CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-51987 | D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords. | https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2 | 2023-12-26T00:00:00 | 2024-01-11T00:00:00 | 2024-01-11T15:30:11.402213 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51968 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function getIptvInfo. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-getIptvInfo-f5918cc2828c49e78554f456bf7d4b36 | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:22:00.276482 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51010 | An issue in the export component AdSdkH5Activity of com.sdjictec.qdmetro v4.2.2 allows attackers to open a crafted URL without any filtering or checking. | https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro | 2023-12-18T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T04:00:11.365441 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51505 | Deserialization of Untrusted Data vulnerability in realmag777 Active Products Tables for WooCommerce. Professional products tables for WooCommerce store.This issue affects Active Products Tables for WooCommerce. Professional products tables for WooCommerce store : from n/a through 1.0.6.
| https://patchstack.com/database/vulnerability/profit-products-tables-for-woocommerce/wordpress-active-products-tables-for-woocommerce-plugin-1-0-6-unauthenticated-php-object-injection-vulnerability?_s_id=cve | 2023-12-20T15:33:01.354Z | 2023-12-29T12:51:56.637Z | 2023-12-29T12:51:56.637Z | {'Vendor': 'realmag777', 'Product': 'Active Products Tables for WooCommerce. Professional products tables for WooCommerce store ', 'Versions': 'n/a'} |
CVE-2023-51417 | Unrestricted Upload of File with Dangerous Type vulnerability in Joris van Montfort JVM Gutenberg Rich Text Icons.This issue affects JVM Gutenberg Rich Text Icons: from n/a through 1.2.3.
| https://patchstack.com/database/vulnerability/jvm-rich-text-icons/wordpress-jvm-rich-text-icons-plugin-1-2-3-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-12-19T00:04:39.259Z | 2023-12-29T13:44:41.119Z | 2023-12-29T13:44:41.119Z | {'Vendor': 'Joris van Montfort', 'Product': 'JVM Gutenberg Rich Text Icons', 'Versions': 'n/a'} |
CVE-2023-51102 | Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a stack overflow via the function formWifiMacFilterSet. | https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:18:17.804863 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51381 | null | null | 2023-12-18T17:47:35.907Z | 2024-01-16T18:52:06.480Z | 2024-01-17T20:21:19.192Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-51952 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formSetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formSetIptv-d758f5dba8f646afaf5cddc6f8d3ec70 | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T14:57:34.635105 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51051 | S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_textauth parameter at /admin/ajax.php. | https://www.notion.so/scms5-0-sql-injection-94c791a563d1481a9439fa98a1bc9a1b | 2023-12-18T00:00:00 | 2023-12-21T00:00:00 | 2023-12-21T15:18:48.707773 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51397 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force WP Remote Site Search allows Stored XSS.This issue affects WP Remote Site Search: from n/a through 1.0.4.
| https://patchstack.com/database/vulnerability/wp-remote-site-search/wordpress-wp-remote-site-search-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-18T22:08:57.075Z | 2023-12-29T10:23:43.091Z | 2023-12-29T10:23:43.091Z | {'Vendor': 'Brainstorm Force', 'Product': 'WP Remote Site Search', 'Versions': 'n/a'} |
CVE-2023-51728 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the SMTP Password parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.226Z | 2024-01-17T07:02:31.923Z | 2024-01-17T07:02:31.923Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51378 | Cross-Site Request Forgery (CSRF) vulnerability in Rise Themes Rise Blocks – A Complete Gutenberg Page Builder.This issue affects Rise Blocks – A Complete Gutenberg Page Builder: from n/a through 3.1.
| https://patchstack.com/database/vulnerability/rise-blocks/wordpress-rise-blocks-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-18T15:51:57.414Z | 2023-12-29T12:08:17.011Z | 2023-12-29T12:08:17.011Z | {'Vendor': 'Rise Themes', 'Product': 'Rise Blocks – A Complete Gutenberg Page Builder', 'Versions': 'n/a'} |
CVE-2023-51006 | An issue in the openFile method of Chinese Perpetual Calendar v9.0.0 allows attackers to read any file via unspecified vectors. | https://github.com/firmianay/security-issues/tree/main/app/cn.etouch.ecalendar | 2023-12-18T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T04:00:10.099106 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51790 | Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component. | https://github.com/Piwigo/Piwigo/issues/2069 | 2023-12-26T00:00:00 | 2024-01-12T00:00:00 | 2024-01-12T12:29:09.776692 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51774 | The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode. | https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md | 2023-12-25T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T21:16:15.213156 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51959 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formGetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formGetIptv-0fcc584fcda44b1c837e42d5d732957a | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:02:22.087546 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51373 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ian Kennerley Google Photos Gallery with Shortcodes allows Reflected XSS.This issue affects Google Photos Gallery with Shortcodes: from n/a through 4.0.2.
