CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-49993
Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the function ReadClause at readclause.c.
https://github.com/espeak-ng/espeak-ng/issues/1826
2023-12-04T00:00:00
2023-12-12T00:00:00
2024-01-19T04:06:52.241317
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49090
CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a partial match. If the `content_type` argument of `allowlisted_content_type?` is passed a value crafted by the attacker, Content-Types not included in the `content_type_allowlist` will be allowed. This issue has been patched in versions 2.2.5 and 3.0.5.
https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj
2023-11-21T18:57:30.429Z
2023-11-29T14:38:52.195Z
2023-11-29T14:38:52.195Z
{'Vendor': 'carrierwaveuploader', 'Product': 'carrierwave', 'Versions': '>= 2.2.0, < 2.2.5, >= 3.0.0, < 3.0.5'}
CVE-2023-49751
Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu Block for Font Awesome.This issue affects Block for Font Awesome: from n/a through 1.4.0.
https://patchstack.com/database/vulnerability/block-for-font-awesome/wordpress-block-for-font-awesome-plugin-1-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:02.831Z
2023-12-17T09:50:21.617Z
2023-12-17T09:50:21.617Z
{'Vendor': 'Ciprian Popescu', 'Product': 'Block for Font Awesome', 'Versions': 'n/a'}
CVE-2023-49244
Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.175Z
2023-12-06T08:58:41.728Z
2023-12-06T08:58:41.728Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0'}
CVE-2023-49182
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fabio Marzocca List all posts by Authors, nested Categories and Titles allows Reflected XSS.This issue affects List all posts by Authors, nested Categories and Titles: from n/a through 2.7.10.
https://patchstack.com/database/vulnerability/list-all-posts-by-authors-nested-categories-and-titles/wordpress-list-all-posts-by-authors-nested-categories-and-title-plugin-2-7-10-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:35.546Z
2023-12-15T14:52:08.191Z
2023-12-15T14:52:08.191Z
{'Vendor': 'Fabio Marzocca', 'Product': 'List all posts by Authors, nested Categories and Titles', 'Versions': 'n/a'}
CVE-2023-49028
Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and before allows a remote attacker to execute arbitrary code via the user parameter in the lock/lock.php file.
https://github.com/smpn1smg/absis
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T16:09:53.391358
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49747
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebFactory Ltd Guest Author allows Stored XSS.This issue affects Guest Author: from n/a through 2.3.
https://patchstack.com/database/vulnerability/guest-author/wordpress-guest-author-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:21:40.736Z
2023-12-15T15:16:14.552Z
2023-12-15T15:16:14.552Z
{'Vendor': 'WebFactory Ltd', 'Product': 'Guest Author', 'Versions': 'n/a'}
CVE-2023-49252
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The affected application allows IP configuration change without authentication to the device. This could allow an attacker to cause denial of service condition.
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf
2023-11-24T11:41:23.260Z
2024-01-09T10:00:10.226Z
2024-01-09T10:00:10.226Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC CN 4100', 'Versions': 'All versions < V2.7'}
CVE-2023-49878
IBM System Storage Virtualization Engine TS7700 3957-VEC, 3948-VED and 3957-VEC could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 272652.
https://www.ibm.com/support/pages/node/7092383
2023-12-01T01:47:32.862Z
2023-12-13T20:40:52.300Z
2023-12-13T20:40:52.300Z
{'Vendor': 'IBM', 'Product': 'System Storage Virtualization Engine', 'Versions': '8.52.103.23, 8.53.1.21'}
CVE-2023-49897
An OS command injection vulnerability exists in AE1021PE firmware version 2.0.9 and earlier and AE1021 firmware version 2.0.9 and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can log in to the product.
https://www.fxc.jp/news/20231206
2023-12-01T02:30:49.222Z
2023-12-06T06:49:41.752Z
2023-12-22T04:06:04.193Z
{'Vendor': 'FXC Inc.', 'Product': 'AE1021PE', 'Versions': '2.0.9 and earlier'}
CVE-2023-49655
A cross-site request forgery (CSRF) vulnerability in Jenkins MATLAB Plugin 2.11.0 and earlier allows attackers to have Jenkins parse an XML file from the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193
2023-11-28T21:18:14.328Z
2023-11-29T13:45:11.577Z
2023-11-29T13:45:11.577Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins MATLAB Plugin', 'Versions': '0'}
CVE-2023-49086
Cacti is a robust performance and fault management framework and a frontend to RRDTool - a Time Series Database (TSDB). Bypassing an earlier fix (CVE-2023-39360) that leads to a DOM XSS attack. Exploitation of the vulnerability is possible for an authorized user. The vulnerable component is the `graphs_new.php`. Impact of the vulnerability - execution of arbitrary javascript code in the attacked user's browser. This issue has been patched in version 1.2.26.
