CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-51987
D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords.
https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2
2023-12-26T00:00:00
2024-01-11T00:00:00
2024-01-11T15:30:11.402213
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51968
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function getIptvInfo.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-getIptvInfo-f5918cc2828c49e78554f456bf7d4b36
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:22:00.276482
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51010
An issue in the export component AdSdkH5Activity of com.sdjictec.qdmetro v4.2.2 allows attackers to open a crafted URL without any filtering or checking.
https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro
2023-12-18T00:00:00
2023-12-28T00:00:00
2023-12-28T04:00:11.365441
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51505
Deserialization of Untrusted Data vulnerability in realmag777 Active Products Tables for WooCommerce. Professional products tables for WooCommerce store.This issue affects Active Products Tables for WooCommerce. Professional products tables for WooCommerce store : from n/a through 1.0.6.
https://patchstack.com/database/vulnerability/profit-products-tables-for-woocommerce/wordpress-active-products-tables-for-woocommerce-plugin-1-0-6-unauthenticated-php-object-injection-vulnerability?_s_id=cve
2023-12-20T15:33:01.354Z
2023-12-29T12:51:56.637Z
2023-12-29T12:51:56.637Z
{'Vendor': 'realmag777', 'Product': 'Active Products Tables for WooCommerce. Professional products tables for WooCommerce store ', 'Versions': 'n/a'}
CVE-2023-51417
Unrestricted Upload of File with Dangerous Type vulnerability in Joris van Montfort JVM Gutenberg Rich Text Icons.This issue affects JVM Gutenberg Rich Text Icons: from n/a through 1.2.3.
https://patchstack.com/database/vulnerability/jvm-rich-text-icons/wordpress-jvm-rich-text-icons-plugin-1-2-3-arbitrary-file-upload-vulnerability?_s_id=cve
2023-12-19T00:04:39.259Z
2023-12-29T13:44:41.119Z
2023-12-29T13:44:41.119Z
{'Vendor': 'Joris van Montfort', 'Product': 'JVM Gutenberg Rich Text Icons', 'Versions': 'n/a'}
CVE-2023-51102
Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a stack overflow via the function formWifiMacFilterSet.
https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:18:17.804863
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51381
null
null
2023-12-18T17:47:35.907Z
2024-01-16T18:52:06.480Z
2024-01-17T20:21:19.192Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-51952
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formSetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formSetIptv-d758f5dba8f646afaf5cddc6f8d3ec70
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T14:57:34.635105
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51051
S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_textauth parameter at /admin/ajax.php.
https://www.notion.so/scms5-0-sql-injection-94c791a563d1481a9439fa98a1bc9a1b
2023-12-18T00:00:00
2023-12-21T00:00:00
2023-12-21T15:18:48.707773
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51397
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force WP Remote Site Search allows Stored XSS.This issue affects WP Remote Site Search: from n/a through 1.0.4.
https://patchstack.com/database/vulnerability/wp-remote-site-search/wordpress-wp-remote-site-search-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-18T22:08:57.075Z
2023-12-29T10:23:43.091Z
2023-12-29T10:23:43.091Z
{'Vendor': 'Brainstorm Force', 'Product': 'WP Remote Site Search', 'Versions': 'n/a'}
CVE-2023-51728
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the SMTP Password parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.226Z
2024-01-17T07:02:31.923Z
2024-01-17T07:02:31.923Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51378
Cross-Site Request Forgery (CSRF) vulnerability in Rise Themes Rise Blocks – A Complete Gutenberg Page Builder.This issue affects Rise Blocks – A Complete Gutenberg Page Builder: from n/a through 3.1.
https://patchstack.com/database/vulnerability/rise-blocks/wordpress-rise-blocks-plugin-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-18T15:51:57.414Z
2023-12-29T12:08:17.011Z
2023-12-29T12:08:17.011Z
{'Vendor': 'Rise Themes', 'Product': 'Rise Blocks – A Complete Gutenberg Page Builder', 'Versions': 'n/a'}
CVE-2023-51006
An issue in the openFile method of Chinese Perpetual Calendar v9.0.0 allows attackers to read any file via unspecified vectors.
