CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-49993 | Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the function ReadClause at readclause.c. | https://github.com/espeak-ng/espeak-ng/issues/1826 | 2023-12-04T00:00:00 | 2023-12-12T00:00:00 | 2024-01-19T04:06:52.241317 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49090 | CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a partial match. If the `content_type` argument of `allowlisted_content_type?` is passed a value crafted by the attacker, Content-Types not included in the `content_type_allowlist` will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5. | https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj | 2023-11-21T18:57:30.429Z | 2023-11-29T14:38:52.195Z | 2023-11-29T14:38:52.195Z | {'Vendor': 'carrierwaveuploader', 'Product': 'carrierwave', 'Versions': '>= 2.2.0, < 2.2.5, >= 3.0.0, < 3.0.5'} |
CVE-2023-49751 | Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu Block for Font Awesome.This issue affects Block for Font Awesome: from n/a through 1.4.0.
| https://patchstack.com/database/vulnerability/block-for-font-awesome/wordpress-block-for-font-awesome-plugin-1-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T13:22:02.831Z | 2023-12-17T09:50:21.617Z | 2023-12-17T09:50:21.617Z | {'Vendor': 'Ciprian Popescu', 'Product': 'Block for Font Awesome', 'Versions': 'n/a'} |
CVE-2023-49244 | Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.175Z | 2023-12-06T08:58:41.728Z | 2023-12-06T08:58:41.728Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0'} |
CVE-2023-49182 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fabio Marzocca List all posts by Authors, nested Categories and Titles allows Reflected XSS.This issue affects List all posts by Authors, nested Categories and Titles: from n/a through 2.7.10.
| https://patchstack.com/database/vulnerability/list-all-posts-by-authors-nested-categories-and-titles/wordpress-list-all-posts-by-authors-nested-categories-and-title-plugin-2-7-10-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:35.546Z | 2023-12-15T14:52:08.191Z | 2023-12-15T14:52:08.191Z | {'Vendor': 'Fabio Marzocca', 'Product': 'List all posts by Authors, nested Categories and Titles', 'Versions': 'n/a'} |
CVE-2023-49028 | Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and before allows a remote attacker to execute arbitrary code via the user parameter in the lock/lock.php file. | https://github.com/smpn1smg/absis | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T16:09:53.391358 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49747 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebFactory Ltd Guest Author allows Stored XSS.This issue affects Guest Author: from n/a through 2.3.
| https://patchstack.com/database/vulnerability/guest-author/wordpress-guest-author-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:21:40.736Z | 2023-12-15T15:16:14.552Z | 2023-12-15T15:16:14.552Z | {'Vendor': 'WebFactory Ltd', 'Product': 'Guest Author', 'Versions': 'n/a'} |
CVE-2023-49252 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The affected application allows IP configuration change without authentication to the device. This could allow an attacker to cause denial of service condition. | https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | 2023-11-24T11:41:23.260Z | 2024-01-09T10:00:10.226Z | 2024-01-09T10:00:10.226Z | {'Vendor': 'Siemens', 'Product': 'SIMATIC CN 4100', 'Versions': 'All versions < V2.7'} |
CVE-2023-49878 | IBM System Storage Virtualization Engine TS7700 3957-VEC, 3948-VED and 3957-VEC could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 272652. | https://www.ibm.com/support/pages/node/7092383 | 2023-12-01T01:47:32.862Z | 2023-12-13T20:40:52.300Z | 2023-12-13T20:40:52.300Z | {'Vendor': 'IBM', 'Product': 'System Storage Virtualization Engine', 'Versions': '8.52.103.23, 8.53.1.21'} |
CVE-2023-49897 | An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product. | https://www.fxc.jp/news/20231206 | 2023-12-01T02:30:49.222Z | 2023-12-06T06:49:41.752Z | 2023-12-22T04:06:04.193Z | {'Vendor': 'FXC Inc.', 'Product': 'AE1021PE', 'Versions': '2.0.9 and earlier'} |
CVE-2023-49655 | A cross-site request forgery (CSRF) vulnerability in Jenkins MATLAB Plugin 2.11.0 and earlier allows attackers to have Jenkins parse an XML file from the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193 | 2023-11-28T21:18:14.328Z | 2023-11-29T13:45:11.577Z | 2023-11-29T13:45:11.577Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins MATLAB Plugin', 'Versions': '0'} |
CVE-2023-49086 | Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). Bypassing an earlier fix (CVE-2023-39360) that leads to a DOM XSS attack.
Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is
the `graphs_new.php`. Impact of the vulnerability - execution of arbitrary javascript code in
the attacked user's browser. This issue has been patched in version 1.2.26.
| https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr | 2023-11-21T18:57:30.428Z | 2023-12-21T23:29:45.134Z | 2023-12-21T23:29:45.134Z | {'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'} |
CVE-2023-49087 | xml-security is a library that implements XML signatures and encryption. Validation of an XML signature requires verification that the hash value of the related XML-document matches a specific DigestValue-value, but also that the cryptographic signature on the SignedInfo-tree (the one that contains the DigestValue) verifies and matches a trusted public key. If an attacker somehow (i.e. by exploiting a bug in PHP's canonicalization function) manages to manipulate the canonicalized version's DigestValue, it would be possible to forge the signature. This issue has been patched in version 1.6.12 and 5.0.0-alpha.13. | https://github.com/simplesamlphp/xml-security/security/advisories/GHSA-ww7x-3gxh-qm6r | 2023-11-21T18:57:30.429Z | 2023-11-30T05:20:28.298Z | 2023-11-30T05:20:28.298Z | {'Vendor': 'simplesamlphp', 'Product': 'xml-security', 'Versions': '= 1.6.11, = 5.0.0-alpha.12'} |
CVE-2023-49438 | An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows attackers to redirect unsuspecting users to malicious sites via a crafted URL by abusing the ?next parameter on the /login and /register routes. | https://github.com/Flask-Middleware/flask-security | 2023-11-27T00:00:00 | 2023-12-26T00:00:00 | 2024-01-14T02:06:31.346809 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49068 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1.
Users are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.
| https://github.com/apache/dolphinscheduler/pull/15192 | 2023-11-21T05:39:23.905Z | 2023-11-27T09:49:42.477Z | 2023-11-27T09:49:42.477Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '0'} |
CVE-2023-49654 | Missing permission checks in Jenkins MATLAB Plugin 2.11.0 and earlier allow attackers to have Jenkins parse an XML file from the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193 | 2023-11-28T21:18:14.327Z | 2023-11-29T13:45:10.938Z | 2023-11-29T13:45:10.938Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins MATLAB Plugin', 'Versions': '0'} |
CVE-2023-49195 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Phillips Nested Pages allows Stored XSS.This issue affects Nested Pages: from n/a through 3.2.6.
| https://patchstack.com/database/vulnerability/wp-nested-pages/wordpress-nested-pages-plugin-3-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:56.849Z | 2023-12-14T15:39:26.529Z | 2023-12-14T15:39:26.529Z | {'Vendor': 'Kyle Phillips', 'Product': 'Nested Pages', 'Versions': 'n/a'} |
CVE-2023-49746 | Server-Side Request Forgery (SSRF) vulnerability in Softaculous Team SpeedyCache – Cache, Optimization, Performance.This issue affects SpeedyCache – Cache, Optimization, Performance: from n/a through 1.1.2.
| https://patchstack.com/database/vulnerability/speedycache/wordpress-speedycache-plugin-1-1-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | 2023-11-30T13:21:40.736Z | 2023-12-07T10:50:20.261Z | 2023-12-07T10:50:20.261Z | {'Vendor': 'Softaculous Team', 'Product': 'SpeedyCache – Cache, Optimization, Performance', 'Versions': 'n/a'} |
CVE-2023-49316 | In Math/BinaryField.php in phpseclib 3 before 3.0.34, excessively large degrees can lead to a denial of service. | https://github.com/phpseclib/phpseclib/commit/964d78101a70305df33f442f5490f0adb3b7e77f | 2023-11-26T00:00:00 | 2023-11-27T00:00:00 | 2023-11-30T03:15:13.625096 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49253 | Root user password is hardcoded into the device and cannot be changed in the user interface.