https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr
2023-11-21T18:57:30.428Z
2023-12-21T23:29:45.134Z
2023-12-21T23:29:45.134Z
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'}
CVE-2023-49087
xml-security is a library that implements XML signatures and encryption. Validation of an XML signature requires verification that the hash value of the related XML-document matches a specific DigestValue-value, but also that the cryptographic signature on the SignedInfo-tree (the one that contains the DigestValue) verifies and matches a trusted public key. If an attacker somehow (i.e. by exploiting a bug in PHP's canonicalization function) manages to manipulate the canonicalized version's DigestValue, it would be possible to forge the signature. This issue has been patched in version 1.6.12 and 5.0.0-alpha.13.
https://github.com/simplesamlphp/xml-security/security/advisories/GHSA-ww7x-3gxh-qm6r
2023-11-21T18:57:30.429Z
2023-11-30T05:20:28.298Z
2023-11-30T05:20:28.298Z
{'Vendor': 'simplesamlphp', 'Product': 'xml-security', 'Versions': '= 1.6.11, = 5.0.0-alpha.12'}
CVE-2023-49438
An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows attackers to redirect unsuspecting users to malicious sites via a crafted URL by abusing the ?next parameter on the /login and /register routes.
https://github.com/Flask-Middleware/flask-security
2023-11-27T00:00:00
2023-12-26T00:00:00
2024-01-14T02:06:31.346809
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49068
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1. Users are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.
https://github.com/apache/dolphinscheduler/pull/15192
2023-11-21T05:39:23.905Z
2023-11-27T09:49:42.477Z
2023-11-27T09:49:42.477Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '0'}
CVE-2023-49654
Missing permission checks in Jenkins MATLAB Plugin 2.11.0 and earlier allow attackers to have Jenkins parse an XML file from the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3193
2023-11-28T21:18:14.327Z
2023-11-29T13:45:10.938Z
2023-11-29T13:45:10.938Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins MATLAB Plugin', 'Versions': '0'}
CVE-2023-49195
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Phillips Nested Pages allows Stored XSS.This issue affects Nested Pages: from n/a through 3.2.6.
https://patchstack.com/database/vulnerability/wp-nested-pages/wordpress-nested-pages-plugin-3-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:56.849Z
2023-12-14T15:39:26.529Z
2023-12-14T15:39:26.529Z
{'Vendor': 'Kyle Phillips', 'Product': 'Nested Pages', 'Versions': 'n/a'}
CVE-2023-49746
Server-Side Request Forgery (SSRF) vulnerability in Softaculous Team SpeedyCache – Cache, Optimization, Performance.This issue affects SpeedyCache – Cache, Optimization, Performance: from n/a through 1.1.2.
https://patchstack.com/database/vulnerability/speedycache/wordpress-speedycache-plugin-1-1-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
2023-11-30T13:21:40.736Z
2023-12-07T10:50:20.261Z
2023-12-07T10:50:20.261Z
{'Vendor': 'Softaculous Team', 'Product': 'SpeedyCache – Cache, Optimization, Performance', 'Versions': 'n/a'}
CVE-2023-49316
In Math/BinaryField.php in phpseclib 3 before 3.0.34, excessively large degrees can lead to a denial of service.
https://github.com/phpseclib/phpseclib/commit/964d78101a70305df33f442f5490f0adb3b7e77f
2023-11-26T00:00:00
2023-11-27T00:00:00
2023-11-30T03:15:13.625096
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49253
Root user password is hardcoded into the device and cannot be changed in the user interface.
https://cert.pl/en/posts/2024/01/CVE-2023-49253/
2023-11-24T11:53:46.294Z
2024-01-12T14:23:26.923Z
2024-01-12T14:23:26.923Z
{'Vendor': 'Hongdian', 'Product': 'H8951-4G-ESP', 'Versions': '0'}
CVE-2023-49880
In the Message Entry and Repair (MER) facility of IBM Financial Transaction Manager for SWIFT Services 3.2.4 the sending address and the message type of FIN messages are assumed to be immutable. However, an attacker might modify these elements of a business transaction. IBM X-Force ID: 273183.
https://www.ibm.com/support/pages/node/7101167
2023-12-01T01:47:32.863Z
2023-12-25T02:24:32.216Z
2023-12-25T02:24:32.216Z
{'Vendor': 'IBM', 'Product': 'Financial Transaction Manager for SWIFT Services', 'Versions': '3.2.4'}
CVE-2023-49183
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NextScripts NextScripts: Social Networks Auto-Poster allows Reflected XSS.This issue affects NextScripts: Social Networks Auto-Poster: from n/a through 4.4.2.