https://github.com/firmianay/security-issues/tree/main/app/cn.etouch.ecalendar
2023-12-18T00:00:00
2023-12-28T00:00:00
2023-12-28T04:00:10.099106
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51790
Cross Site Scripting vulnerability in piwigo v.14.0.0 allows a remote attacker to obtain sensitive information via the lang parameter in the Admin Tools plug-in component.
https://github.com/Piwigo/Piwigo/issues/2069
2023-12-26T00:00:00
2024-01-12T00:00:00
2024-01-12T12:29:09.776692
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51774
The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode.
https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
2023-12-25T00:00:00
2023-12-25T00:00:00
2023-12-25T21:16:15.213156
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51959
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the function formGetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formGetIptv-0fcc584fcda44b1c837e42d5d732957a
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:02:22.087546
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51373
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ian Kennerley Google Photos Gallery with Shortcodes allows Reflected XSS.This issue affects Google Photos Gallery with Shortcodes: from n/a through 4.0.2.
https://patchstack.com/database/vulnerability/google-picasa-albums-viewer/wordpress-google-photos-gallery-with-shortcodes-plugin-4-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-18T15:51:57.414Z
2023-12-29T10:55:28.284Z
2023-12-29T10:55:28.284Z
{'Vendor': 'Ian Kennerley', 'Product': 'Google Photos Gallery with Shortcodes', 'Versions': 'n/a'}
CVE-2023-51723
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Description parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.226Z
2024-01-17T06:54:46.598Z
2024-01-17T06:54:46.598Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51735
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Pre-shared key parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.227Z
2024-01-17T07:15:02.550Z
2024-01-17T07:15:02.550Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51277
nbviewer-app (aka Jupyter Notebook Viewer) before 0.1.6 has the get-task-allow entitlement for release builds.
https://developer.apple.com/documentation/security/notarizing_macos_software_before_distribution/resolving_common_notarization_issues#3087731
2023-12-18T00:00:00
2024-01-05T00:00:00
2024-01-05T04:41:31.196246
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51963
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the function setIptvInfo.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:13:42.462535
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51430
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.
https://www.hihonor.com/global/security/cve-2023-51430/
2023-12-19T01:27:50.841Z
2023-12-29T03:39:19.062Z
2023-12-29T03:39:19.062Z
{'Vendor': 'Honor', 'Product': 'Magic UI', 'Versions': '6.0'}
CVE-2023-51719
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Traceroute parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.225Z
2024-01-17T06:48:08.326Z
2024-01-17T06:48:08.326Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51467
The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code
https://ofbiz.apache.org/download.html
2023-12-20T12:14:42.522Z
2023-12-26T14:46:59.800Z
2024-01-04T09:02:37.085Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OFBiz', 'Versions': '0'}
CVE-2023-51888
Buffer Overflow vulnerability in the nomath() function in Mathtex v.1.05 and before allows a remote attacker to cause a denial of service via a crafted string in the application URL.
https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
2023-12-26T00:00:00
2024-01-24T00:00:00
2024-01-24T17:12:12.952507
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51021
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘merge’ parameter of the setRptWizardCfg interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setRptWizardCfg-merge/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:14:38.484447
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51133
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formRoute.
https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36
2023-12-18T00:00:00
2023-12-30T00:00:00
2023-12-30T15:28:12.813384
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51099
Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formexeCommand .
https://github.com/GD008/TENDA/blob/main/W9/W9_execommand/W9_execommand.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:21:46.111723
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51426
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.
https://www.hihonor.com/global/security/cve-2023-51426/
2023-12-19T01:27:50.841Z
2023-12-29T03:28:07.173Z
2023-12-29T03:28:07.173Z
{'Vendor': 'Honor', 'Product': 'Magic OS', 'Versions': '7.0'}
CVE-2023-51282
An issue in mingSoft MCMS v.5.2.4 allows a a remote attacker to obtain sensitive information via a crafted script to the password parameter.