| https://cert.pl/en/posts/2024/01/CVE-2023-49253/ | 2023-11-24T11:53:46.294Z | 2024-01-12T14:23:26.923Z | 2024-01-12T14:23:26.923Z | {'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'} |
CVE-2023-49880 | In the Message Entry and Repair (MER) facility of IBM Financial Transaction Manager for SWIFT Services 3.2.4 the sending address and the message type of FIN messages are assumed to be immutable. However, an attacker might modify these elements of a business transaction. IBM X-Force ID: 273183. | https://www.ibm.com/support/pages/node/7101167 | 2023-12-01T01:47:32.863Z | 2023-12-25T02:24:32.216Z | 2023-12-25T02:24:32.216Z | {'Vendor': 'IBM', 'Product': 'Financial Transaction Manager for SWIFT Services', 'Versions': '3.2.4'} |
CVE-2023-49183 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NextScripts NextScripts: Social Networks Auto-Poster allows Reflected XSS.This issue affects NextScripts: Social Networks Auto-Poster: from n/a through 4.4.2.
| https://patchstack.com/database/vulnerability/social-networks-auto-poster-facebook-twitter-g/wordpress-nextscripts-social-networks-auto-poster-plugin-4-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:35.546Z | 2023-12-15T14:54:38.275Z | 2023-12-15T14:54:38.275Z | {'Vendor': 'NextScripts', 'Product': 'NextScripts: Social Networks Auto-Poster', 'Versions': 'n/a'} |
CVE-2023-49029 | Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and before allows a remote attacker to execute arbitrary code via the nama parameter in the lock/lock.php file. | https://github.com/smpn1smg/absis | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T15:55:38.711357 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49750 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spoonthemes Couponis - Affiliate & Submitting Coupons WordPress Theme.This issue affects Couponis - Affiliate & Submitting Coupons WordPress Theme: from n/a before 2.2.
| https://patchstack.com/database/vulnerability/couponis/wordpress-couponis-affiliate-submitting-coupons-wordpress-theme-theme-3-1-7-sql-injection-vulnerability?_s_id=cve | 2023-11-30T13:22:02.831Z | 2023-12-19T20:36:16.588Z | 2023-12-19T20:36:16.588Z | {'Vendor': 'Spoonthemes', 'Product': 'Couponis - Affiliate & Submitting Coupons WordPress Theme', 'Versions': 'n/a'} |
CVE-2023-49245 | Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:47.175Z | 2023-12-06T09:00:03.721Z | 2023-12-06T09:00:03.721Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-49992 | Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c. | https://github.com/espeak-ng/espeak-ng/issues/1827 | 2023-12-04T00:00:00 | 2023-12-12T00:00:00 | 2024-01-19T04:06:58.299033 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49091 | Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.0. | https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x | 2023-11-21T18:57:30.429Z | 2023-11-29T19:16:37.723Z | 2023-11-29T19:16:37.723Z | {'Vendor': 'azukaar', 'Product': 'Cosmos-Server', 'Versions': '< 0.13.0'} |
CVE-2023-49584 | SAP Fiori launchpad - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793, allows an attacker to use HTTP verb POST on read-only service causing low impact on Confidentiality of the application.
| https://me.sap.com/notes/3406786 | 2023-11-27T18:45:03.233Z | 2023-12-12T01:35:22.515Z | 2023-12-12T01:35:22.515Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Fiori Launchpad', 'Versions': 'SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793'} |
CVE-2023-49707 | SQLi vulnerability in S5 Register module for Joomla. | https://extensions.joomla.org/extension/s5-register/ | 2023-11-30T04:31:32.258Z | 2023-12-14T08:51:59.222Z | 2023-12-14T08:51:59.222Z | {'Vendor': 'joomlart.com', 'Product': 'S5 Register module for Joomla', 'Versions': '1.0.0-3.0.0'} |
CVE-2023-49843 | Cross-Site Request Forgery (CSRF) vulnerability in QuanticEdge First Order Discount Woocommerce.This issue affects First Order Discount Woocommerce: from n/a through 1.21.
