CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-49824 | Cross-Site Request Forgery (CSRF) vulnerability in PixelYourSite Product Catalog Feed by PixelYourSite.This issue affects Product Catalog Feed by PixelYourSite: from n/a through 2.1.1.
| https://patchstack.com/database/vulnerability/product-catalog-feed/wordpress-product-catalog-feed-by-pixelyoursite-plugin-2-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T15:27:45.874Z | 2023-12-17T10:35:19.743Z | 2023-12-17T10:35:19.743Z | {'Vendor': 'PixelYourSite', 'Product': 'Product Catalog Feed by PixelYourSite', 'Versions': 'n/a'} |
CVE-2023-49961 | WALLIX Bastion 7.x, 8.x, 9.x and 10.x and WALLIX Access Manager 3.x and 4.x have Incorrect Access Control which can lead to sensitive data exposure. | https://www.wallix.com/support/alerts/ | 2023-12-03T00:00:00 | 2024-01-08T00:00:00 | 2024-01-08T20:16:33.575838 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49062 | Katran could disclose non-initialized kernel memory as part of an IP header. The issue was present for IPv4 encapsulation and ICMP (v4) Too Big packet generation. After a bpf_xdp_adjust_head call, Katran code didn’t initialize the Identification field for the IPv4 header, resulting in writing content of kernel memory in that field of IP header. The issue affected all Katran versions prior to commit 6a03106ac1eab39d0303662963589ecb2374c97f | https://www.facebook.com/security/advisories/cve-2023-49062 | 2023-11-20T19:59:38.627Z | 2023-11-28T15:45:42.674Z | 2023-11-28T15:45:42.674Z | {'Vendor': 'Facebook', 'Product': 'Katran', 'Versions': '0'} |
CVE-2023-49598 | Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/ | 2023-12-07T02:39:42.967Z | 2023-12-26T07:21:02.611Z | 2023-12-26T07:21:02.611Z | {'Vendor': 'WESEEK, Inc.', 'Product': 'GROWI', 'Versions': 'prior to v6.0.0'} |
CVE-2023-49432 | Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'deviceList' parameter at /goform/setMacFilterCfg. | https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T16:03:49.671124 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49259 | The authentication cookies are generated using an algorithm based on the username, hardcoded secret and the up-time, and can be guessed in a reasonable time. | https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | 2023-11-24T11:53:46.294Z | 2024-01-12T14:25:12.037Z | 2024-01-12T14:25:12.037Z | {'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'} |
CVE-2023-49170 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in captainform Forms by CaptainForm – Form Builder for WordPress allows Reflected XSS.This issue affects Forms by CaptainForm – Form Builder for WordPress: from n/a through 2.5.3.
| https://patchstack.com/database/vulnerability/captainform/wordpress-forms-by-captainform-form-builder-for-wordpress-plugin-2-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.489Z | 2023-12-15T14:10:52.014Z | 2023-12-15T14:10:52.014Z | {'Vendor': 'captainform', 'Product': 'Forms by CaptainForm – Form Builder for WordPress', 'Versions': 'n/a'} |
CVE-2023-49465 | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function at motion.cc. | https://github.com/strukturag/libde265/issues/435 | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-30T21:06:23.977788 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49936 | An issue was discovered in SchedMD Slurm 22.05.x, 23.02.x, and 23.11.x. A NULL pointer dereference leads to denial of service. The fixed versions are 22.05.11, 23.02.7, and 23.11.1. | https://www.schedmd.com/security-archive.php | 2023-12-03T00:00:00 | 2023-12-14T00:00:00 | 2024-01-03T03:06:33.349975 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49166 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Magic Logix MSync.This issue affects MSync: from n/a through 1.0.0.
| https://patchstack.com/database/vulnerability/msync/wordpress-msync-plugin-1-0-0-sql-injection-vulnerability?_s_id=cve | 2023-11-22T23:36:04.379Z | 2023-12-20T17:35:29.992Z | 2023-12-20T17:35:29.992Z | {'Vendor': 'Magic Logix', 'Product': 'MSync', 'Versions': 'n/a'} |
CVE-2023-49920 | Apache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As a result, it was possible for a malicious website opened in the same browser - by the user who also had Airflow UI opened - to trigger the execution of DAGs without the user's consent.
Users are advised to upgrade to version 2.8.0 or later which is not affected | https://github.com/apache/airflow/pull/36026 | 2023-12-02T15:33:40.610Z | 2023-12-21T09:27:09.651Z | 2023-12-21T09:27:09.651Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '2.7.0'} |
CVE-2023-49189 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Getsocial, S.A. Social Share Buttons & Analytics Plugin – GetSocial.Io allows Stored XSS.This issue affects Social Share Buttons & Analytics Plugin – GetSocial.Io: from n/a through 4.3.12.