https://gitee.com/mingSoft/MCMS/issues/I4Q4NV
2023-12-18T00:00:00
2024-01-16T00:00:00
2024-01-16T01:33:13.658305
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51451
Symbolicator is a service used in Sentry. Starting in Symbolicator version 0.3.3 and prior to version 21.12.1, an attacker could make Symbolicator send GET HTTP requests to arbitrary URLs with internal IP addresses by using an invalid protocol. The responses of those requests could be exposed via Symbolicator's API. In affected Sentry instances, the data could be exposed through the Sentry API and user interface if the attacker has a registered account. The issue has been fixed in Symbolicator release 23.12.1, Sentry self-hosted release 23.12.1, and has already been mitigated on sentry.io on December 18, 2023. If updating is not possible, some other mitigations are available. One may disable JS processing by toggling the option `Allow JavaScript Source Fetching` in `Organization Settings > Security & Privacy` and/or disable all untrusted public repositories under `Project Settings > Debug Files`. Alternatively, if JavaScript and native symbolication are not required, disable Symbolicator completely in `config.yml`.
https://github.com/getsentry/symbolicator/security/advisories/GHSA-ghg9-7m82-h96r
2023-12-19T15:19:39.615Z
2023-12-22T21:01:21.824Z
2023-12-22T21:01:21.824Z
{'Vendor': 'getsentry', 'Product': 'symbolicator', 'Versions': '>= 0.3.3, < 23.12.1'}
CVE-2023-51390
journalpump is a daemon that takes log messages from journald and pumps them to a given output. A logging vulnerability was found in journalpump which logs out the configuration of a service integration in plaintext to the supplied logging pipeline, including credential information contained in the configuration if any. The problem has been patched in journalpump 2.5.0.
https://github.com/Aiven-Open/journalpump/security/advisories/GHSA-738v-v386-8r6g
2023-12-18T19:35:29.004Z
2023-12-20T23:27:10.958Z
2023-12-20T23:27:10.958Z
{'Vendor': 'Aiven-Open', 'Product': 'journalpump', 'Versions': '< 2.5.0'}
CVE-2023-51406
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Ninja Team FastDup – Fastest WordPress Migration & Duplicator.This issue affects FastDup – Fastest WordPress Migration & Duplicator: from n/a through 2.1.7.
https://patchstack.com/database/vulnerability/fastdup/wordpress-fastdup-plugin-2-1-7-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
2023-12-18T22:41:07.588Z
2024-01-08T20:41:36.337Z
2024-01-08T20:41:36.337Z
{'Vendor': 'Ninja Team', 'Product': 'FastDup – Fastest WordPress Migration & Duplicator', 'Versions': 'n/a'}
CVE-2023-51955
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formSetIptv-d758f5dba8f646afaf5cddc6f8d3ec70
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T14:50:57.975770
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51810
SQL injection vulnerability in StackIdeas EasyDiscuss v.5.0.5 and fixed in v.5.0.10 allows a remote attacker to obtain sensitive information via a crafted request to the search parameter in the Users module.
http://easydiscuss.com
2023-12-26T00:00:00
2024-01-16T00:00:00
2024-01-16T00:45:23.336651
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51386
Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0.
https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-p7w3-j66h-m7mx
2023-12-18T19:35:29.003Z
2023-12-22T21:58:58.714Z
2023-12-22T21:58:58.714Z
{'Vendor': 'awslabs', 'Product': 'sandbox-accounts-for-events', 'Versions': '< 1.1.0'}
CVE-2023-51739
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Device Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.227Z
2024-01-17T07:20:42.601Z
2024-01-17T07:20:42.601Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51410
Unrestricted Upload of File with Dangerous Type vulnerability in WPVibes WP Mail Log.This issue affects WP Mail Log: from n/a through 1.1.2.