| https://patchstack.com/database/vulnerability/google-picasa-albums-viewer/wordpress-google-photos-gallery-with-shortcodes-plugin-4-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-18T15:51:57.414Z | 2023-12-29T10:55:28.284Z | 2023-12-29T10:55:28.284Z | {'Vendor': 'Ian Kennerley', 'Product': 'Google Photos Gallery with Shortcodes', 'Versions': 'n/a'} |
CVE-2023-51723 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Description parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.226Z | 2024-01-17T06:54:46.598Z | 2024-01-17T06:54:46.598Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51735 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.227Z | 2024-01-17T07:15:02.550Z | 2024-01-17T07:15:02.550Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51277 | nbviewer-app (aka Jupyter Notebook Viewer) before 0.1.6 has the get-task-allow entitlement for release builds. | https://developer.apple.com/documentation/security/notarizing_macos_software_before_distribution/resolving_common_notarization_issues#3087731 | 2023-12-18T00:00:00 | 2024-01-05T00:00:00 | 2024-01-05T04:41:31.196246 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51963 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function setIptvInfo. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:13:42.462535 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51430 |
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.
| https://www.hihonor.com/global/security/cve-2023-51430/ | 2023-12-19T01:27:50.841Z | 2023-12-29T03:39:19.062Z | 2023-12-29T03:39:19.062Z | {'Vendor': 'Honor', 'Product': 'Magic UI', 'Versions': '6.0'} |
CVE-2023-51719 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Traceroute parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.225Z | 2024-01-17T06:48:08.326Z | 2024-01-17T06:48:08.326Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51467 | The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code
| https://ofbiz.apache.org/download.html | 2023-12-20T12:14:42.522Z | 2023-12-26T14:46:59.800Z | 2024-01-04T09:02:37.085Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache OFBiz', 'Versions': '0'} |
CVE-2023-51888 | Buffer Overflow vulnerability in the nomath() function in Mathtex v.1.05 and before allows a remote attacker to cause a denial of service via a crafted string in the application URL. | https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/ | 2023-12-26T00:00:00 | 2024-01-24T00:00:00 | 2024-01-24T17:12:12.952507 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51021 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘merge’ parameter of the setRptWizardCfg interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setRptWizardCfg-merge/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:14:38.484447 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51133 | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formRoute. | https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36 | 2023-12-18T00:00:00 | 2023-12-30T00:00:00 | 2023-12-30T15:28:12.813384 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51099 | Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formexeCommand . | https://github.com/GD008/TENDA/blob/main/W9/W9_execommand/W9_execommand.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:21:46.111723 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51426 |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.