| https://patchstack.com/database/vulnerability/wp-share-buttons-analytics-by-getsocial/wordpress-social-share-buttons-analytics-plugin-getsocial-io-plugin-4-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:56.848Z | 2023-12-15T15:08:01.376Z | 2023-12-15T15:08:01.376Z | {'Vendor': 'Getsocial, S.A.', 'Product': 'Social Share Buttons & Analytics Plugin – GetSocial.io', 'Versions': 'n/a'} |
CVE-2023-49131 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | 2023-11-22T14:53:05.160Z | 2024-01-09T10:00:05.693Z | 2024-01-09T10:00:05.693Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'} |
CVE-2023-49424 | Tenda AX12 V22.03.01.46 was discovered to contain a stack overflow via the list parameter at /goform/SetVirtualServerCfg. | https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T13:57:37.606208 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49799 | `nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example `\nhttps://whatever.com` which has a leading newline. According to the fetch specification, before a fetch is made the URL is normalized. "To normalize a byte sequence potentialValue, remove any leading and trailing HTTP whitespace bytes from potentialValue.". This means the final request will be normalized to `https://whatever.com` bypassing the check and nuxt-api-party will send a request outside of the whitelist. This could allow us to leak credentials or perform Server-Side Request Forgery (SSRF). This vulnerability has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should revert to the previous method of detecting absolute URLs. | https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv | 2023-11-30T13:39:50.864Z | 2023-12-08T23:45:18.581Z | 2023-12-08T23:45:18.581Z | {'Vendor': 'johannschopplich', 'Product': 'nuxt-api-party', 'Versions': '< 0.22.1'} |
CVE-2023-49633 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'buyer_address' parameter of the buyer_detail_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/zimerman/ | 2023-11-28T15:05:55.678Z | 2024-01-04T13:53:59.309Z | 2024-01-04T13:53:59.309Z | {'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'} |
CVE-2023-49776 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Hakan Demiray Sayfa Sayac.This issue affects Sayfa Sayac: from n/a through 2.6.
| https://patchstack.com/database/vulnerability/sayfa-sayac/wordpress-sayfa-sayac-plugin-2-6-unauthenticated-sql-injection-vulnerability?_s_id=cve | 2023-11-30T13:22:54.826Z | 2023-12-20T15:35:57.714Z | 2023-12-20T15:35:57.714Z | {'Vendor': 'Hakan Demiray', 'Product': 'Sayfa Sayac', 'Versions': 'n/a'} |
CVE-2023-49371 | RuoYi up to v4.6 was discovered to contain a SQL injection vulnerability via /system/dept/edit. | https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md | 2023-11-27T00:00:00 | 2023-12-01T00:00:00 | 2023-12-06T12:25:09.975077 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49058 | SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
| https://me.sap.com/notes/3363690 | 2023-11-20T11:31:43.313Z | 2023-12-12T01:01:07.964Z | 2023-12-12T01:01:07.964Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Master Data Governance', 'Versions': 'MDG_FND 731, MDG_FND 732, MDG_FND 746, MDG_FND 747, MDG_FND 748, MDG_FND 749, MDG_FND 752, MDG_FND 800, MDG_FND 802, MDG_FND 803, MDG_FND 804, MDG_FND 805, MDG_FND 806, MDG_FND 807, MDG_FND 808, SAP_BS_FND 702'} |
CVE-2023-49408 | Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the function set_device_name. | https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T17:39:59.330694 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49625 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the partylist_edit_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/zimerman/ | 2023-11-28T15:05:55.677Z | 2024-01-04T13:52:28.723Z | 2024-01-04T13:52:28.723Z | {'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'} |
CVE-2023-49760 | Cross-Site Request Forgery (CSRF) vulnerability in Giannopoulos Kostas WPsoonOnlinePage.This issue affects WPsoonOnlinePage: from n/a through 1.9.
| https://patchstack.com/database/vulnerability/wp-soononline-page/wordpress-wpsoononlinepage-plugin-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:22:27.402Z | 2023-12-18T22:21:56.262Z | 2023-12-18T22:21:56.262Z | {'Vendor': 'Giannopoulos Kostas', 'Product': 'WPsoonOnlinePage', 'Versions': 'n/a'} |
CVE-2023-49828 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo allows Stored XSS.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 6.4.2.
| https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woopayments-plugin-6-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T15:27:45.875Z | 2023-12-14T14:29:47.110Z | 2023-12-14T14:29:47.110Z | {'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'} |
CVE-2023-49081 | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0. | https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2 | 2023-11-21T18:57:30.428Z | 2023-11-30T06:56:26.348Z | 2023-11-30T06:56:26.348Z | {'Vendor': 'aio-libs', 'Product': 'aiohttp', 'Versions': '< 3.9.0'} |
CVE-2023-49594 | An information disclosure vulnerability exists in the challenge functionality of instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. A specially crafted HTTP request can lead to a disclosure of sensitive information. A user logging into Keycloak using DuoUniversalKeycloakAuthenticator plugin triggers this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1907 | 2023-12-15T16:08:15.594Z | 2023-12-23T20:04:48.013Z | 2024-01-17T20:25:57.458Z | {'Vendor': 'instipod', 'Product': 'DuoUniversalKeycloakAuthenticator', 'Versions': '1.0.7'} |
CVE-2023-49347 | Temporary data passed between application components by Budgie Extras Windows Previews could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may read private information from windows, present false information to users, or deny access to the application. | https://ubuntu.com/security/notices/USN-6556-1 | 2023-11-27T03:17:52.866Z | 2023-12-14T21:31:32.489Z | 2023-12-14T21:31:32.489Z | {'Vendor': 'Ubuntu Budgie', 'Product': 'Budgie Extras', 'Versions': 'v1.4.0'} |
CVE-2023-49652 | Incorrect permission checks in Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier allow attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate system-scoped credentials IDs of credentials stored in Jenkins and to connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects. This fix has been backported to 4.3.17.1. | https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-2835 | 2023-11-28T21:18:14.327Z | 2023-11-29T13:45:09.576Z | 2023-11-29T13:52:09.792Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Google Compute Engine Plugin', 'Versions': '4.551.v5a_4dc98f6962, 4.3.17.1'} |
CVE-2023-49486 | JFinalCMS v5.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the model management department. | https://github.com/Rabb1ter/cms/blob/main/There%20is%20a%20stored%20XSS%20in%20the%20model%20management%20department.md | 2023-11-27T00:00:00 | 2023-12-08T00:00:00 | 2023-12-08T15:08:59.259411 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49469 | Reflected Cross Site Scripting (XSS) vulnerability in Shaarli v0.12.2, allows remote attackers to execute arbitrary code via search tag function. | https://github.com/shaarli/Shaarli/issues/2038 | 2023-11-27T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T05:56:12.495094 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49740 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seraphinite Solutions Seraphinite Accelerator allows Reflected XSS.This issue affects Seraphinite Accelerator: from n/a through 2.20.28.