https://patchstack.com/database/vulnerability/social-networks-auto-poster-facebook-twitter-g/wordpress-nextscripts-social-networks-auto-poster-plugin-4-4-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:35.546Z
2023-12-15T14:54:38.275Z
2023-12-15T14:54:38.275Z
{'Vendor': 'NextScripts', 'Product': 'NextScripts: Social Networks Auto-Poster', 'Versions': 'n/a'}
CVE-2023-49029
Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and before allows a remote attacker to execute arbitrary code via the nama parameter in the lock/lock.php file.
https://github.com/smpn1smg/absis
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T15:55:38.711357
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49750
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Spoonthemes Couponis - Affiliate & Submitting Coupons WordPress Theme.This issue affects Couponis - Affiliate & Submitting Coupons WordPress Theme: from n/a before 2.2.
https://patchstack.com/database/vulnerability/couponis/wordpress-couponis-affiliate-submitting-coupons-wordpress-theme-theme-3-1-7-sql-injection-vulnerability?_s_id=cve
2023-11-30T13:22:02.831Z
2023-12-19T20:36:16.588Z
2023-12-19T20:36:16.588Z
{'Vendor': 'Spoonthemes', 'Product': 'Couponis - Affiliate & Submitting Coupons WordPress Theme', 'Versions': 'n/a'}
CVE-2023-49245
Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:47.175Z
2023-12-06T09:00:03.721Z
2023-12-06T09:00:03.721Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-49992
Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c.
https://github.com/espeak-ng/espeak-ng/issues/1827
2023-12-04T00:00:00
2023-12-12T00:00:00
2024-01-19T04:06:58.299033
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49091
Cosmos provides users the ability self-host a home server by acting as a secure gateway to your application, as well as a server manager. Cosmos-server is vulnerable due to to the authorization header used for user login remaining valid and not expiring after log out. This vulnerability allows an attacker to use the token to gain unauthorized access to the application/system even after the user has logged out. This issue has been patched in version 0.13.0.
https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x
2023-11-21T18:57:30.429Z
2023-11-29T19:16:37.723Z
2023-11-29T19:16:37.723Z
{'Vendor': 'azukaar', 'Product': 'Cosmos-Server', 'Versions': '< 0.13.0'}
CVE-2023-49584
SAP Fiori launchpad - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793, allows an attacker to use HTTP verb POST on read-only service causing low impact on Confidentiality of the application.
https://me.sap.com/notes/3406786
2023-11-27T18:45:03.233Z
2023-12-12T01:35:22.515Z
2023-12-12T01:35:22.515Z
{'Vendor': 'SAP_SE', 'Product': 'SAP Fiori Launchpad', 'Versions': 'SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793'}
CVE-2023-49707
SQLi vulnerability in S5 Register module for Joomla.
https://extensions.joomla.org/extension/s5-register/
2023-11-30T04:31:32.258Z
2023-12-14T08:51:59.222Z
2023-12-14T08:51:59.222Z
{'Vendor': 'joomlart.com', 'Product': 'S5 Register module for Joomla', 'Versions': '1.0.0-3.0.0'}
CVE-2023-49843
Cross-Site Request Forgery (CSRF) vulnerability in QuanticEdge First Order Discount Woocommerce.This issue affects First Order Discount Woocommerce: from n/a through 1.21.
https://patchstack.com/database/vulnerability/first-order-discount-woocommerce/wordpress-first-order-discount-woocommerce-plugin-1-21-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T17:12:47.221Z
2023-12-18T14:43:37.077Z
2023-12-18T14:43:37.077Z
{'Vendor': 'QuanticEdge', 'Product': 'First Order Discount Woocommerce', 'Versions': 'n/a'}
CVE-2023-49140
Denial-of-service (DoS) vulnerability exists in commplex-link service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur.
https://www.electronics.jtekt.co.jp/en/topics/202312116562/
2023-11-30T05:55:29.274Z
2023-12-12T09:16:13.379Z
2023-12-12T09:16:13.379Z
{'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'GC-A22W-CW', 'Versions': 'all versions'}
CVE-2023-49639
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'customer_details' parameter of the buyer_invoice_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/zimerman/
2023-11-28T15:05:55.679Z
2024-01-04T13:57:12.848Z
2024-01-04T13:57:12.848Z
{'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'}
CVE-2023-49269
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'adults' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
https://fluidattacks.com/advisories/lang/
2023-11-24T16:25:53.192Z
2023-12-20T17:41:53.093Z
2023-12-20T17:41:53.093Z
{'Vendor': 'Kashipara Group', 'Product': 'Hotel Management', 'Versions': '1.0'}
CVE-2023-49286
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27
2023-11-24T16:45:24.312Z
2023-12-04T22:53:44.827Z
2023-12-04T22:53:44.827Z
{'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '< 6.5'}
CVE-2023-49402
Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function localMsg.