https://patchstack.com/database/vulnerability/wp-mail-log/wordpress-wp-mail-log-plugin-1-1-2-arbitrary-file-upload-vulnerability?_s_id=cve
2023-12-18T22:41:07.589Z
2023-12-29T13:53:24.643Z
2023-12-29T13:53:24.643Z
{'Vendor': 'WPVibes', 'Product': 'WP Mail Log', 'Versions': 'n/a'}
CVE-2023-51105
A floating point exception (divide-by-zero) vulnerability was discovered in mupdf 1.23.4 in function bmp_decompress_rle4() of load-bmp.c.
https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T14:18:57.517888
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51806
File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file.
https://www.ujcms.com/
2023-12-26T00:00:00
2024-01-12T00:00:00
2024-01-12T12:23:01.308544
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51781
An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
2023-12-25T00:00:00
2023-12-25T00:00:00
2024-01-11T21:06:24.776598
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51017
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanIp parameter’ of the setLanConfig interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanIp/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:20:36.011472
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51502
Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.6.1.
https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-gateway-plugin-7-6-1-unauthenticated-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-12-20T15:33:01.354Z
2024-01-05T07:56:31.944Z
2024-01-05T07:56:31.944Z
{'Vendor': 'WooCommerce', 'Product': 'WooCommerce Stripe Payment Gateway', 'Versions': 'n/a'}
CVE-2023-51650
Hertzbeat is an open source, real-time monitoring system. Prior to version 1.4.1, Spring Boot permission configuration issues caused unauthorized access vulnerabilities to three interfaces. This could result in disclosure of sensitive server information. Version 1.4.1 fixes this issue.
https://github.com/dromara/hertzbeat/security/advisories/GHSA-rrc5-qpxr-5jm2
2023-12-20T22:12:04.737Z
2023-12-22T20:56:37.097Z
2023-12-22T20:56:37.097Z
{'Vendor': 'dromara', 'Product': 'hertzbeat', 'Versions': '< 1.4.1'}
CVE-2023-51200
An issue in the default configurations of ROS2 Foxy Fitzroy ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows unauthenticated attackers to authenticate using default credentials.
https://github.com/16yashpatel/CVE-2023-51200
2023-12-18T00:00:00
2024-01-23T00:00:00
2024-01-23T20:57:23.036046
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51742
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Add Downstream Frequency parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform a Denial of Service (DoS) attack on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.228Z
2024-01-17T07:57:14.510Z
2024-01-17T07:57:14.510Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51257
An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code.
https://github.com/jasper-software/jasper/issues/367
2023-12-18T00:00:00
2024-01-16T00:00:00
2024-01-24T03:06:25.598631
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51892
An issue in weaver e-cology v.10.0.2310.01 allows a remote attacker to execute arbitrary code via a crafted script to the FrameworkShellController component.
http://e-cology.com
2023-12-26T00:00:00
2024-01-20T00:00:00
2024-01-20T01:00:23.595728
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51538
Cross-Site Request Forgery (CSRF) vulnerability in Awesome Support Team Awesome Support – WordPress HelpDesk & Support Plugin.This issue affects Awesome Support – WordPress HelpDesk & Support Plugin: from n/a through 6.1.5.
https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-20T18:46:01.364Z
2024-01-05T09:47:18.840Z
2024-01-05T09:47:18.840Z
{'Vendor': 'Awesome Support Team', 'Product': 'Awesome Support – WordPress HelpDesk & Support Plugin', 'Versions': 'n/a'}
CVE-2023-51095
Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow via the function formDelWlRfPolicy.
https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:07:28.264432
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51094
Tenda M3 V1.0.0.12(4856) was discovered to contain a Command Execution vulnerability via the function TendaTelnet.
https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:09:53.613658
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51978
In PHPGurukul Art Gallery Management System v1.1, "Update Artist Image" functionality of "imageid" parameter is vulnerable to SQL Injection.