| https://patchstack.com/database/vulnerability/seraphinite-accelerator/wordpress-seraphinite-accelerator-plugin-2-20-28-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:21:40.735Z | 2023-12-14T14:40:36.861Z | 2023-12-14T14:40:36.861Z | {'Vendor': 'Seraphinite Solutions', 'Product': 'Seraphinite Accelerator', 'Versions': 'n/a'} |
CVE-2023-49255 | The router console is accessible without authentication at "data" field, and while a user needs to be logged in in order to modify the configuration, the session state is shared. If any other user is currently logged in, the anonymous user can execute commands in the context of the authenticated one. If the logged in user has administrative privileges, it is possible to use webadmin service configuration commands to create a new admin user with a chosen password. | https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | 2023-11-24T11:53:46.294Z | 2024-01-12T14:23:53.922Z | 2024-01-12T14:23:53.922Z | {'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'} |
CVE-2023-49490 | XunRuiCMS v4.5.5 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component /admin.php. | https://github.com/dayrui/xunruicms/issues/2 | 2023-11-27T00:00:00 | 2023-12-11T00:00:00 | 2023-12-11T20:31:57.119689 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49185 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Doofinder Doofinder WP & WooCommerce Search allows Reflected XSS.This issue affects Doofinder WP & WooCommerce Search: from n/a through 2.1.7.
| https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-wp-woocommerce-search-plugin-2-0-33-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:35.546Z | 2023-12-15T14:59:27.925Z | 2023-12-15T14:59:27.925Z | {'Vendor': 'Doofinder', 'Product': 'Doofinder WP & WooCommerce Search', 'Versions': 'n/a'} |
CVE-2023-49243 | Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.175Z | 2023-12-06T08:56:24.442Z | 2023-12-06T08:56:24.442Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-49097 | ZITADEL is an identity infrastructure system. ZITADEL uses the notification triggering requests Forwarded or X-Forwarded-Host header to build the button link sent in emails for confirming a password reset with the emailed code. If this header is overwritten and a user clicks the link to a malicious site in the email, the secret code can be retrieved and used to reset the users password and take over his account. Accounts with MFA or Passwordless enabled can not be taken over by this attack. This issue has been patched in versions 2.41.6, 2.40.10 and 2.39.9.
| https://github.com/zitadel/zitadel/security/advisories/GHSA-2wmj-46rj-qm2w | 2023-11-21T18:57:30.430Z | 2023-11-30T04:45:49.675Z | 2023-11-30T04:45:49.675Z | {'Vendor': 'zitadel', 'Product': 'zitadel', 'Versions': '>= 2.39.0, < 2.39.9, >= 2.40.0, < 2.40.10, >= 2.41.0, < 2.41.6'} |
CVE-2023-49994 | Espeak-ng 1.52-dev was discovered to contain a Floating Point Exception via the function PeaksToHarmspect at wavegen.c. | https://github.com/espeak-ng/espeak-ng/issues/1823 | 2023-12-04T00:00:00 | 2023-12-12T00:00:00 | 2024-01-19T04:06:53.748161 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49078 | raptor-web is a CMS for game server communities that can be used to host information and keep track of players. In version 0.4.4 of raptor-web, it is possible to craft a malicious URL that will result in a reflected cross-site scripting vulnerability. A user controlled URL parameter is loaded into an internal template that has autoescape disabled. This is a cross-site scripting vulnerability that affects all deployments of `raptor-web` on version `0.4.4`. Any victim who clicks on a malicious crafted link will be affected. This issue has been patched 0.4.4.1. | https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq | 2023-11-21T18:57:30.427Z | 2023-11-28T18:15:24.447Z | 2023-11-28T18:15:24.447Z | {'Vendor': 'zediious', 'Product': 'raptor-web', 'Versions': '< 0.4.4.1'} |
CVE-2023-49428 | Tenda AX12 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'mac' parameter at /goform/SetOnlineDevName. | https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T14:49:21.963460 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49701 | Memory Corruption in SIM management while USIMPhase2init | https://www.asrmicro.com/en/goods/psirt?cid=31 | 2023-11-30T01:28:05.185Z | 2023-11-30T07:15:14.820Z | 2023-11-30T07:15:14.820Z | {'Vendor': 'ASR', 'Product': 'Falcon', 'Versions': '0'} |
CVE-2023-49351 | A stack-based buffer overflow vulnerability in /bin/webs binary in Edimax BR6478AC V2 firmware veraion v1.23 allows attackers to overwrite other values located on the stack due to an incorrect use of the strcpy() function. | https://github.com/countfatcode/temp/blob/main/formUSBAccount/formUSBAccount.md | 2023-11-27T00:00:00 | 2024-01-16T00:00:00 | 2024-01-16T18:41:52.699858 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49214 | Usedesk before 1.7.57 allows chat template injection. | https://usedesk.ru/updates_september23 | 2023-11-23T00:00:00 | 2023-11-23T00:00:00 | 2023-11-23T22:01:29.626227 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49003 | An issue in simplemobiletools Simple Dialer 5.18.1 allows an attacker to bypass intended access restrictions via interaction with com.simplemobiletools.dialer.activities.DialerActivity. | https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md | 2023-11-20T00:00:00 | 2023-12-27T00:00:00 | 2023-12-27T21:21:55.561596 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49146 | DOMSanitizer (aka dom-sanitizer) before 1.0.7 allows XSS via an SVG document because of mishandling of comments and greedy regular expressions. | https://github.com/rhukster/dom-sanitizer/commit/c2a98f27ad742668b254282ccc5581871d0fb601 | 2023-11-22T00:00:00 | 2023-11-22T00:00:00 | 2023-11-22T21:45:04.084202 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49795 | MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a server-side request forgery vulnerability in `file.py`. This can lead to limited information disclosure. Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.