https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T16:53:32.131561
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49052
File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component.
https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload
2023-11-20T00:00:00
2023-11-30T00:00:00
2023-11-30T06:49:15.400896
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49117
PowerCMS (6 Series, 5 Series, and 4 Series) contains a stored cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user's web browser. Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
https://www.powercms.jp/news/release-powercms-202312.html
2023-12-21T12:24:04.679Z
2023-12-26T05:53:40.513Z
2023-12-26T05:53:40.513Z
{'Vendor': 'Alfasado Inc.', 'Product': 'PowerCMS (PowerCMS 6 Series)', 'Versions': '6.31 and earlier'}
CVE-2023-49814
Unrestricted Upload of File with Dangerous Type vulnerability in Symbiostock symbiostock.This issue affects Symbiostock: from n/a through 6.0.0.
https://patchstack.com/database/vulnerability/symbiostock/wordpress-symbiostock-lite-plugin-6-0-0-arbitrary-file-upload-vulnerability?_s_id=cve
2023-11-30T14:51:04.753Z
2023-12-20T18:26:20.872Z
2023-12-20T18:26:20.872Z
{'Vendor': 'Symbiostock', 'Product': 'Symbiostock', 'Versions': 'n/a'}
CVE-2023-49394
Zentao versions 4.1.3 and before has a URL redirect vulnerability, which prevents the system from functioning properly.
https://narrow-payment-2cd.notion.site/zentao-4-1-3-is-vulnerable-URL-redirect-b03f8f9f5b4e4cbea819c2961c097d92?pvs=4
2023-11-27T00:00:00
2024-01-10T00:00:00
2024-01-10T08:48:42.952241
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49681
Job Portal v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'cmbQual' parameter of the Employer/InsertWalkin.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/pollini/
2023-11-29T17:48:17.255Z
2023-12-21T23:06:19.930Z
2023-12-21T23:06:19.930Z
{'Vendor': 'Kashipara Group', 'Product': 'Job Portal', 'Versions': '1.0'}
CVE-2023-49044
Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the ssid parameter in the function form_fast_setting_wifi_set.
https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_wifi_set.md
2023-11-20T00:00:00
2023-11-27T00:00:00
2023-11-27T20:35:36.724647
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49947
Forgejo before 1.20.5-1 allows 2FA bypass when docker login uses Basic Authentication.
https://forgejo.org/2023-11-release-v1-20-5-1/
2023-12-03T00:00:00
2023-12-03T00:00:00
2023-12-03T18:55:33.844898
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49802
The LinkedCustomFields plugin for MantisBT allows users to link values between two custom fields, creating linked drop-downs. Prior to version 2.0.1, cross-site scripting in the MantisBT LinkedCustomFields plugin allows Javascript execution, when a crafted Custom Field is linked via the plugin and displayed when reporting a new Issue or editing an existing one. This issue is fixed in version 2.0.1. As a workaround, one may utilize MantisBT's default Content Security Policy, which blocks script execution.
https://github.com/mantisbt-plugins/LinkedCustomFields/security/advisories/GHSA-2f37-9xpx-5hhw
2023-11-30T13:39:50.864Z
2023-12-11T21:11:53.407Z
2023-12-11T21:11:53.407Z
{'Vendor': 'mantisbt-plugins', 'Product': 'LinkedCustomFields', 'Versions': '< 2.0.1'}
CVE-2023-49551
An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file.
https://github.com/cesanta/mjs/issues/257
2023-11-27T00:00:00
2024-01-02T00:00:00
2024-01-02T22:31:09.601671
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49678
null
null
2023-11-29T17:48:17.254Z
2023-12-21T22:59:09.539Z
2024-01-02T19:52:25.846Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-49382
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/div/delete.
https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20the%20custom%20table.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:43:10.080488
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49228
An issue was discovered in Peplink Balance Two before 8.4.0. Console port authentication uses hard-coded credentials, which allows an attacker with physical access and sufficient knowledge to execute arbitrary commands as root.