| https://patchstack.com/database/vulnerability/first-order-discount-woocommerce/wordpress-first-order-discount-woocommerce-plugin-1-21-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T17:12:47.221Z | 2023-12-18T14:43:37.077Z | 2023-12-18T14:43:37.077Z | {'Vendor': 'QuanticEdge', 'Product': 'First Order Discount Woocommerce', 'Versions': 'n/a'} |
CVE-2023-49140 | Denial-of-service (DoS) vulnerability exists in commplex-link service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur. | https://www.electronics.jtekt.co.jp/en/topics/202312116562/ | 2023-11-30T05:55:29.274Z | 2023-12-12T09:16:13.379Z | 2023-12-12T09:16:13.379Z | {'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'GC-A22W-CW', 'Versions': 'all versions'} |
CVE-2023-49639 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'customer_details' parameter of the buyer_invoice_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/zimerman/ | 2023-11-28T15:05:55.679Z | 2024-01-04T13:57:12.848Z | 2024-01-04T13:57:12.848Z | {'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'} |
CVE-2023-49269 | Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'adults' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
| https://fluidattacks.com/advisories/lang/ | 2023-11-24T16:25:53.192Z | 2023-12-20T17:41:53.093Z | 2023-12-20T17:41:53.093Z | {'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'} |
CVE-2023-49286 | Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27 | 2023-11-24T16:45:24.312Z | 2023-12-04T22:53:44.827Z | 2023-12-04T22:53:44.827Z | {'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '< 6.5'} |
CVE-2023-49402 | Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function localMsg. | https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T16:53:32.131561 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49052 | File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component. | https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload | 2023-11-20T00:00:00 | 2023-11-30T00:00:00 | 2023-11-30T06:49:15.400896 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49117 | PowerCMS (6 Series, 5 Series, and 4 Series) contains a stored cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user's web browser. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability. | https://www.powercms.jp/news/release-powercms-202312.html | 2023-12-21T12:24:04.679Z | 2023-12-26T05:53:40.513Z | 2023-12-26T05:53:40.513Z | {'Vendor': 'Alfasado Inc.', 'Product': 'PowerCMS (PowerCMS 6 Series)', 'Versions': '6.31 and earlier'} |
CVE-2023-49814 | Unrestricted Upload of File with Dangerous Type vulnerability in Symbiostock symbiostock.This issue affects Symbiostock: from n/a through 6.0.0.
| https://patchstack.com/database/vulnerability/symbiostock/wordpress-symbiostock-lite-plugin-6-0-0-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-11-30T14:51:04.753Z | 2023-12-20T18:26:20.872Z | 2023-12-20T18:26:20.872Z | {'Vendor': 'Symbiostock', 'Product': 'Symbiostock', 'Versions': 'n/a'} |
CVE-2023-49394 | Zentao versions 4.1.3 and before has a URL redirect vulnerability, which prevents the system from functioning properly. | https://narrow-payment-2cd.notion.site/zentao-4-1-3-is-vulnerable-URL-redirect-b03f8f9f5b4e4cbea819c2961c097d92?pvs=4 | 2023-11-27T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T08:48:42.952241 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49681 | Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cmbQual' parameter of the Employer/InsertWalkin.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/pollini/ | 2023-11-29T17:48:17.255Z | 2023-12-21T23:06:19.930Z | 2023-12-21T23:06:19.930Z | {'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'} |
CVE-2023-49044 | Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the ssid parameter in the function form_fast_setting_wifi_set. | https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_wifi_set.md | 2023-11-20T00:00:00 | 2023-11-27T00:00:00 | 2023-11-27T20:35:36.724647 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49947 | Forgejo before 1.20.5-1 allows 2FA bypass when docker login uses Basic Authentication. | https://forgejo.org/2023-11-release-v1-20-5-1/ | 2023-12-03T00:00:00 | 2023-12-03T00:00:00 | 2023-12-03T18:55:33.844898 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49802 | The LinkedCustomFields plugin for MantisBT allows users to link values between two custom fields, creating linked drop-downs. Prior to version 2.0.1, cross-site scripting in the MantisBT LinkedCustomFields plugin allows Javascript execution, when a crafted Custom Field is linked via the plugin and displayed when reporting a new Issue or editing an existing one. This issue is fixed in version 2.0.1. As a workaround, one may utilize MantisBT's default Content Security Policy, which blocks script execution. | https://github.com/mantisbt-plugins/LinkedCustomFields/security/advisories/GHSA-2f37-9xpx-5hhw | 2023-11-30T13:39:50.864Z | 2023-12-11T21:11:53.407Z | 2023-12-11T21:11:53.407Z | {'Vendor': 'mantisbt-plugins', 'Product': 'LinkedCustomFields', 'Versions': '< 2.0.1'} |
CVE-2023-49551 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file. | https://github.com/cesanta/mjs/issues/257 | 2023-11-27T00:00:00 | 2024-01-02T00:00:00 | 2024-01-02T22:31:09.601671 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49678 | null | null | 2023-11-29T17:48:17.254Z | 2023-12-21T22:59:09.539Z | 2024-01-02T19:52:25.846Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-49382 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/div/delete. | https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20the%20custom%20table.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:43:10.080488 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49228 | An issue was discovered in Peplink Balance Two before 8.4.0. Console port authentication uses hard-coded credentials, which allows an attacker with physical access and sufficient knowledge to execute arbitrary commands as root. | https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4 | 2023-11-24T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T03:15:53.754490 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49443 | DoraCMS v2.1.8 was discovered to re-use the same code for verification of valid usernames and passwords. This vulnerability allows attackers to gain access to the application via a bruteforce attack. | https://github.com/woshinibaba222/DoraCMS-Verification-Code-Reuse | 2023-11-27T00:00:00 | 2023-12-08T00:00:00 | 2023-12-08T14:13:12.634291 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49855 | Cross-Site Request Forgery (CSRF) vulnerability in BinaryCarpenter Menu Bar Cart Icon For WooCommerce By Binary Carpenter.This issue affects Menu Bar Cart Icon For WooCommerce By Binary Carpenter: from n/a through 1.49.3.