| https://github.com/mindsdb/mindsdb/security/advisories/GHSA-34mr-6q8x-g9r6 | 2023-11-30T13:39:50.863Z | 2023-12-11T19:01:00.946Z | 2023-12-11T20:38:42.859Z | {'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.11.4.1'} |
CVE-2023-49280 | XWiki Change Request is an XWiki application allowing to request changes on a wiki without publishing directly the changes. Change request allows to edit any page by default, and the changes are then exported in an XML file that anyone can download. So it's possible for an attacker to obtain password hash of users by performing an edit on the user profiles and then downloading the XML file that has been created. This is also true for any document that might contain password field and that a user can view.
This vulnerability impacts all version of Change Request, but the impact depends on the rights that has been set on the wiki since it requires for the user to have the Change request right (allowed by default) and view rights on the page to target. This issue cannot be easily exploited in an automated way. The patch consists in denying to users the right of editing pages that contains a password field with change request. It means that already existing change request for those pages won't be removed by the patch, administrators needs to take care of it. The patch is provided in Change Request 1.10, administrators should upgrade immediately. It's possible to workaround the vulnerability by denying manually the Change request right on some spaces, such as XWiki space which will include any user profile by default. | https://github.com/xwiki-contrib/application-changerequest/security/advisories/GHSA-2fr7-cc7p-p45q | 2023-11-24T16:45:24.311Z | 2023-12-04T22:33:59.292Z | 2023-12-04T22:33:59.292Z | {'Vendor': 'xwiki-contrib', 'Product': 'application-changerequest', 'Versions': '>= 0.1, < 1.10'} |
CVE-2023-49404 | Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formAdvancedSetListSet. | https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setAdvancedSetList/w30e_setAdvancedSetList.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T17:30:46.319323 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49957 | An issue was discovered in Dalmann OCPP.Core before 1.3.0 for OCPP (Open Charge Point Protocol) for electric vehicles. It permits multiple transactions with the same connectorId and idTag, contrary to the expected ConcurrentTx status. This could result in critical transaction management and billing errors. NOTE: the vendor's perspective is "Imagine you've got two cars in your family and want to charge both in parallel on the same account/token? Why should that be rejected?" | https://github.com/dallmann-consulting/OCPP.Core/issues/35 | 2023-12-03T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T12:59:06.071445 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49812 | Authorization Bypass Through User-Controlled Key vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005.
| https://patchstack.com/database/vulnerability/wp-photo-album-plus/wordpress-wp-photo-album-plus-plugin-8-5-02-005-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-11-30T14:51:04.753Z | 2023-12-19T20:55:34.805Z | 2023-12-19T20:55:34.805Z | {'Vendor': 'J.N. Breetvelt a.k.a. OpaJaap', 'Product': 'WP Photo Album Plus', 'Versions': 'n/a'} |
CVE-2023-49238 | In Gradle Enterprise before 2023.1, a remote attacker may be able to gain access to a new installation (in certain installation scenarios) because of a non-unique initial system user password. Although this password must be changed upon the first login, it is possible that an attacker logs in before the legitimate administrator logs in. | https://security.gradle.com | 2023-11-24T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T01:40:13.981561 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49687 | null | null | 2023-11-29T17:48:17.255Z | 2023-12-21T23:20:14.194Z | 2024-01-02T19:59:58.279Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49042 | Heap Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the schedStartTime parameter or the schedEndTime parameter in the function setSchedWifi. | https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/setSchedWifi.md | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T16:43:09.070379 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49107 | Generation of Error Message Containing Sensitive Information vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent modules).This issue affects Hitachi Device Manager: before 8.8.5-04.