| https://www.hihonor.com/global/security/cve-2023-51426/ | 2023-12-19T01:27:50.841Z | 2023-12-29T03:28:07.173Z | 2023-12-29T03:28:07.173Z | {'Vendor': 'Honor', 'Product': 'Magic OS', 'Versions': '7.0'} |
CVE-2023-51282 | An issue in mingSoft MCMS v.5.2.4 allows a a remote attacker to obtain sensitive information via a crafted script to the password parameter. | https://gitee.com/mingSoft/MCMS/issues/I4Q4NV | 2023-12-18T00:00:00 | 2024-01-16T00:00:00 | 2024-01-16T01:33:13.658305 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51451 | Symbolicator is a service used in Sentry. Starting in Symbolicator version 0.3.3 and prior to version 21.12.1, an attacker could make Symbolicator send GET HTTP requests to arbitrary URLs with internal IP addresses by using an invalid protocol. The responses of those requests could be exposed via Symbolicator's API. In affected Sentry instances, the data could be exposed through the Sentry API and user interface if the attacker has a registered account. The issue has been fixed in Symbolicator release 23.12.1, Sentry self-hosted release 23.12.1, and has already been mitigated on sentry.io on December 18, 2023. If updating is not possible, some other mitigations are available. One may disable JS processing by toggling the option `Allow JavaScript Source Fetching` in `Organization Settings > Security & Privacy` and/or disable all untrusted public repositories under `Project Settings > Debug Files`. Alternatively, if JavaScript and native symbolication are not required, disable Symbolicator completely in `config.yml`. | https://github.com/getsentry/symbolicator/security/advisories/GHSA-ghg9-7m82-h96r | 2023-12-19T15:19:39.615Z | 2023-12-22T21:01:21.824Z | 2023-12-22T21:01:21.824Z | {'Vendor': 'getsentry', 'Product': 'symbolicator', 'Versions': '>= 0.3.3, < 23.12.1'} |
CVE-2023-51390 | journalpump is a daemon that takes log messages from journald and pumps them to a given output. A logging vulnerability was found in journalpump which logs out the configuration of a service integration in plaintext to the supplied logging pipeline, including credential information contained in the configuration if any. The problem has been patched in journalpump 2.5.0. | https://github.com/Aiven-Open/journalpump/security/advisories/GHSA-738v-v386-8r6g | 2023-12-18T19:35:29.004Z | 2023-12-20T23:27:10.958Z | 2023-12-20T23:27:10.958Z | {'Vendor': 'Aiven-Open', 'Product': 'journalpump', 'Versions': '< 2.5.0'} |
CVE-2023-51406 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ninja Team FastDup – Fastest WordPress Migration & Duplicator.This issue affects FastDup – Fastest WordPress Migration & Duplicator: from n/a through 2.1.7.
| https://patchstack.com/database/vulnerability/fastdup/wordpress-fastdup-plugin-2-1-7-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | 2023-12-18T22:41:07.588Z | 2024-01-08T20:41:36.337Z | 2024-01-08T20:41:36.337Z | {'Vendor': 'Ninja Team', 'Product': 'FastDup – Fastest WordPress Migration & Duplicator', 'Versions': 'n/a'} |
CVE-2023-51955 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formSetIptv-d758f5dba8f646afaf5cddc6f8d3ec70 | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T14:50:57.975770 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51810 | SQL injection vulnerability in StackIdeas EasyDiscuss v.5.0.5 and fixed in v.5.0.10 allows a remote attacker to obtain sensitive information via a crafted request to the search parameter in the Users module. | http://easydiscuss.com | 2023-12-26T00:00:00 | 2024-01-16T00:00:00 | 2024-01-16T00:45:23.336651 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51386 | Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0. | https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-p7w3-j66h-m7mx | 2023-12-18T19:35:29.003Z | 2023-12-22T21:58:58.714Z | 2023-12-22T21:58:58.714Z | {'Vendor': 'awslabs', 'Product': 'sandbox-accounts-for-events', 'Versions': '< 1.1.0'} |
CVE-2023-51739 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Device Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.227Z | 2024-01-17T07:20:42.601Z | 2024-01-17T07:20:42.601Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51410 | Unrestricted Upload of File with Dangerous Type vulnerability in WPVibes WP Mail Log.This issue affects WP Mail Log: from n/a through 1.1.2.
| https://patchstack.com/database/vulnerability/wp-mail-log/wordpress-wp-mail-log-plugin-1-1-2-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-12-18T22:41:07.589Z | 2023-12-29T13:53:24.643Z | 2023-12-29T13:53:24.643Z | {'Vendor': 'WPVibes', 'Product': 'WP Mail Log', 'Versions': 'n/a'} |
CVE-2023-51105 | A floating point exception (divide-by-zero) vulnerability was discovered in mupdf 1.23.4 in function bmp_decompress_rle4() of load-bmp.c. | https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T14:18:57.517888 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51806 | File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file. | https://www.ujcms.com/ | 2023-12-26T00:00:00 | 2024-01-12T00:00:00 | 2024-01-12T12:23:01.308544 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51781 | An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8 | 2023-12-25T00:00:00 | 2023-12-25T00:00:00 | 2024-01-11T21:06:24.776598 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51017 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanIp parameter’ of the setLanConfig interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanIp/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:20:36.011472 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51502 | Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.6.1.