| https://patchstack.com/database/vulnerability/bc-menu-cart-woo/wordpress-bc-menu-bar-cart-icon-for-woocommerce-by-binary-carpenter-plugin-1-49-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T17:13:03.351Z | 2023-12-18T10:18:11.399Z | 2023-12-18T10:18:11.399Z | {'Vendor': 'BinaryCarpenter', 'Product': 'Menu Bar Cart Icon For WooCommerce By Binary Carpenter', 'Versions': 'n/a'} |
CVE-2023-49290 | lestrrat-go/jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. A p2c parameter set too high in JWE's algorithm PBES2-* could lead to a denial of service. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource- intensive. Therefore, if an attacker sets the p2c parameter in JWE to a very large number, it can cause a lot of computational consumption, resulting in a denial of service. This vulnerability has been addressed in commit `64f2a229b` which has been included in release version 1.2.27 and 2.0.18. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf | 2023-11-24T16:45:24.313Z | 2023-12-04T23:42:53.061Z | 2023-12-04T23:42:53.061Z | {'Vendor': 'lestrrat-go', 'Product': 'jwx', 'Versions': '< 1.2.27, >= 2.0.0, < 2.0.18'} |
CVE-2023-49658 | Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'bank_details' parameter of the party_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/zimerman/ | 2023-11-28T21:52:11.042Z | 2024-01-04T14:00:11.438Z | 2024-01-04T14:00:11.438Z | {'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'} |
CVE-2023-49208 | scheme/webauthn.c in Glewlwyd SSO server before 2.7.6 has a possible buffer overflow during FIDO2 credentials validation in webauthn registration. | https://github.com/babelouest/glewlwyd/commit/f9d8c06aae8dfe17e761b18b577ff169e059e812 | 2023-11-23T00:00:00 | 2023-11-23T00:00:00 | 2023-11-23T18:09:22.734350 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49121 | A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf | 2023-11-22T14:43:13.523Z | 2024-01-09T09:59:52.512Z | 2024-01-09T09:59:52.512Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'} |
CVE-2023-49434 | Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'list' parameter at /goform/SetNetControlList. | https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList.md | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T16:05:57.032144 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49967 | Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc. | https://github.com/typecho/typecho/issues/1648 | 2023-12-04T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T15:58:58.518376 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49176 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Reflected XSS.This issue affects WP Pocket URLs: from n/a through 1.0.2.
| https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:21.490Z | 2023-12-15T14:20:30.610Z | 2023-12-15T14:20:30.610Z | {'Vendor': 'CodeRevolution', 'Product': 'WP Pocket URLs', 'Versions': 'n/a'} |
CVE-2023-49463 | libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc. | https://github.com/strukturag/libheif/issues/1042 | 2023-11-27T00:00:00 | 2023-12-07T00:00:00 | 2023-12-07T19:37:46.148227 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49619 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.
This issue affects Apache Answer: through 1.2.0.
Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the script can increase the number of collection of the question many times.