| https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-101/index.html | 2023-11-22T02:40:01.035Z | 2024-01-16T00:59:46.297Z | 2024-01-16T00:59:46.297Z | {'Vendor': 'Hitachi', 'Product': 'Hitachi Device Manager', 'Versions': '0'} |
CVE-2023-49557 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component. | https://github.com/yasm/yasm/issues/253 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T23:35:09.402961 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49804 | Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, when a user changes their login password in Uptime Kuma, a previously logged-in user retains access without being logged out. This behavior persists consistently, even after system restarts or browser restarts. This vulnerability allows unauthorized access to user accounts, compromising the security of sensitive information. The same vulnerability was partially fixed in CVE-2023-44400, but logging existing users out of their accounts was forgotten. To mitigate the risks associated with this vulnerability, the maintainers made the server emit a `refresh` event (clients handle this by reloading) and then disconnecting all clients except the one initiating the password change. It is recommended to update Uptime Kuma to version 1.23.9. | https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3 | 2023-11-30T13:39:50.865Z | 2023-12-11T22:32:32.869Z | 2023-12-11T22:32:32.869Z | {'Vendor': 'louislam', 'Product': 'uptime-kuma', 'Versions': '< 1.23.9'} |
CVE-2023-49691 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V8.0), SCALANCE M804PB (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (All versions < V8.0), SCALANCE M874-2 (All versions < V8.0), SCALANCE M874-3 (All versions < V8.0), SCALANCE M876-3 (EVDO) (All versions < V8.0), SCALANCE M876-3 (ROK) (All versions < V8.0), SCALANCE M876-4 (All versions < V8.0), SCALANCE M876-4 (EU) (All versions < V8.0), SCALANCE M876-4 (NAM) (All versions < V8.0), SCALANCE MUM853-1 (EU) (All versions < V8.0), SCALANCE MUM856-1 (EU) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (All versions < V8.0), SCALANCE S615 (All versions < V8.0), SCALANCE S615 EEC (All versions < V8.0). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update. | https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf | 2023-11-29T17:51:25.463Z | 2023-12-12T11:27:24.588Z | 2023-12-12T11:27:24.588Z | {'Vendor': 'Siemens', 'Product': 'RUGGEDCOM RM1224 LTE(4G) EU', 'Versions': 'All versions < V8.0'} |
CVE-2023-49853 | Cross-Site Request Forgery (CSRF) vulnerability in PayTR Ödeme ve Elektronik Para Kuruluşu A.Ş. PayTR Taksit Tablosu – WooCommerce.This issue affects PayTR Taksit Tablosu – WooCommerce: from n/a through 1.3.1.
| https://patchstack.com/database/vulnerability/paytr-taksit-tablosu-woocommerce/wordpress-paytr-taksit-tablosu-woocommerce-plugin-1-3-1-broken-authentication-vulnerability?_s_id=cve | 2023-11-30T17:13:03.350Z | 2023-12-18T14:33:57.484Z | 2023-12-18T14:33:57.484Z | {'Vendor': 'PayTR Ödeme ve Elektronik Para Kuruluşu A.Ş.', 'Product': 'PayTR Taksit Tablosu – WooCommerce', 'Versions': 'n/a'} |
CVE-2023-49150 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CurrencyRate.Today Crypto Converter Widget allows Stored XSS.This issue affects Crypto Converter Widget: from n/a through 1.8.1.
| https://patchstack.com/database/vulnerability/crypto-converter-widget/wordpress-crypto-converter-widget-plugin-1-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:35:38.289Z | 2023-12-14T17:04:07.003Z | 2023-12-14T17:04:07.003Z | {'Vendor': 'CurrencyRate.today', 'Product': 'Crypto Converter Widget', 'Versions': 'n/a'} |
CVE-2023-49279 | Umbraco is an ASP.NET content management system (CMS). Starting in version 7.0.0 and prior to versions 7.15.11, 8.18.9, 10.7.0, 11.5.0, and 12.2.0, a user with access to the backoffice can upload SVG files that include scripts. If the user can trick another user to load the media directly in a browser, the scripts can be executed. Versions 7.15.11, 8.18.9, 10.7.0, 11.5.0, and 12.2.0 contain a patch for this issue. Some workarounds are available. Implement the server side file validation or serve all media from an different host (e.g cdn) than where Umbraco is hosted. | https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-6xmx-85x3-4cv2 | 2023-11-24T16:45:24.311Z | 2023-12-12T19:35:05.931Z | 2023-12-12T19:35:05.931Z | {'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 7.0.0, < 7.15.11, >= 8.0.0, < 8.18.9, >= 9.0.0-rc001, < 10.7.0, >= 11.0.0-rc1, < 11.5.0, >= 12.0.0-rc1, < 12.2.0'} |
CVE-2023-49783 | Silverstripe Admin provides a basic management interface for the Silverstripe Framework. In versions on the 1.x branch prior to 1.13.19 and on the 2.x branch prior to 2.1.8, users who don't have edit or delete permissions for records exposed in a `ModelAdmin` can still edit or delete records using the CSV import form, provided they have create permissions. The likelihood of a user having create permissions but not having edit or delete permissions is low, but it is possible. Note that this doesn't affect any `ModelAdmin` which has had the import form disabled via the `showImportForm` public property. Versions 1.13.19 and 2.1.8 contain a patch for the issue. Those who have a custom implementation of `BulkLoader` should update their implementations to respect permissions when the return value of `getCheckPermissions()` is true. Those who use any `BulkLoader` in their own project logic, or maintain a module which uses it, should consider passing `true` to `setCheckPermissions()` if the data is provided by users. | https://github.com/silverstripe/silverstripe-admin/security/advisories/GHSA-j3m6-gvm8-mhvw | 2023-11-30T13:39:50.861Z | 2024-01-23T13:54:51.301Z | 2024-01-23T13:54:51.301Z | {'Vendor': 'silverstripe', 'Product': 'silverstripe-admin', 'Versions': '>= 1.0.0, < 1.13.19, >= 2.0.0, < 2.1.8'} |
CVE-2023-49296 | The Arduino Create Agent allows users to use the Arduino Create applications to upload code to any USB connected Arduino board directly from the browser. A vulnerability in versions prior to 1.3.6 affects the endpoint `/certificate.crt` and the way the web interface of the ArduinoCreateAgent handles custom error messages. An attacker that is able to persuade a victim into clicking on a malicious link can perform a Reflected Cross-Site Scripting attack on the web interface of the create agent, which would allow the attacker to execute arbitrary browser client side code. Version 1.3.6 contains a fix for the issue.