https://github.com/hackerhijeck/Exploited/blob/main/Art_Gallary/SQL_Injection.md
2023-12-26T00:00:00
2024-01-12T00:00:00
2024-01-12T16:00:10.621533
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51702
Since version 5.2.0, when using deferrable mode with the path of a Kubernetes configuration file for authentication, the Airflow worker serializes this configuration file as a dictionary and sends it to the triggerer by storing it in metadata without any encryption. Additionally, if used with an Airflow version between 2.3.0 and 2.6.0, the configuration dictionary will be logged as plain text in the triggerer service without masking. This allows anyone with access to the metadata or triggerer log to obtain the configuration file and use it to access the Kubernetes cluster. This behavior was changed in version 7.0.0, which stopped serializing the file contents and started providing the file path instead to read the contents into the trigger. Users are recommended to upgrade to version 7.0.0, which fixes this issue.
https://github.com/apache/airflow/pull/29498
2023-12-21T22:59:06.988Z
2024-01-24T12:56:17.869Z
2024-01-24T12:56:17.869Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow CNCF Kubernetes provider', 'Versions': '5.2.0'}
CVE-2023-51217
An issue discovered in TenghuTOS TWS-200 firmware version:V4.0-201809201424 allows a remote attacker to execute arbitrary code via crafted command on the ping page component.
https://github.com/websafe2021/CVE/blob/main/TenghuTOS-TWS-200.md
2023-12-18T00:00:00
2024-01-18T00:00:00
2024-01-18T20:46:05.073997
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51539
Cross-Site Request Forgery (CSRF) vulnerability in Apollo13Themes Apollo13 Framework Extensions.This issue affects Apollo13 Framework Extensions: from n/a through 1.9.1.
https://patchstack.com/database/vulnerability/apollo13-framework-extensions/wordpress-apollo13-framework-extensions-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-20T19:26:40.706Z
2024-01-05T09:44:29.762Z
2024-01-05T09:44:29.762Z
{'Vendor': 'Apollo13Themes', 'Product': 'Apollo13 Framework Extensions', 'Versions': 'n/a'}
CVE-2023-51885
Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via the length of the LaTeX string component.
https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
2023-12-26T00:00:00
2024-01-24T00:00:00
2024-01-24T16:56:10.156539
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51743
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Set Upstream Channel ID (UCID) parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform a Denial of Service (DoS) attack on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.229Z
2024-01-17T08:00:11.223Z
2024-01-17T08:00:11.223Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51714
An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check.
https://codereview.qt-project.org/c/qt/qtbase/+/524864
2023-12-22T00:00:00
2023-12-24T00:00:00
2023-12-24T20:27:31.747018
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51651
AWS SDK for PHP is the Amazon Web Services software development kit for PHP. Within the scope of requests to S3 object keys and/or prefixes containing a Unix double-dot, a URI path traversal is possible. The issue exists in the `buildEndpoint` method in the RestSerializer component of the AWS SDK for PHP v3 prior to 3.288.1. The `buildEndpoint` method relies on the Guzzle Psr7 UriResolver utility, which strips dot segments from the request path in accordance with RFC 3986. Under certain conditions, this could lead to an arbitrary object being accessed. This issue has been patched in version 3.288.1.
https://github.com/aws/aws-sdk-php/security/advisories/GHSA-557v-xcg6-rm5m
2023-12-20T22:12:04.737Z
2023-12-22T21:03:00.825Z
2024-01-08T15:45:25.963Z
{'Vendor': 'aws', 'Product': 'aws-sdk-php', 'Versions': '>= 3.0.0, < 3.288.1'}
CVE-2023-51201
Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack.
https://github.com/16yashpatel/CVE-2023-51201
2023-12-18T00:00:00
2024-01-23T00:00:00
2024-01-23T21:46:52.234857
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51016
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the setRebootScheCfg interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/10/EX1800T/TOTOlink%20EX1800T_V9.1.0cu.2112_B20220316%28setRebootScheCfg%29/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:23:06.147621
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51503
Authorization Bypass Through User-Controlled Key vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 6.9.2.