| https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-1-unauthenticated-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-12-20T15:33:01.354Z | 2024-01-05T07:56:31.944Z | 2024-01-05T07:56:31.944Z | {'Vendor': 'WooCommerce', 'Product': 'WooCommerce Stripe Payment Gateway', 'Versions': 'n/a'} |
CVE-2023-51650 | Hertzbeat is an open source, real-time monitoring system. Prior to version 1.4.1, Spring Boot permission configuration issues caused unauthorized access vulnerabilities to three interfaces. This could result in disclosure of sensitive server information. Version 1.4.1 fixes this issue.
| https://github.com/dromara/hertzbeat/security/advisories/GHSA-rrc5-qpxr-5jm2 | 2023-12-20T22:12:04.737Z | 2023-12-22T20:56:37.097Z | 2023-12-22T20:56:37.097Z | {'Vendor': 'dromara', 'Product': 'hertzbeat', 'Versions': '< 1.4.1'} |
CVE-2023-51200 | An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials. | https://github.com/16yashpatel/CVE-2023-51200 | 2023-12-18T00:00:00 | 2024-01-23T00:00:00 | 2024-01-23T20:57:23.036046 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51742 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Add Downstream Frequency parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform a Denial of Service (DoS) attack on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.228Z | 2024-01-17T07:57:14.510Z | 2024-01-17T07:57:14.510Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51257 | An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code. | https://github.com/jasper-software/jasper/issues/367 | 2023-12-18T00:00:00 | 2024-01-16T00:00:00 | 2024-01-24T03:06:25.598631 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51892 | An issue in weaver e-cology v.10.0.2310.01 allows a remote attacker to execute arbitrary code via a crafted script to the FrameworkShellController component. | http://e-cology.com | 2023-12-26T00:00:00 | 2024-01-20T00:00:00 | 2024-01-20T01:00:23.595728 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51538 | Cross-Site Request Forgery (CSRF) vulnerability in Awesome Support Team Awesome Support – WordPress HelpDesk & Support Plugin.This issue affects Awesome Support – WordPress HelpDesk & Support Plugin: from n/a through 6.1.5.
| https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-20T18:46:01.364Z | 2024-01-05T09:47:18.840Z | 2024-01-05T09:47:18.840Z | {'Vendor': 'Awesome Support Team', 'Product': 'Awesome Support – WordPress HelpDesk & Support Plugin', 'Versions': 'n/a'} |
CVE-2023-51095 | Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow via the function formDelWlRfPolicy. | https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:07:28.264432 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51094 | Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet. | https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:09:53.613658 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51978 | In PHPGurukul Art Gallery Management System v1.1, "Update Artist Image" functionality of "imageid" parameter is vulnerable to SQL Injection. | https://github.com/hackerhijeck/Exploited/blob/main/Art_Gallary/SQL_Injection.md | 2023-12-26T00:00:00 | 2024-01-12T00:00:00 | 2024-01-12T16:00:10.621533 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51702 | Since version 5.2.0, when using deferrable mode with the path of a Kubernetes configuration file for authentication, the Airflow worker serializes this configuration file as a dictionary and sends it to the triggerer by storing it in metadata without any encryption. Additionally, if used with an Airflow version between 2.3.0 and 2.6.0, the configuration dictionary will be logged as plain text in the triggerer service without masking. This allows anyone with access to the metadata or triggerer log to obtain the configuration file and use it to access the Kubernetes cluster.
This behavior was changed in version 7.0.0, which stopped serializing the file contents and started providing the file path instead to read the contents into the trigger. Users are recommended to upgrade to version 7.0.0, which fixes this issue. | https://github.com/apache/airflow/pull/29498 | 2023-12-21T22:59:06.988Z | 2024-01-24T12:56:17.869Z | 2024-01-24T12:56:17.869Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow CNCF Kubernetes provider', 'Versions': '5.2.0'} |
CVE-2023-51217 | An issue discovered in TenghuTOS TWS-200 firmware version:V4.0-201809201424 allows a remote attacker to execute arbitrary code via crafted command on the ping page component. | https://github.com/websafe2021/CVE/blob/main/TenghuTOS-TWS-200.md | 2023-12-18T00:00:00 | 2024-01-18T00:00:00 | 2024-01-18T20:46:05.073997 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51539 | Cross-Site Request Forgery (CSRF) vulnerability in Apollo13Themes Apollo13 Framework Extensions.This issue affects Apollo13 Framework Extensions: from n/a through 1.9.1.