| https://github.com/arduino/arduino-create-agent/security/advisories/GHSA-j5hc-wx84-844h | 2023-11-24T16:45:24.314Z | 2023-12-13T19:54:34.638Z | 2023-12-13T19:54:34.638Z | {'Vendor': 'arduino', 'Product': 'arduino-create-agent', 'Versions': '< 1.3.6'} |
CVE-2023-49622 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'itemnameid' parameter of the material_bill.php?action=itemRelation resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/zimerman/ | 2023-11-28T15:05:55.676Z | 2024-01-04T13:50:27.318Z | 2024-01-04T13:50:27.318Z | {'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'} |
CVE-2023-49272 | Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'children' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
| https://fluidattacks.com/advisories/lang/ | 2023-11-24T16:25:53.193Z | 2023-12-20T19:25:08.511Z | 2023-12-20T19:25:08.511Z | {'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'} |
CVE-2023-49788 | Collabora Online is a collaborative online office suite based on LibreOffice technology. Unlike a standalone dedicated Collabora Online server, the Built-in CODE Server (richdocumentscode) is run without chroot sandboxing. Vulnerable versions of the richdocumentscode app can be susceptible to attack via modified client->server commands to overwrite files outside the sub directory the server has provided for the transient session. Files which can be accessed are limited to those that the server process has access to. The bug was fixed in Collabora Online - Built-in CODE Server (richdocumentscode) release 23.5.602. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/CollaboraOnline/online/security/advisories/GHSA-3r69-xvf7-v94j | 2023-11-30T13:39:50.862Z | 2023-12-08T20:02:07.086Z | 2023-12-08T20:02:07.086Z | {'Vendor': 'CollaboraOnline', 'Product': 'online', 'Versions': '< 23.5.602'} |
CVE-2023-49767 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Stored XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
| https://patchstack.com/database/vulnerability/biteship/wordpress-biteship-plugin-2-2-22-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:22:27.403Z | 2023-12-15T15:19:37.348Z | 2023-12-15T15:19:37.348Z | {'Vendor': 'Biteship', 'Product': 'Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo', 'Versions': 'n/a'} |
CVE-2023-49337 | Concrete CMS before 9.2.3 allows Stored XSS on the Admin Dashboard via /dashboard/system/basics/name. (8.5 and earlier are unaffected.) | https://hackerone.com/reports/2232594 | 2023-11-27T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T18:56:22.178026 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49225 | A cross-site-scripting vulnerability exists in Ruckus Access Point products (ZoneDirector, SmartZone, and AP Solo). If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in the product. As for the affected products/models/versions, see the information provided by the vendor listed under [References] section or the list under [Product Status] section. | https://support.ruckuswireless.com/security_bulletins/323 | 2023-11-24T00:19:52.591Z | 2023-12-07T06:22:32.328Z | 2023-12-07T06:22:32.328Z | {'Vendor': 'CommScope, Inc.', 'Product': 'ZoneDirector', 'Versions': '10.5.1 and earlier '} |
CVE-2023-49819 | Deserialization of Untrusted Data vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
| https://patchstack.com/database/vulnerability/structured-content/wordpress-structured-content-json-ld-wpsc-plugin-1-5-3-php-object-injection-vulnerability?_s_id=cve | 2023-11-30T14:51:04.753Z | 2023-12-18T23:35:58.076Z | 2023-12-18T23:35:58.076Z | {'Vendor': 'Gordon Böhme, Antonio Leutsch', 'Product': 'Structured Content (JSON-LD) #wpsc', 'Versions': 'n/a'} |
CVE-2023-49376 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/delete. | https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:31:20.863097 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49321 | Certain WithSecure products allow a Denial of Service because scanning a crafted file takes a long time, and causes the scanner to hang. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1. | https://www.withsecure.com/en/support/security-advisories/cve-2023-49321 | 2023-11-26T00:00:00 | 2023-11-26T00:00:00 | 2023-11-28T18:43:53.336684 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49771 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Raschendorfer Smart External Link Click Monitor [Link Log] allows Reflected XSS.This issue affects Smart External Link Click Monitor [Link Log]: from n/a through 5.0.2.
| https://patchstack.com/database/vulnerability/link-log/wordpress-smart-external-link-click-monitor-link-log-plugin-5-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:22:54.825Z | 2023-12-14T15:48:20.519Z | 2023-12-14T15:48:20.519Z | {'Vendor': 'Peter Raschendorfer', 'Product': 'Smart External Link Click Monitor [Link Log]', 'Versions': 'n/a'} |
CVE-2023-49589 | An insufficient entropy vulnerability exists in the userRecoverPass.php recoverPass generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to an arbitrary user password recovery. An attacker can send an HTTP request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1896 | 2023-12-06T18:41:14.102Z | 2024-01-10T15:48:09.137Z | 2024-01-10T18:00:10.359Z | {'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'} |
CVE-2023-49862 | An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_gifimage` parameter. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880 | 2023-11-30T18:43:03.139Z | 2024-01-10T15:48:12.383Z | 2024-01-10T18:00:08.626Z | {'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'} |
CVE-2023-49161 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Guelben Bravo Translate.This issue affects Bravo Translate: from n/a through 1.2.