Users are recommended to upgrade to version [1.2.1], which fixes the issue. | https://lists.apache.org/thread/nscrl3c7pn68q4j73y3ottql6n5x3hd4 | 2023-11-28T06:34:49.463Z | 2024-01-10T08:25:01.610Z | 2024-01-10T08:25:01.610Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Answer', 'Versions': '0'} |
CVE-2023-49863 | An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880 | 2023-11-30T18:43:03.139Z | 2024-01-10T15:48:12.475Z | 2024-01-10T18:00:08.822Z | {'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'} |
CVE-2023-49160 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in formzu Inc. Formzu WP allows Stored XSS.This issue affects Formzu WP: from n/a through 1.6.6.
| https://patchstack.com/database/vulnerability/formzu-wp/wordpress-formzu-wp-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-22T23:36:04.378Z | 2023-12-15T13:54:16.677Z | 2023-12-15T13:54:16.677Z | {'Vendor': 'formzu Inc.', 'Product': 'Formzu WP', 'Versions': 'n/a'} |
CVE-2023-49926 | app/Lib/Tools/EventTimelineTool.php in MISP before 2.4.179 allows XSS in the event timeline widget. | https://github.com/MISP/MISP/commit/dc73287ee2000476e3a5800ded402825ca10f7e8 | 2023-12-03T00:00:00 | 2023-12-03T00:00:00 | 2023-12-03T02:58:30.167527 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49834 | Cross-Site Request Forgery (CSRF) vulnerability in realmag777 FOX – Currency Switcher Professional for WooCommerce.This issue affects FOX – Currency Switcher Professional for WooCommerce: from n/a through 1.4.1.4.
| https://patchstack.com/database/vulnerability/woocommerce-currency-switcher/wordpress-fox-currency-switcher-professional-for-woocommerce-plugin-1-4-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-30T17:12:29.821Z | 2023-12-17T10:38:49.072Z | 2023-12-17T10:38:49.072Z | {'Vendor': 'realmag777', 'Product': 'FOX – Currency Switcher Professional for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-49770 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Raschendorfer Smart External Link Click Monitor [Link Log] allows Stored XSS.This issue affects Smart External Link Click Monitor [Link Log]: from n/a through 5.0.2.
| https://patchstack.com/database/vulnerability/link-log/wordpress-smart-external-link-click-monitor-link-log-plugin-5-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:22:54.825Z | 2023-12-14T15:45:10.348Z | 2023-12-14T15:45:10.348Z | {'Vendor': 'Peter Raschendorfer', 'Product': 'Smart External Link Click Monitor [Link Log]', 'Versions': 'n/a'} |
CVE-2023-49398 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/delete. | https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:53:12.481941 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49377 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/update. | https://github.com/cui2shark/cms/blob/main/Modification%20of%20CSRF%20in%20Label%20Management.md | 2023-11-27T00:00:00 | 2023-12-05T00:00:00 | 2023-12-05T14:32:53.901451 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49674 | A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password. | https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3256 | 2023-11-29T10:34:02.383Z | 2023-11-29T13:45:13.482Z | 2023-11-29T13:45:13.482Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins NeuVector Vulnerability Scanner Plugin', 'Versions': '0'} |
CVE-2023-49418 | TOTOLink A7000R V9.1.0u.6115_B20201022has a stack overflow vulnerability via setIpPortFilterRules. | https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setIpPortFilterRules | 2023-11-27T00:00:00 | 2023-12-11T00:00:00 | 2023-12-11T13:33:07.254577 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-49273 | Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.8.1, and 12.3.4, users with low privileges (Editor, etc.) are able to access some unintended endpoints. Versions 8.18.10, 10.8.1, and 12.3.4 contain a patch for this issue. | https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-cfr5-7p54-4qg8 | 2023-11-24T16:45:24.310Z | 2023-12-12T19:05:39.361Z | 2023-12-12T19:09:21.071Z | {'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 8.0.0, < 8.18.10, >= 9.0.0-rc001, < 10.8.1, >= 11.0.0-rc1, < 12.3.4'} |
CVE-2023-49766 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Ultimate Addons for Contact Form 7 allows Stored XSS.This issue affects Ultimate Addons for Contact Form 7: from n/a through 3.2.0.