| https://patchstack.com/database/vulnerability/apollo13-framework-extensions/wordpress-apollo13-framework-extensions-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-20T19:26:40.706Z | 2024-01-05T09:44:29.762Z | 2024-01-05T09:44:29.762Z | {'Vendor': 'Apollo13Themes', 'Product': 'Apollo13 Framework Extensions', 'Versions': 'n/a'} |
CVE-2023-51885 | Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via the length of the LaTeX string component. | https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/ | 2023-12-26T00:00:00 | 2024-01-24T00:00:00 | 2024-01-24T16:56:10.156539 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51743 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Set Upstream Channel ID (UCID) parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform a Denial of Service (DoS) attack on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.229Z | 2024-01-17T08:00:11.223Z | 2024-01-17T08:00:11.223Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51714 | An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check. | https://codereview.qt-project.org/c/qt/qtbase/+/524864 | 2023-12-22T00:00:00 | 2023-12-24T00:00:00 | 2023-12-24T20:27:31.747018 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51651 | AWS SDK for PHP is the Amazon Web Services software development kit for PHP. Within the scope of requests to S3 object keys and/or prefixes containing a Unix double-dot, a URI path traversal is possible. The issue exists in the `buildEndpoint` method in the RestSerializer component of the AWS SDK for PHP v3 prior to 3.288.1. The `buildEndpoint` method relies on the Guzzle Psr7 UriResolver utility, which strips dot segments from the request path in accordance with RFC 3986. Under certain conditions, this could lead to an arbitrary object being accessed. This issue has been patched in version 3.288.1. | https://github.com/aws/aws-sdk-php/security/advisories/GHSA-557v-xcg6-rm5m | 2023-12-20T22:12:04.737Z | 2023-12-22T21:03:00.825Z | 2024-01-08T15:45:25.963Z | {'Vendor': 'aws', 'Product': 'aws-sdk-php', 'Versions': '>= 3.0.0, < 3.288.1'} |
CVE-2023-51201 | Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack. | https://github.com/16yashpatel/CVE-2023-51201 | 2023-12-18T00:00:00 | 2024-01-23T00:00:00 | 2024-01-23T21:46:52.234857 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51016 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the setRebootScheCfg interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/10/EX1800T/TOTOlink%20EX1800T_V9.1.0cu.2112_B20220316%28setRebootScheCfg%29/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:23:06.147621 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51503 | Authorization Bypass Through User-Controlled Key vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 6.9.2.
| https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woopayments-plugin-6-6-2-unauthenticated-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-12-20T15:33:01.354Z | 2023-12-31T17:59:28.385Z | 2023-12-31T17:59:28.385Z | {'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'} |
CVE-2023-51780 | An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition. | https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3 | 2023-12-25T00:00:00 | 2023-12-25T00:00:00 | 2024-01-11T21:06:23.204643 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51411 | Unrestricted Upload of File with Dangerous Type vulnerability in Shabti Kaplan Frontend Admin by DynamiApps.This issue affects Frontend Admin by DynamiApps: from n/a through 3.18.3.
| https://patchstack.com/database/vulnerability/acf-frontend-form-element/wordpress-frontend-admin-by-dynamiapps-plugin-3-18-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-12-18T22:41:07.589Z | 2023-12-29T13:50:21.393Z | 2023-12-29T13:50:21.393Z | {'Vendor': 'Shabti Kaplan', 'Product': 'Frontend Admin by DynamiApps', 'Versions': 'n/a'} |
CVE-2023-51104 | A floating point exception (divide-by-zero) vulnerability was discovered in mupdf 1.23.4 in functon pnm_binary_read_image() of load-pnm.c line 527. | https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T14:24:53.133948 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51807 | Cross Site Scripting vulnerability in OFCMS v.1.14 allows a remote attacker to obtain sensitive information via a crafted payload to the title addition component. | https://gitee.com/oufu/ofcms | 2023-12-26T00:00:00 | 2024-01-16T00:00:00 | 2024-01-16T22:15:42.535116 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51387 | Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1. | https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj | 2023-12-18T19:35:29.003Z | 2023-12-22T20:46:29.236Z | 2023-12-22T20:46:29.236Z | {'Vendor': 'dromara', 'Product': 'hertzbeat', 'Versions': '< 1.4.1'} |
CVE-2023-51738 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Network Name (SSID) parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.227Z | 2024-01-17T07:19:23.523Z | 2024-01-17T07:19:23.523Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51954 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formSetIptv-d758f5dba8f646afaf5cddc6f8d3ec70 | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T14:54:17.129467 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51779 | bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition. | https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768 | 2023-12-25T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T23:35:44.906244 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51098 | Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formSetDiagnoseInfo . | https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:22:59.161372 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51427 |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.