| https://patchstack.com/database/vulnerability/bravo-translate/wordpress-bravo-translate-plugin-1-2-sql-injection-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-20T17:31:32.701Z | 2023-12-20T17:31:32.701Z | {'Vendor': 'Guelben', 'Product': 'Bravo Translate', 'Versions': 'n/a'} |
CVE-2023-49248 | Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.176Z | 2023-12-06T08:34:22.774Z | 2023-12-06T08:34:22.774Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-49177 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gilles Dumas which template file allows Reflected XSS.This issue affects which template file: from n/a through 4.9.0.
| https://patchstack.com/database/vulnerability/which-template-file/wordpress-which-template-file-plugin-4-9-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.490Z | 2023-12-15T14:24:30.513Z | 2023-12-15T14:24:30.513Z | {'Vendor': 'Gilles Dumas', 'Product': 'which template file', 'Versions': 'n/a'} |
CVE-2023-49874 | Mattermost fails to check whether a user is a guest when updating the tasks of a private playbook run allowing a guest to update the tasks of a private playbook run if they know the run ID.
| https://mattermost.com/security-updates | 2023-12-05T08:04:35.043Z | 2023-12-12T08:17:53.947Z | 2023-12-12T08:17:53.947Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 0, 9.2.2, 8.1.6, 9.0.4, 9.1.3, 7.8.15'} |
CVE-2023-49462 | libheif v1.17.5 was discovered to contain a segmentation violation via the component /libheif/exif.cc. | https://github.com/strukturag/libheif/issues/1043 | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T19:37:20.444292 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49032 | An issue in LTB Self Service Password before v.1.5.4 allows a remote attacker to execute arbitrary code and obtain sensitive information via hijack of the SMS verification code function to arbitrary phone. | https://github.com/ltb-project/self-service-password/issues/816 | 2023-11-20T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T23:47:51.286145 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49823 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 4.6.1.
| https://patchstack.com/database/vulnerability/bold-page-builder/wordpress-bold-page-builder-plugin-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T15:27:45.874Z | 2023-12-15T15:27:51.918Z | 2023-12-15T15:27:51.918Z | {'Vendor': 'BoldThemes', 'Product': 'Bold Page Builder', 'Versions': 'n/a'} |
CVE-2023-49435 | Tenda AX9 V22.03.01.46 is vulnerable to command injection. | https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-3.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T15:29:45.902726 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49291 | tj-actions/branch-names is a Github action to retrieve branch or tag names with support for all events. The `tj-actions/branch-names` GitHub Actions improperly references the `github.event.pull_request.head.ref` and `github.head_ref` context variables within a GitHub Actions `run` step. The head ref variable is the branch name and can be used to execute arbitrary code using a specially crafted branch name. As a result an attacker can use this vulnerability to steal secrets from or abuse `GITHUB_TOKEN` permissions. This vulnerability has been addressed in version 7.0.7. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/tj-actions/branch-names/security/advisories/GHSA-8v8w-v8xg-79rf | 2023-11-24T16:45:24.313Z | 2023-12-04T23:21:33.367Z | 2023-12-04T23:21:33.367Z | {'Vendor': 'tj-actions', 'Product': 'branch-names', 'Versions': '< 7.0.7'} |
CVE-2023-49442 | Deserialization of Untrusted Data in jeecgFormDemoController in JEECG 4.0 and earlier allows attackers to run arbitrary code via crafted POST request. | https://lemono.fun/thoughts/JEECG-RCE.html | 2023-11-27T00:00:00 | 2024-01-03T00:00:00 | 2024-01-03T20:24:49.667637 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49157 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Andreas Münch Multiple Post Passwords allows Stored XSS.This issue affects Multiple Post Passwords: from n/a through 1.1.1.
| https://patchstack.com/database/vulnerability/multiple-post-passwords/wordpress-multiple-post-passwords-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:35:38.290Z | 2023-12-14T17:15:59.765Z | 2023-12-14T17:15:59.765Z | {'Vendor': 'Andreas Münch', 'Product': 'Multiple Post Passwords', 'Versions': 'n/a'} |
CVE-2023-49854 | Cross-Site Request Forgery (CSRF) vulnerability in Tribe Interactive Caddy – Smart Side Cart for WooCommerce.This issue affects Caddy – Smart Side Cart for WooCommerce: from n/a through 1.9.7.
