas Münch Multiple Post Passwords allows Stored XSS.This issue affects Multiple Post Passwords: from n/a through 1.1.1.
https://patchstack.com/database/vulnerability/multiple-post-passwords/wordpress-multiple-post-passwords-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:35:38.290Z
2023-12-14T17:15:59.765Z
2023-12-14T17:15:59.765Z
{'Vendor': 'Andreas Münch', 'Product': 'Multiple Post Passwords', 'Versions': 'n/a'}
CVE-2023-49854
Cross-Site Request Forgery (CSRF) vulnerability in Tribe Interactive Caddy – Smart Side Cart for WooCommerce.This issue affects Caddy – Smart Side Cart for WooCommerce: from n/a through 1.9.7.
https://patchstack.com/database/vulnerability/caddy/wordpress-caddy-plugin-1-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T17:13:03.351Z
2023-12-18T10:48:44.569Z
2023-12-18T10:48:44.569Z
{'Vendor': 'Tribe Interactive', 'Product': 'Caddy – Smart Side Cart for WooCommerce', 'Versions': 'n/a'}
CVE-2023-49679
null
null
2023-11-29T17:48:17.254Z
2023-12-21T22:59:46.244Z
2024-01-02T19:54:11.087Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49383
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/save.
https://github.com/cui2shark/cms/blob/main/Added%20CSRF%20in%20Label%20Management.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:41:58.576987
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49229
An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in the administration web service allows read-only, unprivileged users to obtain sensitive information about the device configuration.
https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4
2023-11-24T00:00:00
2023-12-28T00:00:00
2023-12-28T03:16:02.699229
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49946
In Forgejo before 1.20.5-1, certain endpoints do not check whether an object belongs to a repository for which permissions are being checked. This allows remote attackers to read private issues, read private pull requests, delete issues, and perform other unauthorized actions.
https://forgejo.org/2023-11-release-v1-20-5-1/
2023-12-03T00:00:00
2023-12-03T00:00:00
2023-12-03T18:56:04.385022
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49803
@koa/cors npm provides Cross-Origin Resource Sharing (CORS) for koa, a web framework for Node.js. Prior to version 5.0.0, the middleware operates in a way that if an allowed origin is not provided, it will return an `Access-Control-Allow-Origin` header with the value of the origin from the request. This behavior completely disables one of the most crucial elements of browsers - the Same Origin Policy (SOP), this could cause a very serious security threat to the users of this middleware. If such behavior is expected, for instance, when middleware is used exclusively for prototypes and not for production applications, it should be heavily emphasized in the documentation along with an indication of the risks associated with such behavior, as many users may not be aware of it. Version 5.0.0 fixes this vulnerability.
https://github.com/koajs/cors/security/advisories/GHSA-qxrj-hx23-xp82
2023-11-30T13:39:50.865Z
2023-12-11T22:42:17.547Z
2023-12-11T22:42:17.547Z
{'Vendor': 'koajs', 'Product': 'cors', 'Versions': '< 5.0.0'}
CVE-2023-49550
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs+0x4ec508 component.
https://github.com/cesanta/mjs/issues/252
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T22:23:57.209360
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49395
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/update.
https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:48:34.350498
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49680
null
null
2023-11-29T17:48:17.255Z
2023-12-21T23:02:30.114Z
2024-01-02T19:54:55.180Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49403
Tenda W30E V16.01.0.12(4843) was discovered to contain a command injection vulnerability via the function setFixTools.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T16:55:09.051962
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49792
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98
2023-11-30T13:39:50.863Z
2023-12-22T16:31:17.833Z
2023-12-22T16:31:17.833Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 23.0.0, < 23.0.12.13, >= 24.0.0, < 24.0.12.9, >= 25.0.0, < 25.0.13.4, >= 26.0.0, < 26.0.9, >= 27.0.0, < 27.1.4'}
CVE-2023-49287
TinyDir is a lightweight C directory and file reader. Buffer overflows in the `tinydir_file_open()` function. This vulnerability has been patched in version 1.2.6.
https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf
2023-11-24T16:45:24.312Z
2023-12-04T05:29:10.673Z
2023-12-04T05:29:10.673Z
{'Vendor': 'cxong', 'Product': 'tinydir', 'Versions': '< 1.2.6'}
CVE-2023-49004
An issue in D-Link DIR-850L v.B1_FW223WWb01 allows a remote attacker to execute arbitrary code via a crafted script to the en parameter.
https://github.com/ef4tless/vuln/blob/master/iot/DIR-850L/bug1.md
2023-11-20T00:00:00
2023-12-19T00:00:00
2023-12-19T21:53:06.090436
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49842
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpexpertsio Rocket Maintenance Mode & Coming Soon Page allows Stored XSS.This issue affects Rocket Maintenance Mode & Coming Soon Page: from n/a through 4.3.
https://patchstack.com/database/vulnerability/rocket-maintenance-mode/wordpress-rocket-maintenance-mode-coming-soon-page-plugin-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T17:12:47.221Z
2023-12-14T16:15:42.205Z
2023-12-14T16:15:42.205Z
{'Vendor': 'wpexpertsio', 'Product': 'Rocket Maintenance Mode & Coming Soon Page', 'Versions': 'n/a'}
CVE-2023-49706
Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal.
https://www.linotp.org/news.html
2023-11-30T00:00:00
2023-12-19T00:00:00
2023-12-19T18:50:03.676576
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49356
A stack buffer overflow vulnerability in MP3Gain v1.6.2 allows an attacker to cause a denial of service via the WriteMP3GainAPETag function at apetag.c:592.
https://github.com/linzc21/bug-reports/blob/main/reports/mp3gain/1.6.2/stack-buffer-overflow/CVE-2023-49356.md
2023-11-27T00:00:00
2023-12-22T00:00:00
2023-12-22T09:27:37.025539
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49213
The API endpoints in Ironman PowerShell Universal 3.0.0 through 4.2.0 allow remote attackers to execute arbitrary commands via crafted HTTP requests if a param block is used, due to invalid sanitization of input strings. The fixed versions are 3.10.2, 4.1.10, and 4.2.1.
https://docs.powershelluniversal.com/changelogs/changelog
2023-11-23T00:00:00
2023-11-23T00:00:00
2023-11-23T21:39:36.183852
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}