| https://patchstack.com/database/vulnerability/ultimate-addons-for-contact-form-7/wordpress-ultimate-addons-for-contact-form-7-plugin-3-2-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-11-30T13:22:27.402Z | 2023-12-14T15:42:37.230Z | 2023-12-14T15:42:37.230Z | {'Vendor': 'Themefic', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': 'n/a'} |
CVE-2023-38348 | A CSRF issue was discovered in LWsystems Benno MailArchiv 2.10.1. | https://wiki.benno-mailarchiv.de/doku.php | 2023-07-15T00:00:00 | 2023-08-09T00:00:00 | 2023-08-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38718 | IBM Robotic Process Automation 21.0.0 through 21.0.7.8 could disclose sensitive information from access to RPA scripts, workflows and related data. IBM X-Force ID: 261606. | https://www.ibm.com/support/pages/node/7031619 | 2023-07-25T00:00:53.163Z | 2023-09-20T19:12:24.102Z | 2023-09-20T19:12:24.102Z | {'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'} |
CVE-2023-38574 | Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL. | https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf | 2023-08-25T04:25:45.902Z | 2023-09-05T08:37:35.942Z | 2023-09-05T08:37:35.942Z | {'Vendor': 'i-PRO Co., Ltd.', 'Product': 'VI Web Client', 'Versions': 'prior to 7.9.6'} |
CVE-2023-38827 | Cross Site Scripting vulnerability in Follet School Solutions Destiny v.20_0_1_AU4 and later allows a remote attacker to run arbitrary code via presentonesearchresultsform.do. | https://github.com/Oracle-Security/CVEs/tree/main/Follett%20Learning%20Solutions/Destiny/CVE-2023-38827 | 2023-07-25T00:00:00 | 2024-01-09T00:00:00 | 2024-01-09T21:46:51.335918 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38431 | An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-08-24T18:06:20.296400 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38061 | In JetBrains TeamCity before 2023.05.1 stored XSS when using a custom theme was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-07-12T12:43:55.554Z | 2023-07-12T12:48:19.126Z | 2023-07-12T12:48:19.126Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-38870 | A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection. | https://github.com/gugoan/economizzer | 2023-07-25T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T03:23:20.376214 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38489 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user.
Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization. In the variation described in this advisory, it allows attackers to stay logged in to a Kirby site on another device even if the logged in user has since changed their password. Kirby did not invalidate user sessions that were created with a password that was since changed by the user or by a site admin. If a user changed their password to lock out an attacker who was already in possession of the previous password or of a login session on another device or browser, the attacker would not be reliably prevented from accessing the Kirby site as the affected user.
The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have updated the authentication implementation to keep track of the hashed password in each active session. If the password changed since the login, the session is invalidated. To enforce this fix even if the vulnerability was previously abused, all users are logged out from the Kirby site after updating to one of the patched releases. | https://github.com/getkirby/kirby/security/advisories/GHSA-5mvj-rvp8-rf45 | 2023-07-18T16:28:12.075Z | 2023-07-27T14:36:46.189Z | 2023-07-27T15:46:54.264Z | {'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'} |
CVE-2023-38173 | Microsoft Edge for Android Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38173 | 2023-07-12T23:41:45.863Z | 2023-07-21T17:51:28.763Z | 2023-12-14T19:53:02.425Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge for Android', 'Versions': '1.0.0'} |
CVE-2023-38523 | The web interface on multiple Samsung Harman AMX N-Series devices allows directory listing for the /tmp/ directory, without authentication, exposing sensitive information such as the command history and screenshot of the file being processed. This affects N-Series N1115 Wallplate Video Encoder before 1.15.61, N-Series N1x22A Video Encoder/Decoder before 1.15.61, N-Series N1x33A Video Encoder/Decoder before 1.15.61, N-Series N1x33 Video Encoder/Decoder before 1.15.61, N-Series N2x35 Video Encoder/Decoder before 1.15.61, N-Series N2x35A Video Encoder/Decoder before 1.15.61, N-Series N2xx2 Video Encoder/Decoder before 1.15.61, N-Series N2xx2A Video Encoder/Decoder before 1.15.61, N-Series N3000 Video Encoder/Decoder before 2.12.105, and N-Series N4321 Audio Transceiver before 1.00.06. | https://help.harmanpro.com/n1115-svsi-firmware | 2023-07-19T00:00:00 | 2023-07-20T00:00:00 | 2023-07-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38466 | In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.588Z | 2023-09-04T01:16:10.383Z | 2023-09-04T01:16:10.383Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'} |