https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woopayments-plugin-6-6-2-unauthenticated-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-12-20T15:33:01.354Z
2023-12-31T17:59:28.385Z
2023-12-31T17:59:28.385Z
{'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'}
CVE-2023-51780
An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
2023-12-25T00:00:00
2023-12-25T00:00:00
2024-01-11T21:06:23.204643
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51411
Unrestricted Upload of File with Dangerous Type vulnerability in Shabti Kaplan Frontend Admin by DynamiApps.This issue affects Frontend Admin by DynamiApps: from n/a through 3.18.3.
https://patchstack.com/database/vulnerability/acf-frontend-form-element/wordpress-frontend-admin-by-dynamiapps-plugin-3-18-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve
2023-12-18T22:41:07.589Z
2023-12-29T13:50:21.393Z
2023-12-29T13:50:21.393Z
{'Vendor': 'Shabti Kaplan', 'Product': 'Frontend Admin by DynamiApps', 'Versions': 'n/a'}
CVE-2023-51104
A floating point exception (divide-by-zero) vulnerability was discovered in mupdf 1.23.4 in functon pnm_binary_read_image() of load-pnm.c line 527.
https://github.com/dongyuma/sox-defects/blob/main/mupdf-defects.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T14:24:53.133948
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51807
Cross Site Scripting vulnerability in OFCMS v.1.14 allows a remote attacker to obtain sensitive information via a crafted payload to the title addition component.
https://gitee.com/oufu/ofcms
2023-12-26T00:00:00
2024-01-16T00:00:00
2024-01-16T22:15:42.535116
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51387
Hertzbeat is an open source, real-time monitoring system. Hertzbeat uses aviatorscript to evaluate alert expressions. The alert expressions are supposed to be some simple expressions. However, due to improper sanitization for alert expressions in version prior to 1.4.1, a malicious user can use a crafted alert expression to execute any command on hertzbeat server. A malicious user who has access to alert define function can execute any command in hertzbeat instance. This issue is fixed in version 1.4.1.
https://github.com/dromara/hertzbeat/security/advisories/GHSA-4576-m8px-w9qj
2023-12-18T19:35:29.003Z
2023-12-22T20:46:29.236Z
2023-12-22T20:46:29.236Z
{'Vendor': 'dromara', 'Product': 'hertzbeat', 'Versions': '< 1.4.1'}
CVE-2023-51738
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Network Name (SSID) parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.227Z
2024-01-17T07:19:23.523Z
2024-01-17T07:19:23.523Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51954
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formSetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formSetIptv-d758f5dba8f646afaf5cddc6f8d3ec70
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T14:54:17.129467
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51779
bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.
https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
2023-12-25T00:00:00
2023-12-25T00:00:00
2023-12-25T23:35:44.906244
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51098
Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formSetDiagnoseInfo .
https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:22:59.161372
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51427
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak.
https://www.hihonor.com/global/security/cve-2023-51427/
2023-12-19T01:27:50.841Z
2023-12-29T03:30:31.955Z
2023-12-29T03:30:31.955Z
{'Vendor': 'Honor', 'Product': 'Magic OS', 'Versions': '7.0'}
CVE-2023-51535
Cross-Site Request Forgery (CSRF) vulnerability in СleanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20.
https://patchstack.com/database/vulnerability/cleantalk-spam-protect/wordpress-spam-protection-anti-spam-firewall-by-cleantalk-plugin-6-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-12-20T18:46:01.364Z
2024-01-05T09:57:44.974Z
2024-01-05T09:57:44.974Z
{'Vendor': 'СleanTalk - Anti-Spam Protection', 'Product': 'Spam protection, Anti-Spam, FireWall by CleanTalk', 'Versions': 'n/a'}
CVE-2023-51889
Stack Overflow vulnerability in the validate() function in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in the application URL.