| https://www.hihonor.com/global/security/cve-2023-51427/ | 2023-12-19T01:27:50.841Z | 2023-12-29T03:30:31.955Z | 2023-12-29T03:30:31.955Z | {'Vendor': 'Honor', 'Product': 'Magic OS', 'Versions': '7.0'} |
CVE-2023-51535 | Cross-Site Request Forgery (CSRF) vulnerability in СleanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20.
| https://patchstack.com/database/vulnerability/cleantalk-spam-protect/wordpress-spam-protection-anti-spam-firewall-by-cleantalk-plugin-6-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-12-20T18:46:01.364Z | 2024-01-05T09:57:44.974Z | 2024-01-05T09:57:44.974Z | {'Vendor': 'СleanTalk - Anti-Spam Protection', 'Product': 'Spam protection, Anti-Spam, FireWall by CleanTalk', 'Versions': 'n/a'} |
CVE-2023-51889 | Stack Overflow vulnerability in the validate() function in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in the application URL. | https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/ | 2023-12-26T00:00:00 | 2024-01-24T00:00:00 | 2024-01-24T17:15:05.392989 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51470 | Deserialization of Untrusted Data vulnerability in Jacques Malgrange Rencontre – Dating Site.This issue affects Rencontre – Dating Site: from n/a through 3.11.1.
| https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-11-1-authenticated-php-object-injection-vulnerability?_s_id=cve | 2023-12-20T15:31:58.310Z | 2023-12-29T12:55:43.526Z | 2023-12-29T12:55:43.526Z | {'Vendor': 'Jacques Malgrange', 'Product': 'Rencontre – Dating Site', 'Versions': 'n/a'} |
CVE-2023-51020 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘langType’ parameter of the setLanguageCfg interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langType/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:15:55.678685 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51962 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:24:54.260673 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51431 |
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.
| https://www.hihonor.com/global/security/cve-2023-51431/ | 2023-12-19T01:27:50.841Z | 2023-12-29T03:43:09.979Z | 2023-12-29T03:43:09.979Z | {'Vendor': 'Honor', 'Product': 'com.hihonor.phoneservice\t', 'Versions': '11.0.0.241'} |
CVE-2023-51763 | csv_builder.rb in ActiveAdmin (aka Active Admin) before 3.2.0 allows CSV injection. | https://github.com/activeadmin/activeadmin/commit/697be2b183491beadc8f0b7d8b5bfb44f2387909 | 2023-12-24T00:00:00 | 2023-12-24T00:00:00 | 2023-12-24T03:25:35.537322 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51734 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Identity parameter under Remote endpoint settings at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.227Z | 2024-01-17T07:13:09.597Z | 2024-01-17T07:13:09.597Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51688 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in impleCode eCommerce Product Catalog Plugin for WordPress.This issue affects eCommerce Product Catalog Plugin for WordPress: from n/a through 3.3.26.
| https://patchstack.com/database/vulnerability/ecommerce-product-catalog/wordpress-ecommerce-product-catalog-plugin-for-wordpress-plugin-3-3-26-sensitive-data-exposure-vulnerability?_s_id=cve | 2023-12-21T18:32:24.433Z | 2023-12-29T14:53:55.107Z | 2023-12-29T14:53:55.107Z | {'Vendor': 'impleCode', 'Product': 'eCommerce Product Catalog Plugin for WordPress', 'Versions': 'n/a'} |
CVE-2023-51372 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HashBar – WordPress Notification Bar allows Stored XSS.This issue affects HashBar – WordPress Notification Bar: from n/a through 1.4.1.