https://www.synacktiv.com/publications%253Ffield_tags_target_id%253D4
2023-11-24T00:00:00
2023-12-28T00:00:00
2023-12-28T03:15:53.754490
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49443
DoraCMS v2.1.8 was discovered to re-use the same code for verification of valid usernames and passwords. This vulnerability allows attackers to gain access to the application via a bruteforce attack.
https://github.com/woshinibaba222/DoraCMS-Verification-Code-Reuse
2023-11-27T00:00:00
2023-12-08T00:00:00
2023-12-08T14:13:12.634291
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49855
Cross-Site Request Forgery (CSRF) vulnerability in BinaryCarpenter Menu Bar Cart Icon For WooCommerce By Binary Carpenter.This issue affects Menu Bar Cart Icon For WooCommerce By Binary Carpenter: from n/a through 1.49.3.
https://patchstack.com/database/vulnerability/bc-menu-cart-woo/wordpress-bc-menu-bar-cart-icon-for-woocommerce-by-binary-carpenter-plugin-1-49-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T17:13:03.351Z
2023-12-18T10:18:11.399Z
2023-12-18T10:18:11.399Z
{'Vendor': 'BinaryCarpenter', 'Product': 'Menu Bar Cart Icon For WooCommerce By Binary Carpenter', 'Versions': 'n/a'}
CVE-2023-49290
lestrrat-go/jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. A p2c parameter set too high in JWE's algorithm PBES2-* could lead to a denial of service. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource- intensive. Therefore, if an attacker sets the p2c parameter in JWE to a very large number, it can cause a lot of computational consumption, resulting in a denial of service. This vulnerability has been addressed in commit `64f2a229b` which has been included in release version 1.2.27 and 2.0.18. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf
2023-11-24T16:45:24.313Z
2023-12-04T23:42:53.061Z
2023-12-04T23:42:53.061Z
{'Vendor': 'lestrrat-go', 'Product': 'jwx', 'Versions': '< 1.2.27, >= 2.0.0, < 2.0.18'}
CVE-2023-49658
Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'bank_details' parameter of the party_submit.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/zimerman/
2023-11-28T21:52:11.042Z
2024-01-04T14:00:11.438Z
2024-01-04T14:00:11.438Z
{'Vendor': 'Kashipara Group', 'Product': 'Billing Software', 'Versions': '1.0'}
CVE-2023-49208
scheme/webauthn.c in Glewlwyd SSO server before 2.7.6 has a possible buffer overflow during FIDO2 credentials validation in webauthn registration.
https://github.com/babelouest/glewlwyd/commit/f9d8c06aae8dfe17e761b18b577ff169e059e812
2023-11-23T00:00:00
2023-11-23T00:00:00
2023-11-23T18:09:22.734350
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49121
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:43:13.523Z
2024-01-09T09:59:52.512Z
2024-01-09T09:59:52.512Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49434
Tenda AX9 V22.03.01.46 has been found to contain a stack overflow vulnerability in the 'list' parameter at /goform/SetNetControlList.
https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T16:05:57.032144
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49967
Typecho v1.2.1 was discovered to be vulnerable to an XML Quadratic Blowup attack via the component /index.php/action/xmlrpc.
https://github.com/typecho/typecho/issues/1648
2023-12-04T00:00:00
2023-12-07T00:00:00
2023-12-07T15:58:58.518376
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49176
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Reflected XSS.This issue affects WP Pocket URLs: from n/a through 1.0.2.
https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:21.490Z
2023-12-15T14:20:30.610Z
2023-12-15T14:20:30.610Z
{'Vendor': 'CodeRevolution', 'Product': 'WP Pocket URLs', 'Versions': 'n/a'}
CVE-2023-49463
libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc.
https://github.com/strukturag/libheif/issues/1042
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T19:37:46.148227
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49619
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer. This issue affects Apache Answer: through 1.2.0. Under normal circumstances, a user can only bookmark a question once, and will only increase the number of questions bookmarked once. However, repeat submissions through the script can increase the number of collection of the question many times. Users are recommended to upgrade to version [1.2.1], which fixes the issue.
https://lists.apache.org/thread/nscrl3c7pn68q4j73y3ottql6n5x3hd4
2023-11-28T06:34:49.463Z
2024-01-10T08:25:01.610Z
2024-01-10T08:25:01.610Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Answer', 'Versions': '0'}
CVE-2023-49863
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_webpimage` parameter.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1880
2023-11-30T18:43:03.139Z
2024-01-10T15:48:12.475Z
2024-01-10T18:00:08.822Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
CVE-2023-49160
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in formzu Inc. Formzu WP allows Stored XSS.This issue affects Formzu WP: from n/a through 1.6.6.