CVE-2023-38935 | Tenda AC1206 V15.03.06.23, AC8 V4 V16.03.34.06, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and AC9 V3.0 V15.03.06.42_multi were discovered to contain a tack overflow via the list parameter in the formSetQosBand function. | https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetQosBand/README.md | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38309 | An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the "Search for Package" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser. | https://webmin.com/tags/webmin-changelog/ | 2023-07-14T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38759 | Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components. | https://wger.de | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38866 | COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_415588. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter interface and display_name. | https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38889 | An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String). | https://github.com/Alluxio/alluxio/issues/17766 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38470 | A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function. | https://access.redhat.com/security/cve/CVE-2023-38470 | 2023-07-18T09:48:04.752Z | 2023-11-02T14:57:28.872Z | 2023-11-02T14:57:28.872Z | {'Vendor': 'n/a', 'Product': 'avahi', 'Versions': ''} |
CVE-2023-38831 | RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. | https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ | 2023-07-25T00:00:00 | 2023-08-23T00:00:00 | 2023-10-23T00:10:57.118648 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38132 | LAN-W451NGR all versions provided by LOGITEC CORPORATION contains an improper access control vulnerability, which allows an unauthenticated attacker to log in to telnet service. | https://www.elecom.co.jp/news/security/20230810-01/ | 2023-08-09T11:55:01.344Z | 2023-08-18T09:38:31.606Z | 2023-08-18T09:38:31.606Z | {'Vendor': 'LOGITEC CORPORATION', 'Product': 'LAN-W451NGR', 'Versions': 'all versions'} |
CVE-2023-38427 | An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=f1a411873c85b642f13b01f21b534c2bab81fc1b | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-08-24T18:06:21.863816 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38974 | A stored cross-site scripting (XSS) vulnerability in the Edit Category function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter. | https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS4.md | 2023-07-25T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T00:23:18.065579 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38325 | The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options. | https://github.com/pyca/cryptography/issues/9207 | 2023-07-14T00:00:00 | 2023-07-14T00:00:00 | 2023-08-24T18:06:38.236041 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38149 | Windows TCP/IP Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38149 | 2023-07-12T23:41:45.860Z | 2023-09-12T16:58:20.193Z | 2023-12-14T20:11:36.197Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38519 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MainWP MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance.This issue affects MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance: from n/a through 4.4.3.3.
| https://patchstack.com/database/vulnerability/mainwp/wordpress-mainwp-plugin-4-4-3-3-sql-injection-vulnerability?_s_id=cve | 2023-07-18T17:33:34.155Z | 2023-12-20T13:48:04.919Z | 2023-12-20T13:48:04.919Z | {'Vendor': 'MainWP', 'Product': 'MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance', 'Versions': 'n/a'} |
CVE-2023-38237 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.616Z | 2023-08-10T13:17:30.548Z | 2023-08-10T13:17:30.548Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38667 | Stack-based buffer over-read in function disasm in nasm 2.16 allows attackers to cause a denial of service. | https://bugzilla.nasm.us/show_bug.cgi?id=3392812 | 2023-07-23T00:00:00 | 2023-08-22T00:00:00 | 2023-08-22T15:44:38.537089 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38688 | twitch-tui provides Twitch chat in a terminal. Prior to version 2.4.1, the connection is not using TLS for communication. In the configuration of the irc connection, the software disables TLS, which makes all communication to Twitch IRC servers unencrypted. As a result, communication, including auth tokens, can be sniffed. Version 2.4.1 has a patch for this issue. | https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx | 2023-07-24T16:19:28.363Z | 2023-08-04T16:18:15.288Z | 2023-08-04T16:18:15.288Z | {'Vendor': 'Xithrius', 'Product': 'twitch-tui', 'Versions': ' < 2.4.1'} |
CVE-2023-38722 | IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 262174. | https://www.ibm.com/support/pages/node/7057407 | 2023-07-25T00:00:53.164Z | 2023-10-23T17:40:32.328Z | 2023-10-23T17:40:32.328Z | {'Vendor': 'IBM', 'Product': 'Sterling Partner Engagement Manager', 'Versions': '6.1.2, 6.2.0, 6.2.2'} |
CVE-2023-38958 | An access control issue in ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to arbitrarily close and open the doors managed by the platform remotely via sending a crafted web request. | http://zkteco.com | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38671 | Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md | 2023-07-24T07:55:02.091Z | 2023-07-26T10:59:48.778Z | 2023-07-26T10:59:48.778Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38221 | Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that could lead in arbitrary code execution by an admin-privilege authenticated attacker. Exploitation of this issue does not require user interaction and attack complexity is high as it requires knowledge of tooling beyond just using the UI. | https://helpx.adobe.com/security/products/magento/apsb23-50.html | 2023-07-13T16:21:52.614Z | 2023-10-13T06:15:06.405Z | 2023-10-13T06:15:06.405Z | {'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.