| https://patchstack.com/database/vulnerability/hashbar-wp-notification-bar/wordpress-hashbar-wordpress-notification-bar-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-18T15:51:57.414Z | 2023-12-29T10:52:53.644Z | 2023-12-29T10:52:53.644Z | {'Vendor': 'HasThemes', 'Product': 'HashBar – WordPress Notification Bar', 'Versions': 'n/a'} |
CVE-2023-51722 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 3 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.226Z | 2024-01-17T06:52:36.357Z | 2024-01-17T06:52:36.357Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51958 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formGetIptv-0fcc584fcda44b1c837e42d5d732957a | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:07:56.790120 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51775 | The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. | https://bitbucket.org/b_c/jose4j/issues/212 | 2023-12-25T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T21:16:04.514276 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51074 | json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method. | https://github.com/json-path/JsonPath/issues/973 | 2023-12-18T00:00:00 | 2023-12-27T00:00:00 | 2023-12-27T20:56:22.383078 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51473 | Unrestricted Upload of File with Dangerous Type vulnerability in Pixelemu TerraClassifieds – Simple Classifieds Plugin.This issue affects TerraClassifieds – Simple Classifieds Plugin: from n/a through 2.0.3.
| https://patchstack.com/database/vulnerability/terraclassifieds/wordpress-terraclassifieds-plugin-2-0-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-12-20T15:31:58.310Z | 2023-12-29T13:12:04.457Z | 2023-12-29T13:12:04.457Z | {'Vendor': 'Pixelemu', 'Product': 'TerraClassifieds – Simple Classifieds Plugin', 'Versions': 'n/a'} |
CVE-2023-51023 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to arbitrary command execution in the ‘host_time’ parameter of the NTPSyncWithHost interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031NTPSyncWithHost-host_time/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:12:02.731821 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51035 | TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface. | https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:43:41.676433 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51432 |
Some Honor products are affected by out of bounds read vulnerability, successful exploitation could cause information leak.
| https://www.hihonor.com/global/security/cve-2023-51432/ | 2023-12-19T01:27:50.842Z | 2023-12-29T03:45:42.193Z | 2023-12-29T03:45:42.193Z | {'Vendor': 'Honor', 'Product': 'Magic UI', 'Versions': '6.0'} |
CVE-2023-51062 | An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command. | https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md | 2023-12-18T00:00:00 | 2024-01-13T00:00:00 | 2024-01-13T03:57:08.553837 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51961 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formGetIptv-0fcc584fcda44b1c837e42d5d732957a | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T14:59:32.356690 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51127 | FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file. | https://github.com/risuxx/CVE-2023-51127 | 2023-12-18T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T20:45:19.455612 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51449 | Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0. | https://github.com/gradio-app/gradio/security/advisories/GHSA-6qm2-wpxq-7qh2 | 2023-12-19T15:19:39.615Z | 2023-12-22T20:58:36.185Z | 2023-12-22T20:58:36.185Z | {'Vendor': 'gradio-app', 'Product': 'gradio', 'Versions': '< 4.11.0'} |
CVE-2023-51019 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘key5g’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-key5g/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:17:51.266498 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51737 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Preshared Phrase parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.227Z | 2024-01-17T07:17:52.170Z | 2024-01-17T07:17:52.170Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51371 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bit Assist Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget allows Stored XSS.This issue affects Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget: from n/a through 1.1.9.
| https://patchstack.com/database/vulnerability/bit-assist/wordpress-chat-button-plugin-1-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-18T15:51:57.414Z | 2023-12-29T10:58:40.309Z | 2023-12-29T10:58:40.309Z | {'Vendor': 'Bit Assist', 'Product': 'Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget', 'Versions': 'n/a'} |
CVE-2023-51721 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 2 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.226Z | 2024-01-17T06:51:49.772Z | 2024-01-17T06:51:49.772Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51664 | tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade. | https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63 | 2023-12-21T14:14:26.224Z | 2023-12-27T16:58:31.908Z | 2023-12-27T16:58:31.908Z | {'Vendor': 'tj-actions', 'Product': 'changed-files', 'Versions': '< 41.0.0'} |
CVE-2023-51408 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StudioWombat WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce.This issue affects WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce: from n/a through 1.4.3.
| https://patchstack.com/database/vulnerability/wp-optin-wheel/wordpress-wp-optin-wheel-plugin-1-4-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve | 2023-12-18T22:41:07.589Z | 2024-01-08T20:36:04.132Z | 2024-01-08T20:36:04.132Z | {'Vendor': 'StudioWombat', 'Product': 'WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.