https://patchstack.com/database/vulnerability/formzu-wp/wordpress-formzu-wp-plugin-1-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-22T23:36:04.378Z
2023-12-15T13:54:16.677Z
2023-12-15T13:54:16.677Z
{'Vendor': 'formzu Inc.', 'Product': 'Formzu WP', 'Versions': 'n/a'}
CVE-2023-49926
app/Lib/Tools/EventTimelineTool.php in MISP before 2.4.179 allows XSS in the event timeline widget.
https://github.com/MISP/MISP/commit/dc73287ee2000476e3a5800ded402825ca10f7e8
2023-12-03T00:00:00
2023-12-03T00:00:00
2023-12-03T02:58:30.167527
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49834
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 FOX – Currency Switcher Professional for WooCommerce.This issue affects FOX – Currency Switcher Professional for WooCommerce: from n/a through 1.4.1.4.
https://patchstack.com/database/vulnerability/woocommerce-currency-switcher/wordpress-fox-currency-switcher-professional-for-woocommerce-plugin-1-4-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T17:12:29.821Z
2023-12-17T10:38:49.072Z
2023-12-17T10:38:49.072Z
{'Vendor': 'realmag777', 'Product': 'FOX – Currency Switcher Professional for WooCommerce', 'Versions': 'n/a'}
CVE-2023-49770
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Raschendorfer Smart External Link Click Monitor [Link Log] allows Stored XSS.This issue affects Smart External Link Click Monitor [Link Log]: from n/a through 5.0.2.
https://patchstack.com/database/vulnerability/link-log/wordpress-smart-external-link-click-monitor-link-log-plugin-5-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:22:54.825Z
2023-12-14T15:45:10.348Z
2023-12-14T15:45:10.348Z
{'Vendor': 'Peter Raschendorfer', 'Product': 'Smart External Link Click Monitor [Link Log]', 'Versions': 'n/a'}
CVE-2023-49398
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/delete.
https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:53:12.481941
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49377
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/tag/update.
https://github.com/cui2shark/cms/blob/main/Modification%20of%20CSRF%20in%20Label%20Management.md
2023-11-27T00:00:00
2023-12-05T00:00:00
2023-12-05T14:32:53.901451
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49674
A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3256
2023-11-29T10:34:02.383Z
2023-11-29T13:45:13.482Z
2023-11-29T13:45:13.482Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins NeuVector Vulnerability Scanner Plugin', 'Versions': '0'}
CVE-2023-49418
TOTOLink A7000R V9.1.0u.6115_B20201022has a stack overflow vulnerability via setIpPortFilterRules.
https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setIpPortFilterRules
2023-11-27T00:00:00
2023-12-11T00:00:00
2023-12-11T13:33:07.254577
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49273
Umbraco is an ASP.NET content management system (CMS). Starting in version 8.0.0 and prior to versions 8.18.10, 10.8.1, and 12.3.4, users with low privileges (Editor, etc.) are able to access some unintended endpoints. Versions 8.18.10, 10.8.1, and 12.3.4 contain a patch for this issue.
https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-cfr5-7p54-4qg8
2023-11-24T16:45:24.310Z
2023-12-12T19:05:39.361Z
2023-12-12T19:09:21.071Z
{'Vendor': 'umbraco', 'Product': 'Umbraco-CMS', 'Versions': '>= 8.0.0, < 8.18.10, >= 9.0.0-rc001, < 10.8.1, >= 11.0.0-rc1, < 12.3.4'}
CVE-2023-49766
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Ultimate Addons for Contact Form 7 allows Stored XSS.This issue affects Ultimate Addons for Contact Form 7: from n/a through 3.2.0.
https://patchstack.com/database/vulnerability/ultimate-addons-for-contact-form-7/wordpress-ultimate-addons-for-contact-form-7-plugin-3-2-0-unauthenticated-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-30T13:22:27.402Z
2023-12-14T15:42:37.230Z
2023-12-14T15:42:37.230Z
{'Vendor': 'Themefic', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': 'n/a'}
CVE-2023-38348
A CSRF issue was discovered in LWsystems Benno MailArchiv 2.10.1.
https://wiki.benno-mailarchiv.de/doku.php
2023-07-15T00:00:00
2023-08-09T00:00:00
2023-08-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38718
IBM Robotic Process Automation 21.0.0 through 21.0.7.8 could disclose sensitive information from access to RPA scripts, workflows and related data. IBM X-Force ID: 261606.
https://www.ibm.com/support/pages/node/7031619
2023-07-25T00:00:53.163Z
2023-09-20T19:12:24.102Z
2023-09-20T19:12:24.102Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
CVE-2023-38574
Open redirect vulnerability in VI Web Client prior to 7.9.6 allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.