| https://patchstack.com/database/vulnerability/caddy/wordpress-caddy-plugin-1-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T17:13:03.351Z | 2023-12-18T10:48:44.569Z | 2023-12-18T10:48:44.569Z | {'Vendor': 'Tribe Interactive', 'Product': 'Caddy – Smart Side Cart for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-49679 | null | null | 2023-11-29T17:48:17.254Z | 2023-12-21T22:59:46.244Z | 2024-01-02T19:54:11.087Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49383 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/save. | https://github.com/cui2shark/cms/blob/main/Added%20CSRF%20in%20Label%20Management.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:41:58.576987 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49229 | An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in the administration web service allows read-only, unprivileged users to obtain sensitive information about the device configuration. | https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4 | 2023-11-24T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T03:16:02.699229 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49946 | In Forgejo before 1.20.5-1, certain endpoints do not check whether an object belongs to a repository for which permissions are being checked. This allows remote attackers to read private issues, read private pull requests, delete issues, and perform other unauthorized actions. | https://forgejo.org/2023-11-release-v1-20-5-1/ | 2023-12-03T00:00:00 | 2023-12-03T00:00:00 | 2023-12-03T18:56:04.385022 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49803 | @koa/cors npm provides Cross-Origin Resource Sharing (CORS) for koa, a web framework for Node.js. Prior to version 5.0.0, the middleware operates in a way that if an allowed origin is not provided, it will return an `Access-Control-Allow-Origin` header with the value of the origin from the request. This behavior completely disables one of the most crucial elements of browsers - the Same Origin Policy (SOP), this could cause a very serious security threat to the users of this middleware. If such behavior is expected, for instance, when middleware is used exclusively for prototypes and not for production applications, it should be heavily emphasized in the documentation along with an indication of the risks associated with such behavior, as many users may not be aware of it. Version 5.0.0 fixes this vulnerability. | https://github.com/koajs/cors/security/advisories/GHSA-qxrj-hx23-xp82 | 2023-11-30T13:39:50.865Z | 2023-12-11T22:42:17.547Z | 2023-12-11T22:42:17.547Z | {'Vendor': 'koajs', 'Product': 'cors', 'Versions': '< 5.0.0'} |
CVE-2023-49550 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs+0x4ec508 component. | https://github.com/cesanta/mjs/issues/252 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T22:23:57.209360 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49395 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/update. | https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:48:34.350498 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49680 | null | null | 2023-11-29T17:48:17.255Z | 2023-12-21T23:02:30.114Z | 2024-01-02T19:54:55.180Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49403 | Tenda W30E V16.01.0.12(4843) was discovered to contain a command injection vulnerability via the function setFixTools. | https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T16:55:09.051962 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49792 | Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. In Nextcloud Server prior to versions 26.0.9 and 27.1.4; as well as Nextcloud Enterprise Server prior to versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4; when a (reverse) proxy is configured as trusted proxy the server could be tricked into reading a wrong remote address for an attacker, allowing them executing authentication attempts than intended. Nextcloud Server versions 26.0.9 and 27.1.4 and Nextcloud Enterprise Server versions 23.0.12.13, 24.0.12.9, 25.0.13.4, 26.0.9, and 27.1.4 contain a patch for this issue. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5j2p-q736-hw98 | 2023-11-30T13:39:50.863Z | 2023-12-22T16:31:17.833Z | 2023-12-22T16:31:17.833Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 23.0.0, < 23.0.12.13, >= 24.0.0, < 24.0.12.9, >= 25.0.0, < 25.0.13.4, >= 26.0.0, < 26.0.9, >= 27.0.0, < 27.1.4'} |
CVE-2023-49287 | TinyDir is a lightweight C directory and file reader. Buffer overflows in the `tinydir_file_open()` function. This vulnerability has been patched in version 1.2.6. | https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf | 2023-11-24T16:45:24.312Z | 2023-12-04T05:29:10.673Z | 2023-12-04T05:29:10.673Z | {'Vendor': 'cxong', 'Product': 'tinydir', 'Versions': '< 1.2.6'} |
CVE-2023-49004 | An issue in D-Link DIR-850L v.B1_FW223WWb01 allows a remote attacker to execute arbitrary code via a crafted script to the en parameter. | https://github.com/ef4tless/vuln/blob/master/iot/DIR-850L/bug1.md | 2023-11-20T00:00:00 | 2023-12-19T00:00:00 | 2023-12-19T21:53:06.090436 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49842 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpexpertsio Rocket Maintenance Mode & Coming Soon Page allows Stored XSS.This issue affects Rocket Maintenance Mode & Coming Soon Page: from n/a through 4.3.
| https://patchstack.com/database/vulnerability/rocket-maintenance-mode/wordpress-rocket-maintenance-mode-coming-soon-page-plugin-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T17:12:47.221Z | 2023-12-14T16:15:42.205Z | 2023-12-14T16:15:42.205Z | {'Vendor': 'wpexpertsio', 'Product': 'Rocket Maintenance Mode & Coming Soon Page', 'Versions': 'n/a'} |
CVE-2023-49706 | Defective request context handling in Self Service in LinOTP 3.x before 3.2.5 allows remote unauthenticated attackers to escalate privileges, thereby allowing them to act as and with the permissions of another user. Attackers must generate repeated API requests to trigger a race condition with concurrent user activity in the self-service portal. | https://www.linotp.org/news.html | 2023-11-30T00:00:00 | 2023-12-19T00:00:00 | 2023-12-19T18:50:03.676576 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49356 | A stack buffer overflow vulnerability in MP3Gain v1.6.2 allows an attacker to cause a denial of service via the WriteMP3GainAPETag function at apetag.c:592. | https://github.com/linzc21/bug-reports/blob/main/reports/mp3gain/1.6.2/stack-buffer-overflow/CVE-2023-49356.md | 2023-11-27T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T09:27:37.025539 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49213 | The API endpoints in Ironman PowerShell Universal 3.0.0 through 4.2.0 allow remote attackers to execute arbitrary commands via crafted HTTP requests if a param block is used, due to invalid sanitization of input strings. The fixed versions are 3.10.2, 4.1.10, and 4.2.1. | https://docs.powershelluniversal.com/changelogs/changelog | 2023-11-23T00:00:00 | 2023-11-23T00:00:00 | 2023-11-23T21:39:36.183852 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.