https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
2023-12-26T00:00:00
2024-01-24T00:00:00
2024-01-24T17:15:05.392989
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51470
Deserialization of Untrusted Data vulnerability in Jacques Malgrange Rencontre – Dating Site.This issue affects Rencontre – Dating Site: from n/a through 3.11.1.
https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-11-1-authenticated-php-object-injection-vulnerability?_s_id=cve
2023-12-20T15:31:58.310Z
2023-12-29T12:55:43.526Z
2023-12-29T12:55:43.526Z
{'Vendor': 'Jacques Malgrange', 'Product': 'Rencontre – Dating Site', 'Versions': 'n/a'}
CVE-2023-51020
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘langType’ parameter of the setLanguageCfg interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langType/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:15:55.678685
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51962
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function setIptvInfo.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:24:54.260673
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51431
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause device service exceptions.
https://www.hihonor.com/global/security/cve-2023-51431/
2023-12-19T01:27:50.841Z
2023-12-29T03:43:09.979Z
2023-12-29T03:43:09.979Z
{'Vendor': 'Honor', 'Product': 'com.hihonor.phoneservice\t', 'Versions': '11.0.0.241'}
CVE-2023-51763
csv_builder.rb in ActiveAdmin (aka Active Admin) before 3.2.0 allows CSV injection.
https://github.com/activeadmin/activeadmin/commit/697be2b183491beadc8f0b7d8b5bfb44f2387909
2023-12-24T00:00:00
2023-12-24T00:00:00
2023-12-24T03:25:35.537322
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51734
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Identity parameter under Remote endpoint settings at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.227Z
2024-01-17T07:13:09.597Z
2024-01-17T07:13:09.597Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51688
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in impleCode eCommerce Product Catalog Plugin for WordPress.This issue affects eCommerce Product Catalog Plugin for WordPress: from n/a through 3.3.26.
https://patchstack.com/database/vulnerability/ecommerce-product-catalog/wordpress-ecommerce-product-catalog-plugin-for-wordpress-plugin-3-3-26-sensitive-data-exposure-vulnerability?_s_id=cve
2023-12-21T18:32:24.433Z
2023-12-29T14:53:55.107Z
2023-12-29T14:53:55.107Z
{'Vendor': 'impleCode', 'Product': 'eCommerce Product Catalog Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-51372
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HashBar – WordPress Notification Bar allows Stored XSS.This issue affects HashBar – WordPress Notification Bar: from n/a through 1.4.1.
https://patchstack.com/database/vulnerability/hashbar-wp-notification-bar/wordpress-hashbar-wordpress-notification-bar-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-18T15:51:57.414Z
2023-12-29T10:52:53.644Z
2023-12-29T10:52:53.644Z
{'Vendor': 'HasThemes', 'Product': 'HashBar – WordPress Notification Bar', 'Versions': 'n/a'}
CVE-2023-51722
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 3 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.226Z
2024-01-17T06:52:36.357Z
2024-01-17T06:52:36.357Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51958
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the function formGetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formGetIptv-0fcc584fcda44b1c837e42d5d732957a
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:07:56.790120
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51775
The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
https://bitbucket.org/b_c/jose4j/issues/212
2023-12-25T00:00:00
2023-12-25T00:00:00
2023-12-25T21:16:04.514276
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51074
json-path v2.8.0 was discovered to contain a stack overflow via the Criteria.parse() method.
https://github.com/json-path/JsonPath/issues/973
2023-12-18T00:00:00
2023-12-27T00:00:00
2023-12-27T20:56:22.383078
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51473
Unrestricted Upload of File with Dangerous Type vulnerability in Pixelemu TerraClassifieds – Simple Classifieds Plugin.This issue affects TerraClassifieds – Simple Classifieds Plugin: from n/a through 2.0.3.
https://patchstack.com/database/vulnerability/terraclassifieds/wordpress-terraclassifieds-plugin-2-0-3-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve
2023-12-20T15:31:58.310Z
2023-12-29T13:12:04.457Z
2023-12-29T13:12:04.457Z
{'Vendor': 'Pixelemu', 'Product': 'TerraClassifieds – Simple Classifieds Plugin', 'Versions': 'n/a'}
CVE-2023-51023
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to arbitrary command execution in the ‘host_time’ parameter of the NTPSyncWithHost interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031NTPSyncWithHost-host_time/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:12:02.731821
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51035
TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface.