https://downloadvi.com/downloads/IPServer/v7.9/796232/v796232RN.pdf
2023-08-25T04:25:45.902Z
2023-09-05T08:37:35.942Z
2023-09-05T08:37:35.942Z
{'Vendor': 'i-PRO Co., Ltd.', 'Product': 'VI Web Client', 'Versions': 'prior to 7.9.6'}
CVE-2023-38827
Cross Site Scripting vulnerability in Follet School Solutions Destiny v.20_0_1_AU4 and later allows a remote attacker to run arbitrary code via presentonesearchresultsform.do.
https://github.com/Oracle-Security/CVEs/tree/main/Follett%20Learning%20Solutions/Destiny/CVE-2023-38827
2023-07-25T00:00:00
2024-01-09T00:00:00
2024-01-09T21:46:51.335918
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38431
An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-08-24T18:06:20.296400
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38061
In JetBrains TeamCity before 2023.05.1 stored XSS when using a custom theme was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-07-12T12:43:55.554Z
2023-07-12T12:48:19.126Z
2023-07-12T12:48:19.126Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-38870
A SQL injection vulnerability exists in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1. The cash book has a feature to list accomplishments by category, and the 'category_id' parameter is vulnerable to SQL Injection.
https://github.com/gugoan/economizzer
2023-07-25T00:00:00
2023-09-28T00:00:00
2023-09-28T03:23:20.376214
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38489
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user. Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization. In the variation described in this advisory, it allows attackers to stay logged in to a Kirby site on another device even if the logged in user has since changed their password. Kirby did not invalidate user sessions that were created with a password that was since changed by the user or by a site admin. If a user changed their password to lock out an attacker who was already in possession of the previous password or of a login session on another device or browser, the attacker would not be reliably prevented from accessing the Kirby site as the affected user. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have updated the authentication implementation to keep track of the hashed password in each active session. If the password changed since the login, the session is invalidated. To enforce this fix even if the vulnerability was previously abused, all users are logged out from the Kirby site after updating to one of the patched releases.
https://github.com/getkirby/kirby/security/advisories/GHSA-5mvj-rvp8-rf45
2023-07-18T16:28:12.075Z
2023-07-27T14:36:46.189Z
2023-07-27T15:46:54.264Z
{'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'}
CVE-2023-38173
Microsoft Edge for Android Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38173
2023-07-12T23:41:45.863Z
2023-07-21T17:51:28.763Z
2023-12-14T19:53:02.425Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge for Android', 'Versions': '1.0.0'}
CVE-2023-38523
The web interface on multiple Samsung Harman AMX N-Series devices allows directory listing for the /tmp/ directory, without authentication, exposing sensitive information such as the command history and screenshot of the file being processed. This affects N-Series N1115 Wallplate Video Encoder before 1.15.61, N-Series N1x22A Video Encoder/Decoder before 1.15.61, N-Series N1x33A Video Encoder/Decoder before 1.15.61, N-Series N1x33 Video Encoder/Decoder before 1.15.61, N-Series N2x35 Video Encoder/Decoder before 1.15.61, N-Series N2x35A Video Encoder/Decoder before 1.15.61, N-Series N2xx2 Video Encoder/Decoder before 1.15.61, N-Series N2xx2A Video Encoder/Decoder before 1.15.61, N-Series N3000 Video Encoder/Decoder before 2.12.105, and N-Series N4321 Audio Transceiver before 1.00.06.
https://help.harmanpro.com/n1115-svsi-firmware
2023-07-19T00:00:00
2023-07-20T00:00:00
2023-07-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38466
In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.588Z
2023-09-04T01:16:10.383Z
2023-09-04T01:16:10.383Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-38935
Tenda AC1206 V15.03.06.23, AC8 V4 V16.03.34.06, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and AC9 V3.0 V15.03.06.42_multi were discovered to contain a tack overflow via the list parameter in the formSetQosBand function.
https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetQosBand/README.md
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38309
An issue was discovered in Webmin 2.021. A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the package search functionality. The vulnerability allows an attacker to inject a malicious payload in the "Search for Package" field, which gets reflected back in the application's response, leading to the execution of arbitrary JavaScript code within the context of the victim's browser.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38759
Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.
https://wger.de
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38866
COMFAST CF-XR11 V2.7.2 has a command injection vulnerability detected at function sub_415588. Attackers can send POST request messages to /usr/bin/webmgnt and inject commands into parameter interface and display_name.
https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38889
An issue in Alluxio v.2.9.3 and before allows an attacker to execute arbitrary code via a crafted script to the username parameter of lluxio.util.CommonUtils.getUnixGroups(java.lang.String).
https://github.com/Alluxio/alluxio/issues/17766
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38470
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
https://access.redhat.com/security/cve/CVE-2023-38470
2023-07-18T09:48:04.752Z
2023-11-02T14:57:28.872Z
2023-11-02T14:57:28.872Z
{'Vendor': 'n/a', 'Product': 'avahi', 'Versions': ''}
CVE-2023-38831
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
2023-07-25T00:00:00
2023-08-23T00:00:00
2023-10-23T00:10:57.118648
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38132
LAN-W451NGR all versions provided by LOGITEC CORPORATION contains an improper access control vulnerability, which allows an unauthenticated attacker to log in to telnet service.
https://www.elecom.co.jp/news/security/20230810-01/
2023-08-09T11:55:01.344Z
2023-08-18T09:38:31.606Z
2023-08-18T09:38:31.606Z
{'Vendor': 'LOGITEC CORPORATION', 'Product': 'LAN-W451NGR', 'Versions': 'all versions'}
CVE-2023-38427
An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=f1a411873c85b642f13b01f21b534c2bab81fc1b
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-08-24T18:06:21.863816
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38974
A stored cross-site scripting (XSS) vulnerability in the Edit Category function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter.
https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS4.md
2023-07-25T00:00:00
2023-08-25T00:00:00
2023-08-25T00:23:18.065579
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38325
The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.
https://github.com/pyca/cryptography/issues/9207
2023-07-14T00:00:00
2023-07-14T00:00:00
2023-08-24T18:06:38.236041
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38149
Windows TCP/IP Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38149
2023-07-12T23:41:45.860Z
2023-09-12T16:58:20.193Z
2023-12-14T20:11:36.197Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38519
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MainWP MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance.This issue affects MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance: from n/a through 4.4.3.3.
https://patchstack.com/database/vulnerability/mainwp/wordpress-mainwp-plugin-4-4-3-3-sql-injection-vulnerability?_s_id=cve
2023-07-18T17:33:34.155Z
2023-12-20T13:48:04.919Z
2023-12-20T13:48:04.919Z
{'Vendor': 'MainWP', 'Product': 'MainWP Dashboard – WordPress Manager for Multiple Websites Maintenance', 'Versions': 'n/a'}
CVE-2023-38237
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:30.548Z
2023-08-10T13:17:30.548Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38667
Stack-based buffer over-read in function disasm in nasm 2.16 allows attackers to cause a denial of service.
https://bugzilla.nasm.us/show_bug.cgi?id=3392812
2023-07-23T00:00:00
2023-08-22T00:00:00
2023-08-22T15:44:38.537089
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38688
twitch-tui provides Twitch chat in a terminal. Prior to version 2.4.1, the connection is not using TLS for communication. In the configuration of the irc connection, the software disables TLS, which makes all communication to Twitch IRC servers unencrypted. As a result, communication, including auth tokens, can be sniffed. Version 2.4.1 has a patch for this issue.
https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx
2023-07-24T16:19:28.363Z
2023-08-04T16:18:15.288Z
2023-08-04T16:18:15.288Z
{'Vendor': 'Xithrius', 'Product': 'twitch-tui', 'Versions': ' < 2.4.1'}
CVE-2023-38722
IBM Sterling Partner Engagement Manager 6.1.2, 6.2.0, and 6.2.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 262174.
https://www.ibm.com/support/pages/node/7057407
2023-07-25T00:00:53.164Z
2023-10-23T17:40:32.328Z
2023-10-23T17:40:32.328Z
{'Vendor': 'IBM', 'Product': 'Sterling Partner Engagement Manager', 'Versions': '6.1.2, 6.2.0, 6.2.2'}
CVE-2023-38958
An access control issue in ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to arbitrarily close and open the doors managed by the platform remotely via sending a crafted web request.
http://zkteco.com
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38671
Heap buffer overflow in paddle.trace in PaddlePaddle before 2.5.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.
https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md
2023-07-24T07:55:02.091Z
2023-07-26T10:59:48.778Z
2023-07-26T10:59:48.778Z
{'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'}
CVE-2023-38221
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability that could lead in arbitrary code execution by an admin-privilege authenticated attacker. Exploitation of this issue does not require user interaction and attack complexity is high as it requires knowledge of tooling beyond just using the UI.
https://helpx.adobe.com/security/products/magento/apsb23-50.html
2023-07-13T16:21:52.614Z
2023-10-13T06:15:06.405Z
2023-10-13T06:15:06.405Z
{'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'}