https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:43:41.676433
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51432
Some Honor products are affected by out of bounds read vulnerability, successful exploitation could cause information leak.
https://www.hihonor.com/global/security/cve-2023-51432/
2023-12-19T01:27:50.842Z
2023-12-29T03:45:42.193Z
2023-12-29T03:45:42.193Z
{'Vendor': 'Honor', 'Product': 'Magic UI', 'Versions': '6.0'}
CVE-2023-51062
An unauthenticated log file read in the component log-smblog-save of QStar Archive Solutions RELEASE_3-0 Build 7 Patch 0 allows attackers to disclose the SMB Log contents via executing a crafted command.
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51062.md
2023-12-18T00:00:00
2024-01-13T00:00:00
2024-01-13T03:57:08.553837
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51961
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formGetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-formGetIptv-0fcc584fcda44b1c837e42d5d732957a
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T14:59:32.356690
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51127
FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.
https://github.com/risuxx/CVE-2023-51127
2023-12-18T00:00:00
2024-01-10T00:00:00
2024-01-10T20:45:19.455612
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51449
Gradio is an open-source Python package that allows you to quickly build a demo or web application for your machine learning model, API, or any arbitary Python function. Versions of `gradio` prior to 4.11.0 contained a vulnerability in the `/file` route which made them susceptible to file traversal attacks in which an attacker could access arbitrary files on a machine running a Gradio app with a public URL (e.g. if the demo was created with `share=True`, or on Hugging Face Spaces) if they knew the path of files to look for. This issue has been patched in version 4.11.0.
https://github.com/gradio-app/gradio/security/advisories/GHSA-6qm2-wpxq-7qh2
2023-12-19T15:19:39.615Z
2023-12-22T20:58:36.185Z
2023-12-22T20:58:36.185Z
{'Vendor': 'gradio-app', 'Product': 'gradio', 'Versions': '< 4.11.0'}
CVE-2023-51019
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘key5g’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-key5g/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:17:51.266498
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51737
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Preshared Phrase parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.227Z
2024-01-17T07:17:52.170Z
2024-01-17T07:17:52.170Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51371
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bit Assist Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget allows Stored XSS.This issue affects Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget: from n/a through 1.1.9.
https://patchstack.com/database/vulnerability/bit-assist/wordpress-chat-button-plugin-1-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-18T15:51:57.414Z
2023-12-29T10:58:40.309Z
2023-12-29T10:58:40.309Z
{'Vendor': 'Bit Assist', 'Product': 'Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating Chat Widget', 'Versions': 'n/a'}
CVE-2023-51721
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Time Server 2 parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.226Z
2024-01-17T06:51:49.772Z
2024-01-17T06:51:49.772Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51664
tj-actions/changed-files is a Github action to retrieve all files and directories. Prior to 41.0.0, the `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets. This issue may lead to arbitrary command execution in the GitHub Runner. This vulnerability has been addressed in version 41.0.0. Users are advised to upgrade.
https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63
2023-12-21T14:14:26.224Z
2023-12-27T16:58:31.908Z
2023-12-27T16:58:31.908Z
{'Vendor': 'tj-actions', 'Product': 'changed-files', 'Versions': '< 41.0.0'}
CVE-2023-51408
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StudioWombat WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce.This issue affects WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce: from n/a through 1.4.3.
https://patchstack.com/database/vulnerability/wp-optin-wheel/wordpress-wp-optin-wheel-plugin-1-4-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve
2023-12-18T22:41:07.589Z
2024-01-08T20:36:04.132Z
2024-01-08T20:36:04.132Z
{'Vendor': 'StudioWombat', 'Product': 'WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce', 'Versions': 'n/a'}